Quantcast
Channel: Identity Management Category
Browsing latest articles
Browse All 66 View Live

NetIQ Designer for Mac OS has finally arrived! (sorta)

NetIQ has released a beta version of their Designer for IDM tool on the Mac OS.  For years Designer has only been supported on Windows and Linux but with this release NetIQ has officially taken that...

View Article


Filtering IDM Transactions With Variable Values

From time to time we run across requirements where there is some attribute that is used to hold a value that can vary greatly across the enterprise from one object to another, usually users.  Most...

View Article


Evaluating OUD ACI's on a Per Entry Basis

I ran into an issue where I couldn't determine why a certain ACI was not working as expected in Oracle Unified Directory 11gR2.  After doing some research, I stumbled onto Effective Rights Control...

View Article

Image may be NSFW.
Clik here to view.

RSA IMG Approvers and Fulfiller Resources: Managing (Aveksa) Turnovers

Within RSA IMG (formerly Aveksa) workflows you can assign many resources to complete an approval and/or manual fulfillment activity. The following screenshot shows an example of resource assigned to an...

View Article

Image may be NSFW.
Clik here to view.

Driver Jobs - Better Than Magic

Have you ever found yourself needing your NetIQ IDM solution to perform a set of instructions at a specific time of day or at regular intervals? Most solutions for IDM include some timed processes like...

View Article


Administering Microsoft Exchange Client Access Attributes with PowerShell

Often times an IDM solution’s connector/functionality does not have the ability to fully match the disablement requirements for a client when it comes to Microsoft Exchange.  An example of this is the...

View Article

The Case for IAM Post Production Support

Depending on your role within an Identity & Access Management shop, successes are defined by various proverbial champagne-popping accomplishments.  If your role is that of a Software Engineer, you...

View Article

How to Avoid the NetIQ User App Date Picker "Gotcha"

Often times there are requirements to pick dates for workflow requests within NetIQ User Application workflows.  These could be for start dates, end dates, effective dates or any other dates of...

View Article


The Balancing Act Of Keeping Unauthorized Users Out

For those of you responsible somehow for the security of your company’s network and information stores, your job never ends. You are placed between two points of diminishing returns between authentic...

View Article


eDirectory and IDM non-root install - Quick Start Guide

Have you ever needed a non-root install and just wanted a quick guide to get it in without having to do a lot of research? This is a quick example guide of getting you started from start to finish....

View Article

4 Quick Performance Improvements for SailPoint IdentityIQ

One thing that can be commonly overlooked in early SailPoint projects is performance tuning.  Just like a car, SailPoint will get you where you need to go, but with a little tuning, it can get you...

View Article
Browsing latest articles
Browse All 66 View Live