Filtered Index
Filtered by: Compliance Management Platform
AGS 6: ACF2 Collector and Simulator
ACF2 is a difficult system to feature in demos. It is also difficult to model data coming from ACF2. This article will walk you through a simplified ACF2 model simulated on a database, and an AGS 6 collector.
Submitted by: mbluteau on Wed. 03.14.2012
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Identity & Security Management, Security
Product: Compliance Management Platform, Identity Manager, Secure Identity Management
Making CMP work with Sentinel 7.0
Trying (and failing) to get Compliance Management Platform 1.1 working with Sentinel 7.0? This simple tip to make the Identity Vault Collector work will get you started!
Submitted by: DCorlette on Tue. 07.12.2011
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Integration
Product: Compliance Management Platform, Sentinel
【セミナー】5月26日 ノベル Identity & Security ソリューションセミナー - 導入実績No1の最新ID管理・セキュリティ製品の解説
【セミナー】5月26日 ノベル Identity & Security ソリューションセミナー - 導入実績No1の最新ID管理・セキュリティ製品の解説
Submitted by: kimimasa on Thu. 05.19.2011
Filed Under:
Cool Solutions
Topic: Identity & Security Management, Identity Management, Log Management
Product: Access Manager, Compliance Management Platform, Identity Manager, Secure Identity Management, Sentinel
Introducing Novell Identity Manager Google Apps Driver Part 2
In the second part of the Introducing Novell Identity Manager Google Apps Driver series Don will discuss the capabilities of the Google Apps driver and User objects.
Submitted by: daredl2 on Sun. 04.17.2011
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions, All Tech, All the Time
Topic: All-Tech IDM, Cloud, Drivers, eDirectory, Identity & Security Management, Identity Management, IDM4
Product: Access Manager, Audit, BorderManager, Business Service Management, Compliance Management Platform, Conferencing, ConsoleOne, Data Synchronizer, DirXML, eDirectory, eGuide, exteNd, File Management Suite, File Reporter, File System Factory, GroupWise, iChain, Identity Manager
Novell Access Manager – “Detected URL Tampering”
There are several reasons that cause the NAM to detect URL Tampering. Most often it is a name resolution issue stemming from improper DNS or HOSTS file configuration in your environment. Still, even with proper configuration your users may, appropriately, get this message. The reason may stem from users having become accustomed to using web server host or “short names” to access the web server/app before it was protected by Access Manager. If that is the case, this article will show you when and how you can configure NAM to allow “short name” access using the Virtual Mult-homing feature.
Submitted by: pmckeith on Wed. 11.17.2010
Filed Under:
Identity & Security Management Cool Solutions, Cool Solutions
Topic: Access Control, Administration, Authentication, Browsers, Configuration, Deployment, Error messages, Gateways, Identity & Security Management, Links, Partners, Policies, Secure Access, Single Sign-on, Tips for Administrators, Troubleshooting, WebAccess
Product: Access Manager, Compliance Management Platform, iChain, Identity-Driven Computing, Secure Identity Management
State of ISM Partner and Employee Sales Briefing Sept 15th or 16th 2010
One-stop call for marketing and sales teams to share updates on product status, marketing events, wins, and sales success stories
Submitted by: ntroia on Tue. 08.24.2010
Filed Under:
Solution Provider, Identity and Security
Topic: Identity & Security Management
Product: Compliance Management Platform, Identity Manager, Identity Manager 3.5, SecureLogin, Sentinel






0