background image

18

Identity Manager 3.6.1 Installation Guide

no

vd

ocx 

(e

n)

  

17

 Sep

te

m

be

r 20

09

2.1.3  Identifying the Key Business and Technical Stakeholders

Identifying all stakeholders involved in the Identity Manager solution is important for the success of 
the solution. In most companies, there is not just one person you can contact who understands all 
business and technical aspects of the business processes. You must identify which services and 
systems are going to be affected by the Identity Manager solution, and you must also identify the 
person who is responsible for that service or system.

For example, if you are integrating an e-mail system into your solution, you would need to list what 
the e-mail system is, who the e-mail system administrator is, and what the contact information is. 
You can add all of this information into the Designer project. Each application icon has a place 
where you can store information about the system and the system administrator. For more 
information, see “

Configuring Application Properties

” in 

Designer 3.5 for Identity Manager 3.6 

Administration Guide

.

After you have identified all of the people involved in each business process, the next step is in 

Section 2.1.4, “Interviewing All Stakeholders,” on page 18

.

2.1.4  Interviewing All Stakeholders

Interviews with key business and technical stakeholders allow you to gather information needed for 
a complete design of the Identity Manager solution. The interviews also allow you to educate each 
stakeholder about the Identity Manager solution and how the solution affects them. Here is a list of 
items to cover when you do the interviews:

Š

Define or clarify the business processes being addressed by the Identity Manager solution. The 
person you are interviewing might have information that can change the current plan.

Š

Determine how the solution will impact the stakeholders and address any concerns they have. 
Also ask the stakeholders how much time their part of the solution might take. They might or 
might not have an estimate, but gathering this information helps to determine the scope of the 
solution.

Š

Capture key business and systems information from the stakeholders. Sometimes a proposed 
plan might adversely affect a business process or a system. By capturing this information, you 
can make educated decisions about the Identity Manager solution.

After you have interviewed the key stakeholders, the next step is in 

Section 2.1.5, “Creating a High-

level Strategy and an Agreed Execution Path,” on page 18

.

2.1.5  Creating a High-level Strategy and an Agreed Execution 
Path

After all of the information is gathered, you need to create a high-level strategy or road map for the 
Identity Manager solution. Add all of the features you want to be included in the Identity Manager 
solution. For example, new user accounts are generated from a request through a workflow, but the 
type of user depends upon the resources the user is given access to.

Present this high-level strategy to all of the stakeholders in the same meeting, if possible. This 
allows you to:

Š

Verify that the included initiatives are the most correct and identify which ones have the 
highest priority.

Summary of Contents for IDENTITY MANAGER 3.6.1

Page 1: ...Novell www novell com novdocx en 17 September 2009 AUTHORIZED DOCUMENTATION Identity Manager 3 6 1 Installation Guide Identity Manager 3 6 1 January 05 2010 Installation Guide ...

Page 2: ...e export to entities on the current U S export exclusion lists or to any embargoed or terrorist countries as specified in the U S export laws You agree to not use deliverables for prohibited nuclear missile or chemical biological weaponry end uses Please refer to the International Trade Services http www novell com company policies trade_services for more information on exporting Novell software N...

Page 3: ...ell Trademarks For Novell trademarks see the Novell Trademark and Service Mark list http www novell com company legal trademarks tmlist html Third Party Materials All third party trademarks are the property of their respective owners ...

Page 4: ...4 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 5: ...22 2 3 Proof of Concept 23 2 4 Data Validation and Preparation 23 2 5 Production Pilot 24 2 6 Production Rollout Planning 24 2 7 Production Deployment 25 3 Technical Guidelines 27 3 1 Management Tools Guidelines 28 3 1 1 Designer Guidelines 28 3 1 2 iManager Guidelines 29 3 2 Metadirectory Server Guidelines 29 3 3 eDirectory Guidelines 30 3 3 1 Identity Manager Objects in eDirectory 30 3 3 2 Repli...

Page 6: ...allation of the Remote Loader 62 7 3 5 Installing the Java Remote Loader on UNIX Linux or AIX 63 7 4 Installing the Roles Based Provisioning Module 63 7 5 Installing a Custom Driver 64 7 6 Installing Identity Audit or Sentinel 64 7 7 Installing Identity Manager in Clustering Environment 64 8 Activating Novell Identity Manager Products 65 8 1 Purchasing an Identity Manager Product License 65 8 2 In...

Page 7: ... Overlay the New Driver Configuration File over the Existing Driver 85 13 8 Restoring Custom Policies and Rules to the Driver 85 13 8 1 Using Designer to Restore Custom Policies and Rules to the Driver 85 13 8 2 Using iManager to Restore Custom Policies and Rules to the Driver 86 13 9 Deploying the Converted Project 87 13 10 Starting the Drivers 87 13 10 1 Using Designer to Start the Drivers 87 13...

Page 8: ...8 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 17 Uninstalling Designer 101 A Documentation Updates 103 A 1 July 31 2009 103 A 1 1 What s New 103 ...

Page 9: ...Guidelines on page 27 Part II Installation on page 37 Chapter 4 Basic Identity Manager System Checklist on page 39 Chapter 5 Where to Get Identity Manager on page 43 Chapter 6 System Requirements on page 45 Chapter 7 Installing Identity Manager on page 55 Chapter 8 Activating Novell Identity Manager Products on page 65 Part III Upgrading on page 69 Chapter 10 What s New on page 71 Chapter 11 Suppo...

Page 10: ...vell com documentation idmrbpm361 index html Documentation Conventions In Novell documentation a greater than symbol is used to separate actions within a step and items in a cross reference path A trademark symbol TM etc denotes a Novell trademark An asterisk denotes a third party trademark When a single pathname can be written with a backslash for some platforms or a forward slash for other platf...

Page 11: ...ity Manager solution When you create a project plan you define your business process and create an implementation plan Most companies have many different business processes that are managed by many different people A complete Identity Manager solution affects most of these processes It is extremely important to take the time to plan an Identity Manager solution so that it can be effectively implem...

Page 12: ...12 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 13: ...e Identity Manager solution The development environment allows you to create the solution that is best for each situation The most important tool to use when you are developing your Identity Manager solution is Designer It allows you to capture all of the information about your environment and then use that information to create an Identity Manager solution that fits your needs Use Designer during...

Page 14: ...14 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 15: ...out Planning on page 24 Section 2 7 Production Deployment on page 25 2 1 Discovery Phase The Identity Manager solution affects many aspects of your business In order to create an effective solution you must take time to define all of your current business processes then identify how an implementation of Identity Manager changes these processes who these changes affect and how the changes are imple...

Page 16: ...ss What systems generate new accounts Is it the human resource system or is it through a workflow request A password policy for the company that defines how often a password changes how complex the password is and which systems are synchronizing the password As you define your business processes use the following list of items to help you understand all of the processes Define or clarify the curre...

Page 17: ...d to decide which processes you want to incorporate into an Identity Manager solution It is best to look at the entire solution and then prioritize which processes should be implemented Identity Manager encompasses so many aspects of your business it is easier to plan the entire solution rather than approach each business process as its own solution Create a list of which business processes are a ...

Page 18: ...ch stakeholder about the Identity Manager solution and how the solution affects them Here is a list of items to cover when you do the interviews Define or clarify the business processes being addressed by the Identity Manager solution The person you are interviewing might have information that can change the current plan Determine how the solution will impact the stakeholders and address any conce...

Page 19: ...entity Manager synchronizes user accounts to directories that do not have direct access to the operating system s file system For example you can have a user account in Active Directory but that does not grant you access to the file system on the Active Directory server Using the information gathered in the discovery phase answer the following sample questions to see what other information needs t...

Page 20: ...a list of the business requirements and determine which systems are affected by this process For example a business requirement for terminating an employee might be that the employee s network and e mail account access must be removed the same day the employee is terminated The e mail system and the Identity Vault are affected by this termination process Establish the process flows process trigger...

Page 21: ... Business Processes After completing the analysis of your business requirements there is more information you need to gather to help focus the Identity Manager solution You need to interview essential individuals such as managers administrators and employees who actually use the application or system Issues to be addressed include Where does the data originate Where does the data go Who is respons...

