TTP/Americas Webinars
7 June - 15 July 2022
Agenda | |
---|---|
Technical Insights Series Prelude | |
Tuesday 7 June | |
Introduction to ZENworks Reporting Server by Ron van Herk Abstract: ZENworks Reporting Server is one of the forgotten secrets of the ZENworks family, it ships with any of the ZENworks products but unfortunately people do not take the time to learn how to use this magical reporting engine. In this session Ron van Herk will demonstrate how easy it is to create custom reports using ZENworks data. But the session will also show how you can get other information from your managed devices, get a report with the Bitlocker status or get a report with the health of the laptop batteries. |
slides
video |
Introduction to Change Guardian by Anmol Rastogi Abstract: Early ransomware detection- Use of file integrity and system configuration drift monitoring. Compliance drift - Identify the baseline and watch for changes. Proactively assess the AD environment for any potential misuse by privileged users. |
slides video |
Introduction to eDirectory by Johnnie Odom Abstract: The identities and relationships in your organization are one of its core advantages. Take full advantage of them by using a robust directory service like eDirectory. In this session we will go over the basics of how to use eDirectory, how to think about eDirectory, and how to learn more about it. There will be extensive demonstrations. We will focus on the use of an already-running system so that Junior sysadmins can make use of what already exists. |
slides video |
Data Access Governance by Doug Ouzts Abstract: Products: Data Access Governance (File Reporter, File Dynamics), Identity Manager, and Identity Governance Abstract: Identity Management and Identity Governance are expanding from their roots of provisioning and application access management. This evolution now includes Data Access Governance to control access entitlements to high-value unstructured data as well. Data Access Governance consists of both File Dynamics and File Reporter and the targeted use of policy and reporting respectively; specifically focused on the access controls of prioritized data locations. Gain insight into who has access, remediate to make corrections, put automation policy in place to ensure continual compliance, and perform periodic access reviews in Identity Governance right alongside applications. |
slides video |
How to protect local accounts without any communication to the server by Václav Šamša, TDP Abstract: Local account protection by regular password changes is widely accepted as a must. But any solution which needs to communicate with the server to accomplish the task is limited. A good solution needs to be platform-independent and connectivity independent but still manageable in an enterprise style. This session is an introductory how-to focused on local accounts. |
slides video |
Wednesday 8 June | |
Introduction to Data Protector by Marc Fisseler Abstract: Get to know Micro Focus backup solution Data Protector with all its features and latest innovations. Data Protector provides backup and disaster recovery for diverse, dynamic and distributed organizations. Our Micro Focus solution delivers secure, compliant backups of all enterprise data from a single point of management. Instant enterprise-scale data recovery and security for modern hybrid environments. Ensuring businesses quickly return to normal, minimize impact and revenue loss, and avoid reputational damage. |
slides video |
How to ensure to always know the status of accounts, objects and/or users in eDir by Roger Zimmermann, Konstantin Andriyuk Abstract: Learn how to initiate actions based on any kind of events happening to eDir objects. With the Audit Proxy of SKyPRO's Audit & Compliance Dashboard you can automatically initiate alerts based on events that you define. |
slides video |
eDirectory as a Core Service by Johnnie Odom, School District of Escambia County Abstract: Cloud services are too cool for X.500 and even workstations don't require a direct login to a directory service. Plus, those Cloud services have their own directories. Does that mean on-Prem solutions like eDirectory are dead? No, they are just controlling things from the shadows. Find out how eDirectory remains a core service when paired with the two Managers (Identity and Access) and a rogue's gallery of internal and third-party apps. |
slides video |
How to secure large files in any storage cloud/onprem - store/transfer/share by Václav Šamša, TDP Abstract: Sharing files between users is so easy and so insecure. Large means - no encrypted email. The file needs to be encrypted and shared. The tricky part is not encryption - AES is built-in many standard tools, including office tools. The tricky part is how to share the key (password) between users. This session is about files, but in fact, it is about keys and how users can share them securely. |
slides video |
Micro Focus Vibe - Irreplaceable by Johnnie Odom, School District of Escambia County Abstract: In a world where every application adds collaboration features, why can't I find as comprehensive a solution as Vibe? And why are Google Docs and Markdown afraid of true structure? In this session we will demonstrate what Vibe does out-of-the-box and why it does it better than anything else. The focus will be on scenarios where collaborative knowledge needs to be captured and maintained in many different forms. |
slides video |
Useful Tools for IDM Admins by Alex Belousov, IDM Consultant Abstract: A review of the different tools that can help IDM developers and admins. |
slides video |
Tuesday 14 June | |
Open Enterprise Server in the Enterprise Environments by Mike Hunsche Abstract: Open Enterprise Server (OES) delivers the reliable and flexible file, print, and networking services to your users across multiple platforms, including mobile. In this session you willtake a sneak peek at some useful solution from Enterprise Environments as well as basic functionalities out of OES. Commonly used features are automated Installation, Configuration and Patch mANagement, Distributed Files Services and Cluster Services. |
slides video |
Desktop Containers, the tool to support hybrid learning by Ron van Herk Abstract: Students might be back at school, the world however has changed. More than ever students will be working in a more hybrid world where they combine education centrally with working remote. You might know the Desktop Management capabilities to create containerized applications but Desktop Containers is so much more. It allows Education environments to provide a hybrid working environment integrated with your Learning Management system where you can offer applications to students independent from where they work, not only to students with a Windows laptop but also to students running a Mac or Chromebook. In this session we will show you how to provide such a hybrid workspace for your students. |
slides video |
Using SUSE Harvester for your home lab by Simon Flood Abstract: With Harvester you have the ability to host both virtual machines and containers on the same hardware which makes it ideal for running your home lab. Based on my own experiences both testing and running Harvester, in this session we will look at using Harvester for your home lab, identify some things to think about, highlight possible issues, and provide some tips and tricks for getting the most out of using Harvester. |
slides video |
An Introduction to ZENworks Service Desk – Extending the typical Help Desk System by Paul Pedron Abstract: ZENworks Service Desk is a complete service management solution that allows you to easily monitor and solve services and issues so that there is minimal disruption to your organization, which allows users to focus on the core business. ZENworks Service Desk extends beyond the online help desk support system to meet all your service requirements and promotes self-service for your customers, administrators, supervisors, technicians, clerks maintenance and facility staff. |
slides video |
Lifecycle management of Unstructured Data by David Condrey Abstract: Take advantage of policy-driven automation in File Dynamics to control the provisioning, disposition and management of your data to ensure that organizational goals are achieved and compliance and governance requirements are met. Policy can be applied through Identity and Role constructs, optionally in conjunction with Identity Management, or directly against High-Value-Target data locations. Construct and refine policies by using File Reporter to gain views on your data from a variety of perspectives including where it is located, who can access it, how it’s growing, and how it is aging. Engage Line-of-Business Data Owners outside of IT to make decisions and take action on their data. |
slides video |
Doing Data Science As Work Hobby by Johnnie Odom Abstract: Do you have a bunch of data flying around your infrastructure just to get the systems populated every day? Stop throwing it away and put it to work. We demonstrate some very basic techniques you can use to understand your processes and institution. Topics covered include simple regression, time series, and cluster plots. |
slides video |
Wednesday 15 June | |
Update your testing and development environment in no time by Antoine Schellhorn, Konstantin Andriyuk Abstract: In this session you see how easy cloning entire directories can be. Wether you want to update your test environment or if you need valuable data for your development environment, copying the right amount of data can be done over and over again with just a few clicks using Modules of SKyPRO's Toolbox. |
slides video |
Introduction to Filr, Enterprise File Synchronisation and Sharing by Robin Redgrave Abstract: This session will cover how you can rapidly implement recure remote access to, and sharing of, your existing file storage. We will explain the benefits of giving users the productivity gains and time savings that mobile file access and collaborative sharing offer, while utilising the existing access controls you have in place to enable you to securely access your existing files remotely and share them with both internal and external colleagues. We will demonstrate remote access to files from your mobile or desktop, MFA access, ransomware protection, DLP options, secure online editing and much more. |
slides video |
Open Enterprise Server as a Linux Add-on by Johnnie Odom, School District of Escambia County Abstract: If you run a Linux distribution that requires support, running OES will give you supported features that other distros cannot match. If you don't care about support, then why aren't you running Tumbleweed already? In this session we address the former, including users, file access, administrative tooling, and DNS. |
slides video |
Advanced Authentication Limited - The Most Important Product You Didn't Order by Johnnie Odom, School District of Escambia County Abstract: Advanced Authentication Limited (AAL) has been added as an entitlement to several Micro Focus products over the last few years. This session will provide an overview and demonstration of AAL and where it fits in a world where multi-factor authentication is now required. |
slides video |
Content Manager 10.1 – What’s New? by Don Prekop Abstract: Please join us as we overview and demonstrate the new features of Content Manager 10.1 including: • The new integration to MS Teams with Content Manager as part of our “Privacy Companion for M365” campaign • New capabilities in the Content Manager Web Client • Expanded Manage in Place capabilities to extend Content Manager lifecycle management capabilities. |
slides video |
Tuesday 21 June | |
Introduction to ZENworks by Johan dela Ferte Abstract: This session is targeting people who have never seen or touched ZENworks but also people who perhaps recently started to gain experience with ZENworks, for example new joiners. We will discuss the ZENworks portfolio and their components providing a broad overview of what ZENworks can do. |
slides video |
Introduction to Rumba by Shelli Peshkur Abstract: Rumba+ provides connectivity solutions to mainframes, mid-range, UNIX, Linux, and HP servers. Rumba+ also provides secure file transfer and printing services from various host systems. |
slides video |
An Introduction to the Apache Web Server by Joe Doupnik Abstract: The most popular Linux web server Apache is full of useful features, and its configuration is rather intimidating at first contact. Here we look at it from a short distance, learning enough to activate it intelligently, note some interesting features, and how to learn more later. The intended audience is those who are not yet familiar with Apache. |
slides video |
Windows 11 deployment with ENGL Imaging Toolkit by Heath Upton, Steve Thompson, ENGL Abstract: This session includes demos using Imaging Toolkit and ZENworks Configuration Management to deploy Windows 11. Learn about the new features in Imaging Toolkit 12 including Image Service that simplifies base image creation and Monitor Service that provides live deployment monitoring. |
slides video |
Containers Update and Lab With Podman by Johnnie Odom Abstract: Last year we gave an overview of the container space. This year we will talk about the great leaps podman has made and demonstrate real practices for building containers at small-scale. |
slides video |
Wednesday 22 June | |
An Introduction to Fortify SCA by Frans van Buul, Micro Focus Product Manager Abstract: Fortify is Micro Focus' portfolio for application security testing and is widely recognized as one of the leaders in this space (alongside Checkmarx, Veracode, Synopsys). One of several application security functionalities delivered by Fortify is static analysis,often referred to as SAST (static application security testing). SAST executes a range of algorithms that try to find security problems by analyzing an application's source code, without executing it in any way (that's the "static" aspect of it). In the modern application development landscape, where large application portfolios get developed and deployed rapidly (DevOps, Agile), this type of automated analysis is essential as manual security review procedures wouldn't sufficiently scale. In this session, you'll get an introduction to Fortify SAST. How does it work, what algorithms are executed, what are its strengths and weaknesses, and how does it relate to other application security testing techniques (such as DAST, IAST, and SCA)? |
slides video |
An Introduction to iPrint Advanced by Robin Redgrave Abstract: This session will cover the functionality that is available as an entitlement to Open Enterprise Server or as a standalone product. We will demonstrate driverless printing, self service driver installation, walk up print job release, mobile printing and much more. |
slides video |
NSS and File Services Foundation by Johnnie Odom, School District of Escambia County Abstract: In a world where files are synchronized over HTTP, do the features and efficiency of the file system really matter? We answer this question by re-familiarizing ourselves with NSS. |
slides video |
Single authentication to virtualized Windows desktops on shared devices with Citrix and KeyShield SSO by Václav Šamša, TDP Abstract: Citrix implements a so-called virtualized smart card to avoid double (triple) authentication. Once the user authenticates to the Citrix server, the Citrix environment delivers the newly issued user's certificate to AD. Then the user authenticates to virtualized windows workstation against MS Kerberos without any further manual interaction. It's a brilliant solution itself, but KeyShield integration for Ubuntu-powered cheap terminals gets it to yet another level. This session shows you what is possible also in a school, library or hospital environment. |
slides video |
Easy OAuth and SAML for Internal Applications with Access Manager and Shibboleth by Johnnie Odom Abstract: Tired of using LDAP for your internal applications? Do you have Access Manager? We review approaches to incorporating OAuth into your app and throw in Shibbolethand SAML and options as well. It's easy and more secure. |
slides video |
GroupWise 18.4 new release features presentation and demo. by Ed Hanley Abstract: Ed Hanley, Solutions Consultant, will provide a demonstration of the new features in GroupWise 18.4, which was released in March. Additionally, an overview of the upgrade process will be covered. At the end this session there will be an opportunity to ask general GroupWise and Enterprise Messaging questions. |
slides video |
Tuesday 28 June | |
Introduction to Retain Unified Archiving by Vanessa Lisseck Abstract: Micro Focus Retain provides unified archiving of all business communication including email, social media, and mobile communication data for case assessment, search, and eDiscovery. It can be deployed on-premises or in the cloud. |
slides video |
Introduction to Directory Resource Administrator by Anmol Rastogi Abstract: Streamline AD administrative task with automation. Secure AD environment by reducing the number of privilege users. Track the change history report for delegated admins for compliance reporting as proof for auditor. Manage trusted and untrusted domain through central location - Advantage over native tools. |
slides video |
An Introduction to IP by Joe Doupnik Abstract: We take a tourist's view of the TCP/IP protocol landscape, noting many important items in the packet construction of IP, TCP and UDP, and why they are present. The tone is kept light, informative, and practical. The discussion provides a brief introduction to the workings of today's most heavily used communications protocol suite. |
slides video |
Introduction to Web to Host by Shelli Peshkur Abstract: Web-to-Host is a server-based Web application that publishes your existing legacy applications in intranet, extranet, and Internet environments. It includes host display, printer, and file transfer features that enable end users to work productively with host-based information in a familiar Windows or web browser environment. OnWeb Web-to-Host provides access to a broad range of host types, including IBM® mainframe, IBM AS/ 400®, DIGITAL® VAX, UNIX®, and HP® systems. |
slides video |
Autopilot deployment with ENGL Imaging Toolkit by Heath Upton, Steve Thompson, ENG Abstract: This session includes demos using Imaging Toolkit and ZENworks Configuration Management to deploy Windows with Autopilot. Learn about the new features in Imaging Toolkit 12 including Image Servicethat simplifies base image creation and Monitor Service that provides live deployment monitoring. |
slides video |
Bringing GMail Into Automated Processes by Johnnie Odom Abstract: GMail is not real e-mail, but that's okay because real e-mail is unreliable in automated processes. Using GMail with automated processes is also terrible, but in a different way. In this session we will show how you can send messages through GMail programmatically and also how to grab messages from specific senders with specific subjects for non-GMail workflows. |
|
Wednesday 29 June | |
IDM PHP based Slim Framework by Ragnar Storstrom Abstract: While you can do many things in NetIQ Identity Manager using drivers and custom forms, you can expand the functionality by creating REST APIs. There are many ways to do this and one way is to use the PHP based Slim Framework. In this session, I will demonstrate how to install the components you need, how to write your first REST endpoint, how to connect to an LDAP directory service, how to connect to a database and how to implement logging. |
slides video |
How to securely access your LDAP directories (AD, OpenLDAP, eDir) via REST by Andreas Fuhrmann, Christian Karch Abstract: LDAP directories are still very common and often used to store identity information. The amount of applications, that want to access these information from inside or outside are increasing more and more. LDAPS or definitely LDAP is not the protocoll you want to use for external application to access your internal identity data. At the moment REST is the service, web application want to use to handle data. But how can you access data in a LDAP directory securely via REST? Seras opens your LDAP directory in a secure way to access the data via https using secure tokens with strictly limited services, offering only access to data you're allowed to see and operations you're allowed to execute. |
slides video |
Micro Focus Team Works - Where it Fits and Where it Might Fit by Johnnie Odom, School District of Escambia County Abstract: When Slack came out, every tech company wanted to fill a Slack-shaped hole in its lineup. Micro Focus introduced TeamWorks, a product which also exists. In this session we will start by demonstrating the Slack-like features of TeamWorks and its architectural similarities to Vibe and Filr. Unlike most discussions, we won't stop there but instead will journey through the tunnel to emerge in a world where TeamWorks can be incorporated in the background to add group collaboration to a larger system. |
video |
X-raying Files by Aaron Burgemeister Abstract: Building your toolbox by using grep for fun and profit - Whether it's looking for issues in log files, finding settings in configuration files, or pulling data from any other stream, grep is one of the most fundamental tool for your digital toolbox. This session will touch on the basics of the tool, plus also show the less obvious features that help it solve questions well beyond, "Are these characters in this file." including the really important things in life: upping your social media game with grep to be awesome at Wordle. |
slides |
Introduction to ZCM Endpoint Antimalware/Patch by Darrin VandenBos Abstract: Detecting and eliminating software vulnerabilities and malware threats on endpoint devices is key to reducing an organization’s exposure to damaging and costly attacks. Learn how ZENworks Patch Management and ZENworks Endpoint SecurityAntimalware help you meet this challenge. The session covers the purpose of the products, demonstrates features and functionality commonly used in organizations, discusses future direction for the products, and highlights additional resources available tohelp you with the products. |
slides video |
ZENworks Top Support Issues and Best Practices by Arvind Tiwary, Moises Morales Abstract: This session from Micro Focus ZENworks Customer support team covers Common Issues that Customers are encountering with the ZENworks Product and how to resolve them. ZENworks 2020 Update 2 involves significantarchitectural changes to the core components and underlying framework, so this session will cover its appropriate troubleshooting tools/procedures, and best practices on tuning your environment for an optimal performance. |
slides video |
The TTP main conference | |
Monday 11 July | |
Unified Endpoint Management Roadmap by Paul Pedron, Darrin VandenBos, Vikram Goyal Abstract: Organizations need secure, automated processes for managing and protecting their endpoint devices and data. However, expanding workspace locations and the growing number of endpoint types continueto challenge IT departments as they look for ways to manage and protect both local and remote devices, while ensuring employees have the resources needed to do their work. See the future of Unified Endpoint Management with the ZENworks Portfolio. |
slides video |
Identity Management and Identity Governance Integrations by Shalabh Garg Abstract: Extend your existing IDM on-premises setup with our new IG-SaaS functionalities. A hybrid strategy allows for a smooth transition to SaaS. Integrate IDM on-premises with IG-SaaS without transferring complex driver policies. Examine the numerous IDM and IG integrations, such as AzureAD, MSTeams, and others, that have recently been improved or added. |
slides video |
Migrating the Zone from Physical servers to a cost effective Appliance by Paul Pedron Abstract: Using a physical or virtual server for your applications can quickly become costly. This is due to OS licensing fees coupled with requirements and resources used to patch these servers regularly. With the newer capabilities introduced in ZENworks 2020 Update 2, it is now possible to move your Windows or Linux servers to a ZENworks Virtual Appliance. |
slides video |
MFDC Application Streaming providing Secure Applications and Data Access Anywhere by Paul Pedron Abstract: Now more than ever before, organizations must be attentive to their users and user access without compromising security. This involves complying with mandates and policies, while continuing to provide needed resources to achieve growth for the organization. Supporting employees in all locations can be difficult with while still adhering to the security policies and data concerns. Solve the security and data containment issues, to increase the power of application provisioning and production in the digital workspacewith MFDC Application Streaming & Packaging. |
slides video |
The Next Generation of Patch Management by Darrin VandenBos Abstract: ZENworks Patch Management is undergoing significant changes in the ZENworks 2020 Update 3 release, including removal of the current subscription download process, improvements to patch scanning times, and use of the new ondemand content distribution method. Join us for all the details you’ll want to know to prepare and implement these exciting new changes! |
slides video | ZENworks Service Desk is a Help Desk system for Any Industry by Paul Pedron Abstract: Keeping your organization productive requires a proficient Help Desk system and Users and Customer that get accurate information for expediting the resolution of requests. Many tasks— such as fulfilling software requests that require approval, access to inventory, scheduling events/maintenance, recording and tracking assets and issues, which can be repetitive, resulting in wasted time and resources. ZENworks Service Desk can help solve this dilemma by automating processes for any industry, allowing customers and users to manage their issues. |
slides video |
Tuesday 12 July | |
The new Unified Management Console for Open Enterprise Server by Girish KS Abstract: See a sneak peek into the new Unified Management Console for OES and how you can leverage the new UI to optimize your solution. |
slides video |
Radius Accounting authentication for any device on VPN and Wifi by Václav Šamša, TDP Abstract: There are two basic rules - the user's device must support the method, e.g. Smart Card, and the first authentication should be shared with other systems - this is what users expect as so called SSO. Many devices do not support advanced authentication methods, but their authentication to entrance systems like VPN and WiFi is secure and trusted. Radius Accounting is the de facto standard for SSO between network appliances. This advanced session will teach you how RA works, what is the role of the RA server and RA client and how you can use Radius Accounting in your environment. |
slides video |
Student Workers: What Are They Good For? by Johnnie Odom Abstract: If you are fortunate enough to have student helpers, you know that you are supposed to help them as much as they are helping you. We will talk about strategies to get the most work out of them while giving them the most benefit and saving you the most time. Also, every now and then we need them to haul something heavy. |
slides video |
Concensus Driver Updates: Google Workspace Driver Roadmap, Intro to the Canvas Driver by Mike Weaver, Concensus Abstract: This session will cover current and near future updates to the Google Workspace IDM connector as well as introduce the Concensus Canvas LMS IDM connector. A high-level technical overview of both items will be provided as well as time for questions and answers. |
slides video |
Distributing Content Ondemand by Darrin VandenBos Abstract: For years, ZENworks has excelled at replicating or “pushing” content (bundles, policies, patches, and more) to Primary Servers and Satellite Content Servers, ensuring that the servers have access to the content locally when an endpoint device needs it. In ZENworks 2020 Update 3, we are introducing ondemand content distribution to enable a Primary Server or Satellite Content Server to request content it doesn’t have from other Primaries or Satellites. Join us for details and insights into how you can take advantage of this new content distribution method. |
slides video |
Data Access Goverence: Ensure the right people have the right access by Ed Shropshire Abstract: Micro Focus Data Access Governance is all about the right people having the right access to the right data at the right time. An Integration with NetIQ’s Identity Governance & Voltage Data Discovery gives organizations the power they need to expand the capabilities of access reviews. Now folders containing potentially confidential, sensitive, or regulated files can be easily reviewed to see user access permissions and if those permissions need to be kept, removed, or changed. In addition, DataAccess Governance helps to establish critical data management policies that automatically clean up, move, archive, delete, remediate, and perform a variety of other management actions. |
slides video |
Wednesday 13 July | |
Cloud Integrated Storage Improvements by Girish KS Abstract: Join us to discuss the various improvements in extending your NSS storage to the cloud. |
slides video |
Data Protector backup of virtual & cloud services by Joerg Richter Abstract: Data Protector aims to provide a stable, agentless backup and snapshot-management suite for virtual machines, containers, applications workingon-premises and in the cloud, and storage providers. Key capabilities are: • Microsoft 365 Services data backup support for Exchange Online, SharePoint Online, OneDrive for Business, and Teams. • Protection for Cloud workloads in AWS EC2, containerised workload, and management infrastructure including Kubernetes and OpenShift. • Protection for storage providers including Ceph RBD, Nutanix, and SUSE Enterprise Storage. • Broad support for virtual workload management and hypervisor platforms – VMware, MicrosoftHyper-V, KVM, Citrix XEN, Oracle VM, Nutanix, Red Hat Virtualization, OpenStack and more. • Protection for virtualised databases and applications including application data andconfigurations. |
slides video |
Configuring Apache web server in Open Enterprise Server by Joe Doupnik Abstract: Because for most sites a web server is often the most contacted point by the world this presentation is about how we can configure Apache to withstand the constant probing by the bad guys, plus a few other useful configuration nuances. The material is applicable to Apache on most Micro Focus products and similar installations. Similar web servers, such as Nginx, have similar controls. The solutions are practical, and they are relatively easy to understand and implement. |
slides video |
Access Management SaaS - Are you ready? Canceled by Chandra Shekar Tumula Abstract: This session will highlight our plans on Access Management SaaS for 2022 and later. It will showcase the value adds for a brand new customer and an existing customer who wants to move to SaaS. |
|
Collaboration Update and Roadmap by Mike Bills and Eric Maughan Abstract: Discover the latest news and updates on this product line from product management and look at plans for the future. |
slides video |
Audit & Compliance Dashboard and Audit driver updates: notes from the field by Alex Belousov Abstract: Extensions and new functions included into latest version AUDIT & COMPLIANCE DASHBOARD (ACD) and Audit Driver implementation in the Cloud environment. |
slides video |
Thursday 14 July | |
Tooling and Deployment for IDM Containers by Shalabh Garg Abstract: Terraform and Helm charts were used to automate the deployment and administration of an IDM solution in the cloud. Examine tools that can help you manage complex Identity Manager deployments and automate driver policy testing and deployment across environments. |
slides video |
Micro Focus Keynote Presentation by Peter Sianchuk, VP of Customer Success Abstract: TBA |
video |
IDM at Carmel College by Bas Penris Abstract: The journey to a brand new HR and financial system, using a loopback driver to do admin account management, and the other disasters Bas and Jan have been tackling during COVID. |
slides video |
REST: How access any LDAP directory safe and secure. by Andreas Fuhrmann, Christian Karch Abstract: LDAP directories are very common and often used to store identity information. The amount of applications, that want to access this information from inside or outside is increasing constantly. Instead of LDAPS or LDAP, REST is the service, web applications want to use to handle data. To access data in a LDAP directory securely SERAS opens your LDAP directory in a secure way to access the data via https using secure tokens with strictly limited services, offering only access to data you're allowed to see and operations you're allowed to execute. |
slides video |
K-12 Uses for Filr and Filr Advanced by Johnnie Odom Abstract: In most K-12 environments students are either using Google Drive or Microsoft OneDrive. So why do we need a solution for On-Prem files like Filr? The answer is that some users are not students, not all data needs to be in the cloud, and there are some functions that neither GDrive or OneDrive does especially well. For all these needs there is Filr. Also includes a demonstration of which Filr Advanced features you might actually use. |
slides video |
Secure Messaging Gateway new and upcoming feature presentation and demo. by Josh Gibbs Abstract: Secure Messaging Gateway constantly evolves with frequent updates, typically including incremental enhancements and fixes. Larger, more complex features are developed in parallel to the monthly updates and in this session Josh Gibbs will be demonstrating the upcoming, and long awaited statistics service. You'll get a preview of the new, built for purpose, monitoring user interface, how it integrates with the various SMG components and how it works in multi-tenant environments. |
video |
Friday 15 July |
What's new in Access Manager 5.0.2 by Akhil Laddha Abstract: This session will talk about the enhanced user experience in Access Manager 5.0.2 which includes improved upgrade assistant, integrated analytics dashboard etc. This session will talk about all the improvements that have gone under the hood as well which includes OAuth enhancements, Authentication APIs etc |
slides video |
Reporting, Monitoring and Alerting for eDir (IDM) by Andreas Fuhrmann, Konstantin Andriyuk, Christian Karch Abstract: With Identity and Access Management moving more into the center of Cyber Security the need to know what is and was going on in your main directories becomes increasingly important. Additionally getting alerts on specific actions is required by laws, regulations and industry standards. Watch and learn how the latest version of SKyPRO's ACD enables you to do exactly this with NetIQ IDM. |
video |
PhD-Level SQL For Terrible Applications by Sean Griffith, Tyler Webb, School District of Escambia County Abstract: College-Level Database Courses cover 90% of SQL syntax and beautifully lay out data relationships in entity diagrams. Once you graduate you have to deal with vendors that use their databases to serialize PHP data, managers whose UML diagrams can only be realized with an ORM, and cultists at both ends of the normalization debate. In order to extract data from the resultant systems, darker methods must be used. Join us as we Choose Violence and (ab)use CTEs, functions/stored procedures, materialized views, and the Heroic Left Lateral Join. |
slides video |
Filr at Regensburg and best practices by Edmund Weber, Dexter D'Arbreau Abstract: Join this session to learn how the University of Regensburg has configured Filr in its complex environment and hear from their Premium Support Engineer the Best Practices when using this product from the support organisation. |
slides video |
IDM Database System Users by Aaron Burgemeister Abstract: IDM JDBC drivers are well known for synchronizing to tables or views in order for applications built on those DBs to have users, passwords, etc. Used less often is the provisioning of accounts directly to the database system itself, e.g. creating accounts within the MytSQL or Oracle environment which can login to the database itself, either to provision DB admins/users or for applications that rely on those credentials. An example will be shown to quickly show how to create users and synchronize passwords to them in XSLT showing advantages and drawbacks of this type of integration. |
slides video |
Managing an Academic Computer Center in Today's Reality by Edmund Weber Abstract: Maneuvering the minefield between user expectations, financial and legal regulations. |
slides video |