I have just finished reading A Game of Birds and Wolves: The Secret Game that Won the War by Simon Parkin. As it says on the dustcover: “1941. The battle of the Atlantic is a disaster. Thousands of supply ships ferrying vital food and fuelRead More
I had been running VMware Workstation version 14.1.7 on my Windows 10 laptop quite happily, until after a recent Windows update when I attempted to run a guest virtual machine I got an error ‘VMware Workstation cannot connect to the virtual machine. Make sure youRead More
Setting up integration between Secret Server and IBM Security Identity Intelligence and Intelligence
I did some work recently setting up integration between IBM Security Secret Server and IBM Security Identity Intelligence and Intelligence (ISIGI) using the Adapter. This enables ISIGI to manage user accounts within Secret Server. In the process I made a few discoveries!
At theRead More
I recently read Ben MacIntyre’s latest book The Spy and the Traitor: The Greatest Espionage Story of the Cold War. I have read a number of his books and found them highly enjoyable, and this is no exception. John Le Carre describes this as ‘TheRead More
I’ve recently started working with IBM Privilege Manager (from Thycotic), which enables organisations to remove local administrative rights from endpoints, or ‘implement Least Privilege and Application Control. Among other things you can specify the name of an executable file which you want blocked. (In fact youRead More
As I wrote back in May, I’m delighted that IBM Security is OEMing Thycotic’s Privileged Identity Management Technology. IBM Security Secret Server is a brilliant product, and I’m still getting my head around it. One little ‘gotcha’ I discovered: I had all the software installed, or soRead More
I’m delighted that IBM Security is to OEM Thycotic’s Privileged Identity Management Technology. As part of this agreement, IBM Security will now offer a new privileged access management solution, IBM Security Secret Server, powered by Thycotic’s technology.
There’s more information about this at https://thycotic.com/company/blog/2018/05/15/thycotic-announces-ibm-security-oem-privileged-identity-management-technology/ and https://www.ibm.com/us-en/marketplace/secret-server
I recently succeeded in putting my Sudoku Solver iPhone app on the Apple App Store, so if anyone’s interested you can find it just by searching for ‘Vaughan Harper’ in the App Store app on an iPhone. It does include the capability to solve SudokuRead More
If you are installing IBM Security Directory Server on Windows 2012 R2 then ensure you disable User Account Control (UAC) by doing the following:
1. Go to Control Panel -> User Accounts -> User Accounts, click Change User Account Control settings, then select Never notify.
I recently discovered some useful command line tools available for uploading, deleting and tailing files on the IBM Security Identity Governance and Intelligence (ISIGI) virtual appliance:
1. Transferring connector files to the virtual appliance using scp
As described in the ISIGI documentation it is possible to upload connector