2021-12-10 Log4J Remote Lookup Vulnerability
iGrafx has released new versions of the Cloud and Datacenter solutions (see https//nvd.nist.gov/vuln/detail/CVE-2021-44228 and detailed in https//nvd.nist.gov/vuln/detail/CVE-2021-45046.
iGrafx has released new versions of the Cloud and Datacenter solutions (see https//nvd.nist.gov/vuln/detail/CVE-2021-44228 and detailed in https//nvd.nist.gov/vuln/detail/CVE-2021-45046.
Security roles in the iGrafx Platform provide a way to manage permissions over servers, repositories, and repository objects (items) by users and groups of users. There are three types of security roles:
Requirements
The iGrafx platform supports a variety of authentication schemes, providing multiple methods for recognizing which users are currently logged in.
Profile: defaultsecurity
What is Two/Multi Factor Authentication
Profile: spnegosecurity
In some cases, the local logout for platform users is not enough and in a SAML scenario, the user should also be logged out of the Identity Provider. To do that, the user has to be sent to the SAML logout URL instead of the regular logout URL
Problem
Your only iGrafx Platform Administrator left the company or is on a hiking trip in Patagonia? There are several legitimate reasons to restore administrative access to the iGrafx Platform.
In some instances and within some corporate environments, Tomcat is only allowed to run with the Java SecurityManager enabled (see https//tomcat.apache.org/tomcat-7.0-doc/security-manager-howto.html). If this is the case, additional configuration is required to allow the iGrafx Platform to run, as the default security policies restrict access to almost all file, property and reflection features.
Profile: samlsecurity
Profile: sitemindersecurity
Introduction
Problem