Access Manager

NAM 4.2 provides an end-user portal and a mobile client. Users can access this portal and get SSO to applications listed in the portal or access application URLs. When accessing applications, users often want to move seamlessly from their desktop to their mobile device without having to login again on the mobile device.

By: cstumula
Mar 1, 2016
1:27 pm
Reads:
809
Score:
Unrated

NAM 4.2 provides an end-user portal. Users can access this portal and get SSO to applications listed in the portal or access the application URLs. If users access protected resources directly, as before NAM 4.2, they have to book mark all protected resources. If there are any changes to those protected resources or federation…

By: cstumula
Feb 25, 2016
11:25 am
Reads:
799
Score:
Unrated

From NetIQ Access Manager (NAM) 4.0, NAM is supporting SNMP to monitor many of the NAM parameters. This cool solution will explain how to use this feature to monitor NAM using an open source monitoring tool Cacti. This cool solution covers, Cacti – Introduction SNMP Monitoring – How it works in NAM. Configuring NAM…

By: G Nataraj
Feb 19, 2016
7:56 am
Reads:
638
Score:
Unrated

Introduction This cool solution explains the steps involved in configuring Access Manager for Auditing using Syslog on Windows Server 2012 R2  using Cygwin – a Unix like environment and a command line interface for Microsoft Windows. Need for Syslog for Auditing in Access Manager. With NAM 4.2, the legacy Platform Agent (PA) for auditing is…

+ read more

By: G Nataraj
Feb 1, 2016
11:30 am
Reads:
474
Score:
Unrated

.NAM support X.509 certificate mutual authentication. Mutual authentication is used when a user is issued an X.509 certificate from a trusted source, and certificate is then used to identify the user. Trusted Certificate Authority has to import to NAM trust store. This is an issue in some of the use cases.

By: cstumula
Dec 29, 2015
2:27 pm
Reads:
330
Score:
Unrated

You are writing a mobile or web application to access Amazon Web Services like Cognito Synchronized Storage, S3, Amazon DynoDB etc. Also, you need to handle Identities of your application and store the application state or access services unique per Identity in the Amazon Web Service. In this case, you want to delegate handling of Identities or don’t want to provide custom login code and delegate authentication mechanism to NetIQ Access Manager…

May 7, 2015
10:18 am
Reads:
2,626
Score:
Unrated

This article shows how to write a sample mobile application utilizing Oauth2.0 Implicit Grant to get an access token and ID token. Also, this shows how to get a user’s claim information using UserInfo endpoint of OpenId Connect Core 1.0 protocol. Dependencies This solution uses the following libraries…

May 6, 2015
10:54 am
Reads:
1,444
Score:
Unrated

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
1,687
Score:
Unrated

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
2,122
Score:
Unrated

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
1,548
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow