• Votes

    3

    SSPR - ability for user to switch between available password policies ...

    We offer user a choice of password policies. Currently there is no way in SSPR for the user to select or "change" password policies that are available to them in ...

  • Votes

    1

    Identity Governance - Approve all items option

    Have an option to select all requested types for approval and then approve them all in one action on IG 3.0. It requires that approval user selects approve/deny action on ...

  • Votes

    1

    Identity Governance - Type and present application permissions (like ...

    Have an option to filter which application permission should be displayed (like google) on Browse Request screen on IG 3.0 when selecting which permissions would be ...

  • Votes

    1

    Identity Governance - Requesting access to multiple users

    Select multiple users on Browse Requests when requesting access to various users on IG.

  • Votes

    1

    Identity Governance - Use roles name instead of Access Profiles

    Use the same standardization for name using the word Roles instead of Access Profiles on Browse Requests of IG

  • Votes

    1

    Identity Governance - Identify a removal request is already in ...

    Be able to identify that a removal request was already started and it is in progress for a specific item, avoiding the creation of 2 approval removal requests.

  • Votes

    1

    Identity Governance - Add other information to the reassign request ...

    Provide a way to add other information columns of the requests when reassigning to another user such as request number, detailed information of requested items. If there ...

  • Votes

    2

    Export results of technical role mining on Identity Governance

    Provide a functionality on Identity Governance to export results to CSV file of Technical Role Candidates when mining using Automatic Suggestions as an approach

  • Votes

    1

    Comments in Filr

    some of my employees write very long comments on files.. I would call them notes.. the comment box only shows like 2 lines of text.. it would be much better if the box ...

  • Votes

    2

    Manage RBPM DB connections in configupdate utility

    During the install of the RBPM application is the only time that DB connections can be entered. Once entered, these connections contain encrypted information such as ...

  • Votes

    11

    eDirectory to provide a way to monitor high value attributes outside ...

    Hello, Over a period of time, we see a lot of issues with "Dirxml-Entitlement Result" growing to over 100000 values. We fix it with repair after there is a sync issue. ...

  • Votes

    4

    Provide a threshold for attributes to not grow beyond a certain number ...

    Currently, eDirectory does not have a limit upto which an attribute can grow. Some attributes (even custom) can grow to more than 100K and this can cause a sync melt-down ...

  • Votes

    5

    SSPR - Ability to check password eligibility using web service

    In August 2017, NIST released guidance specifically recommending that user-provided passwords be checked against existing data breaches. I know SSPR has the ability to ...

  • Votes

    5

    SSPR - Add DUO to Forgotten Password Verification methods

    DUO has quickly become one of the standard MFA solutions in the higher education space. It is also becoming a security requirement for many applications. I would like to ...

  • Votes

    5

    SSPR - Substitutions for Disallowed Values in Password Policy

    Security requires us to ban commonly hacked phrases/words from being used in passwords. We use the Disallowed Values in the Password Policy section within SSPR. This ...

  • Votes

    2

    Advanced Authentication emergency password request from SSPR

    This feature would make a component like Client Login Extension very powerful, as well as bring SSPR a little bit closer to Advanced Authentication. CLE can be ...

  • Votes

    2

    Allow 'sub' attribute in NAM Open ID Connect Access/ID tokens to be ...

    This value has little downstream relevance, and applications potentially use this value for mapping to users in systems which obviously won't know this opaque value. ...

  • Votes

    2

    IDM Reporting - Allow for a single report to contain results from ...

    Who would want this? Any company that utilizes IDM Reporting and wants to report on information from multiple data sources. For example, if I utilize Identity ...

  • Votes

    10

    NETIQ Access Manager SAML2 based integrations do not support policy ...

    SAML2 based configuration with NETIQ Access Managers do not provide ability to add policy based authorizations. If users are using SP initiated SSO, we need the ability ...

  • Votes

    2

    X11 Forwarding for more than one Host

    Currently, it seems like it is only possible to enable X11 Forwarding for a single host using command control rules. This means that if you have 1000 hosts that need to ...