-
Votes
6
Sentinel log manager The date of collection is forwarded to other log ...
I suggest that sentinel log manager can support the collection of Log through the other log server, such as: Varonis or N-Reporter, Integrate with the customer's existing ...
Comments (1) | by: johnson y. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
6
Email updates from posted Ideas should not have a generic subject ...
The subject title for automatic email notifications received from posted comments is too generic. It should have a unique identifier that relates to the posted idea to ...
Comments (0) | by: Dexter D. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
6
Sort By User
I would like to be able to see all of the ideas that a given user has added to the ideas system (including myself). This would help when following up on a user's ideas or ...
Comments (0) | by: Johnnie O. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
6
Integrate KeyShield SSO with Kanaka
We use KeyShield SSO with all our Windows machines to SSO into Filr, NetIQ Access Manager, Joomla, Moodle, intranet, web filter and other websites. We have no mechanism ...
Comments (0) | by: Simon P. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
GroupWise Monitor and High Availability should manage Admin Service
GroupWise Monitoring, and therefore High Availability, only manages POA, MTA, DVA, etc, and therefore cannot restart gwadminservice in the event that it fails. MRFE / ...
Comments (1) | by: Marcus G. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Native Driver for SAP-HANA
We are developing a customized JDBC driver to connect eDirectory to SAP-HANA DB, but would like to have to have a native driver to integrate with that SAP module.
Comments (3) | by: Joao T. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
SSPR - Ability to check password eligibility using web service
In August 2017, NIST released guidance specifically recommending that user-provided passwords be checked against existing data breaches. I know SSPR has the ability to ...
Comments (0) | by: Joel B. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Filr monitoring services/health of the various filr components
It would be nice if Filr had some sort of monitoring ability for the various Filr services/components. Examples: Filr could monitor/alert you if the Shared NFS storage ...
Comments (0) | by: Kevin H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Add Contacts folders/databases to proxy access
New to groupwise so I don't have the historical context. I am not for sure I understand why Contacts are not accessible via proxy. Contacts should be part of the ACL ...
Comments (0) | by: Scott W. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
PAM - Password Checkout for Less than 6 hours
When checking out passwords the default is 6 hours. If you try to make less you get error that 6 hours in minimum. Would like ability be more granular like to minutes.
Comments (1) | by: Kevin P. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
SSPR - Add DUO to Forgotten Password Verification methods
DUO has quickly become one of the standard MFA solutions in the higher education space. It is also becoming a security requirement for many applications. I would like to ...
Comments (0) | by: Joel B. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Easier process for voting in the "Ideas Portal"
I don't find the process of first registering on this portal to make a vote to much of an issue, though I really do think it should be a federated login. Especially when ...
Comments (0) | by: Erik W. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Identity Governance - Clone a Review Defintion
In Identity Governance, it is currently not possible to clone a review definition. With having to define many types of reviews across many applications, it speed up the ...
Comments (0) | by: Michael L. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
ZENworks Asset Management Baseline Software
ZENworks should allow me to create a baseline so I can compare a group of computers to a baseline device. This would allow us to focus on a reduced software list, ...
Comments (0) | by: Luiz Angelo H. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Identity Governance - Business Role Reviews
Business Roles in Identity Governance allow for Approval Policies to bet set up so that when an addition or change is made, a designated reviewer must re-approve the ...
Comments (1) | by: Michael L. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Access Manager Risk-based policy IP API
The Risk based policies include an "IP Address Rule" which states encouragingly: "Dynamically consume from the Datasource" with a URL. My plan was to create dynamic URLs ...
Comments (0) | by: Simon P. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
SSPR - Substitutions for Disallowed Values in Password Policy
Security requires us to ban commonly hacked phrases/words from being used in passwords. We use the Disallowed Values in the Password Policy section within SSPR. This ...
Comments (0) | by: Joel B. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
nss vlog cannot monitor the file
It is recommended that the NSS Vlog increase the events for the file size and set the size range of the transaction, for example, 1M ~ 1GB. This event can also be ...
Comments (0) | by: johnson y. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
ZCM Discovery Task should check for agent files already installed
Sometimes ZCM agents can be 'broken' to the point where no services are running. When a Discovery Task is run these devices are flagged as not running the agent as they ...
Comments (1) | by: Stuart P. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other
-
Votes
5
Combine the two disparate ideas portals
There is this "Ideas Portal". And there is also another ideas portal here: http://novell.ideascale.com/ Why not have just one? Please combine them.
Comments (1) | by: Kim G. | over a year ago | Last activity over a year ago | Status changed over a year ago | Other