Technical Solutions

I think that collecting errors and discussing them can be pretty helpful in terms of any product. I have this dream of finding a product that has all possible errors documented with examples. One day, one day my dream shall be fulfilled. Not any time soon though. Thus my current approach of collecting errors I…

+ read more

geoffc
By: geoffc
Sep 21, 2018
1:29 pm
Reads:
29
Score:
Unrated

The Identity Governance product from Micro Focus is a great tool for ensuring that the accounts and permissions your employees have access to are properly governed. You probably have an Identity Management system that is in charge of provisioning and deprovisioning access for users based on Human Resource’s changes to their employment status. Yet, you…

+ read more

geoffc
By: geoffc
Sep 12, 2018
3:14 pm
Reads:
129
Score:
5

This document provides information on how to configure Advanced Authentication with VMware View. To configure the Advanced Authentication integration with VMware View you’ll have to perform the following configuration tasks…

By: whenz
Sep 7, 2018
2:18 pm
Reads:
185
Score:
Unrated
This entry is part 4 of 4 in the series Getting Started with Identity Governance

This entry is part 4 of 4 in the series Getting Started with Identity GovernanceI have been discussing the Identity Governance product in terms of interesting things I have noticed using it. I discussed the product, how to enable logging, and the identified the main configuration tools in the first article. In the second article…

+ read more

geoffc
By: geoffc
Sep 4, 2018
2:45 pm
Reads:
361
Score:
5
This entry is part 3 of 4 in the series Getting Started with Identity Governance

This entry is part 3 of 4 in the series Getting Started with Identity GovernanceI have been discussing the Identity Governance product in terms of interesting things I have noticed using it. In trying to resolve these issues, I have not usually found the answer in the documentation, since it is impossible to document everything….

+ read more

geoffc
By: geoffc
Aug 24, 2018
11:49 am
Reads:
257
Score:
4

NetIQ Access Manager 4.4 SP1 and later versions of Access Manager are supported to be deployed in leading public clouds such as AWS and Azure. The NAM_Deploy_AC_IDP_MAG_v1.yml CloudFormation Template (CFT) attached in this tool can be used to deploy the Access Manager components in AWS in the selected VPC This CFT will do the following:…

+ read more

G Nataraj
By: G Nataraj
Aug 24, 2018
10:08 am
Reads:
276
Score:
Unrated
This entry is part 2 of 4 in the series Getting Started with Identity Governance

This entry is part 2 of 4 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance that has a lot of new features and functionality. There is much to learn about this tool. In the first article in this series I started talking about the product, how to enable…

+ read more

geoffc
By: geoffc
Aug 17, 2018
8:12 am
Reads:
281
Score:
5

AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet. Correlated events in Sentinel can be automatically provisioned to AbuseIPDB using the following script with the Execute Action. Due to Bug # 944428, you will require at least Execute a Command 2011.1r2 or greater.

ScorpionSting
Aug 10, 2018
4:24 pm
Reads:
315
Score:
5
This entry is part 1 of 4 in the series Getting Started with Identity Governance

This entry is part 1 of 4 in the series Getting Started with Identity GovernanceNetIQ has a new product called Identity Governance. This is a pretty neat tool that adds some important functionality. If you are familiar with Micro Focus/NetIQ/Novell Identity Manager then you will be familiar with many of the features in Identity Governance….

+ read more

geoffc
By: geoffc
Aug 9, 2018
12:10 pm
Reads:
410
Score:
5
This entry is part 2 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

In part 1 of this article, we focused on the back-end retrieval of ACL information for use by a Provisioning Request Definition (PRD) in order to enable the form to reflect an administrator’s rights. In part 2, we will discuss how to use that information within the Form API.

By: rrawson
Aug 3, 2018
2:19 pm
Reads:
307
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow