background image

Planning

I

11

no

vd

ocx 

(e

n)

  

17

 Sep

te

m

be

r 20

09

I

Planning

Identity Manager helps you manage the identities and resources in your business. It also automates 
many business processes for you that are currently manual tasks.

If you have any questions about the different components that make up an Identity Manager 
solution, see the 

Identity Manager 3.6.1 Overview

 guide for more information about each 

component.

To create an effective Identity Manager solution for your environment, you first must take time to 
plan and design your Identity Manager solution. There are two major aspects to planning: setting up 
a test lab to become familiar with the products and creating a project plan to implement an Identity 
Manager solution. When you create a project plan, you define your business process and create an 
implementation plan. Most companies have many different business processes that are managed by 
many different people. A complete Identity Manager solution affects most of these processes. It is 
extremely important to take the time to plan an Identity Manager solution, so that it can be 
effectively implemented in your environment.

We strongly recommend that an Identity Manager expert be engaged to assist in each phase of your 
Identity Manager implementation. For more information about partnership options, see the 

Novell

®

 

Solution Partner Web site (http://www.novell.com/partners/)

. Novell Education also offers courses 

that address Identity Manager implementation.

Š

Chapter 1, “Setting Up a Development Environment,” on page 13

Š

Chapter 2, “Creating a Project Plan,” on page 15

Š

Chapter 3, “Technical Guidelines,” on page 27

Содержание IDENTITY MANAGER 3.6.1

Страница 1: ...Novell www novell com novdocx en 17 September 2009 AUTHORIZED DOCUMENTATION Identity Manager 3 6 1 Installation Guide Identity Manager 3 6 1 January 05 2010 Installation Guide ...

Страница 2: ...e export to entities on the current U S export exclusion lists or to any embargoed or terrorist countries as specified in the U S export laws You agree to not use deliverables for prohibited nuclear missile or chemical biological weaponry end uses Please refer to the International Trade Services http www novell com company policies trade_services for more information on exporting Novell software N...

Страница 3: ...ell Trademarks For Novell trademarks see the Novell Trademark and Service Mark list http www novell com company legal trademarks tmlist html Third Party Materials All third party trademarks are the property of their respective owners ...

Страница 4: ...4 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 5: ...22 2 3 Proof of Concept 23 2 4 Data Validation and Preparation 23 2 5 Production Pilot 24 2 6 Production Rollout Planning 24 2 7 Production Deployment 25 3 Technical Guidelines 27 3 1 Management Tools Guidelines 28 3 1 1 Designer Guidelines 28 3 1 2 iManager Guidelines 29 3 2 Metadirectory Server Guidelines 29 3 3 eDirectory Guidelines 30 3 3 1 Identity Manager Objects in eDirectory 30 3 3 2 Repli...

Страница 6: ...allation of the Remote Loader 62 7 3 5 Installing the Java Remote Loader on UNIX Linux or AIX 63 7 4 Installing the Roles Based Provisioning Module 63 7 5 Installing a Custom Driver 64 7 6 Installing Identity Audit or Sentinel 64 7 7 Installing Identity Manager in Clustering Environment 64 8 Activating Novell Identity Manager Products 65 8 1 Purchasing an Identity Manager Product License 65 8 2 In...

Страница 7: ... Overlay the New Driver Configuration File over the Existing Driver 85 13 8 Restoring Custom Policies and Rules to the Driver 85 13 8 1 Using Designer to Restore Custom Policies and Rules to the Driver 85 13 8 2 Using iManager to Restore Custom Policies and Rules to the Driver 86 13 9 Deploying the Converted Project 87 13 10 Starting the Drivers 87 13 10 1 Using Designer to Start the Drivers 87 13...

Страница 8: ...8 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 17 Uninstalling Designer 101 A Documentation Updates 103 A 1 July 31 2009 103 A 1 1 What s New 103 ...

Страница 9: ...Guidelines on page 27 Part II Installation on page 37 Chapter 4 Basic Identity Manager System Checklist on page 39 Chapter 5 Where to Get Identity Manager on page 43 Chapter 6 System Requirements on page 45 Chapter 7 Installing Identity Manager on page 55 Chapter 8 Activating Novell Identity Manager Products on page 65 Part III Upgrading on page 69 Chapter 10 What s New on page 71 Chapter 11 Suppo...

Страница 10: ...vell com documentation idmrbpm361 index html Documentation Conventions In Novell documentation a greater than symbol is used to separate actions within a step and items in a cross reference path A trademark symbol TM etc denotes a Novell trademark An asterisk denotes a third party trademark When a single pathname can be written with a backslash for some platforms or a forward slash for other platf...

Страница 11: ...ity Manager solution When you create a project plan you define your business process and create an implementation plan Most companies have many different business processes that are managed by many different people A complete Identity Manager solution affects most of these processes It is extremely important to take the time to plan an Identity Manager solution so that it can be effectively implem...

Страница 12: ...12 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 13: ...e Identity Manager solution The development environment allows you to create the solution that is best for each situation The most important tool to use when you are developing your Identity Manager solution is Designer It allows you to capture all of the information about your environment and then use that information to create an Identity Manager solution that fits your needs Use Designer during...

Страница 14: ...14 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 15: ...out Planning on page 24 Section 2 7 Production Deployment on page 25 2 1 Discovery Phase The Identity Manager solution affects many aspects of your business In order to create an effective solution you must take time to define all of your current business processes then identify how an implementation of Identity Manager changes these processes who these changes affect and how the changes are imple...

Страница 16: ...ss What systems generate new accounts Is it the human resource system or is it through a workflow request A password policy for the company that defines how often a password changes how complex the password is and which systems are synchronizing the password As you define your business processes use the following list of items to help you understand all of the processes Define or clarify the curre...

Страница 17: ...d to decide which processes you want to incorporate into an Identity Manager solution It is best to look at the entire solution and then prioritize which processes should be implemented Identity Manager encompasses so many aspects of your business it is easier to plan the entire solution rather than approach each business process as its own solution Create a list of which business processes are a ...

Страница 18: ...ch stakeholder about the Identity Manager solution and how the solution affects them Here is a list of items to cover when you do the interviews Define or clarify the business processes being addressed by the Identity Manager solution The person you are interviewing might have information that can change the current plan Determine how the solution will impact the stakeholders and address any conce...

Страница 19: ...entity Manager synchronizes user accounts to directories that do not have direct access to the operating system s file system For example you can have a user account in Active Directory but that does not grant you access to the file system on the Active Directory server Using the information gathered in the discovery phase answer the following sample questions to see what other information needs t...

Страница 20: ...a list of the business requirements and determine which systems are affected by this process For example a business requirement for terminating an employee might be that the employee s network and e mail account access must be removed the same day the employee is terminated The e mail system and the Identity Vault are affected by this termination process Establish the process flows process trigger...

Страница 21: ... Business Processes After completing the analysis of your business requirements there is more information you need to gather to help focus the Identity Manager solution You need to interview essential individuals such as managers administrators and employees who actually use the application or system Issues to be addressed include Where does the data originate Where does the data go Who is respons...

Страница 22: ...n page 22 to start the design 2 2 3 Design an Enterprise Data Model After your business processes have been defined you can use Designer to begin to design a data model that reflects your current business processes The model in Designer illustrates where data originates where it moves to and where it can t move It can also account for how critical events affect the data flow For example Figure 2 2...

Страница 23: ...ncept on page 23 2 3 Proof of Concept The outcome of this activity is to have a sample implementation in a lab environment that reflects your company s business policy and data flow It is based on the design of the data model developed during the requirement analysis and design and is a final step before the production pilot NOTE This step is often beneficial in gaining management support and fund...

Страница 24: ...ies can be confirmed and agreement obtained for the production rollout The pilot validates the plan that has been created to this point in the process NOTE This phase might provide the acceptance criteria for the solution and the necessary milestone en route to full production The pilot solution provides live proof of concept and validation for the data model and desired process outcomes After the...

Страница 25: ...all of the plans into action and the Identity Manager solution is created in the live environment Use the production rollout plan to put the different pieces of the Identity Manager solution into place This might take one night or it might be spread across a longer period of time It depends upon what your plan contains ...

Страница 26: ...26 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 27: ...tain technical best practices guidelines to help set up and configure the Identity Manager solution that works best for your environment Variables that affect how these guidelines apply to your environment include the type of hardware you have for your servers how your WAN is configured and how many objects are being synchronized Section 3 1 Management Tools Guidelines on page 28 Section 3 2 Metad...

Страница 28: ...adminapp html in the User Application Administration Guide Section 3 1 1 Designer Guidelines on page 28 Section 3 1 2 iManager Guidelines on page 29 3 1 1 Designer Guidelines Designer is a thick client that is installed on a workstation Designer is used to design test document and then deploy your Identity Manager solution Using Designer throughout the planning phase helps you capture information ...

Страница 29: ...add a Remote Loader server not represented in the figure to help with the workload or configuration of your environment Drivers must run on the same server as the connected application For example to configure the Active Directory driver the server in Figure 3 3 must be a Member server or a Domain controller If you do not want to install eDirectory and Identity Manager on a Member server or Domain...

Страница 30: ... on page 31 Section 3 3 3 Using Scope Filtering to Manage Users on Different Servers on page 32 3 3 1 Identity Manager Objects in eDirectory The following list indicates the major Identity Manager objects that are stored in eDirectory and how they relate to each other No objects are created during the installation of Identity Manager The Identity Manager objects are created during the configuratio...

Страница 31: ...ca of the Driver Set object If the server has a full replica of the location where the Driver Set object is installed the partition is not required The Server object for that server The Server object is necessary because it allows the driver to generate key pairs for objects It is also important for Remote Loader authentication The objects that you want this instance of the driver to synchronize T...

Страница 32: ... objects that the driver needs to refer to for example work order objects for the Avaya PBX driver If the other objects are only to be read by the driver not changed the replica for those objects on the server can be a read only replica 3 3 3 Using Scope Filtering to Manage Users on Different Servers Scope filtering means adding rules to each driver to limit the scope of the driver s actions to sp...

Страница 33: ...single server He chooses instead to use two instances of the GroupWise driver one on each server He installs Identity Manager and sets up the GroupWise driver on each Identity Manager server Server A holds replicas of the Marketing and Finance containers Also on the server is a replica of the Identity Management container which holds the driver set for Server A and the GroupWise Driver object for ...

Страница 34: ...A and Server B You would define the scope for each driver differently so that they would only synchronize the users in the specified containers Server A would synchronize Marketing and Finance Server B would synchronize Development 3 4 User Application The User Application should run on its own server as shown in Figure 3 7 You might need more than one User Application server Identity Manager Serv...

Страница 35: ...formation see Clustering http www novell com documentation idmrbpm361 agpro data b2gx73a html in the User Application Administration Guide 3 5 Auditing and Reporting Guidelines If you need auditing and reporting as part of the Identity Manager solution you need to implement Identity Audit or Novell SentinelTM It is recommended that you run Identity Audit or Sentinel on its own server as shown in F...

Страница 36: ...r 3 6 1 Installation Guide novdocx en 17 September 2009 Figure 3 8 Sentinel Designer iManager iManager Server Administration Workstation User Application Server Novell Sentinel Server Metadirectory Server with eDirectory ...

Страница 37: ...tity Manager system Chapter 4 Basic Identity Manager System Checklist on page 39 Chapter 5 Where to Get Identity Manager on page 43 Chapter 6 System Requirements on page 45 Chapter 7 Installing Identity Manager on page 55 Chapter 8 Activating Novell Identity Manager Products on page 65 Chapter 9 Troubleshooting Identity Manager on page 67 ...

Страница 38: ...38 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 39: ...nfigure your Identity Manager system use this checklist to make sure all steps are completed Figure 4 1 Basic Identity Manager System Section 4 1 Prerequisites on page 40 Section 4 2 Planning on page 40 Section 4 3 Installation on page 40 Section 4 4 Driver Configuration with the Remote Loader on page 41 Section 4 5 Driver Configuration without the Remote Loader on page 41 Section 4 6 Additional C...