Page 22: ...n page 22 to start the design 2 2 3 Design an Enterprise Data Model After your business processes have been defined you can use Designer to begin to design a data model that reflects your current business processes The model in Designer illustrates where data originates where it moves to and where it can t move It can also account for how critical events affect the data flow For example Figure 2 2...

Page 23: ...ncept on page 23 2 3 Proof of Concept The outcome of this activity is to have a sample implementation in a lab environment that reflects your company s business policy and data flow It is based on the design of the data model developed during the requirement analysis and design and is a final step before the production pilot NOTE This step is often beneficial in gaining management support and fund...

Page 24: ...ies can be confirmed and agreement obtained for the production rollout The pilot validates the plan that has been created to this point in the process NOTE This phase might provide the acceptance criteria for the solution and the necessary milestone en route to full production The pilot solution provides live proof of concept and validation for the data model and desired process outcomes After the...

Page 25: ...all of the plans into action and the Identity Manager solution is created in the live environment Use the production rollout plan to put the different pieces of the Identity Manager solution into place This might take one night or it might be spread across a longer period of time It depends upon what your plan contains ...

Page 26: ...26 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 27: ...tain technical best practices guidelines to help set up and configure the Identity Manager solution that works best for your environment Variables that affect how these guidelines apply to your environment include the type of hardware you have for your servers how your WAN is configured and how many objects are being synchronized Section 3 1 Management Tools Guidelines on page 28 Section 3 2 Metad...

Page 28: ...adminapp html in the User Application Administration Guide Section 3 1 1 Designer Guidelines on page 28 Section 3 1 2 iManager Guidelines on page 29 3 1 1 Designer Guidelines Designer is a thick client that is installed on a workstation Designer is used to design test document and then deploy your Identity Manager solution Using Designer throughout the planning phase helps you capture information ...

Page 29: ...add a Remote Loader server not represented in the figure to help with the workload or configuration of your environment Drivers must run on the same server as the connected application For example to configure the Active Directory driver the server in Figure 3 3 must be a Member server or a Domain controller If you do not want to install eDirectory and Identity Manager on a Member server or Domain...

Page 30: ... on page 31 Section 3 3 3 Using Scope Filtering to Manage Users on Different Servers on page 32 3 3 1 Identity Manager Objects in eDirectory The following list indicates the major Identity Manager objects that are stored in eDirectory and how they relate to each other No objects are created during the installation of Identity Manager The Identity Manager objects are created during the configuratio...

Page 31: ...ca of the Driver Set object If the server has a full replica of the location where the Driver Set object is installed the partition is not required The Server object for that server The Server object is necessary because it allows the driver to generate key pairs for objects It is also important for Remote Loader authentication The objects that you want this instance of the driver to synchronize T...

Page 32: ... objects that the driver needs to refer to for example work order objects for the Avaya PBX driver If the other objects are only to be read by the driver not changed the replica for those objects on the server can be a read only replica 3 3 3 Using Scope Filtering to Manage Users on Different Servers Scope filtering means adding rules to each driver to limit the scope of the driver s actions to sp...

Page 33: ...single server He chooses instead to use two instances of the GroupWise driver one on each server He installs Identity Manager and sets up the GroupWise driver on each Identity Manager server Server A holds replicas of the Marketing and Finance containers Also on the server is a replica of the Identity Management container which holds the driver set for Server A and the GroupWise Driver object for ...

Page 34: ...A and Server B You would define the scope for each driver differently so that they would only synchronize the users in the specified containers Server A would synchronize Marketing and Finance Server B would synchronize Development 3 4 User Application The User Application should run on its own server as shown in Figure 3 7 You might need more than one User Application server Identity Manager Serv...

Page 35: ...formation see Clustering http www novell com documentation idmrbpm361 agpro data b2gx73a html in the User Application Administration Guide 3 5 Auditing and Reporting Guidelines If you need auditing and reporting as part of the Identity Manager solution you need to implement Identity Audit or Novell SentinelTM It is recommended that you run Identity Audit or Sentinel on its own server as shown in F...

Page 36: ...r 3 6 1 Installation Guide novdocx en 17 September 2009 Figure 3 8 Sentinel Designer iManager iManager Server Administration Workstation User Application Server Novell Sentinel Server Metadirectory Server with eDirectory ...

Page 37: ...tity Manager system Chapter 4 Basic Identity Manager System Checklist on page 39 Chapter 5 Where to Get Identity Manager on page 43 Chapter 6 System Requirements on page 45 Chapter 7 Installing Identity Manager on page 55 Chapter 8 Activating Novell Identity Manager Products on page 65 Chapter 9 Troubleshooting Identity Manager on page 67 ...

Page 38: ...38 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 39: ...nfigure your Identity Manager system use this checklist to make sure all steps are completed Figure 4 1 Basic Identity Manager System Section 4 1 Prerequisites on page 40 Section 4 2 Planning on page 40 Section 4 3 Installation on page 40 Section 4 4 Driver Configuration with the Remote Loader on page 41 Section 4 5 Driver Configuration without the Remote Loader on page 41 Section 4 6 Additional C...

Page 40: ...lan for deploying Identity Manager The project plan includes defining you key business processes creating an Identity Manager solution that automates those processes and an technical implementation plan To have a successful deployment of Identity Manager you must have a project plan For more information see Chapter 2 Creating a Project Plan on page 15 4 3 Installation Install the Metadirectory ser...

Page 41: ...ocumentation idm36drivers Optional Enable entitlements on the driver Verify that you have the correct policies in place to execute the entitlement For more information see Identity Manager 3 6 1 Entitlements Guide Repeat these steps for each driver you have in your environment 4 5 Driver Configuration without the Remote Loader Create and configure your driver There is a driver guide for each drive...

Page 42: ...n show your business policies comply with the company s policies You can add Identity Audit or Novell Sentinel to your Identity Manager solution for auditing and reporting For more information about Identity Audit see the Identity Manager 3 6 1 Integration Guide for Identity Audit For more information about Novell Sentinel see the Identity Manager 3 6 1 Reporting Guide for Novell Sentinel ...

Page 43: ...y Manager Integration Modules must be purchased separately The User Application ISO image is the standard version included with your Identity Manager 3 6 1 purchase The User Application Roles Based Provisioning Module is an add on product that adds a powerful roles based approval workflow to managing your users identities The Roles Based Identity Manager Components Platforms ISO Identity Manager D...

Page 44: ...image and is purchased separately See the User Application Installation Guide http www novell com documentation idmrbpm37 for more information Your Identity Manager purchase also includes Designer for Identity Manager a powerful and flexible administration tool that dramatically simplifies configuration and deployment ...

Page 45: ...signer iManager Metadirectory 3 6 1 Server with eDirectory 8 8 5 or later 32 bit and 64 bit iManager 2 7 3 Server Administration Workstation Remote Loader 3 6 1 Server Novell Sentinel Server 6 1 Windows Server 2003 SP2 32 bit Windows Server 2008 32 bit and 64 bit Red Hat 5 0 or later 32 bit and 64 bit SLES 10 SP1 or later SPs 32 bit and 64 bit SLES 11 32 bit and 64 bit Solaris 10 32 bit and 64 bit...

Page 46: ... for eDirectory see the Novell eDirectory 8 8 SP5 Installation Guide http www novell com documentation edir88 index html For system requirements for iManager see the iManager 2 7 Installation Guide http www novell com documentation imanager27 index html 6 2 Metadirectory Server The Metadirectory server processes the events from the drivers whether they are configured using the Remote Loader or not...

Page 47: ...essor is used for Solaris testing The supported 32 bit processors for Linux Red Hat and SUSE Linux Enterprise Server and Windows operating systems are Intel x86 32 AMD x86 32 The supported 64 bit processors for Linux Red Hat and SUES Linux Enterprise Server and Windows operating systems are Intel EM64T AMD Athlon64 AMD Opteron Designer iManager iManager 2 7 3 Server Administration Workstation Remo...

Page 48: ... s automated update facility before you install Identity Manager SUSE Linux Enterprise Server 10 SP1 or later support packs 32 bit and 64 bit The Metadirectory server runs in either 32 bit or 64 bit mode Novell recommends that you apply the latest OS patches via the manufacturer s automated update facility before you install Identity Manager SUSE Linux Enterprise Server 11 32 bit and 64 bit The Me...

Page 49: ...directory engine and the 64 bit Remote Loader have the same names If they are both installed on the same machine it causes conflicts Table 6 2 lists the supported operating systems for the Remote Loader Open Enterprise Server 2 SP1 and SP2 32 bit and 64 bit The Metadirectory server runs in either 32 bit or 64 bit mode NOTE You must have eDirectory 8 8 5 or later 32 bit or 64 bit installed or the i...

Page 50: ...bit or 64 bit mode Red Hat 5 0 or later 32 bit and 64 bit The Remote Loader runs in either 32 bit or 64 bit mode Novell recommends that you apply the latest OS patches via the manufacturer s automated update facility before you install Identity Manager SUSE Linux Enterprise Server 10 SP1 or later support packs 32 bit and 64 bit The Remote Loader runs in either 32 bit or 64 bit mode Novell recommen...

Page 51: ...the Identity Manager 3 6 1 Reporting Guide for Novell Sentinel For system requirement information about Identity Audit see the Identity Audit Guide http www novell com documentation identityaudit index html For system requirement information about Novell Sentinel see the Novell Sentinel Installation Guide http www novell com documentation sentinel6 index html 6 6 Workstations The workstations are ...

Page 52: ...ion Platforms Platforms Details Windows Vista The Ultimate and Business Editions are supported Windows XP Professional SP2 openSUSE 10 3 Apply the latest patches via the automated update facility SUSE Linux Enterprise Desktop 10 SP1 SP2 Apply the latest patches via the automated update facility Designer iManager Metadirectory 3 6 1 Server with eDirectory 8 8 5 or later 32 bit and 64 bit iManager 2...

Page 53: ...r 3 6 1 is iManager 2 7 3 It runs all of the plug ins required to configure and administer Identity Manager The supported Web browsers for managing Identity Manager are Internet Explorer 6 SP2 Internet Explorer 7 Firefox 2 SUSE Linux Enterprise Server 10 SP1 SP2 Apply the latest patches via the automated update facility Platforms Details ...

Page 54: ...54 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 55: ...g part of your Identity Manager implementation For more information about planning see Part I Planning on page 11 1 Verify that your workstation s operating system is supported For more information see Section 6 6 Workstations on page 51 2 Start the installation by executing the correct program for your workstation s platform Windows IDM3 6 1_Designer_Win windows designer install exe Linux IDM3 6 ...

Page 56: ...our platform Windows IDM3 6 1_Win windows setup idm_install exe Linux GUI Install IDM3_6_1_Lin idm_linux bin i gui Linux Command Line Install IDM3_6_1_Lin idm_linux bin i console Solaris GUI Install IDM3_6_1_Solaris idm_solaris bin i gui Solaris Command Line Install IDM3_6_1_Solaris idm_solaris bin i console AIX GUI Install IDM3_6_1_AIX idm_aix bin i gui AIX Command Line Install IDM3_6_1_AIX idm_a...

Page 57: ...nnot install Identity Manager as a nonroot user if eDirectory is installed by root The nonroot installation does not install the following items Remote Loader Use the Java Remote Loader if you need to install the Remote Loader as a nonroot user For more information see Section 7 3 5 Installing the Java Remote Loader on UNIX Linux or AIX on page 63 UNIX Linux Account Driver Requires root privileges...

Page 58: ...ata directory for each instance of eDirectory Run the opt novell eDirectory idm install schema program to extend the schema on additional eDirectory instances after the installation is complete Utilities Optional If you need an Identity Manager driver utility you must copy the utilities from the Identity Manager installation media to the Identity Manager server All utilities are found under the ID...

Page 59: ... the planning process see Chapter 3 Technical Guidelines on page 27 Section 7 3 1 Requirements on page 59 Section 7 3 2 Supported Drivers on page 59 Section 7 3 3 Installation Procedure on page 60 If you want to install the Remote Loader using a nonroot user use the Java Remote Loader It can also be used when customizing your environment and installing it on a unsupported platform such as HP UX Fo...

Page 60: ...1 Verify you have met the system requirements listed in Chapter 6 System Requirements on page 45 2 Start the installation using the correct program for your platform Windows IDM3 6 1_Win windows setup idm_install exe Linux GUI Install IDM3_6_1_Lin idm_linux bin i gui Linux Command Line Install IDM3_6_1_Lin idm_linux bin i console Solaris GUI Install IDM3_6_1_Solaris idm_solaris bin i gui Solaris C...

