Koushik Halder

Contact Koushik Halder

Member since
4/26/2014

No author bio information

User Points

0 points earned on legacy (former) Cool Solutions site
2905 points earned on this site

Author Archives

An organization may have a requirement to find out the number of active sessions and number of unique user’s session. This solution will enable NAM administrator to detect active user sessions, session details (for example session ID, last login time, Remote IP, IDP Roles etc.) and terminate user session(s).

Mar 7, 2018
2:16 pm
Reads:
537
Score:
5

NetIQ IDP can act as a SAML2 Identity Provider as well as a SAM2 Service Provider. In most cases, we configure NAM IDP as an Identity Provider to SaaS/Cloud-based Service Provider and use the organization’s network credentials to log in to SaaS applications. In this solution, I will explain how…

Feb 26, 2018
8:11 am
Reads:
702
Score:
5

NetIQ Access Governance (SailPoint IIQ) provides several Out of the Box (OOTB) Report Templates which can generate a report on inactive users, but there is no report template available which can display Inactive Identities with Active Application Account (i.e. IIQDisabled is null or false). This solution will explain the steps to build a custom…

Feb 13, 2018
8:35 am
Reads:
517
Score:
Unrated

NetIQ Access Governance (SailPoint IIQ 7) does not support aggregation of nested groups Out of the Box (OOTB). However, there is a way to process nested groups by writing custom bean-shell code (java based scripting language) in “Group Aggregation Refresh Rule”.

Jan 31, 2018
3:32 pm
Reads:
529
Score:
5

NAM Identity Provider authenticates the user based on configured contract, method and authentication class. NAM authentication classes are deployed in IDP servers and running as server-side code. If you would like to update user’s profile or execute some business logic (post-processing) without stopping or delaying regular login process, follow this solution to create…

Jan 17, 2018
7:01 am
Reads:
770
Score:
5

Koushik Halder shares a step-by-step process for creating a custom authentication class and how to perform authentication and authorization together. The class will also return authentication or authorization errors to the login form…

Oct 13, 2017
12:38 pm
Reads:
1,310
Score:
5

Geolocation dashboard shows a map with the number of logged in users in a specific geographical location. This solution will demonstrate how to use Maxmind Geolocation Provider with Analytics.

Oct 6, 2017
10:35 am
Reads:
1,205
Score:
5

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Sep 20, 2017
8:41 am
Reads:
787
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information…

Sep 8, 2017
1:25 pm
Reads:
959
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information that…

Aug 31, 2017
9:51 am
Reads:
1,225
Score:
5