Identity Vault

I decided that it would be helpful to produce a monthly report about our Identity Vault and its accounts and groups. So I began to write a shell script to produce my report. To start with…

By: stharp
Dec 1, 2016
11:24 am
Reads:
108
Score:
5

dvandermaas shares some best practices to consider when designing the Identity Vault tree. He has learned this the hard way, so listen up and save yourself some grief.

Nov 21, 2008
4:48 pm
Reads:
4,661
Score:
Unrated

In an Identity Vault environment, an attribute or field can have different character lengths in any of the connected data stores. This article describes a method of handling Attribute length differences by using the Substring Verb token in combination with an IDM Mapping Table.

By: furulo
Jul 24, 2008
10:01 am
Reads:
3,078
Score:
Unrated

David Gersic explains a strategy for moving a user from one container to another, on both eDirectory and AD systems.

dgersic
By: dgersic
Aug 29, 2007
11:15 am
Reads:
2,635
Score:
Unrated

Here’s a walkthrough of some of the cool new features in Identity Manager 3.5, courtesy of Geoff Carman.

geoffc
By: geoffc
Apr 4, 2007
10:30 am
Reads:
1,853
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow