NetIQ eDirectory is the backend directory for the Identity Vault for NetIQ’s Identity Manager product. If eDirectory replica send and receive deltas are significantly out on your Identity Vault server compared to other servers in the replica ring, or even another server, it may be due to an I/O issue or a combination of inadequate
In addition to its many fine and wonderful features pertaining to identity management, NetIQ offers within its eDirectory product the ability to define and assign multiple password policies. These policies can be configured in a variety of ways to offer companies and users strategic options regarding password security and management. However, one of the less
Recently we encountered an organization that had deployed a rather ingenious solution to a seemingly complex problem within their NetIQ IDM solution. The organization is a large University with over a dozen campuses. Across this broad array of campuses, an individual can have multiple roles as both student and/or staff member at multiple campuses concurrently.
The NetIQ Access Manager (NAM) tool is a great tool for providing Single Sign-On (SSO) services to both internal and external web applications for any business. Whether you need support for SAML, WS Fed, OAuth, Liberty, HTML Form Fill, HTML Rewrite, Header Injections, and Cookies, NAM is pretty versatile and can provide SSO capabilities for
In performing upgrades to MicroFocus/NetIQ Identity Manager 4.7, there are a few key items that one should be aware of prior to starting the process. Key Considerations: The install uses a new script based install for Linux. This is great as we have more flexibility with the silent install and one can review the scripts
Here is a method to populate an AD domain for a development environment. This document also includes additional detail of using an AD driver to pull the data into the Identity Vault. This could be used for any Identity Manager Solution. Most customers have Active Directory in their environment and so an AD driver/connector will
It is important to audit data and changes. Sometimes though access to this information is needed for other reasons. If there is a need for complex matching rules, it may be necessary to look at historical data. An example of this would be when matching accounts in the Identity Vault with a potential account that
In most cases, organizations that implement Identity Management (IdM) solutions identify individual users and associated accounts/access by assigning a unique identifier. These identifiers are non-expiring, non-reusable values, often assigned by an HR system. The value of these identifiers is that they never change over time. Marriage, divorce, transfer, rehires, etc., have no impact on these
Multi-factor Authentication (MFA) has been around for a while but is becoming more and more common in organizations that want to make accessing resources and applications more secure. Even if you do not know what MFA is, odds are that you have interacted with it at some point in recent years. If you have ever
During an installation and configuration of the Access Review driver in an IdM environment using OSP as an authentication source we learned that there were details needed to successfully configure the driver that were not available in the NetIQ User Guides. The NetIQ Identity Governance User Guide discusses the integration of IdM (Identity Manager) and