eDirectory

Just when you think it is safe to go back in the water, someone throws in a Shark. I have spent some time getting familiar with the SysVinit processes, and how to run NDSD Command Options. Anybody familiar with troubleshooting eDirectory probably knows about this; rcndsd start -ndb That starts NDSD without loading the database….

+ read more

tse7147
By: tse7147
Jan 9, 2017
2:13 pm
Reads:
259
Score:
5

Novell Audit Platform Agent 2011.1r3 allows non-root installation. Steps to configure PA for non-root eDirectory server…

By: rraghu1
Jan 9, 2017
12:16 am
Reads:
192
Score:
Unrated

With the introduction of TLSv1.2 support for MS SQL servers (MS Tech Doc) one may notice that the Identity Manager JDBC connector may stall trying to make SSL connection to the MS SQL database using the jTDS third party drivers. The driver trace may show something like below…

By: vivekbm
Nov 3, 2016
8:00 am
Reads:
411
Score:
5

From time to time, questions arise as to how to secure eDirectory, often based on somebody’s idea of a “security scan” throwing out nasty sounding messages. A while back, I looked in to what could be done, and what the benefits and costs are of modifying some of the default permissions…

dgersic
By: dgersic
Oct 20, 2016
8:16 am
Reads:
349
Score:
5

During the upgrade from IDM 4.0.2 to 4.5 IDM needs JDK 1.8, but if you run your iManager with JDK 1.8 and try to make use of the SecretStore plugin, you will see this error: Error: Monitor SecretStore failed. -1 Decoding Error: sun/io/ByteToCharConverter…

By: nsanson
May 11, 2016
4:19 pm
Reads:
1,322
Score:
Unrated

eDirectory comes with PKI (Public Key Infrastructure) components built in. The most obvious manifestation of this is the Certificate Authority that is created on the first server in each tree. This is used to make X.509 Certificates that are used by eDirectory for a number of services. (LDAP with SSL/TLS, iMonitor’s HTTP stack for SSL/TLS…

+ read more

geoffc
By: geoffc
Apr 14, 2016
10:54 am
Reads:
1,149
Score:
5

If you’re attending this year’s Gartner IAM Summit, things might be a bit different than what you’re used to. I’ve attended other Gartner events this year, as well as other industry IAM-related events, and the thing I’ve noticed is that IAM is no longer on an island. Where IAM was seen as black magic by…

+ read more

Travis Greene
Nov 20, 2015
4:38 pm
Reads:
992
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow