Have you ever received a survey that you actually wanted to respond to? Not because you wanted to complain, but because it was relevant to something that interested you?” I received a survey this week from my health care provider. Based on the notable amount of transformation they have undergone these last few years I…
Over three decades ago, the game Pitfall! came out for the Atari game console. In it, you control a character named Pitfall Harry, swinging over pits and crocodiles, avoiding fire, scorpions and many other dangers in the jungle while racing to gather treasure. The world is just as rife with dangers to your mobile enterprise…
Introduction Many organizations need or desire to process or filter user attributes after user authentication before share those attributes with any other service. Use cases are, Modify user attributes like changing email domain (runtime in memory) before sending any user information to Access Gateway. On Federation with third party SP when NAM acting as…
cstumula explains how to Integrate NetIQ Access Manager with Symantec VIP two-factor authentication.
This is an update to my previous Cool Solution: Integrating Salesforce.com and NetIQ Access Manager using SAML2. If you are new to SAML2 and federation, you may still find my first article useful as I endeavored to explain each concept as each configuration step is described. This article is not inclusive, but an update to that article. In the years since it was written, several new features related to SAML have been added to Salesforce.com. I describe some of those here and also add some extra tips along the way.
Learn how to do NTLM authentication for your users if your system is not part of the domain after Kerberos failure.
Beyond traditional password-based authentication, you may be looking for additional protection for your valuable online resources, that is easy to implement and transparent to the user. The answer is adaptive, or risk-based, authentication.
This article explains how to Integrate NetIQ Access Manager with reCaptcha for login form failures without NAM code change.
This authentication class for NetIQ Access Manager (NAM) allows for using a remote web-service for authentication, and/or to use a remote web-service to return attribute data to NAM for use in identity injection, form fill or SAML federation.
The purpose of this authentication class is that by writing a simple web service, an administrator can easily add any source for NAM authentication/attribute retrieval, such as a database or a proprietary homegrown system. The administrator does not need to understand or write to NAM’s Java SDK.