Access Management

An organization may have a requirement to find out the number of active sessions and number of unique user’s session. This solution will enable NAM administrator to detect active user sessions, session details (for example session ID, last login time, Remote IP, IDP Roles etc.) and terminate user session(s).

Koushik Halder
Mar 7, 2018
2:16 pm
Reads:
526
Score:
5

NetIQ IDP can act as a SAML2 Identity Provider as well as a SAM2 Service Provider. In most cases, we configure NAM IDP as an Identity Provider to SaaS/Cloud-based Service Provider and use the organization’s network credentials to log in to SaaS applications. In this solution, I will explain how…

Koushik Halder
Feb 26, 2018
8:11 am
Reads:
691
Score:
5

This aims to join the dots between Identity Manager Role(s) and Access Manager Role(s) in a dynamic way. Firstly, we need to create a new custom shared attribute. The nrfMemberOf attribute holds all the currently active/assigned IDM Roles, whether they be Parent, Child or Group Roles. Next, we need to create a Virtual Attribute to…

+ read more

ScorpionSting
Feb 14, 2018
1:31 pm
Reads:
1,171
Score:
5

NetIQ Access Manager is a comprehensive Web Access Management solution to secure web resources across cloud, mobile and enterprise. It supports different federation protocols including SAML, WS-Fed, WS-Trust etc. SimpleSAMLphp is a simple application written in native PHP that deals with authentication. SimpleSAMLphp also supports several federation protocols, authentication mechanisms and can be used…

Nov 17, 2017
9:00 am
Reads:
1,275
Score:
Unrated

Akamai Enterprise Application Access (EAA) is a hybrid (cloud and on-premise) solution that shifts the attack surface of a DMZ in a secure cloud bastion. The whole idea is to control and secure access without any distinction between internal…

By: civ75
Oct 20, 2017
2:19 pm
Reads:
1,338
Score:
Unrated

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
782
Score:
5

There is no shortage of opinions about the dynamics of hybrid cloud growth and its effect on IT organizations. As such, I found CRN’s 2017 purchasing survey to be a worthwhile snapshot of priorities placed in front of today’s CIO’s and where they are investing the most in. You’ll notice in the survey that 3…

+ read more

Kent Purdy
Sep 14, 2017
8:35 am
Reads:
1,110
Score:
Unrated

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information that…

Koushik Halder
Aug 31, 2017
9:51 am
Reads:
1,216
Score:
5

As corporations continue their trend towards hybrid environments, IT organizations are discovering another level of complexity to their any, any, any initiatives. The reality is that for most environments hybrid isn’t as simple as cloud-only architectures. Included in the mix of hybrid complexity are the Identity and Access Management (IAM) capabilities that must span across…

+ read more

Kent Purdy
May 29, 2017
10:34 pm
Reads:
2,952
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
3,187
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow