• Votes

    6

    Sentinel log manager The date of collection is forwarded to other log ...

    I suggest that sentinel log manager can support the collection of Log through the other log server, such as: Varonis or N-Reporter, Integrate with the customer's existing ...

  • Votes

    6

    Email updates from posted Ideas should not have a generic subject ...

    The subject title for automatic email notifications received from posted comments is too generic. It should have a unique identifier that relates to the posted idea to ...

  • Votes

    6

    Sort By User

    I would like to be able to see all of the ideas that a given user has added to the ideas system (including myself). This would help when following up on a user's ideas or ...

  • Votes

    6

    Integrate KeyShield SSO with Kanaka

    We use KeyShield SSO with all our Windows machines to SSO into Filr, NetIQ Access Manager, Joomla, Moodle, intranet, web filter and other websites. We have no mechanism ...

  • Votes

    5

    GroupWise Monitor and High Availability should manage Admin Service

    GroupWise Monitoring, and therefore High Availability, only manages POA, MTA, DVA, etc, and therefore cannot restart gwadminservice in the event that it fails. MRFE / ...

  • Votes

    5

    Native Driver for SAP-HANA

    We are developing a customized JDBC driver to connect eDirectory to SAP-HANA DB, but would like to have to have a native driver to integrate with that SAP module.

  • Votes

    5

    SSPR - Ability to check password eligibility using web service

    In August 2017, NIST released guidance specifically recommending that user-provided passwords be checked against existing data breaches. I know SSPR has the ability to ...

  • Votes

    5

    Filr monitoring services/health of the various filr components

    It would be nice if Filr had some sort of monitoring ability for the various Filr services/components. Examples: Filr could monitor/alert you if the Shared NFS storage ...

  • Votes

    5

    Add Contacts folders/databases to proxy access

    New to groupwise so I don't have the historical context. I am not for sure I understand why Contacts are not accessible via proxy. Contacts should be part of the ACL ...

  • Votes

    5

    PAM - Password Checkout for Less than 6 hours

    When checking out passwords the default is 6 hours. If you try to make less you get error that 6 hours in minimum. Would like ability be more granular like to minutes.

  • Votes

    5

    SSPR - Add DUO to Forgotten Password Verification methods

    DUO has quickly become one of the standard MFA solutions in the higher education space. It is also becoming a security requirement for many applications. I would like to ...

  • Votes

    5

    Easier process for voting in the "Ideas Portal"

    I don't find the process of first registering on this portal to make a vote to much of an issue, though I really do think it should be a federated login. Especially when ...

  • Votes

    5

    Identity Governance - Clone a Review Defintion

    In Identity Governance, it is currently not possible to clone a review definition. With having to define many types of reviews across many applications, it speed up the ...

  • Votes

    5

    ZENworks Asset Management Baseline Software

    ZENworks should allow me to create a baseline so I can compare a group of computers to a baseline device. This would allow us to focus on a reduced software list, ...

  • Votes

    5

    Identity Governance - Business Role Reviews

    Business Roles in Identity Governance allow for Approval Policies to bet set up so that when an addition or change is made, a designated reviewer must re-approve the ...

  • Votes

    5

    Access Manager Risk-based policy IP API

    The Risk based policies include an "IP Address Rule" which states encouragingly: "Dynamically consume from the Datasource" with a URL. My plan was to create dynamic URLs ...

  • Votes

    5

    SSPR - Substitutions for Disallowed Values in Password Policy

    Security requires us to ban commonly hacked phrases/words from being used in passwords. We use the Disallowed Values in the Password Policy section within SSPR. This ...

  • Votes

    5

    nss vlog cannot monitor the file

    It is recommended that the NSS Vlog increase the events for the file size and set the size range of the transaction, for example, 1M ~ 1GB. This event can also be ...

  • Votes

    5

    ZCM Discovery Task should check for agent files already installed

    Sometimes ZCM agents can be 'broken' to the point where no services are running. When a Discovery Task is run these devices are flagged as not running the agent as they ...

  • Votes

    5

    Combine the two disparate ideas portals

    There is this "Ideas Portal". And there is also another ideas portal here: http://novell.ideascale.com/ Why not have just one? Please combine them.