User Application

If you are an eDirectory person, you are used to handling user access requests to other objects. If you come from the Open Enterprise Server world, you are used to how that interfaces with a file system (like NSS). The inheritance model is pretty straightforward and easy to understand, most of the time. In the…

+ read more

geoffc
By: geoffc
Mar 22, 2018
11:07 am
Reads:
461
Score:
5

This feature will enable customers to have functionality to approve or reject an approval task via email. One can directly respond to the pending approval task without logging into Identity Manager. Once this feature is turned on from configuration and notify by email is selected in workflow definition with required email notification template,…

Mar 23, 2017
9:06 am
Reads:
2,860
Score:
5

One of the primary deployment use cases for any IDM customer is to provide a single sign-on access to the User Application for their users from outside the enterprise, mostly for the employees working remotely. In this case, no customer would want to give direct access to IDM URL or keep the IDM in…

Feb 7, 2017
11:25 am
Reads:
3,114
Score:
5
This entry is part 3 of 3 in the series Walking through an Integration Activity in User Application

This entry is part 3 of 3 in the series Walking through an Integration Activity in User ApplicationIn the previous article in this series I worked through the pre-activity of the Integration Activity action. Who would have thought so much work goes on, in such detail in the pre-activity, before we even start actually doing…

+ read more

geoffc
By: geoffc
Dec 5, 2016
12:22 pm
Reads:
1,758
Score:
Unrated
This entry is part 2 of 3 in the series Walking through an Integration Activity in User Application

This entry is part 2 of 3 in the series Walking through an Integration Activity in User ApplicationIn the first part of this article I discussed I would be reading through and explaining what I see in an example of the Integration Activity trace in User Application. The SOAP function I am trying to call…

+ read more

geoffc
By: geoffc
Nov 3, 2016
8:48 am
Reads:
1,441
Score:
Unrated
This entry is part 1 of 3 in the series Walking through an Integration Activity in User Application

This entry is part 1 of 3 in the series Walking through an Integration Activity in User ApplicationIdentity Manager has several important components. The original synchronization engine that makes all the magic possible has been very stable for many years now and just keeps working and working well. The Roles Based Provisioning Module (RBPM) added…

+ read more

geoffc
By: geoffc
Oct 25, 2016
3:18 pm
Reads:
1,406
Score:
Unrated

Some time ago, I wrote a cool solution named “Read Resource Entitlement Values from User Application workflow”, presenting a way to handle multiple entitlement values from the user application, since NetIQ stuff does not allow to read it directly. We worked a lot with resources having multiple entitlement values. For this reason we wanted to…

+ read more

By: nsanson
Sep 28, 2016
3:39 pm
Reads:
1,615
Score:
5

We experienced two issues with User Application v4.5 running on Tomcat. The first issue has been mentioned quite a few times on the forums and ncisrael provided a fix for. This is the issue of Compatibility Mode in Internet Explorer where the Header Portlet does not show. The second issue was related to JQuery calls…

+ read more

ScorpionSting
Jan 21, 2016
12:32 pm
Reads:
2,287
Score:
5

A lot of times NetIQ IDM developers need to define workflows where a user can assign permissions. With IDM, permissions are defined using entitlements and assigned via resources, when you follow RBAC. However in the real world sometimes you cannot map everything with a Role and some entitlements have to be assigned manually on a…

+ read more

By: nsanson
Jul 28, 2015
8:56 am
Reads:
2,491
Score:
5

Recently I had occasion to spend a lot of time digging into the SSO (Single Sign On) configuration for User Application. As it happened, I was starting with the IDM 4.5 version of the User Application, which uses the NetIQ OSP (One SSO Provider) framework. This opens an entire other can of worms, since OSP…

+ read more

geoffc
By: geoffc
May 28, 2015
8:45 am
Reads:
3,182
Score:
5
Active Directory Authentication Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management IT Security Knowledge Depot LDAP Monitoring Open Enterprise Server Passwords Reporting Secure Access Supported Troubleshooting Workflow