Filtered by: Identity & Security Management
I’m now working as a Technical Consultant at Salford Software, a leading IT solutions provider here in the UK. Salford Software are a Novell Platinum partner, Microsoft Gold Partner and and are also partnered with Sun and Oracle.
This question does not have a quick answer, as both Domino and Identity Manager have sophisticated security systems. Each driver configuration may vary as to the required minimum security rights.
In an Identity Vault environment, an attribute or field can have different character lengths in any of the connected data stores. This article describes a method of handling Attribute length differences by using the Substring Verb token in combination with an IDM Mapping Table.
SAP Solution Manager can be accessed through the SAP GUI and through a SAP Web Application Server (SAP NetWeaver). Applications like this must be protected especially when it is accessed from the outside world, a name and password combination will simply not do. This is when Access Manager comes into place.
SAP systems will mostly be hidden somewhere deep within a company's infrastructure, it will not be in the DMZ. In this case the SAP systems we even hosted at SAPHosting – Waldorf Germany. So no way we can reach it from the outside world. Again a good opportunity for Access Manager.
Perry Nuffer explains how Notes user.id files can be created anywhere you can map a drive with sufficient rights.