Page 61: ...lling Identity Manager 3 6 1 do not select the Utilities component The installation does not proceed if you select the Utilities component Custom Select this option if you want to customize the features that are installed It allows you to select the following options Remote Loader Service The service that communicates with the Metadirectory engine Drivers Select which driver files to install You s...

Page 62: ...T_INSTALL_ON_64BIT property values to true as follows RL_32BIT_INSTALL_ON_64BIT true 2 In the terminal change the directory path to IDM 3 6 1 installation folder say linux setup and enter one of the following commands idm_linux bin i gui f 32bit_RL_Install properties idm_linux bin i console f 32bit_RL_Install properties 3 Follow from Step 3 of Section 7 3 3 Installation Procedure on page 60 to com...

Page 63: ...o the usage html document 4 Unzip and extract the dirxml_jremote tar gz file and the dirxml_jremote_dev tar gz file For example gunzip dirxml_jremote tar gz or tar xvf dirxml_jremote_dev tar 5 Copy the application shim jar files to the lib subdirectory that was created when the dirxml_jremote tar file was extracted Because the tar file doesn t contain drivers you must manually copy the drivers int...

Page 64: ... you deploy Identity Manager in a clustered environment Novell supports Identity Manager running in the cluster although in most situations the cluster itself is not supported The following two scenarios describe the extent of support given If you run the Identity Manager engine or remote loader on SUSE Linux Enterprise Server SLES and use Heartbeat to manage High Availability everything is suppor...

Page 65: ...il also contains a URL to the Novell site where you can obtain a credential If you do not remember or do not receive your Customer ID call the Novell Activation Center at 1 800 418 8373 in the U S In all other locations call 1 801 861 8373 You will be charged for calls made using the 801 area code You can also chat with us online http support novell com chat activation 8 2 Installing a Product Act...

Page 66: ...ith the credential 8 3 Viewing Product Activations for Identity Manager and for Drivers For each of your driver sets you can view the Product Activation Credentials you have installed for the Metadirectory engine and Identity Manager drivers 1 Open iManager 2 Click Identity Manager Identity Manager Overview 3 Click to browse for and select a driver set in the tree structure then click to perform t...

Page 67: ...llation On Solaris 10 while installing IDM 3 6 1 as non root you might encounter the following error message for Lotus Notes driver ln cannot create usr lib locale ja wnn ndsrep File exists ln cannot create cp cannot create usr lib locale ja wnn libnotesdrvjni so 1 0 0 Permission denied ln cannot create usr lib locale ja wnn libnotesdrvjni so 1 File exists ln cannot create usr lib locale ja wnn li...

Page 68: ...68 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 69: ...grading your existing Identity Manager solution Chapter 10 What s New on page 71 Chapter 11 Supported Versions for Upgrades and System Requirements on page 73 Chapter 12 In place Upgrade Versus Migration on page 75 Chapter 13 Performing an In place Upgrade on page 77 Chapter 14 Performing a Migration on page 89 ...

Page 70: ...70 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 71: ... 64 Bit Operating Systems Identity Manager supports 32 bit Remote Loader installation on 64 bit Operating Systems For a list of supported Operating Systems see Section 6 3 Remote Loader on page 49 10 3 Identity Manager Driver for SAP Portal The Identity Manager Integration Module for Enterprise contains a new driver the SAP Portal driver The SAP Portal driver provisions users to the SAP NetWeaver ...

Page 72: ...72 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 73: ...upported platforms See Section 12 2 Migration on page 76 if you are migrating Identity Manager on a new server or see Section 12 1 In place Upgrade on page 75 for performing an in place upgrade 11 2 System Requirements In order to upgrade to Identity Manager 3 6 1 the servers running the Identity Manager services need to meet the minimum requirements See Chapter 6 System Requirements on page 45 fo...

Page 74: ...74 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 75: ...and is restarted There are certain scenarios that occur when an in place upgrade is not feasible or multiple in place upgrades must be performed Because Identity Manager 3 5 x and above are the only supported migration paths these are the only versions that are contained in the following scenarios The only supported situation for an in place upgrade is to have Identity Manager 3 5 x on a supported...

Page 76: ...river Set If you have multiple servers associated with a driver set you can perform an in place upgrade or a migration on one server at a time If you don t have time to upgrade the servers at the same time the drivers continue to work with the different versions of Identity Manager until the upgrades for each server can be completed The Identity Manager engine is backward compatible so the Identit...

Page 77: ...ntinue with Chapter 14 Performing a Migration on page 89 if your operating system is NetWare Windows NT Windows 2000 Red Hat Linux 3 SLES 8 Solaris 8 or 9 Upgrade your iManager server to iManager 2 7 3 For more information see the iManager Installation Guide http www novell com documentation imanager27 imanager_install_27 data hk42s9ot html Stop the drivers associated with the server you are upgra...

Page 78: ...tation idmrbpm361 index html Upgrade the User Application For more information see the Roles Based Provisioning Module Migration Guide http www novell com documentation idmrbpm361 index html Optional Overlay the new driver configuration files over the existing drivers to get new policies This is required only if there is new functionality included in the policies for a driver that you want to add ...

Page 79: ...n the project is synchronized with what is in the Identity Vault 1 In Designer open your project 2 In the Modeler right click the Identity Vault then select Live Compare 3 Evaluate the project and reconcile any differences then click OK For more information see Using the Compare Feature When Deploying in Designer 3 5 for Identity Manager 3 6 Administration Guide 4 On the toolbar select Project Exp...

Page 80: ...ect is imported 15 If you only have one Identity Vault you are finished If you have multiple Identity Vaults proceed with Step 16 16 Click Live Import on the toolbar 17 Repeat Step 8 through Step 14 for each additional Identity Vault 13 1 2 Creating an Export of the Drivers Creating an export of the drivers makes a backup of your current configuration Using Designer to Create an Export of the Driv...

Page 81: ...e project 3 Set the drivers to manual start to ensure that the drivers do not start until the upgrade process is complete 3a Double click the driver icon in the Outline tab 3b Select Driver Configuration Startup Options 3c Select Manual then click OK 3d Repeat Step 3a through Step 3c for each driver 13 2 2 Using iManager to Stop the Drivers 1 In iManager select Identity Manager Identity Manager Ov...

Page 82: ...L true AIX idm_aix bin i console DCLUSTER_INSTALL true This adds the correct files without authenticating to eDirectory 2 Enter ndsconfig upgrade to upgrade the eDirectory files 3 Verify whether the following entry exists in the nds conf file n4u server interfaces ipaddress port For example n4u server interfaces ipaddress 524 If n4u server interfaces entry does not exist you should manually set it...

Page 83: ...1 overwrites the previous versions of Identity Manager updating the binaries extending the schema and updating the driver configuration files NOTE After upgrading Identity Manager from 32 bit to 64 bit the Groupwise driver and the native custom drivers do not work 13 6 Upgrading the Remote Loader If you are running the Remote Loader you also need to upgrade the Remote Loader files 1 Create a backu...

Page 84: ...he driver with any new policies or functionality that are in the driver configuration file Section 13 7 1 Using Designer to Overlay the New Driver Configuration File over the Existing Driver on page 84 Section 13 7 2 Using iManager to Overlay the New Driver Configuration File over the Existing Driver on page 85 13 7 1 Using Designer to Overlay the New Driver Configuration File over the Existing Dr...

Page 85: ... have custom policies proceed to Section 13 8 Restoring Custom Policies and Rules to the Driver on page 85 Otherwise proceed to Section 13 10 Starting the Drivers on page 87 13 8 Restoring Custom Policies and Rules to the Driver If you have custom policies or rules they must be restored to the driver after you have overlaid the new driver configuration file If these policies have different names t...

Page 86: ...lick OK 4 Specify the name of the customized policy then click OK 5 Click Yes in the file conflict message to save your project 6 After the Policy Builder opens the policy verify that the information is correct in the copied policy 7 Repeat Step 2 through Step 6 for each customized policy you need to restore to the driver 8 Start the driver and test the driver For more information on starting the ...

