Skip Headers
Oracle® Access Manager Identity and Common Administration Guide
10g (10.1.4.0.1)

Part Number B25343-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  B  C  D  E  F  G  H  I  L  M  N  O  P  Q  R  S  T  U  V  W 

A

AAA Server
see Access Server
About page, 1.3.5
Access Manager
SDK, configuring, 7.9
Access Manager SDK, 7.9
formerly named Access Server SDK, Preface
Access Server, 1.2.1
AAA Server configuration option
auditing, 9.1
cache flush, caveat, 8.1.1
cache updates, 7.8.6, 7.8.6
changing the security password, 8.7
changing to Cert mode, 8.3.4
changing to Open mode, 8.3.2
changing to Simple mode, 8.3.3
changing transport security modes for, 8.3
configureAAAServer tool, 7.5.5.3, 8.7
file-based auditing for, 11.5
location for user and configuration data, 7.5
logging, 10.1
reconfiguring after setting up Policy Manager, 7.5.5.3
setting up redirect URLs for account locout, 7.8.5.3
SNMP monitoring of, 12.2
transport security for, 8.1.1
Access Server SDK
now named Access Manager SDK, Preface
Access System
changing to Open security mode, 8.3.2
changing to Simple transport security, 8.3.3
changing transport security modes for, 8.3
log in, 1.3.1.2
transport security for, 8.1.1, 8.1.1
AccessGate
changing transport security modes for, 8.3
logging, 10.1
transport security for, 8.1.1
Active Directory, 7.5.6.1
Access Server with LDAP, C.3
ADSI configuration with Oracle Access Manager, B.1
authentication, A.2
authorization, A.2
backward compatibility, A.6
configuring with LDAP, C
credential_mapping plug-in, A.3
defining directory server profiles, A.1.1
deleting a disjoint searchbase, A.1.2.1
deploying with, A
disjoint searchbases for, A.1.2
group-search read operations, A.1.3
increasing the length of the SAM account name, Preface
LDAP authentication with ADSI, C.5
Microsoft Global Catalog, C.1
.NET features, A.7
ObMyGroups action attribute, A.2.3
parent-child authentication, A.2.1
parent-child authorization, A.2.2
Policy Manager setup with LDAP, C.2
required schema modifications, 3.8
setting up profiles and searchbases, A.1
timeouts for LDAP, C.4
troubleshooting, A.8
what's new in this release, Preface
administration
preparing for, 1
administrators
about Identity administrators, 2.1
administrators with access to all attributes, 4.4.8
configuring, 2, 2.2
delegated administration
adding delegated administrators, 2.3.3
configuring, task overview, 2.3.1
models of, 2.3.2
delegated administrators, 2.3
Delegated Identity Administrators, 2.1, 2.1
deleting administrators, 2.2.1
Identity System, 2
Master Administrators, 2.1, 2.1
Master Identity Administrators, 2.1, 2.1
substitute administrators, 2.3.4
assuming another administrator's identity, 2.3.4
temporarily granting your rights to another person, 2.3.4
ADSI, 7.5.6.1
bind mechanisms for the Access Server, B.3.1
bind mechanisms for the Identity Server, B.2.3
configuration files, B.2.4, B.3.2
configuration for Access System, B.3
configuring for, B
configuring for the Access System, B.7
configuring for the Identity System, B.4
mixed ADSI and LDAP configuration, B.2.2
pageSize parameter, B.8
troubleshooting, B.9
Anonymous access, 4.4.4
ANR, D.1
attributes
class attribute, 3.2
selecting, 3.3.1
class attributes for template object classes, 3.3.1
configuring, 3.6.1, 3.8
configuring lists of radio buttons, check boxes, and so on, 3.8.1
configuring lists of values using directory queries (filters), 3.8.1
data types, 3.6.2
binary, 3.6.2
distinguished name, 3.6.2
integer, 3.6.2
postal address, 3.6.2
string, 3.6.2
telephone, 3.6.2
derived
about, 3.9
adding to a User Manager tab, 3.9.2
caveats, 3.9
example of, 3.9.1
display names, localing, 3.8.2
display types, 3.6.4
boolean, 3.6.4
check box, 3.6.4
date, 3.6.4
email, 3.6.4
filter builder, 3.6.4
GIF image, 3.6.4
GIF image URL, 3.6.4
location, 3.6.4
media, 3.6.4
multi-line text, 3.6.4
None, 3.6.4
numeric string, 3.6.4
object selector, 3.6.4
postal address, 3.6.4
radio button, 3.6.4
selection menu, 3.6.4
single line text, 3.6.4
S/MIME certificate, 3.6.4
filters to use with searches, 3.8.4
giving users access to the class attribute, 3.3.1
how used in Identity applications, 3.1
lists, defining, 3.8.1.2
localizing, 3.8.2
password, 3.6.3.5
provisioning (template) attributes, 3.1.5
rules for static lists of attributes, defining, 3.8.1.1
search
attribute used as the key in searches, 3.2
based on finding the same value in different attributes, 3.9
dynamic, 3.8.7.5
dynamic with multiple values, 3.8.7.7
dynamic with wild cards, 3.8.7.6
returning results that match an attribute on a profile page, 3.8.7.5
returning targets that match the DN of the logged-in user, 3.8.7.4
search key (class) attribute, 3.2
selecting what can be searched, 4.2.4
selection keys, 4.4.10
semantic types, 3.6.3
challenge, 3.6.3.5
defined during setup, 3.6.3.1
DN prefix, 3.6.3.1
full name, 3.6.3.1, 3.6.3.2
Group Dynamic Member, 3.6.3.3
Group Owner, 3.6.3.3
Group Static Member, 3.6.3.3
location coordinates, 3.6.3.4
login, 3.6.3.1
lost passwords, attributes for managing, 3.6.3.5
map, 3.6.3.6
none, 3.6.3.6
password, 3.6.3.1
photo, 3.6.3.2
preferred email address, 3.6.3.6
response, 3.6.3.5
title, 3.6.3.2
used in Group Manager, 3.6.3.3
used in profile pages, 3.6.3.2
template attributes, 3.1.5
viewing, 3.7
auditing, 11
about, 11.1
actions Identity applications, 4.7
audit database, about, 11.4.5
audit database, creating, 11.6.2.2
audit database, setting up, 11.6.2
audit reports, setting up, 11.7, 11.7
authentication events, 7.8.2.2
connecting Access and Identity Servers to the database, 11.6.2.4
Crystal Reports, 11.2.4
Crystal Reports templates, using, 11.7
Crystal repository, 11.4.6
database auditing architecture, 11.4
database auditing requirements, 11.3.1
database auditing, setting up, 11.6
diagnostics, 11.2.6
diagnostics, on-screen, 11.2.6
dynamic, 11.2.4
enabling for Access Servers, 11.2.6
enabling on Identity Servers, 11.2.6
file vs database auditing, 11.2
file-based, setting up, 11.5
formatting, 11.2.6
Global User Access Privilege Report, 11.2.6
GUI location for auditing functions, 11.2.6
Identity events to be audited, 11.2.6
master audit rule, 11.2.6
new features, Preface
OCI connection type, 11.4.4.2
ODBC data source definitions, 11.4.2
ODBC drivers, 11.4.3
Oracle Database as the audit repository, Preface
output type and amount, 11.2.5
performance considerations, 11.2.2
policy information, 11.2.3
profile information, 11.2.3
RDBMS profile configuration, 11.4.4
RDBMS profiles for, 11.2.6
RDMBS profiles for, 11.2.6
reports, types of, 11.4.6.1
security considerations, 11.2.1
SQL Server, installing, 11.6.2.1
static reports, 11.2.3
success and failure of Identity System actions, 11.2.6
authentication, Preface
auditing authentication events, 7.8.2.2, 11.4.6.1
Fast Bind for, 7.5.6.1
for ADSI, B.7, C.5
for transport security, 7.4.2, 7.7.2
monitoring authentication actions, 12.3.3
monitoring authentication plug-ins, 12.3.3, 12.3.3
not required for self-registration, 5.10
plug-in APIs, Preface
reports on authentication attempts, 9.1.2
scheme
default schemes, Preface
scheme for disjoint searchbases, 7.5.8
schemes, modifying to include a password policy, 7.8.4.1
with Active Directory, A.2
authorization, Preface, Preface
auditing authorization events, 11.4.6.1
authorization plug-ins MIB objects, 12.3.3
AzMan plug-in, D.8
for ADSI, C.5
monitoring authorization events, 12.3.3
monitoring authorization plug-ins, 12.3.3
plug-in APIs, Preface
with Active Directory, A.2
auxiliary object classes
adding to a tab, 4.2.6

