Customizing

Authorization policies are used when you want to protect a resource based on criteria other than authentication and you want Access Manager to enforce the access restrictions. Authorization policies are enforced when a user requests data from a resource…

Koushik Halder
Sep 20, 2017
8:41 am
Reads:
282
Score:
5

Some time ago, I wrote a cool solution named “Read Resource Entitlement Values from User Application workflow”, presenting a way to handle multiple entitlement values from the user application, since NetIQ stuff does not allow to read it directly. We worked a lot with resources having multiple entitlement values. For this reason we wanted to…

+ read more

By: nsanson
Sep 28, 2016
3:39 pm
Reads:
1,080
Score:
5

Just about every client wants to be able to customize their web presence. For IDM, this includes several different points of customization for IDM Home. SSPR has one, User Application has another, OSP has a third. Each is different. There is no single point to customization for the IDM Home presentation. User Application was the first app to be…

+ read more

tse7147
By: tse7147
Sep 26, 2016
3:07 pm
Reads:
1,830
Score:
5

From time to time there is a need to create a custom alarm inside of Operations Center either due to some specific process you are trying to set up or due to NOC not having an adapter to a third party product.   I assume that you have read THIS BLOG on the different integration options and…

+ read more

Tobin Isenberg
Jan 7, 2014
4:47 pm
Reads:
3,153
Score:
Unrated

Debianized shares a cool script that helps you solve the problems of high CPU usage, and optimize TCP connections in Linux Access Gateway.

debianized
May 24, 2013
12:04 pm
Reads:
8,685
Score:
5

Forms in User Application may contain more fields than you would like to present to your users at the same time.

This Cool Solution shows a simple approach how to assign form fields to groups and let the user expand or collapse these field groups as needed.

wschreiber
May 22, 2012
10:14 am
Reads:
4,798
Score:
Unrated

This is a short tutorial about adding new applications (palette entries) to the Designer palette.

By: tvivek
Apr 30, 2012
3:00 pm
Reads:
4,045
Score:
5

Operations Center is built on Java and therefore requires some attention to configuration of the Java Virtual Machine (JVM). One of the nice features of the JVM is specifically around memory management…

Tobin Isenberg
Apr 12, 2012
3:33 pm
Reads:
2,983
Score:
Unrated

This is a very simple PERL script that may be quite useful when working with delimited text files, especially for those of you who write/maintain Delimited Text drivers in IDM.

Dec 8, 2011
12:46 pm
Reads:
4,313
Score:
Unrated
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow