Access Manager

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
81
Score:
Unrated

Many organizations need or desire to implement authentication through external OAuth providers like Gmail, Hotmail, Yahoo, Twitter, Facebook, LinkedIn, Salesforce, Foursquare, MySpace, Yammer.

Several applications and portals use external authentication, now you too can use this feature for your NAM authentication.

By: cstumula
Sep 16, 2013
4:01 pm
Reads:
3,140
Score:
5

Many organizations need or desire to implement a multi-factor authentication scheme to satisfy regulatory requirements or increase security. There are several commercial two-factor solutions on the market that can be integrated with NetIQ Access Manager (NAM) but this cool solution shows you how you can use the Google Authenticator One-Time Password (OTP) as a second authentication factor with your NAM implementation through a NAM authentication contract …

By: cstumula
Aug 6, 2013
12:08 pm
Reads:
5,551
Score:
5

I am excited to be part of the team that is putting together ATT Live 2012 – ATT standing for Advanced Technical Training.  ATT Live 2010 was a great training event at a great location and Novell and SUSE users and partners told us, to quote from one of Todd Rossin’s post event blog post, what they learnt…

+ read more

Mar 20, 2012
9:52 am
Reads:
2,716
Score:
Unrated

NetIQ President Jay Gardner welcomed the 2000+ attendees to BrainShare 2011 and the inaugural NetIQ keynote Tuesday morning and introduced his topic: the powerful combination that is NetIQ.  In his introductory outline of the new NetIQ Gardner stated “We have combined the capabilities of NetIQ with some of the capabilities of the former Novell to…

+ read more

David Shephard
Oct 21, 2011
1:30 pm
Reads:
1,911
Score:
Unrated

As I reported in a recent post one of the recurring questions is what of the NetIQ and Novell products that many have said would fit in the same solution portfolio. Well, as many observed including tweeter: @novellpartner: Quite a number of the Novell products appear on the NetIQ website. What does that mean? Today…

+ read more

David Shephard
May 18, 2011
1:45 pm
Reads:
7,220
Score:
Unrated

Provides Mac OS X users automated single login access to Novell eDirectory storage resources through flexible login options—with no NetWare dependencies.

buckgashler
Dec 15, 2010
2:37 pm
Reads:
1,480
Score:
Unrated

You’ve followed all the best practices and documentation. Your eDirectory trees are healthy and replicating with no errors. Time is in synchronization and ndsrepair shows no errors or external references hanging out there.

So, what do you do when eDirectory gets a request to remove 20,000 members from a group and replicates the change to all of the replicas?

By: mfaris01
Dec 14, 2010
10:09 am
Reads:
863
Score:
Unrated

Ankit Gupta explains how to back up and restore NICI keys.

Categories: Uncategorized
Nov 16, 2010
4:41 pm
Reads:
1,078
Score:
Unrated

Updated: For several years the ability to timestamp objects within iMonitor has been available, but doing so to dozens/hundreds/thousands of objects has never been much fun. As iMonitor is just a web interface scripting interactions with it is fairly easy to do.

By: ab
Sep 8, 2010
11:51 am
Reads:
1,567
Score:
5