Latest Posts

NetIQ Access Manager 4.4 SP1 and later versions of Access Manager are supported to be deployed in leading public clouds such as AWS and Azure. The NAM_Deploy_AC_IDP_MAG_v1.yml CloudFormation Template (CFT) attached in this tool can be used to deploy the Access Manager components in AWS in the selected VPC This CFT will do the following:…

+ read more

G Nataraj
By: G Nataraj
Aug 24, 2018
10:08 am
Reads:
392
Score:
Unrated
This entry is part 2 of 4 in the series Getting Started with Identity Governance

NetIQ has a new product called Identity Governance that has a lot of new features and functionality. There is much to learn about this tool. In the first article in this series I started talking about the product, how to enable logging, and then identified the main configuration tools. This time I want to talk…

+ read more

geoffc
By: geoffc
Aug 17, 2018
8:12 am
Reads:
366
Score:
5

AbuseIPDB is a project dedicated to helping combat the spread of hackers, spammers, and abusive activity on the internet. Correlated events in Sentinel can be automatically provisioned to AbuseIPDB using the following script with the Execute Action. Due to Bug # 944428, you will require at least Execute a Command 2011.1r2 or greater.

ScorpionSting
Aug 10, 2018
4:24 pm
Reads:
456
Score:
5
This entry is part 1 of 4 in the series Getting Started with Identity Governance

NetIQ has a new product called Identity Governance. This is a pretty neat tool that adds some important functionality. If you are familiar with Micro Focus/NetIQ/Novell Identity Manager then you will be familiar with many of the features in Identity Governance. The focus of Identity Manager is to provision and manage users in multiple systems….

+ read more

geoffc
By: geoffc
Aug 9, 2018
12:10 pm
Reads:
545
Score:
5
This entry is part 2 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

In part 1 of this article, we focused on the back-end retrieval of ACL information for use by a Provisioning Request Definition (PRD) in order to enable the form to reflect an administrator’s rights. In part 2, we will discuss how to use that information within the Form API.

By: rrawson
Aug 3, 2018
2:19 pm
Reads:
377
Score:
5

I’m pleased to announce the general availability of Secure Configuration Manager 7.1. What’s New: Ability to Create an Exception for Multiple Policy Templates, Reduce the Opportunity for Duplicate or Similar Exceptions, Policy Templates Certified by the Center for Internet Security for Windows Server 2012 R2 and 2016, and more…

Jul 30, 2018
2:17 pm
Reads:
294
Score:
Unrated
This entry is part 1 of 2 in the series Making Fields in a PRD Reflect Trustee Rights (ACLs)

Making your administrative trustee rights reflect in the behavior of a PRD form is possible, but there are quite a few moving parts to make it happen. The story of this implementation will include several important steps including: Understanding how Trustee Rights (ACLs) work in eDirectory, Reviewing the client’s use case, Getting the rights to…

By: rrawson
Jul 27, 2018
4:33 pm
Reads:
405
Score:
4.5

How to enable SAML2 federation on existing java web application? There are many scenarios where in-house applications are developed and have their own authentication mechanism. To enable Single Sign On using SAML2 federation on this kind of application, it needs additional code and configuration. This can be achieved in many ways writing java code, some…

+ read more

By: cstumula
Jul 26, 2018
9:34 am
Reads:
376
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow