Koushik Halder

Contact Koushik Halder

Member since
4/26/2014

No author bio information

User Points

0 points earned on legacy (former) Cool Solutions site
2350 points earned on this site

Author Archives

NetIQ Access Governance (SailPoint IIQ) provides several Out of the Box (OOTB) Report Templates which can generate a report on inactive users, but there is no report template available which can display Inactive Identities with Active Application Account (i.e. IIQDisabled is null or false). This solution will explain the steps to build a custom…

Feb 13, 2018
8:35 am
Reads:
93
Score:
Unrated

NetIQ Access Governance (SailPoint IIQ 7) does not support aggregation of nested groups Out of the Box (OOTB). However, there is a way to process nested groups by writing custom bean-shell code (java based scripting language) in “Group Aggregation Refresh Rule”.

Jan 31, 2018
3:32 pm
Reads:
200
Score:
5

NAM Identity Provider authenticates the user based on configured contract, method and authentication class. NAM authentication classes are deployed in IDP servers and running as server-side code. If you would like to update user’s profile or execute some business logic (post-processing) without stopping or delaying regular login process, follow this solution to create…

Jan 17, 2018
7:01 am
Reads:
322
Score:
5

Koushik Halder shares a step-by-step process for creating a custom authentication class and how to perform authentication and authorization together. The class will also return authentication or authorization errors to the login form…

Oct 13, 2017
12:38 pm
Reads:
914
Score:
5

Geolocation dashboard shows a map with the number of logged in users in a specific geographical location. This solution will demonstrate how to use Maxmind Geolocation Provider with Analytics.

Oct 6, 2017
10:35 am
Reads:
938
Score:
5

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Sep 20, 2017
8:41 am
Reads:
586
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information…

Sep 8, 2017
1:25 pm
Reads:
671
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information that…

Aug 31, 2017
9:51 am
Reads:
948
Score:
5

This article explains how you can map your organization’s AD groups to AWS IAM Roles with the help of Attribute Retrieval and Transformation (Virtual Attribute).…

Aug 16, 2017
10:05 am
Reads:
855
Score:
5

In part 1 of this article, I explained how Access Manager can be configured as a trusted Identity Provider to enable single sign on to AWS Management Console with a single Role (constant value) using SAML federation. As you configure multiple roles in AWS…

Jul 21, 2017
9:46 am
Reads:
859
Score:
5