Updated: New in v2.7: Better feedback when handling drivers, new root DSE Viewer, ability to preview the results of a query in Associations Manager, support for anonymous binds, ability to export the eDirectory CA public key, support for ADLDS and Lotus Domino LDAP, ability to specify the base DN.
In the previous blog(s) I showed an example of how you can automate the building of the server views so they are data driven and self maintaining. The next step is to put the rules in place to control how state (Critical, Major, Minor, etc) are propagated up from the different categories and control how they impact the individual servers.
Now it is time to add the first management data source, for this example we have a management tool that has a break out of the server and a few different types of monitoring.
This article explains how to do LDAP SSL authentication using the Novell LDAP Libraries for C#.
This article explains how to export the Trusted Root Certificate of the eDirectory Server that is used for LDAP SSL authentications.
This document describes the source NAT (SNAT) configuration for the Novell SSL VPN server, when full tunnel mode is enabled. Full tunnel mode is a feature announced in the 3.1 SP1 Version of Access Manager. In full tunnel mode, the client connection is completely secure as any traffic initiated at the client is tunneled to SSL VPN server and then directed to the respective networks. While redirecting, SSL VPN server makes use of the source NAT configuration to reach the public and private networks.
If you get the error: “Unable to contact the specified server. Please verify the information entered and try again…” while accessing iFolder server from a SSLVPN client, check out this tip from Shashikala BV for help on how to fix it.
This article explains how to configure Novell SOAP-DSML web service and IDM SOAP driver for mutual authentication.
Novell SSL VPN has a set of client integrity check policies to protect your network and applications from malicious programs.
Mike Faris explains how to replace existing server certificates with new certificates that are virtually the same, they just last until the CA itself expires.