No author bio information
0 points earned on legacy (former) Cool Solutions site
380 points earned on this site
In this article, I will explain how to match a user with incomplete information using the Levenshtein distance algorithm to identify enough similarity. The problem…
How to implement AES encrypt and decrypt to NetIQ Identity Manager policies using standard ecmascript tools AES stands for Advanced Encryption Standard and is used as an encryption method in high security environments such as governmental data archives. It is a symmetric cryptographic algorithm meaning it can do crypting and decrypting making is quite useful…
This document explains how to make iManager work with Apache in a modern server environment without support for mod_jk. The servers tested are x86_64 RHEL6 / CentOS6 but these instructions apply to SUSE platforms as well.
This article is outdated, please look at my recent article guiding you to use Apache with iManager without mod_jk
In this AppNote, Pekka Kuronen shares an automatic process for making time-triggered events with IDM, in the spirit of crontab.
Pekka Kuronen shares a solution for quickly reformatting your eDirectory tree, in case of accidents or reinstalls.