Identity Manager

Just about every client wants to be able to customize their web presence. For IDM, this includes several different points of customization for IDM Home. SSPR has one, User Application has another, OSP has a third. Each is different. There is no single point to customization for the IDM Home presentation. User Application was the first app to be…

+ read more

tse7147
By: tse7147
Sep 26, 2016
3:07 pm
Reads:
335
Score:
5

An increasingly common requirement within Identity Management projects is to remove or substitute some characters in a given string. Usually these are non-English (ASCII) characters, accents and diacritic marks. We live in an increasingly global environment. This often causes challenges in identity projects where one must synchronise identity data (names, locations) from a diversity of different…

+ read more

Alexander McHugh
Aug 19, 2016
4:07 pm
Reads:
526
Score:
5

Office 365 licensing is unique where it is possible to mix and match various Enterprise Plans. The two common types of plans offered are Enterprise Packaged Plans and Enterprise Individual Plans. Currently there are three different packaged enterprise plans offered which are E1, E3, and E4. The enterprise…

By: vivekbm
Aug 3, 2016
5:03 pm
Reads:
819
Score:
5

Recently a customer had the following use case requirements to be satisfied via the Identity Manager GroupWise REST connector. Obtain a list of GroupWise groups(Distribution lists) that the user is currently a member of. The ability to remove all group membership in cases when the user gets disabled in IDVault. When users…

By: vivekbm
Feb 19, 2016
7:24 am
Reads:
1,054
Score:
5
This entry is part 5 of 5 in the series What's new in IDM 4.5

I think digging in and seeing what is new in releases of Identity Manager is a useful thing. The high level What’s New that the vendor provides is helpful, but rarely covers the level of detail I am interested in…

geoffc
By: geoffc
Oct 30, 2015
11:51 am
Reads:
725
Score:
Unrated

Thanks to the power and simplicity of DirXML-Script tokens in Identity Manager, one can implement even quite complex policies, whilst only rarely needing to dig directly into the underlying XML. This was not always the case, especially in the first few versions of Identity Manager, which relied on XPath and XSLT…

Alexander McHugh
Oct 1, 2015
12:11 pm
Reads:
1,745
Score:
5

If you are using the IDM 4.0 SP2 Advanced Edition with additional toys like HPD, or if you are using IDM 4.5 AE with the same pieces, you may have the opportunity to use Mobile Approvals from an Android or other phone. This is basically a simplified mobile interface made to let those doing approvals…

+ read more

By: ab
Feb 19, 2015
12:14 pm
Reads:
1,659
Score:
4.8

Note: This solution has been developed as a proof of concept in a lab, but hasn’t been battle-tested yet in a production environment.   When writing an IDM Driver, it’s easy to have dependencies which conflict with another driver’s dependencies. For example, let’s say your driver depends on commons-lang-2.6.jar, but other drivers are present which…

+ read more

By: jalbr74
Feb 9, 2015
11:53 am
Reads:
1,256
Score:
Unrated
This entry is part 3 of 3 in the series Delving into and beyond the current-op

Here’s part 3 of Alexander McHugh’s series on Delving into and beyond the current-op. The third article in the series deals exclusively with direct operations, it will outline the technical details, review general best practices related to working with direct operations. It will outline how to manipulate and transform direct operations and provide some useful toolbox rules related to direct operations.

Alexander McHugh
Jun 24, 2014
1:30 pm
Reads:
2,563
Score:
4.5
This entry is part 2 of 3 in the series Delving into and beyond the current-op

Here’s part 2 of Alexander McHugh’s series on Delving into and beyond the current-op. This second article will outline general best practices related to working directly with nodes other than the current-op within the “current operation”. It will also outline some useful toolbox rules and expressions that can be used to access and manipulate the entire XDS document.

Alexander McHugh
Jun 17, 2014
5:00 am
Reads:
2,144
Score:
4.5
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow