Folders

You’ve followed all the best practices and documentation. Your eDirectory trees are healthy and replicating with no errors. Time is in synchronization and ndsrepair shows no errors or external references hanging out there.

So, what do you do when eDirectory gets a request to remove 20,000 members from a group and replicates the change to all of the replicas?

By: mfaris01
Dec 14, 2010
10:09 am
Reads:
1,078
Score:
Unrated

A simple shell script to back up all configured eDirectory instances.

Tags:
Categories: Uncategorized
By: dgersic
Dec 1, 2010
4:28 pm
Reads:
1,308
Score:
5

New product update includes new AuxMap utility and several bug fixes.

buckgashler
Nov 11, 2010
11:53 am
Reads:
1,461
Score:
Unrated

The standard tool to do SecureLogin administration is iManager. This tip has some setup steps that are required, but not well understood, for this setup to work.

Categories: Uncategorized
Sep 23, 2010
10:53 am
Reads:
1,361
Score:
Unrated

This tip explains how to use corporate redirection to manage SecureLogin configuration “one offs” without having to modify each user object individually.

Categories: Uncategorized
Sep 16, 2010
2:39 pm
Reads:
1,512
Score:
Unrated

Typically the process of developing and testing SecureLogin scripts is done directly on a development user id. When the scripts are complete and tested and ready to be used by the general community they need to be copied to one, or several different objects in the supporting directory. This doc shows a sample of how to script the deployment process to make it quick and consistent.

Categories: Uncategorized
Sep 3, 2010
4:29 pm
Reads:
1,380
Score:
Unrated

Here’s part 2 of Geoff Carman’s article on Load Balancing User Placement in GroupWise Post Offices.

geoffc
By: geoffc
Nov 12, 2009
7:21 am
Reads:
1,281
Score:
Unrated

Let’s face the fact, assigning iPrint printers in iManager, especially if the users are in a different container than the iPrint Printer, can become very tedious and time consuming. First you have to wait for the browse window to choose a printer, then wait for the browse window to browse for the users or groups, and finally select all of your users. Well what if you had 5 executives that needed to have access to every Xerox Printer in the organization and these printers existed in multiple containers? Let’s say there were 35 of these printers. This could take hours. I’ll demonstrate how to do it in less than 5 minutes.

By: mbruner1
Oct 28, 2009
4:40 pm
Reads:
1,564
Score:
Unrated

Once in a while an issue comes up where application A gives some odd errors in eDirectory but those errors seem to be cosmetic as application A is still fine and works (unless you count the messages in ndstrace). What does this mean when you see a -714 from eDirectory while tracing LDAP that is talking about some “iterator”? What does an LDAP error 51 mean when everything still seems to return properly? Today I am going to try to share some information on Virtual List Views (VLV) by explaining what they are, how you can use them, and a few cases where they do not work with eDirectory.

By: ab
Jul 14, 2009
12:05 pm
Reads:
1,551
Score:
5

In the last year Novell has released the Novell Compliance Management Platform (NCMP) which is designed to tie a lot of components together in one great big mesh of happiness (so much happiness in fact that a demo system is named ‘Utopia’ which I presume leads directly to euphoria). Understanding the potential benefits of the NCMP for a company can take a bit of time but I wanted to provide that kind of an overview here. There will be some technical parts that I care about emphasizing but overall this is meant to cover what NCMP provides for those who really need to know.

By: ab
Jun 16, 2009
10:03 am
Reads:
1,483
Score:
Unrated