Filtered by: Links
There are several reasons that cause the NAM to detect URL Tampering. Most often it is a name resolution issue stemming from improper DNS or HOSTS file configuration in your environment. Still, even with proper configuration your users may, appropriately, get this message. The reason may stem from users having become accustomed to using web server host or “short names” to access the web server/app before it was protected by Access Manager. If that is the case, this article will show you when and how you can configure NAM to allow “short name” access using the Virtual Mult-homing feature.
Submitted by: pmckeith on Wed. 11.17.2010
Filed Under: Identity & Security Management Cool Solutions, Cool Solutions
Topic: Access Control, Administration, Authentication, Browsers, Configuration, Deployment, Error messages, Gateways, Identity & Security Management, Links, Partners, Policies, Secure Access, Single Sign-on, Tips for Administrators, Troubleshooting, WebAccess
Product: Access Manager, Compliance Management Platform, iChain, Identity-Driven Computing, Secure Identity Management
Domnic shares with us his favorite top 5 jQuery Plugins. Explore the power of jQuery plugins.
Find out how to get items linked to folders with the cross-platform GroupWise client, thanks to this tip from Axel Schnellbügel.