Authentication

The recent cyber attack on Anthem has vexed many victims and onlookers—and not just because Anthem had information on individuals who weren’t Anthem members. Many are asking why cyber attackers would want to steal healthcare records. Is information on someone’s health condition really that valuable? While some may not think so, as a victim of…

+ read more

Travis Greene
Aug 25, 2015
8:13 am
Reads:
460
Score:
Unrated

The rise of mobility in the workplace is prompting government agencies to investigate using multi-factor authentication for access to applications while maintaining compliance to Homeland Security Presidential Directive 12 (HSPD 12). Issued in 2004, this directive mandates common identification standards for federal employees and contractors. Among other security measures, HSPD 12 resulted in the use…

+ read more

David Shephard
Jun 11, 2015
7:13 am
Reads:
516
Score:
5

NetIQ Access Manager can support custom Geo location providers to in order to determine the risk score. Risk Based Authentication with NAM 4.1 will consume this custom provider implementation to read geolocation of user from where user is accessing the system.

By: cstumula
May 12, 2015
2:27 pm
Reads:
585
Score:
Unrated

Salesforce allows you to use any third party web application that implements the server side of the OpenID Connect protocol. This allows you to use authentication providers like NetIQ Access Manager.

By: cstumula
May 11, 2015
4:00 pm
Reads:
472
Score:
Unrated

This Cool solution explains how to create Ajax based form login for user authentication.

By: cstumula
Mar 19, 2015
3:37 pm
Reads:
1,007
Score:
Unrated

Occasionally I’ve needed to troubleshoot memory or CPU utilization issues in Access Manager. This is most common when developing custom authentication classes. Fortunately, there are great tools for this included in the JDK. My favorite tool is JVisualVM. If you have a graphical console on the Identity Server ( or an Access Gateway Service) box…

+ read more

Jerry Combs
Mar 6, 2015
11:20 am
Reads:
1,500
Score:
5

Have you ever received a survey that you actually wanted to respond to? Not because you wanted to complain, but because it was relevant to something that interested you?” I received a survey this week from my health care provider. Based on the notable amount of transformation they have undergone these last few years I…

+ read more

Kent Purdy
Feb 10, 2015
10:12 am
Reads:
1,143
Score:
4.5

Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…

+ read more

Travis Greene
Dec 10, 2014
10:15 am
Reads:
1,079
Score:
Unrated

Introduction   Many organizations need or desire to process or filter user attributes after user authentication before share those attributes with any other service. Use cases are, Modify user attributes like changing email domain (runtime in memory) before sending any user information to Access Gateway. On Federation with third party SP when NAM acting as…

+ read more

By: cstumula
Dec 4, 2014
12:16 pm
Reads:
1,300
Score:
5

cstumula explains how to Integrate NetIQ Access Manager with Symantec VIP two-factor authentication.

By: cstumula
May 22, 2014
4:35 pm
Reads:
2,454
Score:
4.5