Access Manager

A common observation from our new NetIQ Access Manager customers is that they implemented it because of access fatigue, resulting from all the complexity of delivering a diverse set of services while keeping them secure. It’s often complex because the who, where and what of access continue to go through dramatic changes while IT’s mindset…

+ read more

Kent Purdy
Jan 16, 2017
7:25 pm
Reads:
573
Score:
Unrated

The Holidays are here and one of my all-time favorite traditions is catching up on my all-time favorite holiday movies. AND my ALL-TIME FAVORITE holiday movie is Elf. Buddy’s trip from the North Pole workshop down to New York City and his adventures there had me thinking about my every day grind. The day in…

+ read more

Dec 19, 2016
11:27 am
Reads:
1,617
Score:
5

In this example environment, your Sentinel server is configured as an Audit Server for Access Manager, and Sentinel is used for all your enterprise auditing needs. But you also want to use the new Analytics Server for Access Manager-specific visual analytics. The Analytics Server filters and analyzes the events that are generated from the…

Dec 5, 2016
12:09 pm
Reads:
439
Score:
Unrated

With Access Manager 4.3, you will get an out-of-box Audit Server, default Reports, and Analytics Dashboard. This new capability can be achieved by installing a new appliance. If you already have an auditing infrastructure, you can forward raw events to this new appliance and use “Analytics Dashboard”.

Nov 22, 2016
7:47 am
Reads:
898
Score:
4.5

Last time we talked about HIPAA, we said it was time to start getting serious. A number of new rules have been implemented that have increased the level of enforcement faced by healthcare organizations. In 2009 the Health Information Technology for Economic and Clinical Health (HITECH) Act passed, which addressed the privacy and security concerns…

+ read more

Kent Purdy
Nov 21, 2016
2:26 pm
Reads:
1,220
Score:
Unrated

This cool solution provides information for various methods used in the mobile application development world. This is all about how the application will authenticate the user and how this information is shared with other applications without compromising credentials.

By: cstumula
Oct 25, 2016
3:05 pm
Reads:
916
Score:
Unrated

Data breaches have become commonplace these days, and enterprises around the world agree that it’s not a matter of “if” but rather “when.” Complicating matters, gone are the days when your employees worked nine to five, from their desktops or laptops, or even within the walls of the office where access is delivered in a…

+ read more

Kent Purdy
Jun 30, 2016
2:09 am
Reads:
1,582
Score:
5

In Access Manager’s Identity provider (IDP), often we need to transform user attributes. For example: 1. Need to modify the value of a user attribute before sending it to the Service Provider in a federation. 2. Derive a new attribute from the data available in multiple attributes of a user and…

By: Tulika8
May 31, 2016
9:14 am
Reads:
1,683
Score:
5

NAM 4.2 provides an end-user portal and a mobile client. Users can access this portal and get SSO to applications listed in the portal or access application URLs. When accessing applications, users often want to move seamlessly from their desktop to their mobile device without having to login again on the mobile device.

By: cstumula
Mar 1, 2016
1:27 pm
Reads:
1,627
Score:
Unrated

NAM 4.2 provides an end-user portal. Users can access this portal and get SSO to applications listed in the portal or access the application URLs. If users access protected resources directly, as before NAM 4.2, they have to book mark all protected resources. If there are any changes to those protected resources or federation…

By: cstumula
Feb 25, 2016
11:25 am
Reads:
1,653
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow