Access Control

It’s often said that children are born negotiators. They possess a natural ability to try to get what they want though trade-offs, attempting to only do something if they get something in return. It’s less said though that children are born Information Security specialists. Surprising you might think – afterall, as marvellous as the human…

+ read more

David Mount
Jan 21, 2016
2:26 am
Reads:
1,426
Score:
Unrated

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
1,904
Score:
Unrated

At a recent speaking engagement, I shared the successful results of our most recent Common Criteria certification efforts. After being congratulated by a member of the audience, we proceeded to have the following discussion: Audience member: “When are you going to be done with SP800-53 certification?” Me: “Huh? Which part of it?” Audience member: “All…

+ read more

Michael Angelo
Jan 8, 2015
9:33 am
Reads:
4,195
Score:
5

Ever wanted to allow your users to authenticate to Novell Access Manager using their FaceBook credentials? Here’s how..

Categories: Uncategorized
Oct 27, 2010
4:00 pm
Reads:
4,133
Score:
Unrated

I’ve been doing some looking around at Squid add-ons for the first time in a long time. It appears that they’ve thinned out dramatically!

I’m specifically looking for a quota management tool which is compatible with a Squid/Dansguardian configuration. If need be, integration to just plain squid will do.

By: preycor
Jul 8, 2009
3:53 pm
Reads:
3,655
Score:
Unrated

arielbiener explains how to protect the Access Manager Admin Console when the Admin Console and Identity Server are located on the same server.

Categories: Uncategorized
Jun 24, 2009
4:14 pm
Reads:
1,719
Score:
Unrated

In the last year Novell has released the Novell Compliance Management Platform (NCMP) which is designed to tie a lot of components together in one great big mesh of happiness (so much happiness in fact that a demo system is named ‘Utopia’ which I presume leads directly to euphoria). Understanding the potential benefits of the NCMP for a company can take a bit of time but I wanted to provide that kind of an overview here. There will be some technical parts that I care about emphasizing but overall this is meant to cover what NCMP provides for those who really need to know.

By: ab
Jun 16, 2009
10:03 am
Reads:
2,235
Score:
Unrated

In this day and age, it is simply not done to expose a server directly to the internet with just a name and password to get in. It is asking for trouble. And we all know Novell Access Manager is "the" product to use for secure authentication. However, Access Manager and SharePoint don’t work together very well by default.

In this series of articles I would like to describe how to expose Sharepoint to the outside world through Access Manager using SSO, Document Management, and Kerberos…

Categories: Uncategorized
Apr 17, 2009
4:00 pm
Reads:
6,693
Score:
Unrated

When using DacEasy version 15 only two users can get access to network drive. DacEasy has a 20 CALs so it’s not a deaeasy issue can anybody help?

Categories: Uncategorized
Aug 20, 2008
8:25 am
Reads:
2,657
Score:
Unrated

Looking for a way to provide a standard across all your SLES 10 servers to use the same eDirectory authentication for local access? In this article, we will successfully configure LUM on a “non-OES2”, SLES 10 server to allow users in your eDirectory LUM-enabled group to authenticate to this server without creating local accounts, using their eDirectory ID’s and passwords.

By: mfaris01
Apr 22, 2008
5:27 pm
Reads:
1,989
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow