eDirectory

This entry is part 2 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

In part 1 of this article, we focused on the back-end retrieval of ACL information for use by a Provisioning Request Definition (PRD) in order to enable the form to reflect an administrator’s rights. In part 2, we will discuss how to use that information within the Form API.

By: rrawson
Aug 3, 2018
2:19 pm
Reads:
319
Score:
5
This entry is part 1 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

Making your administrative trustee rights reflect in the behavior of a PRD form is possible, but there are quite a few moving parts to make it happen. The story of this implementation will include several important steps including: Understanding how Trustee Rights (ACLs) work in eDirectory, Reviewing the client’s use case, Getting the rights to…

By: rrawson
Jul 27, 2018
4:33 pm
Reads:
338
Score:
4.5

So in a recent customer project I was wondering why a new JDBC driver did not sync the date of birth from user accounts to a database table. Everything else was working and the obvious checks for a typo or missing entry in filter or schema mapping  showed everything just fine. So I captured a…

+ read more

lhaeger
By: lhaeger
Jul 24, 2018
11:48 am
Reads:
339
Score:
5

Sometimes it may be nice to have a reliable way to get a quick summary of partitions and replicas from an eDirectory tree. This may be for troubleshooting, or as a record of the current status on a day-to-day basis. As a consultant a common request to a client is, “What partitions do you have defined,…

+ read more

By: ab
May 24, 2018
11:48 am
Reads:
595
Score:
5

A simple policy to allow one event to run only from the Subscriber channel of any given driver config. Add it as the first policy in the Subscriber Event Transformation Poilcyset (ETP) in order to permit one Subscriber event, then stop the driver config object on the second event.

By: ab
Feb 15, 2018
8:27 am
Reads:
813
Score:
5

FreeRADIUS is an effective and free product for setting up secure authentication to your wireless network by using the WPA2 Enterprise standard. You can use client certificates issued by the eDirectory Certificate Authority to authenticate your devices to eDirectory instead of using usernames and passwords. A benefit is that the password doesn’t need to be…

+ read more

Sep 28, 2017
11:04 am
Reads:
1,762
Score:
5

We recently held an essay contest inviting Micro Focus employees and customers to describe why they love using Micro Focus products. This entry was selected as the second-place winner in the Identity and Access Management solution group. The author, Paul Pedron, received the second-place prize. Take a look at the winning entry…

netiqcoolguys
Aug 17, 2017
10:13 am
Reads:
982
Score:
5

You may have seen issues where when working with the IDM User Application or IDMDash after a while, you seem to be logged in yet the application seems to not able to retrieve information from the directory. We first started seeing this behavior when OSP was added in to IDM at version 4.5…

By: rrawson
Jun 30, 2017
8:48 am
Reads:
1,902
Score:
5

The communication between IDM Azure AD Driver and Exchange Service is secured via SSL. We need to create and import a Server Certificate into the root certificate store of the Windows Server where Exchange Service is deployed…

vkarthik
By: vkarthik
Jun 16, 2017
9:45 am
Reads:
1,698
Score:
5

I was recently asked to help troubleshoot a perceived problem with Dynamic Groups.  While at first I thought the problem was non-working dynamic groups, in actuality the problem was less about Dynamic Groups on their own and more about IDM working with them, specifically creating them or setting their memberQuery attribute; the memberQuery attribute holds…

+ read more

By: ab
May 23, 2017
12:15 pm
Reads:
2,700
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow