No author bio information
0 points earned on legacy (former) Cool Solutions site
2155 points earned on this site
In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…
Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager
Policy Types and Extensions There are different type of policies in NetIQ Access Manager, namely Authorization Policies, ID Injection Policies, Form Fill Policies, Role Assignment Policies and External Attributes Policies. The existing capabilities in Access Manager will suit for most of the general use cases. But sometimes it is necessary to write some custom code…
This article provides the steps for configuring a Windows WCF Web Service application and configuring a WCF client application for authenticating and accepting tokens from NetIQ Access Manager WS-Trust.
This document describes how to integrate Oracle EBS(OEBS) with NetIQ Access Manager to provide Single Sign On capability.
In this Appnote, Sureshkumar T explains how to set up a SUSE Firewall configuration that works with the SSL VPN Component of Access Manager.