Category: <span>talent</span>

DBAT Connector Customization Or How I Learned to Stop Worrying and Love the Groovy Script

I recently had a client who required OIM to manage access to a database application (or two). They needed users managed and they needed roles managed.  To meet their needs, I embarked on the process of installing, configuring and, of course, customizing the Database Application Tables(DBAT) connector. As with many ICF connectors, installation had its
Read More

SOA-INFRA In A Warning State After BP06 Upgrade

If you upgrade Oracle Identity Manager 11gR2 to BP06 you may find that the soa-infra deployment on your SOA managed servers to be in a WARNING state. Further investigation into the deployment monitoring and you find that CaseEventMDB is not connected to the Messaging System. What has happened is that during the upgrade process certain
Read More

Agility In Delivering Cybersecurity Projects

Many cybersecurity professionals wonder how to implement Agile methodologies such as Scrum, XP (Extreme Programming), Kanban, and/or Lean on a cybersecurity project. While some cybersecurity professionals take the standard waterfall approach without even exploring the possibility of implementing Agile for green-field projects, others have successfully adopted Agile not just because of reduced project overhead but because of elevated
Read More

Setting up Global Setup controls for the Identity Tracking Solution Pack on Sentinel 7.4

After installing the Sentinel Identity Tracking solution pack, page 13 step 8 of the installation document tells you to “Select the Create PDF button to generate complete, detailed PDF documentation for this Solution Pack”.  Page 5 Of this document talks about Solution Pack Controls, and the first sentence in the Description section says “The Global Setup
Read More

Configure Tomcat Application With PingAccess For Reverse Proxy

In this blog, I am going to explain how to configure a Tomcat application with PingAccess for reverse proxy. PingAccess offers RBAC (Role based) ABAC (Attribute based) access control. PingAccess supports both the legacy way of agent based integrations for webservers, as well as reverse proxy for application servers. Components Different components used/created for this exercise:
Read More

Common Errors in Configuring the RACF Gateway

RACF full connector has read and write capabilities on external application and allows data to send in both the directions. With the RACF connector being very sensitive, two main issues could possibly occur during the RACF connector Gateway configuration: Connection Timeout Error After the successful installation of RACF in one of our client environments, when
Read More