B

backURL, 7.8.5.1, 7.8.5.2

C

CA certificates
importing multiple, 8.6
security
CA certificates, 8.1.2
cache
Access cache flush, caveat, 8.1.1
Access Server cache updates, 7.8.6
managing Identity Server caches, 7.3.4
Cert mode
about, 8.1
changing the Access System to, 8.3.4
installing a certificate for, 8.2.3
cert7.db, 8.1
cert8.db, 8.1
certificates
installing, 8.2.3
challenge attribute, 7.8.3.5
challenge phrase
deleting, 7.8.3.5
change attribute workflow, 5.1.6
cloning, 7.10
components
copying, 7.10
configuration data
pointing to a new directory server, 7.5.6
profile for storing, 7.5.1
configureAAAServer command, 8.3.2, 8.3.3
configureAAAServer tool, 8.1
configureAccessGate, 8.3.3
COREid
now named Oracle Access Manager, Preface
create group workflow, 5.1.6
create object workflow, 5.1.6
create user workflow, 5.1.6

D

data types, 3.6.2
binary, 3.6.2
distinguished name, 3.6.2
integer, 3.6.2
postal address, 3.6.2
string, 3.6.2
telephone, 3.6.2
data, exporting
see exporting data
database instance
adding, 7.5.6
configuring, 7.5.6.1
deleting, 7.5.7
for an LDAP profile, 7.5.6
for an RDBMS profile, 7.5.6
deactivate user workflow, 5.1.6
delegated administration
adding delegated administrators, 2.3.3
ASP model, 2.3.2.3
extranet model, 2.3.2.1
intranet model, 2.3.2.2
models of, 2.3.2
what can be delegated, 2.3.1
Delegated Identity Administrators
see also delegated administration
definition, 2.1
tasks performed by, 2.1
delete group workflow, 5.1.6
delete object workflow, 5.1.6
derived attributes
see also attributes, derived
directory server profile
creating, 7.5.2
database instance, configuring, 7.5.6.1
deleting a database instance from, 7.5.7
modifying, 7.5.4
re-running setup after modifying, 7.5.5
sharing profiles, 8.1.1
viewing, 7.5.3
directory servers
profiles for, 7.5.1
transport security changes for, 8.4
transport security for, 8.1.1
working with multiple searchbases, 7.5.8
disjoint searchbases, 7.5.8
display types
boolean, 3.6.4
check box, 3.6.4
date, 3.6.4
email, 3.6.4
filter builder, 3.6.4
GIF image, 3.6.4
GIF image URL, 3.6.4
location, 3.6.4
media, 3.6.4
multi-line text, 3.6.4
None, 3.6.4
numeric string, 3.6.4
object selector, 3.6.4, 3.8.3
password, 3.6.4
postal address, 3.6.4
radio button, 3.6.4
selection menu, 3.6.4
single line text, 3.6.4
S/MIME certificate, 3.6.4
DIT
nonoverlapping directory trees, 7.5.8
searching multiple branches of, 7.5.8

E

email
setting addresses for user feedback, 7.3.2
exporting data
see also object templates
about, 3.1.1, 6
IdentityXML actions, 6.2
limitations of, 5.3
object templates, 6.1
using a workflow, 6.2

F

failover, 7.6.1
Fast Bind, 7.5.6.1
features
new, Preface
filters
see LDAP filters
static LDAP, 3.8.7.1
static with wild cards, 3.8.7.2
usage, 3.8.7
full name, 3.6.3.2

G

genCert utility, 8.1.2, 8.3.3
GIF
data type, 3.6.2
display type, 3.6.2, 3.6.4
for photos, 4.5.1.1
display type, configuring, 3.8.8
files in the Chystal Repository database, 11.4.2
image, referencing in a file system, 4.5.1.2
image, used in a location map in a workflow, 5.11
images used in the Identity System u.i., 7.1
location coordinates semantic type, 3.6.3.4
semantic type, 3.6.3.2
semantic type for, 3.6.3.6
tab image, 4.2.1
title image, 4.3.4
globalization
see also localization
support for, Preface
Group Manager
ability to create groups, 4.5.3
about, 4.1
adding auxiliary object classes, 4.2.6
adding derived attributes to, 3.9.2
allowing users to view and modify data, 4.4.8
class attribute, 3.3.1
configuring, 4.2.8
configuring multiple languages for, 7.2
configuring objects for, 3.1
configuring search fields for, 4.2.4
configuring what is returned on a search, 4.2.5
configuring, about, 4
controlling read access to an object class via a class attribute, 3.3.1
displaying configured object classes, 3.1.4
Dynamic Members Only, 4.6.5
expanding a dynamic group, 4.9.1
Group Manager Configuration tab, 4.2
group type panels, 4.3.6
localizing, 4.2.2
My Groups, 4.2.8
My Groups tab, 4.2, 4.3.6
objects configured during installation, 3.1.3
only one tab for, 4.2.1
panels, 4.3
configuring, 4.3.4
deleting, 4.3.4
localizing, 4.3.8
ordering, 4.3.5
viewing, 4.3.3
profile pages, 4.3
reports, 4.8.1
search
starting point for searches in the DIT, 4.4
sending data to back-end systems, 6.1
subscribing to groups, 4.6.6
supported workflow types, 5.1.8
tabs
configuring, 4.2
modifying, 4.2.1
viewing, 4.2.1
View Member Profiles, 4.2.8
workflow types for, 5.1.8
groups, 4.6.5
ability to create, 4.5.3
adding members, 4.6.4
change attribute, 5.1.10
create group, 5.1.10
customize using URL parameters, 4.2.8
delete group, 5.1.10
deleting members, 4.6.3
dynamic, 4.2.8, 4.9.1
dynamic members, showing, 4.2.8
expanding a dynamic group, 4.9.1
finding, 4.6.2
Group Manager application, 1.2.1
group type panels, 4.3.6
mail server for notifications, 7.3.3
managed in the Group Manager, 1.2.1
managed in the Identity System, 1.2
managing, 4.6.1
membership determined by an LDAP filter, 4.9.1
nested, 4.2.8
nested members, showing, 4.2.8
static, 4.2.8
static members, showing, 4.2.8
subscribing to, 4.6.5, 4.6.6
you are a member of, 4.2.8
you are an administrator of, 4.2.8

H

header panels, 4.3.2
help, 1.3.4

I

Identity applications
see User Manager
about, 1.2.1.2
configuration, examples of, 4.5
configuring
see objects and attributes
example of configuring, 4.5
purpose of, 1.2.1.2
tabs, 4.2, 4.2.1
modifying, 4.2.1
Identity Server
adding, 7.4.2
auditing, 9.1
auditing, configuration, 11.6.3
cache flush caveat, 8.1.1
caches, 7.3.4
configuration, 7.3
definition, 1.2.1
deleting parameters, 7.4.4
email address for feedback, setting, 7.3.2
Group Manager application, 1.2.1
installation, 1.2.1.1
logging, 10.1
mail server alerts, configuring, 7.3.3
managing, 7.4
managing from the command line, 7.4.5
modifying, 7.4.3
modifying settings, 7.3
multiple, setting up, 7.4.1
Organization Manager application, 1.2.1
session timeout setting, 7.3.1
settings, configuring, 7.3
SNMP monitoring of, 12.2
transport security
changing, 8.2
User Manager application, 1.2.1
viewing, 7.4.3
viewing settings, 7.3
WebPass plug-in, 1.2.1
who configures, 2.1
Identity System
administration, about, 1.2
administrators, 2
ADSI configuration, B.2
components, 1.2.1
configuration, about, 1.2
configuration, overview, 1.2.1.2
configuring, Preface
configuring the Access Manager SDK, 7.9
configuring, about, 1.2.1.2
Identity Server, 1.2.1
installation summary, 1.2.1.1
login, 1.3.1.1
managing, about, 1.2.1.3
transport security
changing, 8.2
transport security for, 8.1.1, 8.1.1
WebPass, 1.2.1
impersonation
enabling, D.4
installation, 7.10

L

languages
see localization
LDAP
data
configuring for Oracle Access Manager, 3
process overview, 3.1.2
read and write access to, 4.4.8
viewing on a profile page, 3.1
filters
advanced, 4.4.7
for searches, 4.4.6
query builder, 4.4.6
objects in a workflow, 5.1.7
objects, on a panel, 4.3.1
profiles, 7.5.1
redirecting client requests, 7.5.6.1
referrals, 7.5.6.1, 7.5.6.1
lists
about, 3.8.1
defining, 3.8.1.2
localization, 3.8.2
about, 7.2
attribute display names, 4.3.8
enabling languages, 7.3.5
language evaluation order, 7.2.2
managing multiple languages, 7.3.5
of administrative pages, 7.2.1
of panels, 4.3.4
of search results, 4.2.5
overview, 7.2
panel display names, 4.3.7
reports, 4.8.2
tabs, 4.2.2
log out
from the Identity System, 1.3.6.1
logging
about, 10.1
automatic updates, Preface, Preface, Preface, Preface, Preface, Preface, Preface, Preface
autosync, 10.5
Buffer_Size, 10.6
configuration file, 10.2
comments in, 10.2.3.1
modifying, 10.2.3
names, 10.2.2
order of elements, 10.4.1
order of evaluation of entries, 10.5.1
parameters, 10.6
structure, 10.4
configuring in the Identity System Console, 10.7
default configuration file, 10.2.3.1
File_Name, 10.6
levels, 10.5
ListName, 10.6
log levels, about, 10.1
log levels, table of, 10.1.1
log output destinations, 10.3
log writers, 10.3
Log_Level, 10.6
Log_Status, 10.5, 10.6
Log_Threshold_Level, 10.5
Log_Writer, 10.6
Max_Rotation_Size, 10.6
Max_Rotation_Time, 10.6
new features in this release, Preface, Preface, Preface, Preface
order of elements in the configuration file, 10.4.1
output, where sent, 10.3
SNMP, 12.7
sychronizing the configuration file and the Identity System Console settings, 10.5
what's new in this release, Preface, Preface, Preface
when a server restart is needed, 10.5.1.1
where log data is sent, 10.3
xmlns, 10.6
login, 1.3.1, 1.3.1
to the Access System, 1.3.1.2
to the Identity System, 1.3.1.1
logout, 1.3.6
lost password management
about, 7.8.3
challenge phrases and responses, 7.8
configuring, 7.8.3.5
deleting challenge phrases, 7.8.3.5
enabling, 7.8.3.5
new features in this release, Preface
overview of configuring, 7.8.3
presenting multiple challenges phrases, 7.8.3.2
redirection to a password reset page, 7.8.5.1
redirection URL, 7.8.2.2
semantic types for challenge and response, 3.6.3.5
style sheets for lost password management, 7.8.2.3
style sheets for password reset pages, 7.8
URL, syntax, 7.8.3.1
viewing policies for, 7.8.3.5

M

managing subscriptions, 4.6.5
Master Administrator
definition, 2.1
tasks performed by, 2.1
Master Identity Administrators
definition, 2.1
tasks performed by, 2.1
monitoring
see SNMP
MTHML, 7.3.3
My Groups, 4.2.8

N

name changes, Preface
names, new, Preface
.NET, A.7
about, D
adding attributes dynamically, D.2.1
adding attributes for a group, D.2.2
ambiguous names, resolving, D.1
ANR, D.1
dynamically linked auxiliary classes, D.2
enabling Fast Bind, D.3
enabling impersonation, D.4
Integrated Windows Authentication, D.5
integrating the Security Connector for ASP.NET, D.10
integration with AzMan, D.8
integration with Smart Card authentication, D.9
managed code and helper classes, D.7
Microsoft Resources, D.12
troubleshooting, D.11
with Access System password management, D.6
NetPoint
now named Oracle Access Manager, Preface
NetPoint SAML Services
now named Oracle Identity Federation, Preface
new features
auditing to Oracle Database, Preface
logging, Preface, Preface, Preface, Preface
new features in this release, Preface, Preface
Novell Directory Server
requirements for configuration, 3.8

O

object class kind, 3.2
object class type, 3.2
Object Class(es) field, 4.2.1
object classes
about, 3.1
auxiliary, 3.1.4
structural, 3.1.4
template object classes, 3.1.5
Object Selector display type
search filters for, 3.8.3
object templates
see also template objects
configuration, 6.5
elements in the file, 6.5.3
file, example of, 6.5.3
file, format of, 6.5.1
object template file, 6.5.1
objects
see also object classes
adding object classes, 3.4
attribute used as the key in searches, 3.2
auxiliary object classes, 3.1.4, 3.4.1
changing the structural object class, 3.3.2
class attribute, 3.2
selecting, 3.3.1
class attributes, about, 3.6
class kind, 3.2
class type, 3.2
class types, 3.1.6
configured at installation, 3.1.3
defaults configured at installation, 3.1.3
deleting object classes, 3.5
displayed on profile pages, 3.1
enabling users to view and modify, about, 3
generic, 3.1.6
group, 3.1.6
in a workflow, 5.1.7
inheritance of, 3.1.4
location, 3.1.6
mix-in, 3.1.4
modifying, 3.3
object templates, 6.1
person, 3.1.6
process for configuring, 3.1.2
template object classes, 3.1.5
template objects, 3.1.1
note about modifying, 6.2
template objects, about, 6
template objects, how used in the Identity System, 3.1.5
used for provisioning, 3.1.1
viewing, 3.2
oblixAdvancedGroup, 4.6.5
oblixpppcatalog.lst, 5.5.3.6
obtaining information from the Identity Server, 1.2.1
ois_cert.pem, 8.1.2
ois_chain.pem, 8.1.2
ois_key.pem, 8.1.2
Open mode
about, 8.1
Oracle Access Manager
formerly NetPoint or COREid, Preface
introduction, Preface, 1.3
Oracle Identity Federation, Preface
formerly SHAREid, Preface
Oracle Virtual Directory Server, 7.5.2
Org. Manager
about, 4.1
adding auxiliary object classes, 4.2.6
adding derived attributes to, 3.9.2
adding tabs to, 4.2.3
allowing users to view and modify data, 4.4.8
arbitrary tabs in, 4.2
change attribute, 5.1.10
class attribute, 3.3.1
configuring multiple languages for, 7.2
configuring objects for, 3.1
configuring search fields for, 4.2.4
configuring what is returned on a search, 4.2.5
configuring, about, 4
container limits, 4.9.4
container limits, deleting, 4.9.4.2
controlling read access to an object class via a class attribute, 3.3.1
copying container limits across domains, 4.9.4.1
create object, 5.1.10
definition, 1.2.1
delete object, 5.1.10
deleting a tab, 4.2.9
displaying configured object classes, 3.1.4
header panels, 4.3.2
localizing, 4.2.2
location tab, 4.5.2
modifying a container limit, 4.9.4.2
multiple tabs for, 4.2.1
objects configured during installation, 3.1.3
ordering a tab, 4.2.10
Org. Manager Configuration tab, 4.2
panels
configuring, 4.3.4
deleting, 4.3.4
localizing, 4.3.8
viewing, 4.3.3
reports, 4.8.1
search
starting point for searches in the DIT, 4.4
sending data to back-end systems, 6.1
supported workflow types, 5.1.8
tabs, 3.1.4
configuring, 4.2
modifying, 4.2.1
viewing, 4.2.1
workflow types for, 5.1.8
out of office flag, 5.5.4

