Cool Tools

Shell script with a set of bash functions that build the SOAP requests to perform common tasks using RBPM 4.5 role SOAP endpoints. To use download the script, source it in a command terminal or other script and call the functions with the parameters. All functions provide a basic usage message if called without parameters.

By: ffreitas
May 13, 2015
5:25 pm
Reads:
136
Score:
5

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
652
Score:
Unrated

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
544
Score:
Unrated

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
652
Score:
Unrated

Welcome to part 2 of the Remote Execution Adapter for Aegis. In this second part I provide the server side adapter, instructions on how to install and configure as well as descriptions of each activity. Part 1 is available here – Please ensure you download the client and server files from part1 and part2 at…

+ read more

Martin Cotter
Mar 24, 2015
4:21 pm
Reads:
570
Score:
Unrated

Recently I had the opportunity to collaborate with a customer and NetIQ development in enhancing a regular expression check that allows multiple expressions against multiple files. The check also allows the ability to confirm if a file is present or not, and allow the logic of deciding if the check will have a…

Mar 19, 2015
12:28 pm
Reads:
939
Score:
Unrated

Designing IT Process Automation workflows very often comprises of taking a manually documented process and converting it into an automated process, maintaining the logical steps and as many of the techniques used in the manual process as possible. Manual processes can include heterogeneous automated steps utilizing customized scripts which may have been in place for…

+ read more

Martin Cotter
Mar 18, 2015
12:23 pm
Reads:
630
Score:
Unrated

NetIQ Access Manager can use OID (Oracle Internet Directory) as an identity source by using this custom LDAP server plug-in. The LDAP server plug-ins for NAM are incredibly simple because a mapping of attributes is all that is necessary since NAM already uses the LDAP protocol.

By: wbusath
Mar 16, 2015
12:34 pm
Reads:
612
Score:
Unrated

The String Replace Map activity takes an input string, and replaces all occurrences of characters/strings based on a map table. In Europe we are normally more concerned with preserving non English Language characters in pieces of text than removing them, so when i got asked about this it was an interesting reversal of a problem I…

+ read more

Martin Cotter
Mar 2, 2015
12:13 pm
Reads:
704
Score:
Unrated

Welcome to Part 4 of Hyper-V Integration Activities for NetIQ Aegis. This is a 4 part cool tool Activity Library which will introduce and extend the functionality with new activities in each part bringing the power of Aegis Automation to Hyper-V environments.

Martin Cotter
Feb 25, 2015
11:23 am
Reads:
718
Score:
Unrated