Identity Manager

This migration tool helps you migrate the client settings from one Identity Manager instance to another.

Mar 24, 2017
9:30 am
Reads:
140
Score:
5

IDM 4.6 Dashboard introduces a new feature to customize UI settings, behavior, branding, and access to the application through client settings. There can be multiple such client settings on a single identity manager instance and different sets of users can map to different clients. This would allow users to have a different look and feel,…

+ read more

By: sumanr
Mar 24, 2017
9:06 am
Reads:
111
Score:
5

This feature will enable customers to have functionality to approve or reject an approval task via email. One can directly respond to the pending approval task without logging into Identity Manager. Once this feature is turned on from configuration and notify by email is selected in workflow definition with required email notification template,…

Mar 23, 2017
9:06 am
Reads:
193
Score:
5

This is a bash script to bulk create LDAP users and add them to a new group. It has been verified via LDAP with eDirectory, but is only intended for testing and troubleshooting purposes. Sometimes you just need a ton of users and would rather not go through the trouble…

By: tdharris
Mar 8, 2017
1:17 pm
Reads:
268
Score:
4

Using packages, to manage code between your IDM environments, allows for consistent transfer of code and easy management. Sharing packages between multiple team members can become cumbersome, unless you setup your own repository. The below Linux script can move built packages from an FTP directory (specified by the variable ${FTPSRCDIR}) to a web directory (under…

+ read more

ScorpionSting
Mar 6, 2017
11:55 am
Reads:
311
Score:
5

With the release of IDM 3.6 and the RBPM (Roles Based Provisioning Module) in the 3.7 version of User Application, the approach of using Roles to grant permissions began to take form. This was modified with the addition of Resources in UA 3.7 which was a fairly big change. Originally, a Role granted another Role,…

+ read more

geoffc
By: geoffc
Feb 28, 2017
1:30 pm
Reads:
390
Score:
5

This is the continuation of Creating the application Client ID and Client Secret from Microsoft Azure new portal – Part 1 which guides you to generate Client ID and Client Secret from the Microsoft Azure New portal. In this post we will guide you to generate Client ID and Client Secret from the Microsoft Azure…

+ read more

By: vkarthik
Feb 23, 2017
9:52 am
Reads:
1,666
Score:
5
This entry is part 6 of 6 in the series Following a Role Grant in the RRSD Driver

In the previous article I was showing how the Role and Resource objects get linked via a ResourceAssociation object, which the Roles and Resource Service Driver (RRSD) events upon and implements. But that example had an error with permissions, such that the RRSD object did not have sufficient eDirectory permissions to modify the User objects…

geoffc
By: geoffc
Feb 16, 2017
10:54 am
Reads:
581
Score:
5
This entry is part 5 of 6 in the series Following a Role Grant in the RRSD Driver

This entry is part 5 of 6 in the series Following a Role Grant in the RRSD DriverIn the first four articles of this series, I discussed what you see in the Roles and Resources Service Driver (RRSD) when different events are triggered out of the User Application. When you are in the User Application,…

+ read more

geoffc
By: geoffc
Feb 7, 2017
12:02 pm
Reads:
463
Score:
5

One of the primary deployment use cases for any IDM customer is to provide a single sign-on access to the User Application for their users from outside the enterprise, mostly for the employees working remotely. In this case, no customer would want to give direct access to IDM URL or keep the IDM in…

Feb 7, 2017
11:25 am
Reads:
715
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow