The IBM Security Identity Governance and Intelligence (ISIGI) Identity Broker has an administrative password which appears to be stored in two different places and which sometimes get out of sync. I don’t know all the details as to what is going on under the covers
Read MoreThe program can’t start because libtrc.dll is missing from your computer…
If you get the error “The program can’t start because libtrc.dll is missing from your computer. Try reinstalling the program to fix this problem” (like in the screenshot below) when you’re trying to run a command with IBM Security Directory Server (ISDS) on a Windows
Read MoreA new challenge…
I’m now going to be specialising in IBM’s governance product, IBM Security Identity Governance and Intelligence (ISIGI). The product is very powerful, containing a huge amount of functionality, so it will be hard work to get my head around it, but I’m looking forward to
Read MoreReflections on just how strong passwords really need to be…
I’m sure we’ve all heard that Bill Burr, the man who wrote the book on password management while working at NIST, has changed his mind about the password guidelines that he devised. “Much of what I did I now regret,” Burr, who is now retired,
Read MoreChallenges with Audi music interface and MP3 ID3 tags…
Earlier this year I bought a 2016 Audi A3. With any new car one of my top priorities is being able to play music: the car has two SD card sockets so I dutifully copied all of my music collection to a 64 GB SD card
Read MoreIBM Cloud Identity Connect
IBM recently released IBM Cloud Identity Connect, which is a great employee productivity tool: it enables end users to find the approved SaaS applications that they need (rather than risking going down the ‘shadow IT’ route); having done that it provides a launch pad which
Read MoreISAM now supports FIDO U2F devices
ISAM Version 9.0.3 was released recently. One of the cool features is that it includes support for authenticators which conform to the FIDO (“Fast IDentity Online”) Alliance Universal 2nd Factor (U2F) standard. These are specialised hardware devices that perform cryptographic operations and which communicate using
Read MoreExperimenting with IBM Bluemix
I’ve been having a fascinating time playing with IBM Bluemix – it makes it very easy to throw together an Internet-facing application running, say, Java or Node.js together with persistent storage. But the real magic comes with access to Watson APIs (such as Watson Personality
Read MoreLDAP – how to enable/configure audit logging
The LDAP audit log can be the most helpful mechanism that I have found for investigating what LDAP requests a client is issuing, so I thought that it would be useful to explain how to enable/configure audit logging with IBM Security Directory Suite Version 8
Read MoreISAM: Setting up ECSSO, tag-value data propagation and EAI authentication…
I recently had a requirement to propagate a third party session ID (set by an EAI server) from one ISAM system to another, so that a user can be automatically logged in to the target third party system based on its session ID. So ECSSO
Read More