Technical Solutions

Many years ago I worked with a client who used Lotus Notes and wanted to send password changes to Notes. Out of that work, a number of articles got written. The thing about Lotus Notes, now called Domino, no more Lotus in the name, owned by IBM is that there are multiple passwords involved in the process. Now as an eDirectory fan, there is very much a throwing stones in a glass house vibe when I talk about number of passwords in a system.

geoffc
By: geoffc
May 4, 2015
10:12 am
Reads:
28
Score:
Unrated

Google Chrome book is gaining popularity especially among education institutes for various reasons. Some are, Google offers subscription at discounted cost for educational institutes. Google Admin Console Device management is simple and easy to control devices. Google provides number of services includes Mail, Google Drive, Calendar, Messenger, etc., as complete suite of services for an Organization. Redistribution of Chromebook is easy with powerwash, this deletes all data and reinstate the device as new.

By: cstumula
Apr 24, 2015
4:48 pm
Reads:
113
Score:
Unrated

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
358
Score:
Unrated

This post describes the method we used to migrate the database from MySQL to PostgreSQL for our JBoss based UserApp installations on SLES (IDM 4.0.2). This is achieved by reinstalling both JBoss with PostgreSQL and the UserApp, and then exporting the db from MySQL and importing it into PostgreSQL. Please note that the newly installed…

+ read more

By: lbert
Apr 20, 2015
2:09 pm
Reads:
162
Score:
5

Introduction   There are some requirements for enterprises such as policy restriction of client location to access Office 365 services. For example STS token has to be sent only for activesync client. Or allow only internal client IPAddress. Solution   Office 365 sends information about application name, client IP, useragent, proxy information to STS as…

+ read more

By: cstumula
Apr 20, 2015
1:59 pm
Reads:
156
Score:
Unrated
This entry is part 3 of 3 in the series Troubleshooting OSP in IDM 4.5

This entry is part 3 of 3 in the series Troubleshooting OSP in IDM 4.5As I worked through a new Identity Manager 4.5 setup I was trying a number of things and ran across some interesting errors. This series of articles is meant to share what I found, hopefully with error codes for the Google…

+ read more

geoffc
By: geoffc
Apr 17, 2015
9:18 am
Reads:
204
Score:
5

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
202
Score:
Unrated

Previously I had posted a script for port redirection on the Identity Server. I’ve since found this doesn’t work too well when the local SLES firewall is enabled. The following is a better solution. First, create a Firewall Service file that contains the necessary ports to open (this assumes the Administration Console and Identity Server…

+ read more

ScorpionSting
Apr 14, 2015
1:09 pm
Reads:
178
Score:
5