Active Directory

I have written many articles about the various error codes I have come across in drivers. I highly recommend everyone try this. When you are working with a driver all sorts of issues pop up. Keep a text editor open, copy and paste the error into the file, and then try to leave a note…

+ read more

geoffc
By: geoffc
Apr 22, 2016
1:34 pm
Reads:
1,262
Score:
Unrated

In this article I will show a fourth method of creating an Aegis workflow to notify Active Directory users that their password will expire in X days, this time using an official adapter. Method #1 was a very simple workflow based off a single script which performed all the automation tasks. Method #2 replaced the…

+ read more

Martin Cotter
Mar 28, 2016
2:26 pm
Reads:
1,326
Score:
Unrated

In this article I will show a third method of creating an Aegis workflow to notify users that their password will expire in X days. Method #1 was a very simple workflow based off a single script which performed all the automation tasks.   Method #2 replaced the script with individual workflow steps with a mix of command…

+ read more

Martin Cotter
Mar 2, 2016
10:59 am
Reads:
1,469
Score:
Unrated

If you’ve been following my series on identifying Active Directory accounts whose passwords are going to expire in the next X days, you’ll have seen that in order to create an LDAP filter for the date range, that the timestamp has to be in FileTime format which isn’t the most readily available format.  So far…

+ read more

Martin Cotter
Feb 16, 2016
8:50 am
Reads:
1,081
Score:
Unrated

In this article I will show the second method of creating an Aegis workflow to notify users that their password will expire in X days. Method #1 was a very simple workflow.  It was based on you already having a script, powershell, vbscript etc. that performs all the tasks you need, and Aegis simply manages…

+ read more

Martin Cotter
Feb 11, 2016
2:24 pm
Reads:
1,216
Score:
Unrated

I’ve been meaning for a long time to do a series of posts on different ways of doing the same thing in Aegis, from using scripts, command line, builtin activities, custom activities and adapters and I finally got around to doing it. The question came up in the Aegis Support Forum asking “How can I detect accounts…

+ read more

Martin Cotter
Feb 4, 2016
9:30 am
Reads:
1,269
Score:
Unrated
This entry is part 2 of 2 in the series Active Directory Password Troubleshooter Tool

In part 1 of this article series I talked about the new Password Troubleshooter tool that comes with IDM 4.5. Over the years we have mocked Novell, then NetIQ for what is known as stealth marketing. This is one of those examples.

geoffc
By: geoffc
Aug 14, 2015
4:12 pm
Reads:
2,090
Score:
5
This entry is part 1 of 2 in the series Active Directory Password Troubleshooter Tool

In Identity Manager 4.5 one of the hidden, unsung new bits is a tool called the Password Sync Troubleshooter. The guys in NTS tell me that they have been using this tool for years when they have to support an issue with Password Sync. They very much wanted to get it out…

geoffc
By: geoffc
Aug 5, 2015
9:55 am
Reads:
4,252
Score:
4.8

Author Thomas Hood once wrote, “…the easiest reading is damned hard writing.” I imagine most system administrators would express a similar sentiment when approached about automating parts of their organization’s identity and access management (IAM) system. Although automation makes IAM processes less complex for users, it introduces additional complexity for IT, particularly in four specific…

+ read more

Travis Greene
Jul 1, 2015
7:13 am
Reads:
7,470
Score:
Unrated

CVE-2014-6324 allows remote elevation of privilege in domains running Windows domain controllers. An attacker with the credentials of any domain user can elevate their privileges to that of any other account on the domain (including domain administrator accounts). In part 1 I discussed how to to detect attempts to exploit this vulnerability on domain controllers…

+ read more

Norbert Klasen
Dec 2, 2014
9:39 am
Reads:
2,362
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow