• Votes

    2

    PAM SSH relay authentication for multiple source of authentication

    We have a need for using different authentication source depending upon which nodes a user connects to via SSH relay. Currently we are using eDirectory as a source for ...

  • Votes

    2

    Zenworks - ZCC 'Administrator Notes' field in Bundles

    The Administrator Notes field in ZCC -> Bundles should be in a more obvious place than bundled with the other field items in the General section of a Bundle. Probably ...

  • Votes

    1

    adding rights and options when defining the administrator assignments ...

    when defining the rights to manage Roles and Resources in UserApplication there would be more options. there is a permission called Update Role and Role Relationship that ...

  • Votes

    4

    iPrint - Scheduled Printer Profile Sync to workstation to enforce ...

    iPrint printer installation will deliver and install the printer driver and profile to the workstation = TRUE iPrint printer driver and/or profile “update” will update ...

  • Votes

    2

    CLE Emergency Access Auditing

    CLE - Emergency Access we need a way to log when this has been used to access a machine. I understand we cannot send real time however if we had a way to look in reports ...

  • Votes

    2

    PAM Credential Vault SSO when logging into PAM admin portal

    Login to PAM Admin portal, select "Credential Vault" Login to PAM Admin again that has new UI Would be nice where the second login is not required when already logged ...

  • Votes

    6

    SSPR Helpdesk module to be able to verify and update users email ...

    Might using the Helpdesk Module provide read/write to an attribute(s)? An example is this users email, helpdesk asks if that is correct and user says no it is now… Is ...

  • Votes

    5

    PAM - Password Checkout for Less than 6 hours

    When checking out passwords the default is 6 hours. If you try to make less you get error that 6 hours in minimum. Would like ability be more granular like to minutes.

  • Votes

    2

    Alllow to configure remote contract for step up authention with ...

    Would like ability to define a remote contract fro step-up authentication in a risk baseed pre-auth policy. As it stands now only have the ability to define a class or ...

  • Votes

    2

    Identity Governance - Selectively Require Comments

    In Identity Governance (2.5 / 3.0), it is currently possible to independently enable or disable comment requirements for review items that are Kept or Denied. We would ...

  • Votes

    2

    Identity Governance - Show Approved Roles During Review

    When conducting a user access review (or account access, etc) with a fully built out business role to technical role model, a review item that is shown as not approved ...

  • Votes

    2

    Identity Governance - Customer Filter or Group-By Attribute In Review

    In an active review, as a reviewer, it would be good to allow that reviewer to filter or group review items by custom attributes that are part of that review. For ...

  • Votes

    6

    Identity Reporting - Allow Internet Access through Proxy

    Identity Reporting currently does not support input of a proxy server for internet access. Without internet access, administrators are forced to manually download and ...

  • Votes

    5

    Identity Governance - Clone a Review Defintion

    In Identity Governance, it is currently not possible to clone a review definition. With having to define many types of reviews across many applications, it speed up the ...

  • Votes

    2

    Identity Governance - Change Default Items per Page

    In Identity Governance, review pages are listed at 10 items per page. It's possible to change this to up to 100 items per page in a drop down at the bottom of the ...

  • Votes

    5

    Identity Governance - Business Role Reviews

    Business Roles in Identity Governance allow for Approval Policies to bet set up so that when an addition or change is made, a designated reviewer must re-approve the ...

  • Votes

    3

    Identity Governance - More Filtering Options for Reviewers

    We have received feedback from our reviewers that they would like to see a second filtering option for their reviews. The purpose of this would be to filter what they ...

  • Votes

    15

    SecureLogin - Show more client settings with SecureLogin Client ...

    SLManager allows to view and edit the configuration of SecureLogin. The SecureLogin Client Utility shows a subset of these configuration settings. The customer would like ...

  • Votes

    15

    Secure Login - Administrative selective deletion of User ...

    With SLManager it is possible to delete the User Data, but only in an all-or-nothing manner. This is because the Datastore Object for that user is deleted in the ...

  • Votes

    2

    CLE for Mac

    Curently, only Windows (desktop) users can have a CLE. We use CLE for SSPR (forgotten password). Mac users inside the company can not use sspr since a Mac client is ...