Latest Posts

This cool solution explains how Sentinel can be configured to forward events from Sentinel or Access Manager Analytics Server to 3rd party Syslog Servers like Splunk and ArcSight. By default, Splunk runs Syslog on UDP 514 and TCP 1514. These ports may be different in your Splunk environment…

By: vjohari
Oct 3, 2018
4:22 pm
Reads:
811
Score:
Unrated
This entry is part 2 of 2 in the series Error Codes for Identity Governance

I was working with a customer and we had all sorts of issues so I collected all sorts of errors, so lets go look at some more. For some reason, which I still do not know the root cause of, our centrally managed database just plain went away. Not sure why it was down, but it was, and in the end they had to restore from backup, which seemed a bit extreme. I thought figuring out what happened would be interesting…

geoffc
By: geoffc
Sep 28, 2018
2:52 pm
Reads:
493
Score:
Unrated
This entry is part 1 of 2 in the series Error Codes for Identity Governance

I think that collecting errors and discussing them can be pretty helpful in terms of any product. I have this dream of finding a product that has all possible errors documented with examples. One day, one day my dream shall be fulfilled. Not any time soon though. Thus my current approach of collecting errors I…

+ read more

geoffc
By: geoffc
Sep 21, 2018
1:29 pm
Reads:
584
Score:
Unrated

The Identity Governance product from Micro Focus is a great tool for ensuring that the accounts and permissions your employees have access to are properly governed. You probably have an Identity Management system that is in charge of provisioning and deprovisioning access for users based on Human Resource’s changes to their employment status. Yet, you…

+ read more

geoffc
By: geoffc
Sep 12, 2018
3:14 pm
Reads:
526
Score:
5

This document provides information on how to configure Advanced Authentication with VMware View. To configure the Advanced Authentication integration with VMware View you’ll have to perform the following configuration tasks…

By: whenz
Sep 7, 2018
2:18 pm
Reads:
717
Score:
5
This entry is part 4 of 4 in the series Getting Started with Identity Governance

I have been discussing the Identity Governance product in terms of interesting things I have noticed using it. I discussed the product, how to enable logging, and the identified the main configuration tools in the first article. In the second article I discussed the configutil.sh file that is used to manage the Identity Governance side…

+ read more

geoffc
By: geoffc
Sep 4, 2018
2:45 pm
Reads:
1,112
Score:
5
This entry is part 3 of 4 in the series Getting Started with Identity Governance

I have been discussing the Identity Governance product in terms of interesting things I have noticed using it. In trying to resolve these issues, I have not usually found the answer in the documentation, since it is impossible to document everything. Additionally, the kind of information I need, working within the product, doing foolish things…

+ read more

geoffc
By: geoffc
Aug 24, 2018
11:49 am
Reads:
725
Score:
4

NetIQ Access Manager 4.4 SP1 and later versions of Access Manager are supported to be deployed in leading public clouds such as AWS and Azure. The NAM_Deploy_AC_IDP_MAG_v1.yml CloudFormation Template (CFT) attached in this tool can be used to deploy the Access Manager components in AWS in the selected VPC This CFT will do the following:…

+ read more

G Nataraj
By: G Nataraj
Aug 24, 2018
10:08 am
Reads:
695
Score:
5
This entry is part 2 of 4 in the series Getting Started with Identity Governance

NetIQ has a new product called Identity Governance that has a lot of new features and functionality. There is much to learn about this tool. In the first article in this series I started talking about the product, how to enable logging, and then identified the main configuration tools. This time I want to talk…

+ read more

geoffc
By: geoffc
Aug 17, 2018
8:12 am
Reads:
668
Score:
5

AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet. Correlated events in Sentinel can be automatically provisioned to AbuseIPDB using the following script with the Execute Action. Due to Bug # 944428, you will require at least Execute a Command 2011.1r2 or greater.

ScorpionSting
Aug 10, 2018
4:24 pm
Reads:
866
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow