Workflow

A lot of times NetIQ IDM developers need to define workflows where a user can assign permissions. With IDM, permissions are defined using entitlements and assigned via resources, when you follow RBAC. However in the real world sometimes you cannot map everything with a Role and some entitlements have to be assigned manually on a…

+ read more

By: nsanson
Jul 28, 2015
8:56 am
Reads:
40
Score:
Unrated

I recently implemented the cool solution, “Setting a password in workflow” for one of my clients. This allows us to set userPassword within a workflow. But the source of the password data might often be a form. A common configuration is that when using a password field, you have the ability to provide a…

By: rrawson
Jul 7, 2015
11:24 am
Reads:
191
Score:
5

Welcome to part 2 of the Remote Execution Adapter for Aegis. In this second part I provide the server side adapter, instructions on how to install and configure as well as descriptions of each activity. Part 1 is available here – Please ensure you download the client and server files from part1 and part2 at…

+ read more

Martin Cotter
Mar 24, 2015
4:21 pm
Reads:
775
Score:
Unrated

Designing IT Process Automation workflows very often comprises of taking a manually documented process and converting it into an automated process, maintaining the logical steps and as many of the techniques used in the manual process as possible. Manual processes can include heterogeneous automated steps utilizing customized scripts which may have been in place for…

+ read more

Martin Cotter
Mar 18, 2015
12:23 pm
Reads:
847
Score:
Unrated

The “Aegis Automation Workflows in 5 Minutes” cool-tool blog series shows examples of Aegis workflows which deliver value in as little as 5 minutes development time – all using out of the box activities! Aegis workflows can be forever evolving, and while these workflows fulfill a purpose, you may for example want to extend a…

+ read more

Martin Cotter
Sep 22, 2014
2:37 pm
Reads:
1,311
Score:
Unrated

In this workflow I have 3 levels of escalation

Martin Cotter
Sep 15, 2014
4:52 pm
Reads:
1,443
Score:
5

This 5 minute workflow tackles the tedious problem of updating local passwords for an account across multiple Linux systems.

Martin Cotter
Sep 10, 2014
11:38 pm
Reads:
1,224
Score:
5

This 5 minute workflow will connect to all your Cisco Network Devices and save their running configuration to disk. This could be done on a schedule, before upgrades or just to verify the configuration hasn

Martin Cotter
Sep 3, 2014
11:50 am
Reads:
1,139
Score:
Unrated

There are many ways to detect Disabled User accounts, in this 5 minute workflow I will use the Directory Resource Administrator Adapter for Aegis to interact with Active Directory. Accounts can be for many reason, disabled manually by an administrator to automatically when the account expires.

Martin Cotter
Aug 27, 2014
3:10 pm
Reads:
1,024
Score:
Unrated

This 5 minute workflow uses the vCenter Adapter for Aegis, first to find all Datastores in connected vCenter instances and then to find orphaned disk on each detected datastore. Finally the workflow sends the detected list to an administrator for action.

Martin Cotter
Aug 25, 2014
4:35 pm
Reads:
952
Score:
Unrated