Identity Manager

This entry is part 3 of 3 in the series Walking through an Integration Activity in User Application

This entry is part 3 of 3 in the series Walking through an Integration Activity in User ApplicationIn the previous article in this series I worked through the pre-activity of the Integration Activity action. Who would have thought so much work goes on, in such detail in the pre-activity, before we even start actually doing…

+ read more

geoffc
By: geoffc
Dec 5, 2016
12:22 pm
Reads:
96
Score:
Unrated

I decided that it would be helpful to produce a monthly report about our Identity Vault and its accounts and groups. So I began to write a shell script to produce my report. To start with…

By: stharp
Dec 1, 2016
11:24 am
Reads:
108
Score:
5

While users are the reason IAM exists, they really are the weakest link in security. Join our session at the Gartner IAM Summit at Caesar’s Palace in Las Vegas on Dec. 30th at 10:15am to explore real-world examples of malicious and negligent users that will leave you shaking your head.

Travis Greene
Nov 18, 2016
2:43 pm
Reads:
131
Score:
Unrated

In this article, I will explain how to match a user with incomplete information using the Levenshtein distance algorithm to identify enough similarity. The problem…

By: kuronen
Nov 18, 2016
12:32 pm
Reads:
173
Score:
Unrated

When working with a SOAP based web service, the communications take place over HTTP or preferably HTTPS (so they are secure) and usually have an XML based body with information in it. There is a language defined, WSDL, the Web Services Description Language, that is itself XML based and explains how the web service should…

+ read more

geoffc
By: geoffc
Nov 14, 2016
5:01 pm
Reads:
153
Score:
5

So I was browsing over the Micro Focus/NetIQ forums for a way to make a web service call to IDM 4.5 provisioning service. I found instructions in the documentation and also…

Nov 9, 2016
1:56 pm
Reads:
289
Score:
5

I don’t know about you, but every few months someone steals my credit card number, and I end up with a new card. It is no longer a question of if someone can get my personal information, but when. We all go to work every day to provide for our families. And in the blink…

+ read more

Kevin Hughes
Nov 4, 2016
8:30 am
Reads:
525
Score:
5
This entry is part 2 of 3 in the series Walking through an Integration Activity in User Application

This entry is part 2 of 3 in the series Walking through an Integration Activity in User ApplicationIn the first part of this article I discussed I would be reading through and explaining what I see in an example of the Integration Activity trace in User Application. The SOAP function I am trying to call…

+ read more

geoffc
By: geoffc
Nov 3, 2016
8:48 am
Reads:
252
Score:
Unrated

With the introduction of TLSv1.2 support for MS SQL servers (MS Tech Doc) one may notice that the Identity Manager JDBC connector may stall trying to make SSL connection to the MS SQL database using the jTDS third party drivers. The driver trace may show something like below…

By: vivekbm
Nov 3, 2016
8:00 am
Reads:
222
Score:
5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow