Access Manager

In the previous article, I have explained the Botnets and free sites which offer a list of infected sites. Repeated here for readability “There are number of publicly available lists of known IP Addresses that are currently compromised. Various sites offer these lists for free. These hosts are running crimeware with Botnets. The…

Apr 21, 2015
12:01 pm
Reads:
173
Score:
Unrated

Provide a know list of IP address from a simple text file. The file can be hand crafted. Or, can be downloaded from known set of vulnerable IP addresses. Configuring them in Administration Console is tedious. Use this tool to update a text file and see this is effected in “Risk Based Authentication” of NetIQ Access Manager

Apr 16, 2015
10:57 am
Reads:
149
Score:
Unrated

Oftentimes organizations start their web presence by building it in-­-house. A common characteristic of such in–house developed solutions is that a database is used to hold user information such as user name, password, and additional information such as first and last name, email address, etc. As the web presence grows and requires more and more…

+ read more

By: wbusath
Mar 25, 2015
11:15 am
Reads:
533
Score:
Unrated

Many organizations need or desire to implement authentication through external OAuth providers like Gmail, Hotmail, Yahoo, Twitter, Facebook, LinkedIn, Salesforce, Foursquare, MySpace, Yammer.

Several applications and portals use external authentication, now you too can use this feature for your NAM authentication.

By: cstumula
Sep 16, 2013
4:01 pm
Reads:
3,318
Score:
5

Many organizations need or desire to implement a multi-factor authentication scheme to satisfy regulatory requirements or increase security. There are several commercial two-factor solutions on the market that can be integrated with NetIQ Access Manager (NAM) but this cool solution shows you how you can use the Google Authenticator One-Time Password (OTP) as a second authentication factor with your NAM implementation through a NAM authentication contract …

By: cstumula
Aug 6, 2013
12:08 pm
Reads:
5,796
Score:
5

I am excited to be part of the team that is putting together ATT Live 2012 – ATT standing for Advanced Technical Training.  ATT Live 2010 was a great training event at a great location and Novell and SUSE users and partners told us, to quote from one of Todd Rossin’s post event blog post, what they learnt…

+ read more

Mar 20, 2012
9:52 am
Reads:
2,783
Score:
Unrated

NetIQ President Jay Gardner welcomed the 2000+ attendees to BrainShare 2011 and the inaugural NetIQ keynote Tuesday morning and introduced his topic: the powerful combination that is NetIQ.  In his introductory outline of the new NetIQ Gardner stated “We have combined the capabilities of NetIQ with some of the capabilities of the former Novell to…

+ read more

David Shephard
Oct 21, 2011
1:30 pm
Reads:
1,996
Score:
Unrated

As I reported in a recent post one of the recurring questions is what of the NetIQ and Novell products that many have said would fit in the same solution portfolio. Well, as many observed including tweeter: @novellpartner: Quite a number of the Novell products appear on the NetIQ website. What does that mean? Today…

+ read more

David Shephard
May 18, 2011
1:45 pm
Reads:
7,288
Score:
Unrated

Provides Mac OS X users automated single login access to Novell eDirectory storage resources through flexible login options—with no NetWare dependencies.

buckgashler
Dec 15, 2010
2:37 pm
Reads:
1,800
Score:
Unrated

You’ve followed all the best practices and documentation. Your eDirectory trees are healthy and replicating with no errors. Time is in synchronization and ndsrepair shows no errors or external references hanging out there.

So, what do you do when eDirectory gets a request to remove 20,000 members from a group and replicates the change to all of the replicas?

By: mfaris01
Dec 14, 2010
10:09 am
Reads:
927
Score:
Unrated