NetIQ Cool Solutions

Tag Archives: Access Manager

How to Integrate NetIQ Access Manager with external OAuth Providers



By: cstumula

September 16, 2013 4:01 pm

Reads: 1101

Many organizations need or desire to implement authentication through external OAuth providers like Gmail, Hotmail, Yahoo, Twitter, Facebook, LinkedIn, Salesforce, Foursquare, MySpace, Yammer.

Several applications and portals use external authentication, now you too can use this feature for your NAM authentication.

+read more

Tags: , , , , , , , , , , , ,
Categories: Access Manager, Technical Solutions

How to Integrate NetIQ Access Manager with Google Authenticator for two-factor authentication



By: cstumula

August 6, 2013 12:08 pm

Reads: 2444

Many organizations need or desire to implement a multi-factor authentication scheme to satisfy regulatory requirements or increase security. There are several commercial two-factor solutions on the market that can be integrated with NetIQ Access Manager (NAM) but this cool solution shows you how you can use the Google Authenticator One-Time Password (OTP) as a second authentication factor with your NAM implementation through a NAM authentication contract …

+read more

Tags: , , ,
Categories: Access Manager, Technical Solutions

Excited at Being Part of ATT Live 2012



By: dcoughanour

March 20, 2012 9:52 am

Reads: 1929

I am excited to be part of the team that is putting together ATT Live 2012 – ATT standing for Advanced Technical Training.  ATT Live 2010 was a great training event at a great location and Novell and SUSE users and partners told us, to quote from one of Todd Rossin’s post event blog post, what they learnt …

+read more

Tags: , , , , , , , , , , , , , , , , ,
Categories: Access Governance Suite, AppManager

NetIQ’s BrainShare Keynote Review

David Shephard

By: David Shephard

October 21, 2011 1:30 pm

Reads: 1084

NetIQ President Jay Gardner welcomed the 2000+ attendees to BrainShare 2011 and the inaugural NetIQ keynote Tuesday morning and introduced his topic: the powerful combination that is NetIQ.  In his introductory outline of the new NetIQ Gardner stated “We have combined the capabilities of NetIQ with some of the capabilities of the former Novell to …

+read more

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,
Categories: AppManager, Operations Center, PlateSpin

Novell Identity, Security & Selected Data Center Lines Added to NetIQ Portfolio

David Shephard

By: David Shephard

May 18, 2011 1:45 pm

Reads: 6041

As I reported in a recent post one of the recurring questions is what of the NetIQ and Novell products that many have said would fit in the same solution portfolio. Well, as many observed including tweeter: @novellpartner: Quite a number of the Novell products appear on the NetIQ website. What does that mean? Today …

+read more

Tags: , , , , , , , , , , , , , ,
Categories: Access Governance Suite, Operations Center, PlateSpin, Privileged User Manager

Condrey Corporation Releases Kanaka for Mac 2.1

buckgashler

By: buckgashler

December 15, 2010 2:37 pm

Reads: 341

Provides Mac OS X users automated single login access to Novell eDirectory storage resources through flexible login options—with no NetWare dependencies.

+read more

Tags: , , , , ,
Categories: Uncategorized

eDirectory Restoration – A Case of Perfect Replication of a Change



By: mfaris01

December 14, 2010 10:09 am

Reads: 66

You’ve followed all the best practices and documentation. Your eDirectory trees are healthy and replicating with no errors. Time is in synchronization and ndsrepair shows no errors or external references hanging out there.

So, what do you do when eDirectory gets a request to remove 20,000 members from a group and replicates the change to all of the replicas?

+read more

Tags: , , , , , , , , , , , , ,
Categories: Uncategorized

Securing NICI keys using eDirectory Server



By: ankitnovell

November 16, 2010 4:41 pm

Reads: 207

Ankit Gupta explains how to back up and restore NICI keys.

+read more

Tags:
Categories: Uncategorized

eDirectory object timestamp tool



By: ab

September 8, 2010 11:51 am

Reads: 363

Updated: For several years the ability to timestamp objects within iMonitor has been available, but doing so to dozens/hundreds/thousands of objects has never been much fun. As iMonitor is just a web interface scripting interactions with it is fairly easy to do.

+read more

Tags: , , , , , ,
Categories: Cool Tools, eDirectory

Backing Up and Restoring the eDirectory Tree with NICI Using DSBK on Linux



By: palaniappan1

April 21, 2010 6:11 pm

Reads: 572

Backing up the NICI files using the utility DSBK, using the -e option is back. This article explains how to use the -e option to backup NICI along with the other features of a full backup, incremental backup, and the use of roll forward logs.

+read more

Tags: ,
Categories: Uncategorized