Security

This entry is part 2 of 2 in the series Getting Started with Identity Governance

This entry is part 2 of 2 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance that has a lot of new features and functionality. There is much to learn about this tool. In the first article in this series I started talking about the product, how to enable…

+ read more

geoffc
By: geoffc
Aug 17, 2018
8:12 am
Reads:
33
Score:
5

AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet. Correlated events in Sentinel can be automatically provisioned to AbuseIPDB using the following script with the Execute Action. Due to Bug # 944428, you will require at least Execute a Command 2011.1r2 or greater.

ScorpionSting
Aug 10, 2018
4:24 pm
Reads:
97
Score:
5
This entry is part 1 of 2 in the series Getting Started with Identity Governance

This entry is part 1 of 2 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance. This is a pretty neat tool that adds some important functionality. If you are familiar with Micro Focus/NetIQ/Novell Identity Manager then you will be familiar with many of the features in Identity Governance….

+ read more

geoffc
By: geoffc
Aug 9, 2018
12:10 pm
Reads:
164
Score:
5
This entry is part 2 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

In part 1 of this article, we focused on the back-end retrieval of ACL information for use by a Provisioning Request Definition (PRD) in order to enable the form to reflect an administrator’s rights. In part 2, we will discuss how to use that information within the Form API.

By: rrawson
Aug 3, 2018
2:19 pm
Reads:
152
Score:
5

I’m pleased to announce the general availability of Secure Configuration Manager 7.1. What’s New: Ability to Create an Exception for Multiple Policy Templates, Reduce the Opportunity for Duplicate or Similar Exceptions, Policy Templates Certified by the Center for Internet Security for Windows Server 2012 R2 and 2016, and more…

Jul 30, 2018
2:17 pm
Reads:
130
Score:
Unrated
This entry is part 1 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

Making your administrative trustee rights reflect in the behavior of a PRD form is possible, but there are quite a few moving parts to make it happen. The story of this implementation will include several important steps including: Understanding how Trustee Rights (ACLs) work in eDirectory, Reviewing the client’s use case, Getting the rights to…

By: rrawson
Jul 27, 2018
4:33 pm
Reads:
198
Score:
4.5

How to enable SAML2 federation on existing java web application? There are many scenarios where in-house applications are developed and have their own authentication mechanism. To enable Single Sign On using SAML2 federation on this kind of application, it needs additional code and configuration. This can be achieved in many ways writing java code, some…

+ read more

By: cstumula
Jul 26, 2018
9:34 am
Reads:
181
Score:
Unrated

So in a recent customer project I was wondering why a new JDBC driver did not sync the date of birth from user accounts to a database table. Everything else was working and the obvious checks for a typo or missing entry in filter or schema mapping  showed everything just fine. So I captured a…

+ read more

lhaeger
By: lhaeger
Jul 24, 2018
11:48 am
Reads:
223
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow