Here is part 2 of Geoff Carman’s Password Transformation Rule Sets article. This article focuses on the password transformation rules that you find in the Publisher channel of most driver configurations.
I was working with a client that has SAP GRC (Governance, Risk, and Compliance) module implemented and they were having trouble getting it to use the eDirectory tree we set up for authentication. Of course, when in doubt, blame the easier to contact people, so I had to figure out what was wrong.
I am starting a series here, walking through one of the more complex drivers, the SAP HR driver.
Geoff Carman shares a few tips about DirXML-Associations and what they mean, and how they are used.
Open Call: Geoff Carman would like to create a list of IDM Move Events. If you have a move event you would like added to the list, send it in here…
As I continued working through the process of deploying a new set of drivers, I found even more errors than I had covered in the first three articles, so here comes part 4 of a continuing series.
Geoff Carman shares some examples of how he uses Jim Willeke’s tool: DumpEdirectoryPasswordInformationTool
Geoff Carman explains Pluggable Authentication Modules. Learn how to configure them, and how to troubleshoot them when things go awry.