P

panels, 4.3.4
about, 4.3
adding, 4.3.4
deleting, 4.3.4
group type panels, 4.3.6
adding, localizing, modifying , deleting, 4.3.7
modifying, 4.3.4
ordering, 4.3.5
using objects on a panel, 4.3.1
viewing, 4.3.3
parameter files, E
about, E
password policies
see passwords
passwords, 3.6.4
see also lost password management
challenge phrases, deleting, 7.8.3.5
changing the Access Server password, 8.7
configuring, 7.8.2
configuring policies for, about, 7.8
expiration notification, 7.3.3
for Access Server security, 8.7
for transport security, changing, 8.5
Global Pass Phrase, 8.2.2
lost password management
new features, Preface
lost password management attributes, 7.8.3.5
new features in this release, Preface
notification of expiration, 7.3.3
order of password policy evaluation, 7.8.1
password policies
account lockout duration, 7.8.2.3
account lockout URL, 7.8.2.3
applying to resources that the Access System protects, 7.8.4
configuring the default policy, 7.8.2.2
creating, 7.8.2.3
custom account lockout redirect URL, 7.8.2.2
defaults for, 7.8.2.2
deleting, 7.8.2.5
enabling, 7.8.2.3
expiry notification, 7.8.2.3
expiry warning URL, 7.8.2.3
externally provided validation rules, 7.8.2.3
for a specific domain, 7.8.2.3
forcing a change after an administrator reset, 7.8.2.3
implementing in the Access System, 7.8.4
including in an authentication scheme, 7.8.4.1
lost password redirect URL, 7.8.2.2
minimum age, 7.8.2.3
minimum length, 7.8.2.3
minimum number of numeric or nonalphanumeric characters, 7.8.2.3
minimum number of upper or lowercase characters, 7.8.2.3
modifying, 7.8.2.4
new in this release, Preface
number of allowed login attempts, 7.8.2.3
password change redirect URL, 7.8.2.2
password expiration warning URL, 7.8.2.2
password history, 7.8.2.3
restricting to a domain, 7.8.2.3
style sheets for the lost password notification page, 7.8.2.3
style sheets for the password reset page, 7.8.2.3
successful authentication events, 7.8.2.2
unsuccessful authentication events, 7.8.2.2
validity period, 7.8.2.3
viewing, 7.8.2.1
Password semantic type, 3.6.3, 3.6.3.1, 6.5.2
password.xml, 8.3.3
required semantic type for the person object class, 3.6.3.1
semantic types for lost password management, 3.6.3.5
Sun iPlanet restrictions, 5.10
transport security passwords, 8.5
PEM files, 8.1.2
photos
default image, 4.5.1.3
displaying in user profiles, 4.5.1
importing to the directory, 4.5.1.1
referencing in a file system, 4.5.1.2
plug-ins
for Active Directory, A.3
logging, 10.1
policy data
profile for storing, 7.5.1
policy domain
default, Preface
Policy Manager
changing to Cert mode, 8.3.4
changing to Open mode., 8.3.2
changing to Simple mode, 8.3.3
location for configuration and user data, 7.5
logging, 10.1
transport security for, 8.1.1
Policy Manager API, Preface
preparing for administration, 1
Procedure
Access Manager SDK
To configure the Access Manager SDK, 7.9
Active Directory
To add a disjoint searchbase for the Disjoint_domain (AD), A.1.2
To configure group-search read opertaions on Windows 2003, A.1.3
To configure SSO with the Identity or Access System (AD), A.4
To configure the credential_mapping plug-in (AD), A.3
To enable LDAP authentication for the Access Server, C.5
To set up additional directory server profiles, A.1.1
To set up additional directory server profiles (AD), A.1.1
To set up the Access Server for Active Directory, C.3
To set up the Policy Manager for Active Directory, C.2
To specify Access Server failover after installation, C.4
administrators
To assign or remove a substitute, 2.3.4
To assume an identity, 2.3.4
To delegate administration, 2.3.3
To delete an administrator, 2.2.1
To revert to your own identity, 2.3.4
To specify Master Administrators and Master Identity Administrators, 2.2
ADSI
To associate an ADSI agent with every domain, B.2.2
To enable ADSI for additional directory profiles, B.6
To enable LDAP authentication for the Access Server, B.7
audits, logs, and reports
To add an SNMP Manager directly after general parameters, 12.5
To add an SNMP trap destination in silent mode, 12.5
To add or delete a log-handler definition, 10.7, 10.7
To add or delete log-handler definitions, 10.7
To change the formatting of a report, 4.8.1
To configure a collection of SNMP statistics, 12.4
To configure a report, 4.8.1
To configure collection of SNMP statistics, 12.4, 12.4
To configure file-based auditing for an Access Server, 11.5
To configure file-based auditing for an Identity Server, 11.5
To configure general parameters first, 12.5
To configure the SNMP Agent and trap destinations, 12.5, 12.5
To connect Crystal Reports to the audit database, 11.7
To copy the audit schema to the audit database host, 11.6.2.3
To copy the Oracle Access Manager-specific Crystal resources, 11.7
To create a primary RDBMS instance, 11.6.2.4
To create an ODBC data source definition (Windows), 11.6.2.4
To create an ODBC data source definition to connect Crystal Reports to the Oracle/Crystal Repository, 11.7
To create an RDBMS profile, 11.6.2.4
To create and manage user access privilege reports, 11.6.3
To create the audit database (Oracle Database on Linux), 11.6.2.2
To create the audit database (Oracle Database on Windows), 11.6.2.2
To create the audit database (SQL Server or Windows), 11.6.2.2
To delete an SNMP Manager directly after adding one, 12.5
To delete an SNMP trap destination in silent mode, 12.5
To delete reports, 4.8.2
To edit orMap.ini, 11.7
To enable and configure auditing for each Access Server, 11.6.3
To enable and configure auditing for each Identity Server, 11.6.3
To install Crystal Reports, 11.7
To install the patch for Crystal Reports, 11.7
To localize reports, 4.8.2
To make the RDBMS profile visible (Linux), 11.6.2.4
To make the RDBMS profile visible (Windows), 11.6.2.4
To modify audit output formatting for the Access System, 11.6.3
To modify audit output formatting for the Identity System, 11.6.3
To modify the log threshold from the Identity System Console, 10.7, 10.7, 10.7, 10.7
To set or modify auditing policies, 4.7.2
To specify global Identity System events and profile attributes for audit, 11.6.3
To specify User, Group, or Org. Manager events for audit, 11.6.3
To upload and verify the audit schema (Oracle Database on Windows or Linux, 11.6.2.3, 11.6.2.3
To upload the audit schema (SQL Server on Windows), 11.6.2.3, 11.6.2.3
To verify that all Identity Servers can record data to the audit database (Linux or Solaris), 11.6.3
To verify that all Identity Servers can record data to the audit database (Windows), 11.6.3
To verify the audit schema (SQL Server on Windows), 11.6.2.3
To view auditing policies, 4.7.1
To view or modify log-handler definitions, 10.7, 10.7, 10.7, 10.7
To view or modify reports, 4.8.2
basics
To log in to the Access System, 1.3.1.2
To log in to the Identity System, 1.3.1.1
To use the Query Builder, 4.4.6
To use the search function, 1.3.2.2
Identity applications
To add a derived attribute to an application tab, 3.9.2
To add a disjoint searchbase for a disjoint domain, 4.4.5
To add a tab, 4.2.3
To add an auxiliary or template object class to a tab, 4.2.6
To add group members, 4.6.4
To add, modify, or delete a Group Type panel, 4.3.7
To build a complex filter, 4.4.7
To change the formatting of a report, 4.8.1
To change the order in which panels are displayed, 4.3.5
To configure a report, 4.8.1
To configure photos for importing to a directory, 4.5.1.1
To configure the header panel, 4.3.2
To copy container limits from one domain to another, 4.9.4.1
To create or add a panel, 4.3.4
To create, view, and modify localized tab configuration, 4.2.2
To delete a container limit, 4.9.4.2
To delete a disjoint searchbase, 4.4.5
To delete a tab, 4.2.9
To delete group members, 4.6.3
To delete reports, 4.8.2
To expand a dynamic group, 4.9.1
To import photos to the directory, 4.5.1.1
To localize a panel, 4.3.4
To localize attribute display names, 4.3.8
To localize panel display names, 4.3.7
To localize reports, 4.8.2
To localize search results, 4.2.5
To modify a container limit, 4.9.4.2
To modify attributes specific to the User, Group, or Org. Manager, 4.3.8
To order the tabs in the Organization Manager, 4.2.10
To reference photos that reside in a file system, 4.5.1.2
To select what users see in My Groups and View Member Profiles, 4.2.8
To set or modify attribute permissions, 4.4.9
To set or modify auditing policies, 4.7.2
To set the globalparams.xml file, 4.9.2
To set the searchbase, 4.4.4
To specify what attribute can be used in a search, 4.2.4
To subscribe to a group, 4.6.6
To subscribe to multiple groups, 4.6.6
To use the Query Builder, 4.4.6
To view a group, 4.6.2
To view a panel in an end user Identity System application, 4.3.3
To view and add container limits, 4.9.4
To view auditing policies, 4.7.1
To view group members, 4.6.2
To view Group Type panels, 4.3.6
To view or modify a panel's configuration, 4.3.4
To view or modify reports, 4.8.2
To view or modify tab configuration information, 4.2.1
To view the search result attributes, 4.2.5
Identity System
To change a style, 7.1.5
To change a style name, 7.1.4
To delete a custom style, 7.1.6
To deploy a style, 7.1.3
To set the default style, 7.1.7
To view currently configured styles, 7.1.1
.NET
To add attributes to a Group Profile panel, D.2.2
To configure ANR in Identity System panels, D.1.2.2
To configure the Access System to use Fast Bind, D.3
To create an IWA authentication scheme in the Access System, D.5.3
To enable IWA on the machine hosting the WebGate, D.5.1
To modify an AccessGate through the Access System Console, D.5.2
To specify additional auxiliary object classes in the User Manager, D.2.1
To test IWA, D.5.4
To update configuration data, D.1.2.1
To use ANR in a search, D.1.2.4
objects
To add a derived attribute to an application tab, 3.9.2
To add an object class, 3.4
To change user or group structural object classes, 3.3.2
To configure a derived attribute, 3.9.1
To configure a GIF image display type, 3.8.8
To configure an attribute, 3.8
To create a filter, 3.8.4
To create a static filter, 3.8.7.1
To create a static search filter using a wild card, 3.8.7.2
To create, view, or modify localized attribute display names, 3.8.2
To define a list, 3.8.1.2
To define a rule, 3.8.1.1
To delete an auxiliary object class, 3.5
To modify an object class type, 3.3
To select the class attribute, 3.3.1
To view an application-specific Modify Attribute page, 3.7
To view configured object classes, 3.2
To view the Modify Attribute page from the System Console, 3.7
passwords, 7.8.2.5
To configure lost password management for a password policy domain, 7.8.3.5
To configure the Lost Password Management attributes, 7.8.3.5
To create the default password policy, 7.8.2.2
To enable or disable Lost Password Management, 7.8.3.5
To enter a password change redirect URL, 7.8.5.1
To modify a password policy's parameters, 7.8.2.4
To modify an authentication scheme to include a password policy, 7.8.4.1
To set up a default password expiry warning redirect URL, 7.8.5.2
To set up the account lockout URL, 7.8.5.3
To view a list of password policies, 7.8.2.1
To view lost password policies, 7.8.3.5
servers
To add a style, 7.1.2
To add or modify a database instance for an LDAP directory server profile, 7.5.6.1
To add or modify a database instance for an RDBMS profile, 7.6.2
To add or modify an RDBMS profile, 7.6.1
To change a style, 7.1.5
To change a style name, 7.1.4
To configure a mail server, 7.3.3
To configure the length of a user's Identity System session, 7.3.1
To create a directory server profile, 7.5.2
To customize email destinations, 7.3.2
To delete a custom style, 7.1.6
To delete a directory server instance for an LDAP directory server profile, 7.5.7
To delete an Identity Server's parameters, 7.4.4
To deploy a style, 7.1.3
To manage a language, 7.3.5
To modify an LDAP Directory Server Profile, 7.5.4
To reconfigure the Access Server, 7.5.5.3
To rerun Identity System setup, 7.5.5.1
To rerun Policy Manager setup, 7.5.5.2
To set the default style, 7.1.7
To view an LDAP directory server profile, 7.5.3
To view currently configured styles, 7.1.1
To view Identity System details, 7.3.4
To view or modify an Identity Server's parameters, 7.4.3
To view or modify server settings, 7.3
transport security
To change the certificate password for the Access System, 8.5
To change the certificate password for the Identity System, 8.5
To change the Identity Server transport security mode, 8.2
To change the transport security mode password, 8.7
To change to Cert security mode, 8.3.4
To change to Open security mode, 8.3.2
To change to Simple security mode, 8.3.3
To change transport security between Access Server and the directory server, 8.4
To change transport security between the Identity Server and directory server, 8.4
To change transport security to SSL between Policy Manager and the directory server, 8.4
To install the signed certificate for Cert mode, 8.3.4
WebPass
To add a WebPass, 7.7.2
To change the transport security mode password, 7.7.4
To disassociate an Identity Server from a WebPass, 7.7.6
To modify a WebPass, 7.7.2
To modify a WebPass through the command line, 7.7.4
To reconfigure transport security mode through the command line, 7.7.4
To remove a WebPass, 7.7.3
To view a configured WebPass, 7.7.1
workflows
To access the Workflow Definition applet, 5.3
To add roles to a workflow definition, 5.9.4
To allow a user to perform an asynchronous operation, 5.6
To archive a workflow, 5.7.6
To associate a subflow with a workflow, 5.4.1
To associate an Out of Office attribute with a semantic type, 5.5.4
To begin a new workflow definition, 5.3.1
To configure a role, 5.9.4
To configure email notification for workflow steps, 5.5.2
To configure language-specific workflow panel information, 5.8.8
To configure workflow attribute properties, 5.3.4
To copy a workflow as a starting point for a new workflow, 5.8.2
To copy a workflow as an alternative to modifying it, 5.8.2
To create a self-registration workflow, 5.10
To create a subflow, 5.4
To create this (example) workflow, 5.3.9
To define a self-registration workflow using the QuickStart tool, 5.2.1
To define a workflow target, 5.3.2
To define a workflow using the QuickStart tool, 5.2
To define subsequent steps in a workflow, 5.3.5
To define the first step in a workflow, 5.3.3
To delete a workflow, 5.8.4
To delete requests, 5.7.7
To enable a workflow, 5.3.7
To enable time-based escallation, 5.5.5
To export workflows, 5.8.5
To find a workflow ticket, 5.7.2
To invoke a change attribute workflow, 5.7.1
To lock or unlock a ticket, 5.7.8
To make use of the Out of Office flag, 5.5.4
To modify a workflow, 5.8.3
To modify a workflow panel, 5.8.7
To modify oblixpppcatalog.lst, 5.5.3.6
To modify the workflow parameter files, 5.5.5
To monitor a workflow, 5.7.5
To preload the User, Group, and Organization Managers, 5.6.1
To prepare a workflow step for dynamic participants, 5.5.3.6
To process a workflow ticket, 5.7.2
To reactivate a deactivated user, 5.7.4
To run a workflow in Group Manager, 5.3.8
To select attributes available for a workflow step, 5.3.4
To specify a surrogate, 5.5.4
To test a workflow, 5.3.8
To view and export a workflow summary, 5.8.1
To view current workflow panel settings, 5.8.6
To view language-specific workflow panel information, 5.8.8
Process overview
A Create User workflow example, 5.1.12
Creating and using a Create User workflow, 5.1.6.2
Using IWA authentication, D.5
profile pages, 4.3

