Attributes

Access Manager can retrieve an attribute from an external resource and transform it before using this value with assertion and access policies. This feature supports user attribute modifications like transform value to uppercase etc., In some of the cases, the user information needs to be retrieved from a third party server from REST endpoint….

By: cstumula
Dec 5, 2016
12:10 pm
Reads:
299
Score:
5

Identity Manager has a really neat XML based language called DirXML Script. When you look at a policy in iManager or Designer, you see a GUI rendering of the underlying XML. This is a very powerful approach, since changing some things in the GUI can be tedious or tricky. Whereas some things are really easy…

+ read more

geoffc
By: geoffc
Mar 11, 2016
8:16 am
Reads:
1,227
Score:
5

NOTE this article has been updated (Sept 4, 2015) with a NAM 4.1-compatible version of the extension. OK, so your SAML Service Provider is asking for a default domain suffix for every username (user@test.com). Or, your application behind NAM wants to receive the full name of a logged-in user’s manager. Or, you need to provide…

+ read more

By: mvreijn
Feb 13, 2015
12:30 pm
Reads:
2,390
Score:
5

NetIQ Access Manager is a great product. One of its strong points is the extensibility in terms of look ’n feel, authentication and other customizations. An area with less flexibility is the user data, especially when working with SAML. Access Manager generally assumes that the data in your LDAP directory has the format you need….

+ read more

By: mvreijn
Dec 16, 2014
11:16 am
Reads:
2,878
Score:
4.6

Introduction   Many organizations need or desire to process or filter user attributes after user authentication before share those attributes with any other service. Use cases are, Modify user attributes like changing email domain (runtime in memory) before sending any user information to Access Gateway. On Federation with third party SP when NAM acting as…

+ read more

By: cstumula
Dec 4, 2014
12:16 pm
Reads:
2,997
Score:
5

Working with the new Driver for eDirectory I found some things, which are worth to talk about, since they are a kind of special. In my article Bidirectional Driver for eDirectory – Some hints and workarounds it was pointing out that the driver filter could cause some trouble. I want to stress what is to…

+ read more

tschloesser
Sep 8, 2014
2:05 am
Reads:
1,950
Score:
5
This entry is part 3 of 3 in the series Delving into and beyond the current-op

Here’s part 3 of Alexander McHugh’s series on Delving into and beyond the current-op. The third article in the series deals exclusively with direct operations, it will outline the technical details, review general best practices related to working with direct operations. It will outline how to manipulate and transform direct operations and provide some useful toolbox rules related to direct operations.

Alexander McHugh
Jun 24, 2014
1:30 pm
Reads:
2,971
Score:
4.67
This entry is part 2 of 3 in the series Delving into and beyond the current-op

Here’s part 2 of Alexander McHugh’s series on Delving into and beyond the current-op. This second article will outline general best practices related to working directly with nodes other than the current-op within the “current operation”. It will also outline some useful toolbox rules and expressions that can be used to access and manipulate the entire XDS document.

Alexander McHugh
Jun 17, 2014
5:00 am
Reads:
2,307
Score:
4.5
This entry is part 1 of 3 in the series Delving into and beyond the current-op

This article is the first part in a series that will delve into the way the NetIQ Identity Manager engine juggles atomic operations. The first article, will give an overview of how the engine actually handles the current operation and outline key technical details related to this concept. Subsequent articles will delve deeper into how to access and modify operations.

Alexander McHugh
Jun 2, 2014
12:25 pm
Reads:
2,282
Score:
4.8

Manage user radius attributes with a fully cross-platform GUI.

By: jlodom
May 22, 2013
5:37 pm
Reads:
2,380
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow