Access Manager

This cool solution will provide directions on how to configure NetIQ Access Manager Single Sign-on using Azure Active Directory as your identity provider. To do this configuration you need a Microsoft Azure Active Directory account…

By: cstumula
Oct 23, 2017
2:14 pm
Reads:
499
Score:
4

Akamai Enterprise Application Access (EAA) is a hybrid (cloud and on-premise) solution that shifts the attack surface of a DMZ in a secure cloud bastion. The whole idea is to control and secure access without any distinction between internal…

By: civ75
Oct 20, 2017
2:19 pm
Reads:
532
Score:
Unrated

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
1,303
Score:
Unrated

In this example environment, your Sentinel server is configured as an Audit Server for Access Manager, and Sentinel is used for all your enterprise auditing needs. But you also want to use the new Analytics Server for Access Manager-specific visual analytics. The Analytics Server filters and analyzes the events that are generated from the…

Dec 5, 2016
12:09 pm
Reads:
888
Score:
Unrated

With Access Manager 4.3, you will get an out-of-box Audit Server, default Reports, and Analytics Dashboard. This new capability can be achieved by installing a new appliance. If you already have an auditing infrastructure, you can forward raw events to this new appliance and use “Analytics Dashboard”.

Nov 22, 2016
7:47 am
Reads:
1,455
Score:
4.5

This cool solution provides information for various methods used in the mobile application development world. This is all about how the application will authenticate the user and how this information is shared with other applications without compromising credentials.

By: cstumula
Oct 25, 2016
3:05 pm
Reads:
4,140
Score:
Unrated

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
2,142
Score:
5

In Access Manager’s Identity provider (IDP), often we need to transform user attributes. For example: 1. Need to modify the value of a user attribute before sending it to the Service Provider in a federation. 2. Derive a new attribute from the data available in multiple attributes of a user and…

By: Tulika8
May 31, 2016
9:14 am
Reads:
2,339
Score:
5

NAM 4.2 provides an end-user portal and a mobile client. Users can access this portal and get SSO to applications listed in the portal or access application URLs. When accessing applications, users often want to move seamlessly from their desktop to their mobile device without having to login again on the mobile device.

By: cstumula
Mar 1, 2016
1:27 pm
Reads:
2,046
Score:
Unrated

NAM 4.2 provides an end-user portal. Users can access this portal and get SSO to applications listed in the portal or access the application URLs. If users access protected resources directly, as before NAM 4.2, they have to book mark all protected resources. If there are any changes to those protected resources or federation…

By: cstumula
Feb 25, 2016
11:25 am
Reads:
2,099
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow