Technical Solutions

Manual installation of Change Guardian Windows Agent requires two artifacts, e.g., Agent Certificate for target host and Installer. The Administrator should first generate the Agent certificate for the Agent host before proceeding with the installation. The steps below will help administrators build a custom script within third party deployment solutions which can generate agent certificates…

+ read more

By: kalyanj
Dec 5, 2018
9:07 am
Reads:
92
Score:
Unrated

Group Policy Administrator 6.9.2 is generally available. What’s New: French Language Support, New Command to Manage GPA Access Accounts, Specify Naming Convention During Offline Mirror Import, Further Define GPO Scope in Active Views…

Nov 30, 2018
2:37 am
Reads:
99
Score:
Unrated

The Identity Reporting module is a web application for scheduling and running reports. It’s included with several NetIQ products, among them are Identity Manager Standard Edition, Identity Manager Advanced Edition, and Identity Governance. NetIQ offers a repository that contains a large number of report definitions for each product and the Reporting Administrator can easily install…

+ read more

Nov 9, 2018
7:47 am
Reads:
286
Score:
Unrated

Identity Governance is a new product from Micro Focus that allows you to validate that your users, accounts, and permissions they obtain are in compliance and approved. You can think of it as a way of proving that your Identity Management service is working properly. Like any complex application, you need to be able to…

+ read more

geoffc
By: geoffc
Oct 9, 2018
9:14 am
Reads:
485
Score:
5

Recently I was confronted with an eDirectory server that was acting strangely. As sometimes happens when working in consulting, I do not have any personal history or notes to reference, I do not know who set it up, what they chose to do, why they chose to do it, or what has happened to it…

+ read more

dgersic
By: dgersic
Oct 4, 2018
1:32 pm
Reads:
467
Score:
5

This cool solution explains how Sentinel can be configured to forward events from Sentinel or Access Manager Analytics Server to 3rd party Syslog Servers like Splunk and ArcSight. By default, Splunk runs Syslog on UDP 514 and TCP 1514. These ports may be different in your Splunk environment…

By: vjohari
Oct 3, 2018
4:22 pm
Reads:
584
Score:
Unrated
This entry is part 2 of 2 in the series Error Codes for Identity Governance

I was working with a customer and we had all sorts of issues so I collected all sorts of errors, so lets go look at some more. For some reason, which I still do not know the root cause of, our centrally managed database just plain went away. Not sure why it was down, but it was, and in the end they had to restore from backup, which seemed a bit extreme. I thought figuring out what happened would be interesting…

geoffc
By: geoffc
Sep 28, 2018
2:52 pm
Reads:
371
Score:
Unrated
This entry is part 1 of 2 in the series Error Codes for Identity Governance

This entry is part 1 of 2 in the series Error Codes for Identity GovernanceI think that collecting errors and discussing them can be pretty helpful in terms of any product. I have this dream of finding a product that has all possible errors documented with examples. One day, one day my dream shall be…

+ read more

geoffc
By: geoffc
Sep 21, 2018
1:29 pm
Reads:
472
Score:
Unrated

The Identity Governance product from Micro Focus is a great tool for ensuring that the accounts and permissions your employees have access to are properly governed. You probably have an Identity Management system that is in charge of provisioning and deprovisioning access for users based on Human Resource’s changes to their employment status. Yet, you…

+ read more

geoffc
By: geoffc
Sep 12, 2018
3:14 pm
Reads:
453
Score:
5

This document provides information on how to configure Advanced Authentication with VMware View. To configure the Advanced Authentication integration with VMware View you’ll have to perform the following configuration tasks…

By: whenz
Sep 7, 2018
2:18 pm
Reads:
584
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow