Collaboration

NetIQ Access Manager supports the SAML2 bearer grant. Access Manager supports only the authorization grant flow for assertion and the assertion is used for authenticating the user. You can use SAML2 assertions to request an access token. Access Manager validates the assertion and generates the access token for accessing OAuth protected resources. But the…

By: cstumula
Jul 18, 2018
1:45 pm
Reads:
156
Score:
Unrated

Modern application development interacts with multiple services. These services can be internal or external. Most of the services are developed with Oauth2 support. When the user or mobile access a service, that particular service might be interacting with other services either internal or cloud service. To access other services, it needs the access token….

By: cstumula
Jul 13, 2018
12:29 pm
Reads:
174
Score:
Unrated

User Behavioral Analytics (UBA) is a security process that observes the normal patterns of users’ behaviour and uses machine learning algorithms or statistical methods to detect deviations from normal patterns. The premise of UBA is that it is easier to steal user’s credentials than to actually mimic the user’s behaviour once the intruder has taken…

+ read more

By: jmdmajid
Jul 2, 2018
1:50 pm
Reads:
377
Score:
Unrated

In the Access Manager documentation the Port Redirection script works only for SUSE. I have modified the script and added a few more steps to run it on Redhat 7.x, which is using systemd. Follow the steps below…

By: vjohari
Jun 29, 2018
5:18 pm
Reads:
295
Score:
4

This cool solution will provide directions on how to configure NetIQ Access Manager Single Sign-on using Azure Active Directory as your identity provider. To do this configuration you need a Microsoft Azure Active Directory account…

By: cstumula
Oct 23, 2017
2:14 pm
Reads:
2,130
Score:
4

Akamai Enterprise Application Access (EAA) is a hybrid (cloud and on-premise) solution that shifts the attack surface of a DMZ in a secure cloud bastion. The whole idea is to control and secure access without any distinction between internal…

By: civ75
Oct 20, 2017
2:19 pm
Reads:
1,719
Score:
Unrated

Geolocation dashboard shows a map with the number of logged in users in a specific geographical location. This solution will demonstrate how to use Maxmind Geolocation Provider with Analytics.

Koushik Halder
Oct 6, 2017
10:35 am
Reads:
1,410
Score:
5

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
963
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information…

Koushik Halder
Sep 8, 2017
1:25 pm
Reads:
1,268
Score:
5

We were trying to hunt for a diagram that showed a combined, generic consolidated overview of Identity, Security, and Access Management that was slightly biased towards Micro Focus. After a few hours on Google, we gave up and created our own.

ScorpionSting
May 16, 2017
10:28 am
Reads:
2,173
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow