Filtered Index

Filtered by: iChain

daredl2's picture
article
Reads:

4857

Score:
2.166665
2.2
6
 
Comments:

1


pmckeith's picture
article
Reads:

4886

Score:
1
1
1
 
Comments:

0


Novell Access Manager – “Detected URL Tampering”

There are several reasons that cause the NAM to detect URL Tampering. Most often it is a name resolution issue stemming from improper DNS or HOSTS file configuration in your environment. Still, even with proper configuration your users may, appropriately, get this message. The reason may stem from users having become accustomed to using web server host or “short names” to access the web server/app before it was protected by Access Manager. If that is the case, this article will show you when and how you can configure NAM to allow “short name” access using the Virtual Mult-homing feature.

pmckeith's picture
article
Reads:

19813

Score:
2.727275
2.7
11
 
Comments:

7


Salesforce.com SSO and Novell Access Manager using SAML 2

Using Novell Access Manager (NAM) with salesforce.com allows your users to use their existing LDAP credentials for single sign-on access to salesforce.com as well as any web applications protected by NAM.

This cool solution will show you how to add salesforce.com to your NAM implementation using a federated authentication via SAML 2.0. By using SAML 2.0, your users authenticate to NAM as they typically do using their existing LDAP credentials provided by your corporate directory. salesforce.com then authenticates users via SAML without the need to synchronize passwords with salesforce.com. Once configured, your users will have SSO access to all your web resources protected by NAM through either the Access Gateway or using federation protocols. Unfortunately, salesforce.com does not support federated provisioning, so you will still need create users in salesforce.com. If you would like to automatically provision, deprovision, and manage the salesforce.com identities, you can use Novell Identity Manager, but that is out of scope for this article.

9159506's picture
article
Reads:

3811

Score:
2
2
1
 
Comments:

0


Redirecting iChain Users based on Groups

Andrei Karyagin explains how to redirect iChain users, based on what group they are a member of.

Submitted by: 9159506 on Mon. 05.05.2008
Filed Under: Identity & Security Management Cool Solutions, Cool Solutions
Topic: Groups
Product: iChain

coolguys's picture
article
Reads:

4982

Score:
2
2
1
 
Comments:

0


Connecting to Protected iChain Resources via Access Manager

If your iChain users can't access resources from behind a firewall since adding Access Manager, this tip should help.

Submitted by: coolguys on Wed. 04.16.2008
Filed Under: Identity & Security Management Cool Solutions, Cool Solutions
Topic: Access Control
Product: Access Manager, iChain

Misterwippy's picture
article
Reads:

5520

Score:
2
2
1
 
Comments:

0


Multiple LDAP Values in a NAM Form Field

Rowan Truscott shares a Javascript snippet that stuffs two attributes into a single text input field in Access Manager.

Submitted by: Misterwippy on Wed. 01.09.2008
Filed Under: Identity & Security Management Cool Solutions, Cool Solutions
Product: Access Manager, iChain

© 2013 Novell