Страница 40: ...lan for deploying Identity Manager The project plan includes defining you key business processes creating an Identity Manager solution that automates those processes and an technical implementation plan To have a successful deployment of Identity Manager you must have a project plan For more information see Chapter 2 Creating a Project Plan on page 15 4 3 Installation Install the Metadirectory ser...

Страница 41: ...ocumentation idm36drivers Optional Enable entitlements on the driver Verify that you have the correct policies in place to execute the entitlement For more information see Identity Manager 3 6 1 Entitlements Guide Repeat these steps for each driver you have in your environment 4 5 Driver Configuration without the Remote Loader Create and configure your driver There is a driver guide for each drive...

Страница 42: ...n show your business policies comply with the company s policies You can add Identity Audit or Novell Sentinel to your Identity Manager solution for auditing and reporting For more information about Identity Audit see the Identity Manager 3 6 1 Integration Guide for Identity Audit For more information about Novell Sentinel see the Identity Manager 3 6 1 Reporting Guide for Novell Sentinel ...

Страница 43: ...y Manager Integration Modules must be purchased separately The User Application ISO image is the standard version included with your Identity Manager 3 6 1 purchase The User Application Roles Based Provisioning Module is an add on product that adds a powerful roles based approval workflow to managing your users identities The Roles Based Identity Manager Components Platforms ISO Identity Manager D...

Страница 44: ...image and is purchased separately See the User Application Installation Guide http www novell com documentation idmrbpm37 for more information Your Identity Manager purchase also includes Designer for Identity Manager a powerful and flexible administration tool that dramatically simplifies configuration and deployment ...

Страница 45: ...signer iManager Metadirectory 3 6 1 Server with eDirectory 8 8 5 or later 32 bit and 64 bit iManager 2 7 3 Server Administration Workstation Remote Loader 3 6 1 Server Novell Sentinel Server 6 1 Windows Server 2003 SP2 32 bit Windows Server 2008 32 bit and 64 bit Red Hat 5 0 or later 32 bit and 64 bit SLES 10 SP1 or later SPs 32 bit and 64 bit SLES 11 32 bit and 64 bit Solaris 10 32 bit and 64 bit...

Страница 46: ... for eDirectory see the Novell eDirectory 8 8 SP5 Installation Guide http www novell com documentation edir88 index html For system requirements for iManager see the iManager 2 7 Installation Guide http www novell com documentation imanager27 index html 6 2 Metadirectory Server The Metadirectory server processes the events from the drivers whether they are configured using the Remote Loader or not...

Страница 47: ...essor is used for Solaris testing The supported 32 bit processors for Linux Red Hat and SUSE Linux Enterprise Server and Windows operating systems are Intel x86 32 AMD x86 32 The supported 64 bit processors for Linux Red Hat and SUES Linux Enterprise Server and Windows operating systems are Intel EM64T AMD Athlon64 AMD Opteron Designer iManager iManager 2 7 3 Server Administration Workstation Remo...

Страница 48: ... s automated update facility before you install Identity Manager SUSE Linux Enterprise Server 10 SP1 or later support packs 32 bit and 64 bit The Metadirectory server runs in either 32 bit or 64 bit mode Novell recommends that you apply the latest OS patches via the manufacturer s automated update facility before you install Identity Manager SUSE Linux Enterprise Server 11 32 bit and 64 bit The Me...

Страница 49: ...directory engine and the 64 bit Remote Loader have the same names If they are both installed on the same machine it causes conflicts Table 6 2 lists the supported operating systems for the Remote Loader Open Enterprise Server 2 SP1 and SP2 32 bit and 64 bit The Metadirectory server runs in either 32 bit or 64 bit mode NOTE You must have eDirectory 8 8 5 or later 32 bit or 64 bit installed or the i...

Страница 50: ...bit or 64 bit mode Red Hat 5 0 or later 32 bit and 64 bit The Remote Loader runs in either 32 bit or 64 bit mode Novell recommends that you apply the latest OS patches via the manufacturer s automated update facility before you install Identity Manager SUSE Linux Enterprise Server 10 SP1 or later support packs 32 bit and 64 bit The Remote Loader runs in either 32 bit or 64 bit mode Novell recommen...

Страница 51: ...the Identity Manager 3 6 1 Reporting Guide for Novell Sentinel For system requirement information about Identity Audit see the Identity Audit Guide http www novell com documentation identityaudit index html For system requirement information about Novell Sentinel see the Novell Sentinel Installation Guide http www novell com documentation sentinel6 index html 6 6 Workstations The workstations are ...

Страница 52: ...ion Platforms Platforms Details Windows Vista The Ultimate and Business Editions are supported Windows XP Professional SP2 openSUSE 10 3 Apply the latest patches via the automated update facility SUSE Linux Enterprise Desktop 10 SP1 SP2 Apply the latest patches via the automated update facility Designer iManager Metadirectory 3 6 1 Server with eDirectory 8 8 5 or later 32 bit and 64 bit iManager 2...

Страница 53: ...r 3 6 1 is iManager 2 7 3 It runs all of the plug ins required to configure and administer Identity Manager The supported Web browsers for managing Identity Manager are Internet Explorer 6 SP2 Internet Explorer 7 Firefox 2 SUSE Linux Enterprise Server 10 SP1 SP2 Apply the latest patches via the automated update facility Platforms Details ...

Страница 54: ...54 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 55: ...g part of your Identity Manager implementation For more information about planning see Part I Planning on page 11 1 Verify that your workstation s operating system is supported For more information see Section 6 6 Workstations on page 51 2 Start the installation by executing the correct program for your workstation s platform Windows IDM3 6 1_Designer_Win windows designer install exe Linux IDM3 6 ...

Страница 56: ...our platform Windows IDM3 6 1_Win windows setup idm_install exe Linux GUI Install IDM3_6_1_Lin idm_linux bin i gui Linux Command Line Install IDM3_6_1_Lin idm_linux bin i console Solaris GUI Install IDM3_6_1_Solaris idm_solaris bin i gui Solaris Command Line Install IDM3_6_1_Solaris idm_solaris bin i console AIX GUI Install IDM3_6_1_AIX idm_aix bin i gui AIX Command Line Install IDM3_6_1_AIX idm_a...

Страница 57: ...nnot install Identity Manager as a nonroot user if eDirectory is installed by root The nonroot installation does not install the following items Remote Loader Use the Java Remote Loader if you need to install the Remote Loader as a nonroot user For more information see Section 7 3 5 Installing the Java Remote Loader on UNIX Linux or AIX on page 63 UNIX Linux Account Driver Requires root privileges...

Страница 58: ...ata directory for each instance of eDirectory Run the opt novell eDirectory idm install schema program to extend the schema on additional eDirectory instances after the installation is complete Utilities Optional If you need an Identity Manager driver utility you must copy the utilities from the Identity Manager installation media to the Identity Manager server All utilities are found under the ID...

Страница 59: ... the planning process see Chapter 3 Technical Guidelines on page 27 Section 7 3 1 Requirements on page 59 Section 7 3 2 Supported Drivers on page 59 Section 7 3 3 Installation Procedure on page 60 If you want to install the Remote Loader using a nonroot user use the Java Remote Loader It can also be used when customizing your environment and installing it on a unsupported platform such as HP UX Fo...

Страница 60: ...1 Verify you have met the system requirements listed in Chapter 6 System Requirements on page 45 2 Start the installation using the correct program for your platform Windows IDM3 6 1_Win windows setup idm_install exe Linux GUI Install IDM3_6_1_Lin idm_linux bin i gui Linux Command Line Install IDM3_6_1_Lin idm_linux bin i console Solaris GUI Install IDM3_6_1_Solaris idm_solaris bin i gui Solaris C...

Страница 61: ...lling Identity Manager 3 6 1 do not select the Utilities component The installation does not proceed if you select the Utilities component Custom Select this option if you want to customize the features that are installed It allows you to select the following options Remote Loader Service The service that communicates with the Metadirectory engine Drivers Select which driver files to install You s...

Страница 62: ...T_INSTALL_ON_64BIT property values to true as follows RL_32BIT_INSTALL_ON_64BIT true 2 In the terminal change the directory path to IDM 3 6 1 installation folder say linux setup and enter one of the following commands idm_linux bin i gui f 32bit_RL_Install properties idm_linux bin i console f 32bit_RL_Install properties 3 Follow from Step 3 of Section 7 3 3 Installation Procedure on page 60 to com...

Страница 63: ...o the usage html document 4 Unzip and extract the dirxml_jremote tar gz file and the dirxml_jremote_dev tar gz file For example gunzip dirxml_jremote tar gz or tar xvf dirxml_jremote_dev tar 5 Copy the application shim jar files to the lib subdirectory that was created when the dirxml_jremote tar file was extracted Because the tar file doesn t contain drivers you must manually copy the drivers int...

Страница 64: ... you deploy Identity Manager in a clustered environment Novell supports Identity Manager running in the cluster although in most situations the cluster itself is not supported The following two scenarios describe the extent of support given If you run the Identity Manager engine or remote loader on SUSE Linux Enterprise Server SLES and use Heartbeat to manage High Availability everything is suppor...

Страница 65: ...il also contains a URL to the Novell site where you can obtain a credential If you do not remember or do not receive your Customer ID call the Novell Activation Center at 1 800 418 8373 in the U S In all other locations call 1 801 861 8373 You will be charged for calls made using the 801 area code You can also chat with us online http support novell com chat activation 8 2 Installing a Product Act...

Страница 66: ...ith the credential 8 3 Viewing Product Activations for Identity Manager and for Drivers For each of your driver sets you can view the Product Activation Credentials you have installed for the Metadirectory engine and Identity Manager drivers 1 Open iManager 2 Click Identity Manager Identity Manager Overview 3 Click to browse for and select a driver set in the tree structure then click to perform t...

Страница 67: ...llation On Solaris 10 while installing IDM 3 6 1 as non root you might encounter the following error message for Lotus Notes driver ln cannot create usr lib locale ja wnn ndsrep File exists ln cannot create cp cannot create usr lib locale ja wnn libnotesdrvjni so 1 0 0 Permission denied ln cannot create usr lib locale ja wnn libnotesdrvjni so 1 File exists ln cannot create usr lib locale ja wnn li...

Страница 68: ...68 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 69: ...grading your existing Identity Manager solution Chapter 10 What s New on page 71 Chapter 11 Supported Versions for Upgrades and System Requirements on page 73 Chapter 12 In place Upgrade Versus Migration on page 75 Chapter 13 Performing an In place Upgrade on page 77 Chapter 14 Performing a Migration on page 89 ...

Страница 70: ...70 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 71: ... 64 Bit Operating Systems Identity Manager supports 32 bit Remote Loader installation on 64 bit Operating Systems For a list of supported Operating Systems see Section 6 3 Remote Loader on page 49 10 3 Identity Manager Driver for SAP Portal The Identity Manager Integration Module for Enterprise contains a new driver the SAP Portal driver The SAP Portal driver provisions users to the SAP NetWeaver ...

Страница 72: ...72 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 73: ...upported platforms See Section 12 2 Migration on page 76 if you are migrating Identity Manager on a new server or see Section 12 1 In place Upgrade on page 75 for performing an in place upgrade 11 2 System Requirements In order to upgrade to Identity Manager 3 6 1 the servers running the Identity Manager services need to meet the minimum requirements See Chapter 6 System Requirements on page 45 fo...

Страница 74: ...74 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 75: ...and is restarted There are certain scenarios that occur when an in place upgrade is not feasible or multiple in place upgrades must be performed Because Identity Manager 3 5 x and above are the only supported migration paths these are the only versions that are contained in the following scenarios The only supported situation for an in place upgrade is to have Identity Manager 3 5 x on a supported...

Страница 76: ...river Set If you have multiple servers associated with a driver set you can perform an in place upgrade or a migration on one server at a time If you don t have time to upgrade the servers at the same time the drivers continue to work with the different versions of Identity Manager until the upgrades for each server can be completed The Identity Manager engine is backward compatible so the Identit...

Страница 77: ...ntinue with Chapter 14 Performing a Migration on page 89 if your operating system is NetWare Windows NT Windows 2000 Red Hat Linux 3 SLES 8 Solaris 8 or 9 Upgrade your iManager server to iManager 2 7 3 For more information see the iManager Installation Guide http www novell com documentation imanager27 imanager_install_27 data hk42s9ot html Stop the drivers associated with the server you are upgra...

Страница 78: ...tation idmrbpm361 index html Upgrade the User Application For more information see the Roles Based Provisioning Module Migration Guide http www novell com documentation idmrbpm361 index html Optional Overlay the new driver configuration files over the existing drivers to get new policies This is required only if there is new functionality included in the policies for a driver that you want to add ...

Страница 79: ...n the project is synchronized with what is in the Identity Vault 1 In Designer open your project 2 In the Modeler right click the Identity Vault then select Live Compare 3 Evaluate the project and reconcile any differences then click OK For more information see Using the Compare Feature When Deploying in Designer 3 5 for Identity Manager 3 6 Administration Guide 4 On the toolbar select Project Exp...

Страница 80: ...ect is imported 15 If you only have one Identity Vault you are finished If you have multiple Identity Vaults proceed with Step 16 16 Click Live Import on the toolbar 17 Repeat Step 8 through Step 14 for each additional Identity Vault 13 1 2 Creating an Export of the Drivers Creating an export of the drivers makes a backup of your current configuration Using Designer to Create an Export of the Driv...

Страница 81: ...e project 3 Set the drivers to manual start to ensure that the drivers do not start until the upgrade process is complete 3a Double click the driver icon in the Outline tab 3b Select Driver Configuration Startup Options 3c Select Manual then click OK 3d Repeat Step 3a through Step 3c for each driver 13 2 2 Using iManager to Stop the Drivers 1 In iManager select Identity Manager Identity Manager Ov...

Страница 82: ...L true AIX idm_aix bin i console DCLUSTER_INSTALL true This adds the correct files without authenticating to eDirectory 2 Enter ndsconfig upgrade to upgrade the eDirectory files 3 Verify whether the following entry exists in the nds conf file n4u server interfaces ipaddress port For example n4u server interfaces ipaddress 524 If n4u server interfaces entry does not exist you should manually set it...

Страница 83: ...1 overwrites the previous versions of Identity Manager updating the binaries extending the schema and updating the driver configuration files NOTE After upgrading Identity Manager from 32 bit to 64 bit the Groupwise driver and the native custom drivers do not work 13 6 Upgrading the Remote Loader If you are running the Remote Loader you also need to upgrade the Remote Loader files 1 Create a backu...

Страница 84: ...he driver with any new policies or functionality that are in the driver configuration file Section 13 7 1 Using Designer to Overlay the New Driver Configuration File over the Existing Driver on page 84 Section 13 7 2 Using iManager to Overlay the New Driver Configuration File over the Existing Driver on page 85 13 7 1 Using Designer to Overlay the New Driver Configuration File over the Existing Dr...

Страница 85: ... have custom policies proceed to Section 13 8 Restoring Custom Policies and Rules to the Driver on page 85 Otherwise proceed to Section 13 10 Starting the Drivers on page 87 13 8 Restoring Custom Policies and Rules to the Driver If you have custom policies or rules they must be restored to the driver after you have overlaid the new driver configuration file If these policies have different names t...

Страница 86: ...lick OK 4 Specify the name of the customized policy then click OK 5 Click Yes in the file conflict message to save your project 6 After the Policy Builder opens the policy verify that the information is correct in the copied policy 7 Repeat Step 2 through Step 6 for each customized policy you need to restore to the driver 8 Start the driver and test the driver For more information on starting the ...

Страница 87: ... Drivers 1 Select the Identity Vault object in the Outline tab 2 Click the Start All Drivers icon in the Modeler toolbar This starts all of the drivers in the project 3 Set the driver startup options 3a Double click the driver icon in the Outline tab 3b Select Driver Configuration Startup Option 3c Select Auto start or select your preferred method of starting the driver then click OK 3d Repeat Ste...

Страница 88: ...con click Edit properties 6e On the Driver Configuration page under Startup Options select Auto start or select your preferred method of starting the driver then click OK 6f Repeat Step 6b through Step 6e for each driver 7 Test the drivers to verify the policies are working as designed There is no policy simulator in iManager To test the policies cause events to happen that make the policies execu...

Страница 89: ...6 1 Use the Chapter 4 Basic Identity Manager System Checklist on page 39 to verify that all steps are completed If any of the drivers in the driver set are Remote Loader drivers upgrade the Remote Loader server for each driver For more information see Section 13 6 Upgrading the Remote Loader on page 83 Conditional If the old server is your User Application server perform the following additional s...

Страница 90: ...ection 14 3 Removing the Old Server from the Driver Set on page 92 If you are using Novell SentinelTM you must update to Novell Sentinel 6 1 For more information about upgrading Sentinel see the Sentinel Installation Guide http www novell com documentation sentinel6 pdfdoc sentinel60_installationguide pdf Activate the Metadirectory engine and any upgraded driver For more information see Chapter 8 ...

Страница 91: ...ctive There are three options but Make the target server active is recommended Make the target server active Copies the settings from the source server to the target server and disables the drivers on the source server Keep the source server active Does not copy the settings and disables all drivers on the target server Makes both target and source servers active Copies settings from the source se...

Страница 92: ...Remove the Old Server from the Driver Set on page 92 Section 14 3 2 Using iManager to Remove the Old Server from the Driver Set on page 92 Section 14 3 3 Decommissioning the Old Server on page 93 14 3 1 Using Designer to Remove the Old Server from the Driver Set 1 In Designer open your project 2 In the Modeler right click the driver set then select Properties 3 Select Server List 4 Select the old ...

Страница 93: ...r more information see Deleting Replicas http www novell com documentation edir88 edir88 data fbgciaad html in the eDirectory Administration Guide http www novell com documentation edir88 pdfdoc edir88 edir88 pdf 2 Remove eDirectory from this server For more information see TID 10056593 Removing a Server From an NDS Tree Permanently http www novell com support php search do cmd displayKC docType k...

Страница 94: ...94 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 95: ...dentity Manager If you need to uninstall Identity Manager use the procedures in the following sections in order Chapter 15 Removing Objects from eDirectory on page 97 Chapter 16 Uninstalling the Metadirectory Server and Drivers on page 99 Chapter 17 Uninstalling Designer on page 101 ...

Страница 96: ...96 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 97: ... eDirectory Healthy http www novell com documentation edir88 edir88 data a5ziqam html in the Novell eDirectory 8 8 Administration Guide 2 Log in to iManager as an administrator user with full rights to the eDirectory tree 3 Select Partitions and Replica Merge Partition 4 Browse to and select the driver set object that is the partition root object then click OK 5 Wait for the merge process to compl...

Страница 98: ...98 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 99: ...ows Server 2008 click Programs and Features NOTE This method is not applicable for Windows Server 2008 Server Core Execute the uninstall script Uninstall Identity Manager exe located at C Program Files Novell Identity Manager Uninstall_Identity_Manager For 64 bit Windows use one of the following methods Access the Control Panel on the Windows server If the server is Windows Server 2003 click Add o...

Страница 100: ...100 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 101: ...gner Uninstalling Designer is very similar to uninstalling the Metadirectory server and driver For Windows select Add or Remove Programs in the control panel For Linux UNIX execute the uninstall script located at designer UninstallDesigner Uninstall_Designer_for_Identity_Manager ...

Страница 102: ...102 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Страница 103: ...g sections The changes are explained below Section A 1 1 What s New on page 103 A 1 1 What s New The following update was made in this section Location Change Section 10 3 Identity Manager Driver for SAP Portal on page 71 Added this information Section 10 4 Updated Identity Manager Driver for SAP HR and Identity Manager Driver for SAP User Management on page 71 Added this information ...

Страница 104: ...104 Identity Manager 3 6 1 Installation Guide novdocx en 17 September 2009 ...

Отзывы: