NetIQ Designer for Mac OS has finally arrived! (sorta)
NetIQ has released a beta version of their Designer for IDM tool on the Mac OS. For years Designer has only been supported on Windows and Linux but with this release NetIQ has officially taken that...
View ArticleFiltering IDM Transactions With Variable Values
From time to time we run across requirements where there is some attribute that is used to hold a value that can vary greatly across the enterprise from one object to another, usually users. Most...
View ArticleEvaluating OUD ACI's on a Per Entry Basis
I ran into an issue where I couldn't determine why a certain ACI was not working as expected in Oracle Unified Directory 11gR2. After doing some research, I stumbled onto Effective Rights Control...
View ArticleRSA IMG Approvers and Fulfiller Resources: Managing (Aveksa) Turnovers
Within RSA IMG (formerly Aveksa) workflows you can assign many resources to complete an approval and/or manual fulfillment activity. The following screenshot shows an example of resource assigned to an...
View ArticleDriver Jobs - Better Than Magic
Have you ever found yourself needing your NetIQ IDM solution to perform a set of instructions at a specific time of day or at regular intervals? Most solutions for IDM include some timed processes like...
View ArticleAdministering Microsoft Exchange Client Access Attributes with PowerShell
Often times an IDM solution’s connector/functionality does not have the ability to fully match the disablement requirements for a client when it comes to Microsoft Exchange. An example of this is the...
View ArticleThe Case for IAM Post Production Support
Depending on your role within an Identity & Access Management shop, successes are defined by various proverbial champagne-popping accomplishments. If your role is that of a Software Engineer, you...
View ArticleHow to Avoid the NetIQ User App Date Picker "Gotcha"
Often times there are requirements to pick dates for workflow requests within NetIQ User Application workflows. These could be for start dates, end dates, effective dates or any other dates of...
View ArticleThe Balancing Act Of Keeping Unauthorized Users Out
For those of you responsible somehow for the security of your company’s network and information stores, your job never ends. You are placed between two points of diminishing returns between authentic...
View ArticleeDirectory and IDM non-root install - Quick Start Guide
Have you ever needed a non-root install and just wanted a quick guide to get it in without having to do a lot of research? This is a quick example guide of getting you started from start to finish....
View Article4 Quick Performance Improvements for SailPoint IdentityIQ
One thing that can be commonly overlooked in early SailPoint projects is performance tuning. Just like a car, SailPoint will get you where you need to go, but with a little tuning, it can get you...
View Article