Q

Query Builder
about, 4.4.6
advanced filters, 4.4.7
QuickStart tool, 5.2, 5.2
example, 5.2.1

R

RDBMS profile
adding, 7.6.1, 7.6.1
database instance for, 7.6.2
database instance for, adding, 7.6.2
modifying, 7.6.1
reactivate user workflow, 5.1.6
read permission, 4.4
realms, 7.5.8
reporting, 9
see also SNMP
reports
attributes not viewable via an Identity application, 4.8
ResourceFilterSerachScope, 4.9.2
response attribute, 7.8.3.5
rules
about, 3.8.1
defining, 3.8.1.1
usage, 3.8.7

S

SAMAccountName, Preface, A.6
schema data
configuring, 3.1.2
search, 1.3.2.2
see also attributes, search
aggregating search results, 1.3.3
basic, 1.3.2.2
changing the scope of a search, 4.9.2
defining search filters, 3.8.4
filters, 4.4.6
dynamic, 3.8.7.5
dynamic with multiple values, 3.8.7.7
dynamic with wild cards, 3.8.7.6
for Object Selector display type, 3.8.3
static, 3.8.7.1
static with multiple targets, 3.8.7.3
static with wild cards, 3.8.7.2
substitution syntax, 3.8.7.4
finding data not viewable in an Identity application, 4.8
finding users at the same level of the DIT as the logged in user, 3.8.7.4
for group members, 4.6.2
for multiple branches of the DIT, 4.4.5
for multiple targets, 3.8.5, 3.8.7.3
levels of the DIT to search, 4.9.2
number of levels of the DIT to include, 4.9.2
results, localizing, 4.2.5
returning results that match an attribute on a profile page, 3.8.7.5
scope, 4.9.2
search results attributes, 4.2.5
search results, configuring, 4.2.5
searchbase
about, 4.4.1
guidelines for setting, 4.4.2
setting, 4.4.4
selecting items returned on a search, 1.3.3
selecting what attributes are returned, 4.2.5
setting the searchbase, 4.4.2
substitution syntax for, 3.8.7.4
via the selector, 1.3.3
working with multiple search bases, 7.5.8
searchbase
about, 4.4.1
configuring multiple searchbases, Preface
deleting, A.1.2.1
disjoint, 4.4.5
disjoint searchbases for Active Directory, A.1.2
for multiple branches of the DIT, 4.4.5
guidelines for setting, 4.4.2
multiple, Preface
setting, 4.4.4
setting for a group, 4.4.4.1
security
see also transport security
Selector, 3.8.3
self registration, 4.4.4
self registration workflow, 5.1.6
semantic type
challenge, 3.6.3.5
full name, 3.6.3.1
group dynamic member, 3.6.3.3
group owner, 3.6.3.3
group static member, 3.6.3.3
login, 3.6.3.1
map, 3.6.3.6
none, 3.6.3.6
password, 3.6.3.1
photo, 3.6.3.2
preferred email address, 3.6.3.6
response, 3.6.3.5
title, 3.6.3.2
session timeout, 7.3.1
setup
re-running manually, 7.5.5
setup_accessmanager, 8.1
setup_ois, 8.1
setup_ois command, 8.2.2
setup_ois utility, 8.2.3
SHAREid
now named Oracle Identity Federation, Preface
Simple mode
about, 8.1
single sign-on
configuring for Active Directory, A.4
see also the Oracle Access Manager Access Administration Guide
single sign-on
SMTP server configuration, 7.3.3
SNMP, 12
about SNMP monitoring, 12.2
Access Server MIB objects, 12.3.3
Access Server traps, 12.3.3
Access System Directory Server MIB objects, 12.3.3
agent, about, 12.2.1
agents, destinations for, 12.5
authentication plug-ins MIB objects, 12.3.3
configuration settings, 12.6
configuring, 12.4
data, destinations for, 12.5
destinations for agents and traps, 12.5
disabling monitoring, 12.4
enabling monitoring, 12.4
event traps, 12.2
Identity Event API MIB objects, 12.3.2
Identity Server MIB Objects, 12.3.2
Identity Server traps, 12.3.2
Identity System directory MIB objects, 12.3.2
logging for, 12.7
Management Information Base, 12.3
messages, 12.8
MIB hierarcy, illustration of, 12.3
MIB index fields, 12.3.1
monitoring, disabling, 12.4
monitoring, enabling, 12.4
Netstat vs SNMP values, 12.9
network management station, 12.1
NMS, use in SNMP monitoring, 12.1
number of live connections, 12.9
obscoreboard_params.xml, 12.6
Oracle Access Manager MIB, 12.3
polling, 12.2
polling interval, 12.4
prerequisites, 12.1
request queue MIB objects, 12.3.3
shutdown interval, 12.10
statistics, collecting, 12.4
traps, 12.2
traps, destinations for, 12.5
version supported, 12.2
styles
adding, 7.1.2
adding a custom style directory, 7.1.2
changing, 7.1.4
configuring, 7.1
configuring for multiple languages, 7.1.2
deleting, 7.1.6
deploying, 7.1.3
directories for styles, 7.1.2
setting the default, 7.1.7
viewing, 7.1.1
subflows
about, 5.1.12
substitution syntax, 3.8.7.4, 5.3.2
synchronization, 7.10

T

Tab Filter field, 4.2.1
tabs, 1.3.2.1, 3.1.4
adding auxiliary and template object classes, 4.2.6
adding to Org. Manager, 4.2.3
configuring, 4.2
deleting, 4.2.9
localizing, 4.2.2
modifying, 4.2.1
Object Class(es) configuration field, 4.2.1
ordering, 4.2.10
panels, configuring, 4.3
profile pages, configuring, 4.3
searching, 4.2.4
tab filter field, 4.2.1
viewing, 4.2.1
Task overview
Assigning dynamic participants to a workflow step, 5.5.3.6
Configuring ADSI for the Access System, B.7
Configuring ADSI for the Identity System, B.4
Configuring multi-language functionality, 7.2
Creating a plug-in or application to select dynamic participants, 5.5.3.6
Creating a workflow definition, 5.1.5
Defining a Create Location workflow, 5.11
Defining a workflow using the workflow applet, 5.3
Delegating administrators, 2.3.1
Displaying information on an application, 4.1
Enabling database auditing, 11.6
Enabling Location functionality, 4.5.2
Enabling Location functionality and users, 5.11
Enabling Oracle Access Manager servers to connect to the audit database, 11.6.2.4
Enabling surrogates, 5.5.4
Preparing for the audit database, 11.6.2
Preparing to use ANR during searches, D.1.2
Setting up an RDBMS profile, 11.6.2.4
Setting up for dynamix auxiliary classes, D.2
Setting up IWA authentication, D.5
Setting up multiple Identity Servers, 7.4.1
To configure auditing, 11.6.3
To connect Crystal Reports to the Oracle Repository, 11.7
To create a secondary RDBMS instance, 11.6.2.4
To set up audit reports, 11.7
Uploading the audit schema, 11.6.2.3
template attributes
in a workflow, 5.1.7
template objects
about, 3.1.1
classes
adding to a tab, 4.2.6
how viewed in the Identity System, 6.5.2
note about modifying, 6.2
used in workflows, 6.4
used on a panel, 4.3.1
To delete a password policy, 7.8.2.5
To set the globalparams.xml file, 4.9.2
transport security
about, 8.1
changing for the Access Server, 8.3
changing for the AccessGate, 8.3
changing for the Identity Server, 8.2
changing for the WebPass, 8.2
changing to Cert for the Access System, 8.3.4
changing to Cert mode, 8.2.3
changing to Open mode for the Access System, 8.3.2
changing to Simple for the Access System, 8.3.3
changing to Simple mode, 8.2.2
passwords, 8.5
PEM files, 8.1.2
setting between components, 8.1.1
specifying during installation, 8.1
troubleshooting, F, F
typical problems in Oracle Access Manager, F

U

user data
profile for storing, 7.5.1
user interface, 1.3.2
customizing, 7.1
navigation elements, 1.3.2
styles
see also styles
viewing, 7.1.1
User Manager
about, 4.1
adding auxiliary object classes, 4.2.6
adding derived attributes to, 3.9.2
allowing users to view and modify data, 4.4.8
class attribute, 3.3.1
configuring multiple languages for, 7.2
configuring objects for, 3.1
configuring search fields for, 4.2.4
configuring what is returned on a search, 4.2.5
configuring, about, 4
controlling read access to an object class via a class attribute, 3.3.1
definition of, 1.2.1
displaying configured object classes, 3.1.4
header panels, 4.3.2
localizing, 4.2.2
My Identity tab, 4.2
objects configured during installation, 3.1.3
only one tab for, 4.2.1
panels
configuring, 4.3.4
deleting, 4.3.4
localizing, 4.3.8
viewing, 4.3.3
profile pages, 4.3
reports, 4.8.1
sample profile page, 3.1
search
starting point for searches in the DIT, 4.4
sending data to back-end systems, 6.1
supported workflow types, 5.1.8
tabs
configuring, 4.2
modifying, 4.2.1
viewing, 4.2.1
User Manager Configuration tab, 4.2
workflow example for, 5.1.2, 5.1.2, 5.1.2, 5.1.6.2
workflow types for, 5.1.8
User Manger
panels, 4.3
users
adding
at the same level of the DIT as the logged in user, Preface, 3.8.7.4, 5.3.2
dynamically, Preface, 3.8.7.4, 5.3.2
via substitution syntax, 5.3.2
administrative, 2
authentication of, Preface
authorization of, Preface
change attribute, 5.1.10
configuring data that users see, 3
create, 5.1.10
delete, 5.1.10, 5.1.10
group membership in Group Manager, 1.2.1
Identity System sessions, 7.3.1
information typically displayed about a user, 3.1.2
LDAP attribute permissions, 4.4.9
mail server for notifications, 7.3.3
managing via User Manager, 1.2.1
modify permissions, 4.4, 4.4.9
permissions, 4.4, 4.4.9
person object class type, 3.1.6
reactivate, 5.1.10
read and write permissions, 1.2, 4.4, 4.4.9
self-registration, 1.2, 5.2.1
session timeout, 7.3.1
user applications, 4
view permissions, 4.2.1, 4.4, 4.4.9

V

VDS, 7.5.2
View Member Profiles, 4.2.8

W

WebGate
and session timeouts, 7.3.1
certificate request for, 8.1.2
changing to Cert mode, 8.3.4
changing to Open mode, 8.3.2
changing to Simple mode, 8.3.3
logging, 10.1
WebPass
adding, 7.7.2
associating with an Identity Server, 7.7.5
configuring, 7.7
definition, 1.2.1
deleting, 7.7.3
disassociating from an Identity Server, 7.7.6
install after the Identity Server, 7.7
logging, 10.1
modifying, 7.7.2
modifying from the command line, 7.7.4
setup_webpass command, 7.7.4
transport security
changing, 8.2
viewing, 7.7.1
viewing associations with Identity Servers, 7.7.5.1
who configures, 2.1
what's new in this release, Preface, Preface
workflows
about, 5.1
actions
change attribute, 5.1.10, 5.1.10, 5.1.10
create group, 5.1.10
create object, 5.1.10
create user, 5.1.10
delete group, 5.1.10
delete object, 5.1.10
delete user, 5.1.10, 5.1.10
reactivate user, 5.1.10
actions you can perform in a step, 5.1.11
actions, about, 5.1.8, 5.1.9
adding roles to, 5.9.4
Anyone role, 5.9.4
application for selecting participants, 5.5.3.6
archiving requests, 5.7.6
asynchronous operations, 5.6
committing data via, 5.3.6
copying, 5.8.2
creating a location workflow, 5.11
deactivating and reactivating users, 5.7.3
defining, 5.3.1
defining a target, 5.3.2
deleting, 5.8.4
dynamic participants, 5.1.3, 5.5.3, 5.5.3.3
overview of assigning, 5.5.3.6
dynamically assigning users to locations in the DIT, Preface
enabling, 5.3.7
end use of, 5.7
entry conditions, 5.1.9
escallation of, 5.5.5
example of, 5.1.12
example of creating, 5.3.8
example of defining, 5.3.9
examples of, 5.1.2
exporting, 5.8.5
external actions, 5.9.2
finding and processing a ticket, 5.7.2
how users access workflows, 5.1.6
illustration of create user workflow, 5.1.4
invoking, 5.7.1
localizing, 5.8.8
locking a ticket, 5.7.8
mail server for ticket processing, 7.3.3
modifying the appearance of workflow panels, 5.8.7
monitoring, 5.7.5
notifications, 5.1.9
notifying step participants, 5.5.2
Out of Office attribute, 5.5.4
out of office flag, 5.5.4
overview of creating, 5.1.5
participants, 5.1.9
performance of, 5.8.9
picking a DIT location for the object being created, 5.3.2
plug-ins for selecting participants, 5.5.3.6
pre- and post- actions, 5.9.1
pre and post processing, 5.1.9
QuickStart tool, 5.2
self-registration, 5.2.1
mail notification, 5.1.11
self-registration, creating, 5.10
sending workflow data to back-end systems, 3.1.5
starting a defintion, 5.3.1
static participants, 5.5.3.1, 5.5.3.4
step actions, 5.1.10
step actions, about, 5.1.9
steps, 5.3.5
attributes, 5.3.4
committing, 5.3.6
steps, about, 5.1.8, 5.1.9
subflows, 5.4
subflows, about, 5.1.3, 5.1.12
subflows, approving, 5.4.2
subflows, associating with a workflow step, 5.4.1
summary reports, exporting, 5.8.1
summary reports, viewing, 5.8.1
surrogate participants, 5.1.3
surrogate participants, about, 5.5.4
surrogates in, 5.5.4
target, 5.3.2
targets, 5.1.9
template objects in, 3.1.5
testing, 5.3.8
ticket routing, 5.5.3.2
tickets, about, 5.1.6.1
tickets, advanced routing, 5.5
time-based escallation, 5.5.5
type of workflows, 5.1.8
types
change attribute, 5.1.6
create group, 5.1.6
create object, 5.1.6
create user, 5.1.6
deactivate user, 5.1.6
delete group, 5.1.6
delete object, 5.1.6
reactivate user, 5.1.6
self-registration, 5.1.6
types of, 5.1.4
use of template objects in, 6.3
using the workflow applet, 5.3
viewing workflow panel settings, 5.8.6
who initiates, 5.1.1
write permission, 4.4