Access Manager

Introduction This cool solution explains the steps involved in configuring Access Manager for Auditing using Syslog on Windows Server 2012 R2  using Cygwin – a Unix like environment and a command line interface for Microsoft Windows. Need for Syslog for Auditing in Access Manager. With NAM 4.2, the legacy Platform Agent (PA) for auditing is…

+ read more

By: G Nataraj
Feb 1, 2016
11:30 am
Reads:
153
Score:
Unrated

.NAM support X.509 certificate mutual authentication. Mutual authentication is used when a user is issued an X.509 certificate from a trusted source, and certificate is then used to identify the user. Trusted Certificate Authority has to import to NAM trust store. This is an issue in some of the use cases.

By: cstumula
Dec 29, 2015
2:27 pm
Reads:
192
Score:
Unrated

You are writing a mobile or web application to access Amazon Web Services like Cognito Synchronized Storage, S3, Amazon DynoDB etc. Also, you need to handle Identities of your application and store the application state or access services unique per Identity in the Amazon Web Service. In this case, you want to delegate handling of Identities or don’t want to provide custom login code and delegate authentication mechanism to NetIQ Access Manager…

May 7, 2015
10:18 am
Reads:
1,842
Score:
Unrated

This article shows how to write a sample mobile application utilizing Oauth2.0 Implicit Grant to get an access token and ID token. Also, this shows how to get a user’s claim information using UserInfo endpoint of OpenId Connect Core 1.0 protocol. Dependencies This solution uses the following libraries…

May 6, 2015
10:54 am
Reads:
1,144
Score:
Unrated

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
1,341
Score:
Unrated

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
1,719
Score:
Unrated

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
1,363
Score:
Unrated

Many organizations need or desire to implement authentication through external OAuth providers like Gmail, Hotmail, Yahoo, Twitter, Facebook, LinkedIn, Salesforce, Foursquare, MySpace, Yammer.

Several applications and portals use external authentication, now you too can use this feature for your NAM authentication.

By: cstumula
Sep 16, 2013
4:01 pm
Reads:
4,839
Score:
5

Many organizations need or desire to implement a multi-factor authentication scheme to satisfy regulatory requirements or increase security. There are several commercial two-factor solutions on the market that can be integrated with NetIQ Access Manager (NAM) but this cool solution shows you how you can use the Google Authenticator One-Time Password (OTP) as a second authentication factor with your NAM implementation through a NAM authentication contract …

By: cstumula
Aug 6, 2013
12:08 pm
Reads:
7,488
Score:
5

I am excited to be part of the team that is putting together ATT Live 2012 – ATT standing for Advanced Technical Training.  ATT Live 2010 was a great training event at a great location and Novell and SUSE users and partners told us, to quote from one of Todd Rossin’s post event blog post, what they learnt…

+ read more

Mar 20, 2012
9:52 am
Reads:
3,388
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow