Category: <span>technology</span>

Beware: Your Reputation Proceeds You

Your reputation is your best selling point unless it is damaged in which case it may cost you dearly. Recently we spoke to an individual in regards to a position within our fair company.  We did the usual due diligence we go through for all prospective hires: Background Check (Criminal, Credit) Reference Check Resume Verification
Read More

Why I am RFIDup

Very recently one of my banks decided to send me a new ATM card as my old one had been about to expire.  Within said card contained a newly minted RFID (Radio Frequency Identification) chip. My security hackles went off like wildfire. Some of you may have already received a similar card or use a
Read More

Elvis has left the building (what to do when a new version of the software is released).

RE: Oracle Fusion Middleware 10g vs. 11g stack selection (OID, OVD, OIM, OAM specifically). Here at IDMWorks we specialize in Identity and Access Management full life-cycle services. Discovery √ Design √ Implementation √ Development √ Support √ During a recent trip to a customer site for an installation of the Oracle Fusion Middleware stack we
Read More

The Role of Identity Management in Public vs. Private Cloud Computing or How I stopped worrying and learned to love the Cloud: Part II

Let’s recap shall we? That install of Firefox, IE, Safari, etc. is your method to cheaper, easier to use techno-services outsourced to a service provider (like Google) who take on the infrastructure, technology and heavy lifting so that you, the business, can reap the ROI. Risks, well, we covered that already, HERE. So how about
Read More

The Problem with Old Cache

This was the question our development team had to answer to resolve a fairly significant problem we had discovered with Oracle’s Access Manager. Picture this.  You are a bank customer with an online account who logged on to the site and is prompted to change your password. You perform a successful password change, but need
Read More

OIM: Installing the Design Console under Linux

According to the Certification Matrix, the Oracle Identity Manager Design Console only runs under Windows environments, but this is not necessarily the case. It’s only supported under Windows environments, but it can run just fine under Linux, it just takes a little work. Here’s the steps to getting the Design Console to run under Linux.
Read More

Logging into & setting up iManager

Logging into iManager is a little deceptive if trying to do it for the first time. You will need three items: 1.The eDirectory login username. In my case this is: admin 2.The password for the user identified in step #1 3.The IP address of the server. Using the Tree name isn’t always reliable I have
Read More

Setting up your java keystore for NIM

To setup your java keystore, you’ll want to run through the following exercise on your system (note: these instructions are for windows): %JAVA_HOME%binkeytool -genkey -alias tomcat -keyalg RSA -keystore /path/to/my/keystore (note: remember what you set the keystore password to) Resart Tomcat You’ll want to modify your <tomcat dir>confserver.xml file to change the value of the
Read More