No author bio information
0 points earned on legacy (former) Cool Solutions site
1425 points earned on this site
Identity Manager has very good facilities for dealing with XML files right out of the box. JSON parsing, however, usually means using an XPATH token to call your own custom ECMA code to parse the JSON object and return values and/or XML that can be manipulated by the IDM driver’s policies. To make it easier to retrieve data from…
The module IATools was initially created to simplify creation and usage of tab interfaces in User Application/RBPM. Its usage is simple – either embed the code inline in a form’s script tab or save it in a web server’s URL and point to it as an external resource. After that call the initial setup and…
Shell script with a set of bash functions that build the SOAP requests to perform common tasks using RBPM 4.5 role SOAP endpoints. To use download the script, source it in a command terminal or other script and call the functions with the parameters. All functions provide a basic usage message if called without parameters.
This article will guide the reader in a graphical way through IDM Out-of-Band events. It assumes that the reader is already familiar with IDM and basic trace reading.
This article will guide the reader in a graphical way though IDM Traces. It assumes that the reader is already familiar with IDM and basic trace reading.
The JDBC driver has several different modes of operation. The schema-unaware mode is when the driver behaves as a pass-through for sql statements, and usually used in a Subscriber-only setup. This article shows policies and methodologies that allow you to use it in publisher-only mode, and can be modified to allow full bi-directional sync in schema-unaware mode.
The purpose for this article is to present a way of enabling JMX on IDM 3.6.1 JVM on SLES 11, allowing remote monitoring of the JVM itself. The remote monitoring will expose Java memory and Heap usage, Thread usage, loaded classes, CPU usage, among other options.
It will cover how to monitor a system without any level of security (useful only in Dev/QA environment) and also how to enable security on the JMX connections, both through authentication and SSL.
Novell Identity Manager has a powerful tracing mechanism that can be used to track most of what is happening behind the scenes in your IDM implementation. To tap into that capability is very simple, and can be a valuable resource during development of the driver and also to troubleshoot issues in production.
Fernando Freitas shares some IDM rules that help you convert a structured syntax attribute to two different eDirectory formats.