Workflow

This entry is part 4 of 8 in the series Aegis Workflow 101

This entry is part 4 of 8 in the series Aegis Workflow 101Welcome to Part 4 of Aegis Workflow 101.  This time we look at Triggers which define the conditions when workitems should start as well as well as other behavior which we will learn about below. In the last topic we learned about events.  When…

+ read more

Martin Cotter
Apr 20, 2016
10:43 am
Reads:
514
Score:
Unrated
This entry is part 2 of 8 in the series Aegis Workflow 101

This entry is part 2 of 8 in the series Aegis Workflow 101Welcome to Part 2 of Aegis Workflow 101.  This time we look at Input Builder which is a basic but very powerful component of Aegis workflow design. Looking back at Part 1, we build a ‘Hello World’ workflow which used the echo activity…

+ read more

Martin Cotter
Apr 8, 2016
2:11 pm
Reads:
765
Score:
Unrated
This entry is part 1 of 8 in the series Aegis Workflow 101

With the newly available Sentinel Adapter for Aegis, a new audience is exposed to the wonderful world of ITPA. To help them on their way this is a new series of posts on getting started with everyone’s favorite automation platform – Aegis!

Martin Cotter
Apr 5, 2016
8:56 am
Reads:
948
Score:
Unrated

In previous posts I have shown how to integrate Aegis and Sentinel – but why? I often get asked what does Aegis actually do, its not an easy question to answer without example. The short answer is – it can do almost anything – the long answer is explaining what that means! Aegis…

Martin Cotter
Dec 22, 2015
10:14 am
Reads:
880
Score:
Unrated

I had a requirement to give some people the possibility to change passwords for lower grade students and it was ok to give this right out per school and they had ~15 schools. The first thing I did was to create one group for each school and the groups have the right to see the…

+ read more

Aug 19, 2015
11:20 am
Reads:
746
Score:
Unrated

A lot of times NetIQ IDM developers need to define workflows where a user can assign permissions. With IDM, permissions are defined using entitlements and assigned via resources, when you follow RBAC. However in the real world sometimes you cannot map everything with a Role and some entitlements have to be assigned manually on a…

+ read more

By: nsanson
Jul 28, 2015
8:56 am
Reads:
1,006
Score:
5

I recently implemented the cool solution, “Setting a password in workflow” for one of my clients. This allows us to set userPassword within a workflow. But the source of the password data might often be a form. A common configuration is that when using a password field, you have the ability to provide a…

By: rrawson
Jul 7, 2015
11:24 am
Reads:
1,099
Score:
5

Welcome to part 2 of the Remote Execution Adapter for Aegis. In this second part I provide the server side adapter, instructions on how to install and configure as well as descriptions of each activity. Part 1 is available here – Please ensure you download the client and server files from part1 and part2 at…

+ read more

Martin Cotter
Mar 24, 2015
4:21 pm
Reads:
1,504
Score:
Unrated

Designing IT Process Automation workflows very often comprises of taking a manually documented process and converting it into an automated process, maintaining the logical steps and as many of the techniques used in the manual process as possible. Manual processes can include heterogeneous automated steps utilizing customized scripts which may have been in place for…

+ read more

Martin Cotter
Mar 18, 2015
12:23 pm
Reads:
1,638
Score:
Unrated

The “Aegis Automation Workflows in 5 Minutes” cool-tool blog series shows examples of Aegis workflows which deliver value in as little as 5 minutes development time – all using out of the box activities! Aegis workflows can be forever evolving, and while these workflows fulfill a purpose, you may for example want to extend a…

+ read more

Martin Cotter
Sep 22, 2014
2:37 pm
Reads:
2,130
Score:
Unrated
Active Directory Automation Cloud Computing Cloud Security Configuration Customizing Data Breach DirXML Drivers End User Management Identity Manager Importing-Exporting / ICE/ LDIF Intelligent Workload Management Knowledge Depot LDAP Migrating from Windows XP or 2003 to SUSE Linux Monitoring Open Enterprise Server Passwords Reporting Secure Access Sentinel Supported Troubleshooting Workflow