Technical Solutions

NetIQ Identity Manager (IDM) can connect to SAP systems in several ways. Both the SAP-HCM and the SAP User Management drivers require a SAP middleware called „SAP Java Connector“, „JCo3“ in short, to be installed and configured in addition to the IDM driver. NetIQ Documentation does not explain this in detail and only refers to…

+ read more

lhaeger
By: lhaeger
Jul 28, 2015
10:59 am
Reads:
73
Score:
5

A lot of times NetIQ IDM developers need to define workflows where a user can assign permissions. With IDM, permissions are defined using entitlements and assigned via resources, when you follow RBAC. However in the real world sometimes you cannot map everything with a Role and some entitlements have to be assigned manually on a…

+ read more

By: nsanson
Jul 28, 2015
8:56 am
Reads:
76
Score:
5

GCVs are immensely valuable components within an IDM solution. Use of GCVs can increase the configurability and reduce the amount of code customization required to both reproduce a solution, to move it between deployment stages (I.e, dev to test to production), and maximizes agility in case a solution’s name space or other factors need to…

+ read more

By: rrawson
Jul 24, 2015
1:02 pm
Reads:
104
Score:
5
This entry is part 3 of 3 in the series What’s New in Designer 4.5.1

In part 1 and 2 of this series I talked about some of the new things in Designer 4.5.1. In this article I will try and get through the rest of the items listed in the readme. The last new features is the following. Designer’s Document Generation feature now includes linked GCV objects. To display…

geoffc
By: geoffc
Jul 22, 2015
11:58 am
Reads:
129
Score:
Unrated

Redirection, which is required by many applications and services, inherently brings security risks to organizations. For instance, an “un-validated” redirect can allow an unsuspecting user visiting a trusted site to be redirected to a malicious site, therefore exploiting the users’ trust. Using a “whitelist” can help mitigate this vulnerability by…

ggilbe
By: ggilbe
Jul 14, 2015
10:43 am
Reads:
183
Score:
Unrated
This entry is part 2 of 3 in the series What’s New in Designer 4.5.1

After the release of IDM 4.5 the first patch came out. One of the components updated is Designer, with an online update (or downloadable ZIP file). When you chose to install the update it shows a list of fixes and enhancements….

geoffc
By: geoffc
Jul 10, 2015
12:36 pm
Reads:
216
Score:
Unrated

Introduction In order to allow additional users to use GPA, you’ll need to add them to the GPA security framework. Specifically, this means two things; they’ll need a repository user account (actually a SQL account), and they’ll need their AD account given permissions to objects in the GP Repo. How you’ve implemented GPA and where…

+ read more

Jul 8, 2015
2:19 pm
Reads:
181
Score:
5

I recently implemented the cool solution, “Setting a password in workflow” for one of my clients. This allows us to set userPassword within a workflow. But the source of the password data might often be a form. A common configuration is that when using a password field, you have the ability to provide a…

By: rrawson
Jul 7, 2015
11:24 am
Reads:
202
Score:
5

I’ve been asked a few times about the purpose of various policysets; for what purpose do we have this one vs. that one? Why Event vs. Command, or Creation vs. Placement? There are reasons for all of them, and if followed properly life can be much simpler than if lumping everything under one policyset and…

+ read more

By: ab
Jul 2, 2015
8:15 am
Reads:
249
Score:
5