Page 87: ... Drivers 1 Select the Identity Vault object in the Outline tab 2 Click the Start All Drivers icon in the Modeler toolbar This starts all of the drivers in the project 3 Set the driver startup options 3a Double click the driver icon in the Outline tab 3b Select Driver Configuration Startup Option 3c Select Auto start or select your preferred method of starting the driver then click OK 3d Repeat Ste...

Page 88: ...con click Edit properties 6e On the Driver Configuration page under Startup Options select Auto start or select your preferred method of starting the driver then click OK 6f Repeat Step 6b through Step 6e for each driver 7 Test the drivers to verify the policies are working as designed There is no policy simulator in iManager To test the policies cause events to happen that make the policies execu...

Page 89: ...6 1 Use the Chapter 4 Basic Identity Manager System Checklist on page 39 to verify that all steps are completed If any of the drivers in the driver set are Remote Loader drivers upgrade the Remote Loader server for each driver For more information see Section 13 6 Upgrading the Remote Loader on page 83 Conditional If the old server is your User Application server perform the following additional s...

Page 90: ...ection 14 3 Removing the Old Server from the Driver Set on page 92 If you are using Novell SentinelTM you must update to Novell Sentinel 6 1 For more information about upgrading Sentinel see the Sentinel Installation Guide http www novell com documentation sentinel6 pdfdoc sentinel60_installationguide pdf Activate the Metadirectory engine and any upgraded driver For more information see Chapter 8 ...

Page 91: ...ctive There are three options but Make the target server active is recommended Make the target server active Copies the settings from the source server to the target server and disables the drivers on the source server Keep the source server active Does not copy the settings and disables all drivers on the target server Makes both target and source servers active Copies settings from the source se...

Page 92: ...Remove the Old Server from the Driver Set on page 92 Section 14 3 2 Using iManager to Remove the Old Server from the Driver Set on page 92 Section 14 3 3 Decommissioning the Old Server on page 93 14 3 1 Using Designer to Remove the Old Server from the Driver Set 1 In Designer open your project 2 In the Modeler right click the driver set then select Properties 3 Select Server List 4 Select the old ...

Page 93: ...r more information see Deleting Replicas http www novell com documentation edir88 edir88 data fbgciaad html in the eDirectory Administration Guide http www novell com documentation edir88 pdfdoc edir88 edir88 pdf 2 Remove eDirectory from this server For more information see TID 10056593 Removing a Server From an NDS Tree Permanently http www novell com support php search do cmd displayKC docType k...

Page 94: ...94 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 95: ...dentity Manager If you need to uninstall Identity Manager use the procedures in the following sections in order Chapter 15 Removing Objects from eDirectory on page 97 Chapter 16 Uninstalling the Metadirectory Server and Drivers on page 99 Chapter 17 Uninstalling Designer on page 101 ...

Page 96: ...96 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 97: ... eDirectory Healthy http www novell com documentation edir88 edir88 data a5ziqam html in the Novell eDirectory 8 8 Administration Guide 2 Log in to iManager as an administrator user with full rights to the eDirectory tree 3 Select Partitions and Replica Merge Partition 4 Browse to and select the driver set object that is the partition root object then click OK 5 Wait for the merge process to compl...

Page 98: ...98 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 99: ...ows Server 2008 click Programs and Features NOTE This method is not applicable for Windows Server 2008 Server Core Execute the uninstall script Uninstall Identity Manager exe located at C Program Files Novell Identity Manager Uninstall_Identity_Manager For 64 bit Windows use one of the following methods Access the Control Panel on the Windows server If the server is Windows Server 2003 click Add o...

Page 100: ...100 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 101: ...gner Uninstalling Designer is very similar to uninstalling the Metadirectory server and driver For Windows select Add or Remove Programs in the control panel For Linux UNIX execute the uninstall script located at designer UninstallDesigner Uninstall_Designer_for_Identity_Manager ...

Page 102: ...102 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Page 103: ...g sections The changes are explained below Section A 1 1 What s New on page 103 A 1 1 What s New The following update was made in this section Location Change Section 10 3 Identity Manager Driver for SAP Portal on page 71 Added this information Section 10 4 Updated Identity Manager Driver for SAP HR and Identity Manager Driver for SAP User Management on page 71 Added this information ...

Page 104: ...104 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Reviews: