Security

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
132
Score:
5

There is no shortage of opinions about the dynamics of hybrid cloud growth and its effect on IT organizations. As such, I found CRN’s 2017 purchasing survey to be a worthwhile snapshot of priorities placed in front of today’s CIO’s and where they are investing the most in. You’ll notice in the survey that 3…

+ read more

Kent Purdy
Sep 14, 2017
8:35 am
Reads:
158
Score:
Unrated

A Designer plugin that displays the version (as displayed in Help – About) and connect mode (NCP or LDAP) in the window title, defaulting to something like “Designer 4.6.1 (LDAP)”.

lhaeger
By: lhaeger
Sep 13, 2017
9:19 am
Reads:
225
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information…

Koushik Halder
Sep 8, 2017
1:25 pm
Reads:
178
Score:
5

Identity injection allows you to add information to the URL, Custom Header, or to the HTML page before it is posted to a Web server. The Web server uses this information to determine whether the user can have access to the resource, so it is the Web server that determines the information that…

Koushik Halder
Aug 31, 2017
9:51 am
Reads:
329
Score:
5

It is good to know that in the recently concluded essay contest on describing what’s great about Micro Focus products, the winning entry on IAM did deal quite a bit with the IDM Rest Driver. The best part about this driver is that it is Generic…

By: sdhaval
Aug 28, 2017
1:38 pm
Reads:
314
Score:
Unrated

Have you ever wanted a workflow form to be able to query for something in one of your drivers? Maybe you want to pre-fill form data, or maybe you want to validate data entered without storing it within the identity vault. The IDVault object in IDM is used to query the IDVault only, but recently…

+ read more

By: rrawson
Aug 4, 2017
2:35 pm
Reads:
336
Score:
5

Supporting OSP with third party products can be tricky, and changing its default configurations that don’t work too well with IDPs can be trickier. It may come as a surprise (it was to me) that these configurations can be changed. And changing these is not a very difficult proposition as well. OSP bundles its default…

+ read more

By: sdhaval
Aug 1, 2017
3:19 pm
Reads:
338
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow