Posts

Guidelines for enabling smart card logon with third-party certification authorities

This article is from Microsoft knowledge base for enabling Smart Card or PIV card logon with Microsoft Active Directory. Though this article is for Windows 2000, it is continues to be relevant for Windows 2008 or 2012 servers. The third party certification authority or Certificate Authority (CA) is an entity that issues digital certificates. Examples of Certificate Authority, GlobalSign, Symantec, Entrust, Digicert etc. Third party CA is mentioned here to differentiate with the Microsoft's Certification Authority. If you are implementing Smart Card logon with a Microsoft CA then you need to refer to this document  and this doc , which provides how to configure Active Directory Certificate services. The below article provides all the information required in order to implement Smart Card Login to Active Directory. This enables a user to authenticate to an Active Directory with two factor authentication using a Smart Card, such as a PIV card thereby eliminating use of passwords to

VMware error with networking

Image
If you are facing networking issues when opening or running a vmware Virtual Machine it could be due to Network Adapter settings. The Virtual Machine opens up fine however there is no network connectivity between this VM (the guest OS) and Host machine. The networking for the Host machine is fine and it can connect to the local LAN or internet. Now if this is the case, then one needs to investigate the guest Virtual Machine's Network Adapter. aa Above figure shows the current Network Adapter settings for guest VM. This shows that the guest VM is connected to the Host machine via Bridged Network Adapter. What this means is that the guest Virtual Machine is now accessing the Local network directly - of course it can only do that by sharing the Host machine's network adapter. Hence, it can obtain its own independent IP address from the Local network if the Local network has DHCP enabled. So the guest VM will appear as another machine on the subnet as shown in below fig

How to Merge data from Two Spreadsheets based on a common attribute

Image
This post is about generating a combined report off two different Spreadsheets. The use case is as follows  -   you have data from two different Excel spreadsheets and need to merge or combine the two spreadsheets into a single Spreadsheet based on a common attribute. For example, say you have two Spreadsheets about Employees in one spreadsheet as below with their First Name, Last Name, Department and email. First Name Last Name Department email Alice King Database king.alice@abc.com Bob Martin Networking martin.bob@abc.com Frank Jones Operations jones.frank@abc.com Alex Miller Engineering miller.alex@abc.com Simmons Young Database young.simmons@abc.com Greg Baker Software Dev baker.greg@abc.com Harry Walker ESD walker.harry@abc.com Edward Johnson Config Management johnson.edward@abc.com Phil Evans Operations evans.phil@abc.com Adam Morgan Infrastructure morgan.adam@abc.com And a second spreadsheet which has data about the employees Telephone and Office Locatio

Silent install for OAM, OIM

Image
Oracle Universal Installer in Silent Mode Silent installation option for OAM or OIM is an automated hands free method of installing where you need not monitor the installation steps and click or respond to input dialog boxes, radio buttons etc. However, it is good practice to run through the installation steps via the Graphical User Interface or GUI. This will not only help you understand the various dialog boxes and radio button options etc that will be needed during the install process but also help in creating the Response file. Silent mode installation is a great option if you have multiple installs to be done and you can automate the install process saving time and avoid errors with manual installation. Silent installation of OAM, OIM 12.2.1.3 , read here .  You can follow the above Silent Install steps for any of the Oracle Fusion Middleware components, e.g. Oracle Identity Governance 12.2.1.3, OIM or Oracle Access Manager (OAM). The Silent install provides installation to be do

How to generate CSR from mmc

Image
This post will go over all the steps require to create or generate a CSR.  CSR is Certificate Signing Request . CSR is actually a text file (encoded text file) which is used in the process of creating a Certificate, e.g, SSL Certificate ( SSL is now phased out and the current standard used is TLS . However we continue to use the term SSL as it is more commonly used term ) or a Digital Certificate. This encoded text file contains the information about the server, device or domain for which you need a Digital Certificate. One generates a CSR locally and sends the request as a file to a Certificate Authority (CA). The Certificate Authority upon receiving the Certificate Signing Request (CSR) confirms the identity of the applicant and upon confirmation signs the CSR, and generates a Certificate ( SSL Certificate or a Digital Certificate) for the identity of the entity, Non Person Entity or a Person Entity. This Certificate can now be trusted by a third party since it was signed by a trust