Identity Manager

I think that collecting errors and discussing them can be pretty helpful in terms of any product. I have this dream of finding a product that has all possible errors documented with examples. One day, one day my dream shall be fulfilled. Not any time soon though. Thus my current approach of collecting errors I…

+ read more

geoffc
By: geoffc
Sep 21, 2018
1:29 pm
Reads:
83
Score:
Unrated

The Identity Governance product from Micro Focus is a great tool for ensuring that the accounts and permissions your employees have access to are properly governed. You probably have an Identity Management system that is in charge of provisioning and deprovisioning access for users based on Human Resource’s changes to their employment status. Yet, you…

+ read more

geoffc
By: geoffc
Sep 12, 2018
3:14 pm
Reads:
147
Score:
5
This entry is part 4 of 4 in the series Getting Started with Identity Governance

This entry is part 4 of 4 in the series Getting Started with Identity GovernanceI have been discussing the Identity Governance product in terms of interesting things I have noticed using it. I discussed the product, how to enable logging, and the identified the main configuration tools in the first article. In the second article…

+ read more

geoffc
By: geoffc
Sep 4, 2018
2:45 pm
Reads:
378
Score:
5
This entry is part 3 of 4 in the series Getting Started with Identity Governance

This entry is part 3 of 4 in the series Getting Started with Identity GovernanceI have been discussing the Identity Governance product in terms of interesting things I have noticed using it. In trying to resolve these issues, I have not usually found the answer in the documentation, since it is impossible to document everything….

+ read more

geoffc
By: geoffc
Aug 24, 2018
11:49 am
Reads:
272
Score:
4
This entry is part 2 of 4 in the series Getting Started with Identity Governance

This entry is part 2 of 4 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance that has a lot of new features and functionality. There is much to learn about this tool. In the first article in this series I started talking about the product, how to enable…

+ read more

geoffc
By: geoffc
Aug 17, 2018
8:12 am
Reads:
292
Score:
5
This entry is part 1 of 4 in the series Getting Started with Identity Governance

This entry is part 1 of 4 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance. This is a pretty neat tool that adds some important functionality. If you are familiar with Micro Focus/NetIQ/Novell Identity Manager then you will be familiar with many of the features in Identity Governance….

+ read more

geoffc
By: geoffc
Aug 9, 2018
12:10 pm
Reads:
431
Score:
5
This entry is part 2 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

In part 1 of this article, we focused on the back-end retrieval of ACL information for use by a Provisioning Request Definition (PRD) in order to enable the form to reflect an administrator’s rights. In part 2, we will discuss how to use that information within the Form API.

By: rrawson
Aug 3, 2018
2:19 pm
Reads:
318
Score:
5
This entry is part 1 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

Making your administrative trustee rights reflect in the behavior of a PRD form is possible, but there are quite a few moving parts to make it happen. The story of this implementation will include several important steps including: Understanding how Trustee Rights (ACLs) work in eDirectory, Reviewing the client’s use case, Getting the rights to…

By: rrawson
Jul 27, 2018
4:33 pm
Reads:
338
Score:
4.5

So in a recent customer project I was wondering why a new JDBC driver did not sync the date of birth from user accounts to a database table. Everything else was working and the obvious checks for a typo or missing entry in filter or schema mapping  showed everything just fine. So I captured a…

+ read more

lhaeger
By: lhaeger
Jul 24, 2018
11:48 am
Reads:
339
Score:
5

Approving a Workflow Programmatically. The IDM engine includes tokens for a great many functions, including a number of common workflow operations. These tokens are the bridge from the metadirectory side of IDM to the workflow side. While many important API calls are represented, there are dozens and dozens that are not. Recently, I had occasion to wish to have a workflow react to actions taken by the IDM engine…

By: rrawson
Jul 24, 2018
9:02 am
Reads:
433
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow