Aegis

The Directory and Resource Administrator 9.1 Service Pack 1 is generally available. This release includes several important fixes in the Web Console. To know more about the issues addressed in this release see the Release Notes…

Nov 10, 2017
8:30 am
Reads:
152
Score:
Unrated

All of the ciphers listed are Forward Secrecy (FS) enabled and are highly recommended. They work with pretty much everything you could possibly run into at…

May 4, 2017
5:29 pm
Reads:
1,597
Score:
5

The Get Value from List Activity has been knocking around my lab for a few years, pretty much without a purpose in many ways outside of my environment. The reason for this is it accepts a list at input, and well no activity or other source available in the product or here on the Community…

+ read more

Martin Cotter
May 9, 2016
8:43 am
Reads:
1,184
Score:
Unrated
This entry is part 8 of 8 in the series Aegis Workflow 101

This entry is part 8 of 8 in the series Aegis Workflow 101Welcome to Part 8 and the final topic on Aegis 101.  A line had to be drawn as to what would make it into 101 and it ends here with a topic I’ve had a love/hate relationship with since its arrival, but I am…

+ read more

Martin Cotter
May 4, 2016
4:06 pm
Reads:
1,579
Score:
Unrated
This entry is part 7 of 8 in the series Aegis Workflow 101

This entry is part 7 of 8 in the series Aegis Workflow 101Welcome to Part 7 of Aegis Workflow 101.  Error Handling in workflows allows workflows to recover from an error in an activity and to complete a workitem in a controlled manner. First of all – What is an Activity Error?  Activity errors have 2…

+ read more

Martin Cotter
May 3, 2016
11:56 am
Reads:
1,213
Score:
Unrated
This entry is part 6 of 8 in the series Aegis Workflow 101

This entry is part 6 of 8 in the series Aegis Workflow 101Welcome to Part 6 of Aegis Workflow 101.  Decision support in Aegis allows users to choose how workflows are started, which flows in a workflow are followed and what decisions need to manual intervention by a user at run-time. Decision Making in Aegis is…

+ read more

Martin Cotter
Apr 28, 2016
8:37 am
Reads:
1,068
Score:
Unrated
This entry is part 5 of 8 in the series Aegis Workflow 101

This entry is part 5 of 8 in the series Aegis Workflow 101Welcome to Part 5 of Aegis Workflow 101. This time we look at variables and their use (and misuse) in Aegis. Variables in Aegis are storage locations where you can store, retrieve and modify data. Like programming, in Aegis we have Global Variables…

+ read more

Martin Cotter
Apr 22, 2016
3:29 pm
Reads:
1,147
Score:
Unrated
This entry is part 4 of 8 in the series Aegis Workflow 101

This entry is part 4 of 8 in the series Aegis Workflow 101Welcome to Part 4 of Aegis Workflow 101.  This time we look at Triggers which define the conditions when workitems should start as well as well as other behavior which we will learn about below. In the last topic we learned about events.  When…

+ read more

Martin Cotter
Apr 20, 2016
10:43 am
Reads:
1,418
Score:
Unrated
This entry is part 3 of 8 in the series Aegis Workflow 101

This entry is part 3 of 8 in the series Aegis Workflow 101Welcome to Part 3 of Aegis Workflow 101.  This time we look at Events which act as signals to Aegis to perform some action, from meeting the criteria to starting a workitem to signalling a workitem should end.  Inside the Aegis Web Console Aegis events…

+ read more

Martin Cotter
Apr 14, 2016
12:26 pm
Reads:
1,635
Score:
Unrated
This entry is part 2 of 8 in the series Aegis Workflow 101

This entry is part 2 of 8 in the series Aegis Workflow 101Welcome to Part 2 of Aegis Workflow 101.  This time we look at Input Builder which is a basic but very powerful component of Aegis workflow design. Looking back at Part 1, we build a ‘Hello World’ workflow which used the echo activity…

+ read more

Martin Cotter
Apr 8, 2016
2:11 pm
Reads:
1,549
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow