NetIQ Cool Solutions

Tag Archives: Security

Securing Access Manager Sessions


By: mattehle

February 19, 2014 3:47 pm

Reads: 245

Although the issue is often overlooked, session hijacking continues to be a pervasive threat on the web. This solution is intended to mitigate the potential of session hijacking on Access Manager installations. For the purpose of this article, session hijacking can be defined as the impersonation of a valid session in order to gain unauthorized …

+read more

Categories: Access Manager, Technical Solutions

Integrating and NetIQ Access Manager using SAML2 (UPDATE)


By: pmckeith

February 11, 2014 12:29 pm

Reads: 348

This is an update to my previous Cool Solution: Integrating and NetIQ Access Manager using SAML2. If you are new to SAML2 and federation, you may still find my first article useful as I endeavored to explain each concept as each configuration step is described. This article is not inclusive, but an update to that article. In the years since it was written, several new features related to SAML have been added to I describe some of those here and also add some extra tips along the way.

+read more

Tags: , , , , ,
Categories: Access Manager, Cloud Computing, Cloud Security Service, News, Technical Solutions

Securing JBoss with User Application


By: ScorpionSting

January 28, 2014 10:51 am

Reads: 277

If you have JBoss and User Application installed at the default location, and your Advanced Provisioning module is set up right, this is how you make it secure.

+read more

Tags: , ,
Categories: Identity Manager, Technical Solutions

Using Yubico YubiKey with eDirectory for two-factor authentication

By: Aleksandar Mujadin

July 9, 2013 4:40 pm

Reads: 570

This article explains how you can use the NMAS HOTP login method together with the YubiKey hardware token from Yubico.

+read more

Tags: , , , , , , , ,
Categories: eDirectory, Technical Solutions

Introducing the new NetIQ Website


By: JayGardner

April 30, 2012 1:42 pm

Reads: 2043

  I am excited to share with you the new NetIQ website. We have completely redesigned the site in order to: • Make it easier for you to find and share information • Showcase our expanded product portfolio • Provide multiple ways to engage with us At NetIQ, we have a culture of focusing on …

+read more

Tags: , , , , , , , , , , , , , , ,

Locking Active directory account when “Locked By Intruder” is set in eDirectory

By: vivekbm

April 13, 2012 11:22 am

Reads: 1777

vivekbm shares a tip on how to synchronize lockedbyintruder to locktime in Active Directory.

+read more

Tags: ,
Categories: eDirectory, Technical Solutions


By: ab

March 22, 2012 10:15 am

Reads: 417

Updated: Perl-coded script designed to backup eDirectory on Linux or Solaris.

+read more

Tags: , ,
Categories: Cool Tools, eDirectory

NetIQ’s BrainShare Keynote Review

David Shephard

By: David Shephard

October 21, 2011 1:30 pm

Reads: 1079

NetIQ President Jay Gardner welcomed the 2000+ attendees to BrainShare 2011 and the inaugural NetIQ keynote Tuesday morning and introduced his topic: the powerful combination that is NetIQ.  In his introductory outline of the new NetIQ Gardner stated “We have combined the capabilities of NetIQ with some of the capabilities of the former Novell to …

+read more

Tags: , , , , , , , , , , , , , , , , , , , , , , , , , ,
Categories: AppManager, Operations Center, PlateSpin

4 Companies, 1 Purpose: Attachmate, NetIQ, Novell & SUSE

David Shephard

By: David Shephard

May 11, 2011 3:15 pm

Reads: 3197

A few days ago now we announced  that The Attachmate Group purchased Novell. Now that the dust has settled let’s take a quick look at some of the commentary about the purchase and NetIQ and a few statements from those in the know here. As reported in Network World by @alphadoggs: ‘The proposed buyout was …

+read more

Tags: , , , , , , , , , , , , , , , , , , , , ,

Novell Access Manager – “Detected URL Tampering”


By: pmckeith

November 17, 2010 4:51 pm

Reads: 49

There are several reasons that cause the NAM to detect URL Tampering. Most often it is a name resolution issue stemming from improper DNS or HOSTS file configuration in your environment. Still, even with proper configuration your users may, appropriately, get this message. The reason may stem from users having become accustomed to using web server host or “short names” to access the web server/app before it was protected by Access Manager. If that is the case, this article will show you when and how you can configure NAM to allow “short name” access using the Virtual Mult-homing feature.

+read more

Tags: , , ,
Categories: Access Manager, Technical Solutions