Filtered Index
Filtered by: Identity-Driven Computing
Talking about Entitlements - Part 4
Here's part 4 of Geoffrey Carman's series about Entitlements.
Submitted by: geoffc on Wed. 09.14.2011
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Identity & Security Management, Identity Management
Product: DirXML, eDirectory, Identity Manager, Identity Manager 3.5, Identity-Driven Computing
GreyTower for Novell IDM
Free Download of GreyTower for Novell IDM Community Edition. This is a JMS connector toll to use in any situation where you would want to extend Novell Identity Manager to a message Que such as an ESB.
Submitted by: MarcRPotter on Thu. 09.08.2011
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: 3rd Party Products
Product: Identity Manager, Identity-Driven Computing
Talking about the DirXML-Policies attributes
Geoffrey addresses a variety of issues he has wondered about over the years.
Submitted by: geoffc on Tue. 08.30.2011
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Attributes, Identity & Security Management, Identity Management, IDM4, Policies
Product: DirXML, eDirectory, Identity Manager, Identity Manager 3.5, Identity-Driven Computing
Wikiもはじめました。
こんにちは。
WIkiも初めてみちゃいました。Blogは情報の発信ツールとしては有効ですが、フロー情報に近いので整理された情報を提供していくには若干不便な部分があります。
ってことで、整理されたストック情報を提供の場として、Wikiも初めてみました。
ほとんどリンク集ですが、ここにくればノベルのISM製品関連情報が網羅できるようにしていきたいと思っています。
Submitted by: kimimasa on Fri. 02.04.2011
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Product: Identity Manager, Identity-Driven Computing
Let's talk some more about Packages in Designer 4 - Part 5
Here's part 5 of Geoffrey Carman's series about Packages in Designer 4.
Submitted by: geoffc on Thu. 01.20.2011
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions, All Tech, All the Time
Product: DirXML, eDirectory, Identity Manager, Identity Manager 3.5, Identity-Driven Computing
Novell Access Manager – “Detected URL Tampering”
There are several reasons that cause the NAM to detect URL Tampering. Most often it is a name resolution issue stemming from improper DNS or HOSTS file configuration in your environment. Still, even with proper configuration your users may, appropriately, get this message. The reason may stem from users having become accustomed to using web server host or “short names” to access the web server/app before it was protected by Access Manager. If that is the case, this article will show you when and how you can configure NAM to allow “short name” access using the Virtual Mult-homing feature.
Submitted by: pmckeith on Wed. 11.17.2010
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Access Control, Administration, Authentication, Browsers, Configuration, Deployment, Error messages, Gateways, Identity & Security Management, Links, Partners, Policies, Secure Access, Single Sign-on, Tips for Administrators, Troubleshooting, WebAccess
Product: Access Manager, Compliance Management Platform, iChain, Identity-Driven Computing, Secure Identity Management





0