Authentication

Have you ever received a survey that you actually wanted to respond to? Not because you wanted to complain, but because it was relevant to something that interested you?” I received a survey this week from my health care provider. Based on the notable amount of transformation they have undergone these last few years I…

+ read more

Kent Purdy
Feb 10, 2015
10:12 am
Reads:
438
Score:
4

Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…

+ read more

Travis Greene
Dec 10, 2014
10:15 am
Reads:
398
Score:
Unrated

Introduction   Many organizations need or desire to process or filter user attributes after user authentication before share those attributes with any other service. Use cases are, Modify user attributes like changing email domain (runtime in memory) before sending any user information to Access Gateway. On Federation with third party SP when NAM acting as…

+ read more

By: cstumula
Dec 4, 2014
12:16 pm
Reads:
566
Score:
5

cstumula explains how to Integrate NetIQ Access Manager with Symantec VIP two-factor authentication.

By: cstumula
May 22, 2014
4:35 pm
Reads:
1,595
Score:
4.5

This is an update to my previous Cool Solution: Integrating Salesforce.com and NetIQ Access Manager using SAML2. If you are new to SAML2 and federation, you may still find my first article useful as I endeavored to explain each concept as each configuration step is described. This article is not inclusive, but an update to that article. In the years since it was written, several new features related to SAML have been added to Salesforce.com. I describe some of those here and also add some extra tips along the way.

pmckeith
By: pmckeith
Feb 11, 2014
12:29 pm
Reads:
1,996
Score:
5

Learn how to do NTLM authentication for your users if your system is not part of the domain after Kerberos failure.

By: cstumula
Jan 29, 2014
9:49 am
Reads:
2,557
Score:
Unrated

Beyond traditional password-based authentication, you may be looking for additional protection for your valuable online resources, that is easy to implement and transparent to the user. The answer is adaptive, or risk-based, authentication.

By: cstumula
Jan 20, 2014
2:22 pm
Reads:
2,448
Score:
Unrated

This article explains how to Integrate NetIQ Access Manager with reCaptcha for login form failures without NAM code change.

By: cstumula
Jan 17, 2014
11:29 am
Reads:
1,985
Score:
5

With the onset of a new year, it is prediction season again, and several NetIQ thought leaders have shared their identity, security and cloud insights. The emerging trends that have arisen in prior years like cloud, mobility, social and big data have been key challenges recently that are reflected in this year’s predictions. According to…

+ read more

David Shephard
Jan 17, 2014
9:27 am
Reads:
1,696
Score:
5

This authentication class for NetIQ Access Manager (NAM) allows for using a remote web-service for authentication, and/or to use a remote web-service to return attribute data to NAM for use in identity injection, form fill or SAML federation.

The purpose of this authentication class is that by writing a simple web service, an administrator can easily add any source for NAM authentication/attribute retrieval, such as a database or a proprietary homegrown system. The administrator does not need to understand or write to NAM’s Java SDK.

By: jrivard
Jan 14, 2014
8:43 am
Reads:
1,143
Score:
5