Access Management

This document provides information on how to configure Advanced Authentication with VMware View. To configure the Advanced Authentication integration with VMware View you’ll have to perform the following configuration tasks…

By: whenz
Sep 7, 2018
2:18 pm
Reads:
608
Score:
Unrated
This entry is part 2 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

In part 1 of this article, we focused on the back-end retrieval of ACL information for use by a Provisioning Request Definition (PRD) in order to enable the form to reflect an administrator’s rights. In part 2, we will discuss how to use that information within the Form API.

By: rrawson
Aug 3, 2018
2:19 pm
Reads:
557
Score:
5

How to enable SAML2 federation on existing java web application? There are many scenarios where in-house applications are developed and have their own authentication mechanism. To enable Single Sign On using SAML2 federation on this kind of application, it needs additional code and configuration. This can be achieved in many ways writing java code, some…

+ read more

By: cstumula
Jul 26, 2018
9:34 am
Reads:
595
Score:
Unrated

Here is a summary of resources available regarding deploying and using Access Manager on Public cloud – AWS and Azure.

Jul 20, 2018
10:03 am
Reads:
458
Score:
Unrated

NetIQ Access Manager 4.4 provides a rich set of REST Endpoints for NAM such as components Administration and OAuth/OpenID Management. EasyNAMClient uses those Rest Endpoints to provide a learning tool to new NAM users. This tool can be used by NAM/OAuth beginners as a starting point to explore NAM REST Endpoints and to write…

Jul 18, 2018
2:11 pm
Reads:
777
Score:
Unrated

NetIQ Access Manager supports the SAML2 bearer grant. Access Manager supports only the authorization grant flow for assertion and the assertion is used for authenticating the user. You can use SAML2 assertions to request an access token. Access Manager validates the assertion and generates the access token for accessing OAuth protected resources. But the…

By: cstumula
Jul 18, 2018
1:45 pm
Reads:
389
Score:
Unrated

Modern application development interacts with multiple services. These services can be internal or external. Most of the services are developed with Oauth2 support. When the user or mobile access a service, that particular service might be interacting with other services either internal or cloud service. To access other services, it needs the access token….

By: cstumula
Jul 13, 2018
12:29 pm
Reads:
392
Score:
Unrated

User Behavioral Analytics (UBA) is a security process that observes the normal patterns of users’ behaviour and uses machine learning algorithms or statistical methods to detect deviations from normal patterns. The premise of UBA is that it is easier to steal user’s credentials than to actually mimic the user’s behaviour once the intruder has taken…

+ read more

By: jmdmajid
Jul 2, 2018
1:50 pm
Reads:
709
Score:
5

In the Access Manager documentation the Port Redirection script works only for SUSE. I have modified the script and added a few more steps to run it on Redhat 7.x, which is using systemd. Follow the steps below…

By: vjohari
Jun 29, 2018
5:18 pm
Reads:
588
Score:
4

Using a SAML 2.0 connection, the service provider (web services or SaaS applications) trusts the identity provider (NAM IDP) to validate the user’s authentication credentials and to send identity information about the authenticated user. The service provider accepts the data and uses it to give the user access to…

Koushik Halder
Jun 20, 2018
8:55 am
Reads:
679
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow