1 About the Connector

Oracle Identity Manager automates access rights management, security, and provisioning of IT resources. Oracle Identity Manager connectors are used to integrate Oracle Identity Manager with external, identity-aware applications. This guide discusses the connector that enables you to use SAP R/3 and SAP CUA systems as managed (target) resources of Oracle Identity Manager.

Note:

In this guide, the term target system collectively refers to both SAP R/3 and SAP CUA. Where information is specific to either SAP R/3 or SAP CUA, the name of the target system has been used.

In the account management (target resource) mode of the connector, data about users created or modified directly on the target system can be reconciled into Oracle Identity Manager. This data is used to provision (allocate) new resources or update resources already assigned to OIM Users. In addition, you can use Oracle Identity Manager to provision or update SAP R/3 or SAP CUA resources assigned to OIM Users. These provisioning operations performed on Oracle Identity Manager translate into the creation of or updates to target system accounts.

This chapter contains the following sections:

1.1 Certified Components

Table 1-1 lists certified components for the connector.

Table 1-1 Certified Components

Component Requirement

Oracle Identity Manager

You can use one of the following releases of Oracle Identity Manager:

  • Oracle Identity Manager release 9.1.0.2 BP04 and any later BP in this release track

    Note: In this guide, Oracle Identity Manager release 9.1.0.x has been used to denote Oracle Identity Manager release 9.1.0.2 BP04 and future releases in the 9.1.0.x series that the connector supports.

  • Oracle Identity Manager 11g release 1 (11.1.1.3.0) and any later BP in this release track

    Note: In this guide, Oracle Identity Manager release 11.1.1 has been used to denote Oracle Identity Manager release 11g release 1 (11.1.1) and future releases in the 11.1.1.x series that the connector supports.

  • Oracle Identity Manager 11g release 1 PS1 (11.1.1.5.0) and any later BP in this release track

  • Oracle Identity Manager 11g release 1 PS2 (11.1.1.7.0) and any later BP in this release track

  • Oracle Identity Manager 11g release 2 BP04 (11.1.2.0.4) and any later BP in this release track

    Note: In this guide, Oracle Identity Manager release 11.1.2 has been used to denote Oracle Identity Manager release 11g release 2 BP04 (11.1.2.0.4) and future releases in the 11.1.2.x series that the connector supports.

The connector does not support Oracle Identity Manager running on Oracle Application Server. For detailed information about certified components of Oracle Identity Manager, see the certification matrix on Oracle Technology Network at

http://www.oracle.com/technetwork/documentation/oim1014-097544.html

JDK

The JDK requirement is as follows:

Note: JRockit is not supported because it is incompatible with the SAP JCo libraries.

  • For Oracle Identity Manager release 9.1.0.x, use Sun/IBM JDK 1.5 or later.

  • For Oracle Identity Manager release 11.1.x, use Sun/IBM JDK 1.6 update 18 or later.

Target systems

The target system can be any one of the following:

  • SAP R/3 4.7 SP 45 (running on WAS 6.20) BASIS SP 48 or later

  • mySAP ERP 2004 (ECC 5.0 running on WAS 6.40) BASIS SP 22 or later

  • mySAP ERP 2005 (ECC 6.0 running on WAS 7.00) BASIS SP 13 or later

Note: From version 6.40 onward, SAP WAS is also known as "SAP NetWeaver."

In general:

  • SAP applications installed on the ABAP stack are supported.

  • Applications installed on the JAVA stack are not supported.

  • Some SAP applications can be installed on the ABAP+JAVA stack. While installing such an application, you specify either ABAP or JAVA as the data source. The connector supports SAP applications that use the ABAP data source.

SoD engine

If you want to configure and use the SoD feature of Oracle Identity Manager with this target system, then install the version of SAP GRC that is supported by Oracle Identity Manager:

SAP GRC versions 5.2 SP4 or later and 5.3 SP5 or later

SAP GRC Compliant User Provisioning

If you want to configure and use the Compliant User Provisioning feature of the connector, then you must also configure the Compliant User Provisioning module included in SAP GRC versions 5.2 SP4 or later and 5.3 SP5 or later.

External code

The connector works with SAP JCo 3.0. The following SAP custom code files are required:

  • sapjco3.jar version 3.0

  • Additional file for Microsoft Windows: sapjco3.dll version 3.0

    Additional file for AIX, Solaris, and Linux: libsapjco3.so version 3.0

Note: There are different distribution packages (JCo) 3.0 available for various supported platforms and processors. See, JCo documentation for more information about using JCo 3.0 packages as per your environment.


1.2 Usage Recommendation

Depending on the Oracle Identity Manager version that you are using, you must deploy and use one of the following connectors:

  • If you are using an Oracle Identity Manager release that is 9.1.0.1 or later and earlier than Oracle Identity Manager Release 9.1.0.2 BP04, then use the 9.0.4.x version of this connector.

  • If you are using Oracle Identity Manager Release 9.1.0.2 BP04 or later and earlier than Oracle Identity Manager 11g PS1 BP07 (11.1.1.5.7) with patch 16627402, then use the latest 9.1.2.x version of this connector.

  • If you are using Oracle Identity Manager 11g Release 1 PS1 BP07 (11.1.1.5.7) with patch 16627402 or later, or Oracle Identity Manager 11g Release 2 BP05 (11.1.2.0.5) with patch 16627415 or later, then use the latest 11.1.1.x version of this connector.

1.3 Certified Languages

The connector supports the following languages:

  • Arabic

  • Chinese (Simplified)

  • Chinese (Traditional)

  • Danish

  • English

  • French

  • German

  • Italian

  • Japanese

  • Korean

  • Portuguese (Brazilian)

  • Spanish

See Also:

Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager for information about supported special characters

1.4 Connector Architecture and Supported Deployment Configurations

In its basic mode of operation, the connector sets up Oracle Identity Manager as the front end for sending account creation or modification provisioning requests to either SAP R/3 or SAP CUA. While deploying the connector, you can opt for enabling either direct provisioning or request-based provisioning in Oracle Identity Manager. In direct provisioning, only Oracle Identity Manager administrators can create and manage target system resources. In request-based provisioning, users can raise requests for creating and managing their accounts. Other users designated as administrators or approvers act upon these requests.

An access policy change is the third form of provisioning operation supported by the connector. If a change in an access policy requires corresponding changes in resources provisioned to a set of users, then the required provisioning operations on the target system are automatically initiated from Oracle Identity Manager.

Account data added or modified through provisioning operations performed directly on the target system can be reconciled into Oracle Identity Manager.

Figure 1-1 shows the connector integrating SAP R/3 with Oracle Identity Manager.

Figure 1-1 Connector Integrating SAP R/3 with Oracle Identity Manager

Description of Figure 1-1 follows
Description of "Figure 1-1 Connector Integrating SAP R/3 with Oracle Identity Manager"

Figure 1-2 shows the connector integrating SAP CUA with Oracle Identity Manager.

Figure 1-2 Connector Integrating SAP CUA with Oracle Identity Manager

Description of Figure 1-2 follows
Description of "Figure 1-2 Connector Integrating SAP CUA with Oracle Identity Manager"

As shown in these figures, either SAP R/3 or SAP CUA is configured as a target resource of Oracle Identity Manager. Through provisioning operations performed on Oracle Identity Manager, accounts are created and updated on the target system for OIM Users. Through reconciliation, account data that is created and updated directly on the target system is fetched into Oracle Identity Manager and stored against the corresponding OIM Users.

Note:

The connector does not support direct administration of accounts on child systems in SAP CUA. As shown in Figure 1-2, all connector operations are performed between Oracle Identity Manager and the SAP R/3 parent system. When required, user data changes resulting from these connector operations are propagated from the parent system to the child system.

During provisioning, adapters carry provisioning data submitted through the process form to the target system. Standard BAPIs on the target system accept provisioning data from the adapters, carry out the required operation on the target system, and return the response from the target system to the adapters. The adapters return the response to Oracle Identity Manager.

During reconciliation, a scheduled task establishes a connection with the target system and sends reconciliation criteria to the BAPIs. The BAPIs extract user records that match the reconciliation criteria and hand them over to the scheduled task, which brings the records to Oracle Identity Manager.

Each record fetched from the target system is compared with SAP UM resources that are already provisioned to OIM Users. If a match is found, then the update made to the SAP record from the target system is copied to the SAP UM resource in Oracle Identity Manager. If no match is found, then the user ID of the record is compared with the user ID of each OIM User. If a match is found, then data in the target system record is used to provision an SAP UM resource to the OIM User.

Besides enabling direct integration with the target system, the connector can also be used to act as an interface with the Risk Analysis and Remediation and Compliant User Provisioning modules of SAP GRC. The target system (SAP R/3 or SAP CUA) and these two modules of SAP GRC together provide various deployment configurations. The following sections provide information about the supported deployment configurations of the connector:

1.4.1 Basic User Management

When you configure the connector for basic user management, the connector accepts provisioning data submitted through Oracle Identity Manager and propagates this data to the target system. For example, when a Create User provisioning operation is performed on Oracle Identity Manager, the outcome is the creation of an account on the target system.

Account data added or modified through provisioning operations performed directly on the target system can be reconciled into Oracle Identity Manager.

Figure 1-1 and Figure 1-2 show the architecture of the connector in this deployment configuration.

The steps performed during a provisioning operation can be summarized as follows:

  1. The provisioning operation is initiated through direct provisioning, request-based provisioning, or an access policy change.

  2. Provisioning data is sent to the target system.

  3. The required change is made on the target system, and the outcome of the operation is sent back to and stored in Oracle Identity Manager.

1.4.2 User Management with SoD

You might have the Risk Analysis and Remediation module of SAP GRC configured to implement segregation of duties (SoD) in your SAP operating environment. In this scenario, the connector can be used as the interface between Oracle Identity Manager and the SoD module. You can configure the connector so that provisioning requests sent from Oracle Identity Manager are first run through the SoD validation process of SAP GRC Risk Analysis and Remediation. Provisioning requests that clear this validation process are then propagated from Oracle Identity Manager to the target system.

Reconciliation does not involve SAP GRC Risk Analysis and Remediation. Account data added or modified through provisioning operations performed directly on the target system can be reconciled into Oracle Identity Manager.

In this guide, the phrase configuring SoD is used to mean configuring the integration between Oracle Identity Manager and SAP GRC Risk Analysis and Remediation.

Figure 1-3 shows data flow in this mode of the connector.

Figure 1-3 Data Flow During the SoD Validation Process

Description of Figure 1-3 follows
Description of "Figure 1-3 Data Flow During the SoD Validation Process"

The steps performed during a provisioning operation can be summarized as follows:

See Also:

The "Segregation of Duties (SoD) in Oracle Identity Manager" chapter in Oracle Identity Manager Tools Reference for detailed information about the provisioning process flow

  1. The provisioning operation is initiated through direct provisioning, request-based provisioning, or an access policy change.

  2. The resource approval workflow of Oracle Identity Manager sends this request to the SoD engine (SAP GRC Risk Analysis and Remediation).

  3. The SoD engine uses predefined rules to check if the entitlement assignment would lead to SoD violations. The outcome of this check is then sent back to Oracle Identity Manager.

  4. If the request fails SoD validation, then the approval workflow can be configured to take remediation steps. If the request passes SoD validation and if the approver in Oracle Identity Manager approves the request, then the resource provisioning workflow is initiated.

  5. This resource provisioning workflow can be configured to perform the SoD validation again. This is to ensure SoD compliance of the entitlement assignment immediately before the entitlement assignment is provisioned to the target system. You can also configure the SoD validation check in the resource provisioning workflow to be bypassed if this validation has been passed in the resource approval workflow.

  6. The resource provisioning workflow performs the required change on the target system, and the outcome of the operation is sent back to and stored in Oracle Identity Manager.

1.4.3 User Management with Compliant User Provisioning

Compliant User Provisioning (CUP) is a module in the SAP GRC suite. In an SAP environment, you can set up Compliant User Provisioning as the front end for receiving account creation and modification provisioning requests. In Compliant User Provisioning, workflows for processing these requests can be configured and users designated as approvers act upon these requests.

Note:

In this guide, the phrase configuring Compliant User Provisioning has been used to mean configuring the integration between Oracle Identity Manager and SAP GRC Compliant User Provisioning.

In your operating environment, the Compliant User Provisioning module might be directly linked with the Risk Analysis and Remediation module. In other words, provisioning requests are first sent from Compliant User Provisioning to Risk Analysis and Remediation for SoD validation. Only requests that clear the validation process are implemented on the target system. In this scenario, it is recommended that you do not configure the SoD feature of the connector.

Reconciliation does not involve SAP GRC Compliant User Provisioning. Scheduled tasks on Oracle Identity Manager fetch data from the target system to Oracle Identity Manager.

Figure 1-4 shows data flow in this mode of the connector.

Figure 1-4 Connector Integrating SAP GRC Compliant User Provisioning with Oracle Identity Manager and the Target System

Description of Figure 1-4 follows
Description of "Figure 1-4 Connector Integrating SAP GRC Compliant User Provisioning with Oracle Identity Manager and the Target System"

The following is the detailed sequence of steps performed during a provisioning operation:

  1. The provisioning operation is initiated through direct provisioning, request-based provisioning, or an access policy change.

  2. A BAPI is run on the target system to determine one of the following:

    • For a Create User operation, if the BAPI determines that the user exists on the target system, then an error message is displayed. If the user does not exist, then a request is created out of the provisioning data and sent to SAP GRC Compliant User Provisioning.

    • For a Modify User operation, if the BAPI determines that the user does not exist on the target system, then an error message is displayed. If the user exists, then a request is created out of the provisioning data and sent to SAP GRC Compliant User Provisioning.

    The connector sends requests and receives responses through the following Web services of SAP GRC:

    • SAPGRC_AC_IDM_SUBMITREQUEST: This Web service is used to submit requests.

    • SAPGRC_AC_IDM_REQUESTSTATUS: This Web service is used to fetch request statuses.

    • SAPGRC_AC_IDM_AUDITTRAIL: This Web service is used to check if there are error messages in the SAP GRC Compliant User Provisioning logs.

    The process form holds fields for both basic user management and Compliant User Provisioning. However, for a Create User operation, only the Compliant User Provisioning fields (attributes) on the process form are used. Mappings for these fields are stored in the Lookup.SAP.CUP.ProvisionAttrMap and Lookup.SAP.CUP.ProvisionRoleAttrMap lookup definitions. If you specify values for any attribute that is not present in these lookup definitions, then the connector ignores those attributes during the Create User operation.

    Note:

    SAP GRC Compliant User Provisioning does not process passwords. Therefore, any value entered in the Password field is ignored during Create User provisioning operations.

    See Section 3.6, "Guidelines on Performing Provisioning" for information about setting passwords when you configure Compliant User Provisioning.

    For a Modify User operation, a request is created only for attributes whose mappings are present in these lookup definitions. If you specify values for attributes that are not present in these lookup definitions, then the connector directly sends them to the target system.

    Note:

    In a Modify User operation, you can specify values for attributes that are mapped with SAP GRC Compliant User Provisioning and attributes that are directly updated on the target system.

  3. When the request is created on SAP GRC Compliant User Provisioning, data sent back by Compliant User Provisioning is stored in the following read-only fields in Oracle Identity Manager:

    • Request ID: This field holds the request ID that is generated on SAP GRC Compliant User Provisioning. The request ID does not change during the lifetime of the request.

    • Request Status: This field holds the status of the request on SAP GRC Compliant User Provisioning. You configure and run the SAP CUP Status Update Recon scheduled task to fetch the latest status of the request from the target system. Section 3.4.3.3, "SAP CUP Status Update Recon" describes this scheduled task.

    • CUP Requestor ID

    • CUP Requestor First Name

    • CUP Requestor Last Name

    • CUP Requestor Email

  4. The request is passed through the workflow defined in SAP GRC Compliant User Provisioning. The outcome is one of the following:

    • If Compliant User Provisioning clears the request, then the outcome is the creation or modification of a user's account on the target system (SAP R/3 or SAP CUA). The status of the request is set to Closed and a message is recorded in the Oracle Identity Manager logs.

    • If Compliant User Provisioning rejects the provisioning request, then the status of the request is set to Reject and a message is recorded in the Oracle Identity Manager logs.

    • If an error occurs during communication between Compliant User Provisioning and the target system, then the request remains in the Open state. A message stating that the operation has failed is recorded in the audit log associated with the request. An error message is displayed on the console.

1.4.4 User Management with Both SoD and Compliant User Provisioning

You might have both SAP GRC Risk Analysis and Remediation and Compliant User Provisioning configured in your SAP operating environment. You should configure the connector features for both SoD and Compliant User Provisioning at the same time only if the Risk Analysis and Remediation and Compliant User Provisioning modules are discretely configured (that is, not linked) modules in your operating environment.

Note:

If SAP GRC Compliant User Provisioning is configured to send provisioning requests to SAP GRC Risk Analysis and Remediation for SoD validation, then you must not configure the SoD feature of the connector.

1.4.5 Guidelines on Using a Deployment Configuration

When you integrate Oracle Identity Manager with your SAP operating environment, you might have one of the following requirements in mind:

  • Use Oracle Identity Manager as the provisioning source for account management on SAP resources.

  • Leverage workflows and access policies configured in SAP GRC Compliant User Provisioning, with Oracle Identity Manager as the provisioning source for account management on SAP resources.

  • Use SAP GRC Risk Analysis and Remediation for SoD enforcement and SAP GRC Compliant User Provisioning for user approval of provisioning requests sent through Oracle Identity Manager. Overall account management on SAP resources is performed through Oracle Identity Manager.

The following sections describe guidelines on the supported deployment configurations:

Note:

There are no special guidelines for the Basic User Management configuration and the User Management with SoD configuration.

User Management with SoD and Compliant User Provisioning

The following are deployment guidelines that you must apply for a scenario in which SAP GRC Risk Analysis and Remediation and SAP GRC Compliant User Provisioning are enabled and discretely configured modules:

  • Configure both SoD and Compliant User Provisioning features of the connector.

  • On SAP GRC Compliant User Provisioning, configure the no-stage approval for account creation. In other words, account creation requests must be auto-approved on Compliant User Provisioning.

    If a role or profile is provisioned on Oracle Identity Manager but rejected on SAP GRC Compliant User Provisioning, then the role or profile is revoked from Oracle Identity Manager at the end of the next user reconciliation run. Therefore, you can have approval workflows defined for role and profile provisioning requests on SAP GRC Compliant User Provisioning.

Summary of the account management process:

  1. Data from a provisioning operation on Oracle Identity Manager is first sent to the SAP GRC Risk Analysis and Remediation module for SoD validation.

  2. After the SoD validation checks are cleared, the provisioning request is sent to SAP GRC Compliant User Provisioning.

  3. After the SAP GRC Compliant User Provisioning workflow clears the request, the provisioning request is implemented on the target system.

  4. Scheduled tasks run from Oracle Identity Manager reconcile the outcome of the operation from the target system into Oracle Identity Manager.

User Management with Compliant User Provisioning

The following are deployment guidelines that you must apply for a scenario in which SAP GRC Compliant User Provisioning is configured and enabled in your SAP operating environment:

Note:

SAP GRC Risk Analysis and Remediation is either configured as a linked module of SAP GRC Compliant User Provisioning or it is not used at all.

  • On SAP GRC Compliant User Provisioning, configure the no-stage approval for account creation. In other words, account creation requests must be auto-approved on Compliant User Provisioning.

    The scenario described earlier in this section explains this guideline.

  • Configure the Compliant User Provisioning feature of the connector.

  • Do not configure the SoD feature of the connector.

Summary of the account management process:

  1. Data from a provisioning operation on Oracle Identity Manager is sent to SAP GRC Compliant User Provisioning.

  2. The workflow defined in SAP GRC Compliant User Provisioning sends the request to the SAP GRC Risk Analysis and Remediation module for SoD validation.

  3. After the SoD validation checks are cleared, the provisioning request is implemented on the target system.

  4. Scheduled tasks run from Oracle Identity Manager reconcile the outcome of the operation from the target system into Oracle Identity Manager.

1.4.6 Considerations to Be Addressed When You Enable Compliant User Provisioning

Keep in mind the following considerations when you enable the Compliant User Provisioning feature of the connector:

  • Multiple requests are generated from Oracle Identity Manager in response to some provisioning operations. For example, if you assign multiple roles to a user in a particular provisioning operation, then one request is created and sent to Compliant User Provisioning for each role.

  • For a particular account, Oracle Identity Manager keeps track of the latest request only. This means, for example, if more than one attribute of an account has been modified in separate provisioning operations, then Oracle Identity Manager keeps track of data related to the last operation only.

  • A Modify User operation can involve changes to multiple process form fields or child form fields. For each field that is modified, one request is created and sent to SAP GRC Compliant User Provisioning. Only information about the last request sent to Compliant User Provisioning is stored in Oracle Identity Manager.

  • Only parent or child form requests can be submitted in a single operation. You cannot submit both parent and child form requests at the same time.

  • Enable linking of SAP HRMS and SAP R/3 or SAP CUA accounts only if a no-stage workflow has been defined for the Create User provisioning operations.

    Section 1.5.9, "Linking of SAP HRMS and SAP R/3 or SAP CUA Accounts" describes the feature of the connector that stores the link between an SAP HRMS account created for an individual and the corresponding SAP R/3 or SAP CUA account created for the same individual. When you configure the Compliant User Provisioning feature, you should enable linking only if a no-stage approval has been defined for the Create User request type in SAP GRC Compliant User Provisioning. A no-stage approval is one in which no approvers are involved. All requests sent through a no-stage approval are automatically approved.

1.5 Features of the Connector

The following are features of the connector:

1.5.1 Support for Both SAP R/3 and SAP CUA

The connector can be used to integrate Oracle Identity Manager with either or both SAP R/3 and SAP CUA. From release 9.1.1 onward, this connector replaces release 9.1.0 of both the SAP User Management and SAP CUA connectors.

Most of the features of the connector are the same for both target systems. Where there are differences, these differences have been called out in this guide.

1.5.2 Mapping Standard and Custom Attributes for Reconciliation and Provisioning

You can create mappings for attributes that are not included in the list of default attribute mappings. These attributes can be part of the standard set of attributes provided by the target system or custom attributes that you add on the target system.

See Chapter 4, "Extending the Functionality of the Connector" for more information.

1.5.3 SoD Validation of Entitlement Requests

The connector supports the SoD feature introduced in Oracle Identity Manager release 9.1.0.2. The following are the focal points of this software update:

  • The SoD Invocation Library (SIL) is bundled with Oracle Identity Manager. The SIL acts as a pluggable integration interface with any SoD engine.

  • The SAP User Management connector is preconfigured to work with SAP GRC as the SoD engine. To enable this, changes have been made in the approval and provisioning workflows of the connector.

    Note:

    The default approval workflow and associated object form are configured for the SoD validation capabilities of SAP GRC. You can use them to develop your own approval workflows and object forms.

    In Oracle Identity Manager release 11.1.1, object forms have been replaced by request datasets. A request dataset is an XML file that specifies information to be submitted by the requester during a provisioning operation. Predefined request datasets are shipped with this connector. The default approval workflow and associated request dataset are configured for the SoD validation capabilities of SAP GRC. You can use them to develop your own approval workflows and request datasets. See Oracle Fusion Middleware Developer's Guide for Oracle Identity Manager for more information about request datasets.

  • The SoD engine processes role and profile entitlement requests that are sent through the connector. This preventive simulation approach helps identify and correct potentially conflicting assignment of entitlements to a user, before the requested entitlements are granted to users.

See Also:

Oracle Identity Manager Tools Reference for detailed information about the SoD feature

Section 2.3.14, "Configuring SoD" in this guide

1.5.4 Routing of Provisioning Requests Through SAP GRC Compliant User Provisioning

You can configure the connector to work with SAP GRC Compliant User Provisioning. See Section 1.4.3, "User Management with Compliant User Provisioning" for detailed information about this feature.

1.5.5 Full and Incremental Reconciliation

In full reconciliation, all records are fetched from the target system to Oracle Identity Manager. In incremental reconciliation, only records that are added or modified after the last reconciliation run are fetched into Oracle Identity Manager.

At the end of a reconciliation run, an attribute of the scheduled task holds the time stamp at which the reconciliation run began. If that attribute is set to 0, then full reconciliation is performed. If that attribute holds a non-zero value, then incremental reconciliation is performed.

During full reconciliation, a single reconciliation event is generated for a particular target system account. However, during incremental reconciliation, two reconciliation events are generated for each account:

  • The first reconciliation event contains all account data other than the Locked/Unlocked status.

  • The second reconciliation event contains the Locked/Unlocked status.

You can switch from incremental to full reconciliation at any time after you deploy the connector. See Section 3.1, "Performing Full Reconciliation" for more information.

1.5.6 Limited (Filtered) Reconciliation

To limit or filter the records that are fetched into Oracle Identity Manager during a reconciliation run, you can specify the subset of added or modified target system records that must be reconciled.

See Section 3.4.2, "Limited Reconciliation" for more information.

1.5.7 Batched Reconciliation

You can break down a reconciliation run into batches by specifying the number of records that must be included in each batch.

See the description of the Batch Size attribute in Section 3.4.3, "Reconciliation Scheduled Tasks" for more information.

1.5.8 Enabling and Disabling Accounts

Valid From and Valid Through are two user attributes on the target system. For a particular user in SAP, if the Valid Through date is less than the current date, then the account is in the Disabled state. Otherwise, the account is in the Enabled state. The same behavior is duplicated in Oracle Identity Manager through reconciliation. In addition, you can set the value of the Valid Through date to a current date or a date in the past through a provisioning operation.

Note:

The Enabled or Disabled state of an account is not related to the Locked or Unlocked status of the account.

1.5.9 Linking of SAP HRMS and SAP R/3 or SAP CUA Accounts

An SAP HRMS account created for an individual can be linked with the SAP R/3 or SAP CUA account created for the same user. For a particular user, an attribute of SAP HRMS holds the user ID of the corresponding SAP R/3 or SAP CUA account.

You can duplicate this link in Oracle Identity Manager by using the following entries of the Lookup.SAP.UM.Configuration lookup definition:

  • Support HRMS 0105 Infotype Linking

  • Validate Personnel Number before Linking

  • Overwrite Link

See Section 2.3.5.1, "Linking of SAP HRMS and SAP R/3 or SAP CUA Accounts" for more information.

1.5.10 SNC Communication Between the Target System and Oracle Identity Manager

You can configure Secure Network Communication (SNC) to secure communication between Oracle Identity Manager and the target system.

See Section 2.3.15, "Configuring SNC to Secure Communication Between Oracle Identity Manager and the Target System" for more information.

1.5.11 Specifying Accounts to Be Excluded from Reconciliation and Provisioning Operations

You can specify a list of accounts that must be excluded from all reconciliation and provisioning operations. Accounts whose user IDs you specify in the exclusion list are not affected by reconciliation and provisioning operations.

See Section 2.3.10, "Setting Up the Lookup.SAP.UM.ExclusionList Lookup Definition" for more information.

1.5.12 Configuring Password Changes for Newly Created Accounts

When you log in to SAP by using a newly created account, you are prompted to change your password at first logon. For accounts created through Oracle Identity Manager, password management can be configured using one of the following approaches:

  • Configure the connector so that users with newly created accounts are prompted to change their passwords at first logon.

  • Configure the connector so that the password set while creating the account on Oracle Identity Manager is set as the new password on the target system. The user is not prompted to change the password at first logon.

This feature is configured using the Dummy password parameter of the IT resource and the Change Password entry of the Lookup.SAP.UM.Configuration lookup definition. In addition, the Password Disabled entry of this lookup definition allows you to specify whether or not the password must be optional during Create User provisioning operations.

1.5.13 Specifying a SAP JCo Trace Level

The connector uses the SAP JCo for reconciliation and provisioning operations. The JCo trace level is a numeric specification of the level of trace data that must be logged when the SAP JCo is used. You can specify the trace level as a parameter of the IT resource.

See Table 2-12, "Parameters of the IT Resource" for more information.

1.5.14 Connection Pooling

A connection pool is a cache of objects that represent physical connections to the target system. Oracle Identity Manager connectors can use these connections to communicate with target systems. At run time, the application requests a connection from the pool. If a connection is available, then the connector uses it and then returns it to the pool. A connection returned to the pool can again be requested for and used by the connector for another operation. By enabling the reuse of connections, the connection pool helps reduce connection creation overheads like network latency, memory allocation, and authentication.

One connection pool is created for each IT resource. For example, if you have three IT resources for three installations of the target system, then three connection pools are created, one for each target system installation.

The configuration properties of the connection pool are part of the IT resource definition. Section 2.3.16, "Configuring the IT Resource" provides information about setting up the connection pool.

1.5.15 Specifying the Use of a Logon Group on the Target System for Connector Operations

In SAP, a logon group is used as a load-sharing mechanism. When a user logs in to a logon group, the system internally routes the connection request to the logon group member with the least load. You can configure the connector to use a logon group for logging in to the target system for reconciliation and provisioning operations.

See Section 2.3.16.1, "Parameters for Enabling the Use of a Logon Group" for more information.

1.5.16 Transformation and Validation of Account Data

You can configure validation of account data that is brought into or sent from Oracle Identity Manager during reconciliation and provisioning. In addition, you can configure transformation of account data that is brought into Oracle Identity Manager during reconciliation. The following sections provide more information:

1.5.17 Transformation of Lookup Field Data

You can configure transformation of lookup field data that is brought into Oracle Identity Manager during lookup field synchronization. Section 4.11, "Configuring Transformation of Data During Lookup Field Synchronization" for more information.

1.5.18 Support for Both Unicode and Non-Unicode Modes

An SAP application can be run in either Unicode or non-Unicode mode. The connector supports both modes.

1.6 Lookup Definitions Used During Connector Operations

Lookup definitions used during connector operations can be categorized as follows:

1.6.1 Lookup Definitions Synchronized with the Target System

During a provisioning operation, you use a lookup field on the process form to specify a single value from a set of values. For example, you use the Date Format lookup field to select a date format from the list of supported date formats. When you deploy the connector, lookup definitions corresponding to the lookup fields on the target system are automatically created in Oracle Identity Manager. Lookup field synchronization involves copying additions or changes made to the target system lookup fields into the lookup definitions in Oracle Identity Manager.

Note:

The target system allows you to use special characters in lookup fields. However, in Oracle Identity Manager, special characters are not supported in lookup definitions.

The Lookup.SAP.UM.LookupMappings and Lookup.SAP.CUA.LookupMappings lookup definitions are used to map each lookup definition with the BAPI that is used to fetch values for the lookup definition from the target system. The Code Key column of these lookup definitions contains names of the lookup definitions that are synchronized with the target system. The Decode column contains the name and parameters of the corresponding BAPIs.

Table 1-2 lists the entries in these lookup definitions. The Decode column holds a list of the parameters required to fetch lookup field values from the target system.

Table 1-2 Entries in the Lookup.SAP.UM.LookupMappings and Lookup.SAP.CUA.LookupMappings Lookup Definitions

Code Key Decode

Lookup.SAP.UM.CommType

BAPI_HELPVALUES_GET;GETDETAIL;ADDRESS;COMM_TYPE;COMM_TYPE;COMM_TEXT

Lookup.SAP.UM.Company

BAPI_HELPVALUES_GET;GETDETAIL;COMPANY;COMPANY;COMPANY;COMPANY;USCOMPANY_ADDR;SH

Lookup.SAP.UM.ContractualUserType

BAPI_HELPVALUES_GET;GETDETAIL;UCLASSSYS;LIC_TYPE;USERTYP;UTYPTEXT;LANGU;I;EQ;EN

Lookup.SAP.UM.DateFormat

BAPI_HELPVALUES_GET;GETDETAIL;DEFAULTS;DATFM;_LOW;_TEXT

Lookup.SAP.UM.DecimalNotation

BAPI_HELPVALUES_GET;GETDETAIL;DEFAULTS;DCPFM;_LOW;_TEXT

Lookup.SAP.UM.LangComm

BAPI_HELPVALUES_GET;GETDETAIL;ADDRESS;LANGU_P;SPRAS;SPTXT

Lookup.SAP.UM.Parameter

BAPI_HELPVALUES_GET;GETDETAIL;PARAMETER;PARID;PARAMID;PARTEXT

Lookup.SAP.UM.Profile

For SAP R/3:

BAPI_HELPVALUES_GET;GETDETAIL;PROFILES;BAPIPROF;PROFN;PTEXT

For SAP CUA:

RFC_READ_TABLE;USRSYSPRFT;PROFN;PTEXT;SUBSYSTEM;USRSYSPRF;LANGU = 'EN'

Lookup.SAP.UM.Roles

For SAP R/3:

BAPI_HELPVALUES_GET;GETDETAIL;ACTIVITYGROUPS;AGR_NAME;AGR_NAME;TEXT;AGR_COLL;SH

For SAP CUA:

RFC_READ_TABLE;USRSYSACTT;AGR_NAME;TEXT;SUBSYSTEM;USRSYSACT;LANGU = 'EN'

Lookup.SAP.UM.System

For SAP R/3:

SYSTEMNAME

For SAP CUA:

RFC_READ_TABLE;USZBVLNDRC;RCVSYSTEM;RCVSYSTEM

Lookup.SAP.UM.TimeZone

BAPI_HELPVALUES_GET;CHANGE;ADDRESS;TIME_ZONE;TZONE;DESCRIPT

Lookup.SAP.UM.UserGroups

BAPI_HELPVALUES_GET;GETDETAIL;GROUPS;USERGROUP;USERGROUP;TEXT

Lookup.SAP.UM.UserTitle

BAPI_HELPVALUES_GET;GETDETAIL;ADDRESS;TITLE_P;TITLE_MEDI;TITLE_MEDI;ADDR2_SH_TITLE;SH


The following is the format of entries in each lookup definition listed in this table:

  • Code Key format: IT_RESOURCE_KEY~LOOKUP_FIELD_ID

    Note:

    For multivalued attributes (roles and profiles), the format is as follows:

    IT_RESOURCE_KEY~SYSTEM_NAME~LOOKUP_FIELD_ID
    

    In this format:

    • IT_RESOURCE_KEY is the numeric code assigned to the IT resource in Oracle Identity Manager.

    • LOOKUP_FIELD_ID is the target system code assigned to the lookup field entry.

    Sample value: 1~PRT

  • Decode format: IT_RESOURCE_NAME~LOOKUP_FIELD_ENTRY

    In this format:

    • IT_RESOURCE_NAME is the name of the IT resource in Oracle Identity Manager.

    • LOOKUP_FIELD_ENTRY is the value or description of the lookup field entry on the target system.

    Sample value: SAP IT~Printer

The SAP User Management Lookup Recon scheduled task is used to synchronize values of these lookup definitions with the target system. Section 3.2, "Scheduled Task for Lookup Field Synchronization" provides more information about this scheduled task.

While performing a provisioning operation on the Administrative and User Console, you select the IT resource for the target system on which you want to perform the operation. When you perform this action, the lookup definitions on the page are automatically populated with values corresponding to the IT resource (target system installation) that you select.

During lookup field synchronization, new entries are appended to the existing set of entries in the lookup definitions. You can switch from an SAP R/3 target to a SAP CUA target, or you can switch between multiple installations of the same target system. Because the IT resource key is part of each entry created in each lookup definition, only lookup field entries that are specific to the IT resource you select during a provisioning operation are displayed.

1.6.2 Preconfigured Lookup Definitions

Table 1-3 describes the other lookup definitions that are created in Oracle Identity Manager when you deploy the connector. These lookup definitions are either prepopulated with values or values must be manually entered in them after the connector is deployed.

Table 1-3 Preconfigured Lookup Definitions

Lookup Definition Description of Values Method to Specify Values for the Lookup Definition

Lookup.SAP.UM.Configuration

This lookup definition holds connector configuration entries that are used during reconciliation and provisioning.

Some of the entries in this lookup definition are preconfigured. See Section 2.3.5, "Setting Up the Configuration Lookup Definition in Oracle Identity Manager" for information about the entries for which you can set values.

Lookup.SAP.CUP.Configuration

This lookup definition holds connector configuration entries that are used during reconciliation and provisioning by the Compliant User Provisioning feature.

Note: This lookup definition is created only after you configure the Compliant User Provisioning feature.

Some of the entries in this lookup definition are preconfigured. See Section 2.3.13.7, "Setting Values in the Lookup.SAP.CUP.Configuration Lookup Definition" for information about the entries for which you can set values.

Lookup.SAP.UM.Constants

This lookup definition stores values that are used internally by the connector. The connector development team can use this lookup definition to make minor configuration changes in the connector.

You must not modify the entries in this lookup definition.

Lookup.SAP.CUP.Constants

This lookup definition stores values that are used internally by the Compliant User Provisioning feature of the connector. The connector development team can use this lookup definition to make minor configuration changes in the connector.

Note: This lookup definition is created only after you configure the Compliant User Provisioning feature.

You must not modify the entries in this lookup definition.

Lookup.SAP.UM.ExclusionList

This lookup definition holds user IDs of target system accounts for which you do not want to perform reconciliation and provisioning.

You can enter user IDs in this lookup definition. See Section 2.3.10, "Setting Up the Lookup.SAP.UM.ExclusionList Lookup Definition" for more information.

Lookup.SAP.UM.ITResourceMapping

The IT resource is a set of the connection properties required to establish a connection with the target system. The entries listed in this lookup definition are mappings between:

  • Code Key: Some of the connection properties defined for the ServerDataProvider and DestinationDataProvider interfaces of SAP JCo 3.0

  • Decode: Parameters of the IT resource

See Table 2-11 for a listing of the entries in this lookup definition. If you want to add more SAP JCo parameters for establishing a connection between Oracle Identity Manager and the target system installation, then see Section 2.3.16.4, "Mapping New Connection Properties" for information.

Lookup.SAP.CUA.LookupMappings and Lookup.SAP.UM.LookupMappings

These lookup definitions hold data required to synchronize other lookup definitions with the target system.

These lookup definitions are preconfigured. You can add entries in this lookup definition, but you must not modify existing entries.

See the earlier section for a listing of the entries in these lookup definitions. See Section 4.12, "Configuring Synchronization of New Lookup Definitions with the Target System" for more information about adding entries.

Lookup.SAP.UM.LookupReconTransformation

This lookup definition is used to configure transformation of data during lookup field synchronization.

See Section 4.11, "Configuring Transformation of Data During Lookup Field Synchronization" for more information about adding entries in this lookup definition.

Lookup.SAP.UM.ProvAttrMap

This lookup definition holds mappings between process form fields and single-valued target system attributes.

This lookup definition is preconfigured. Table 1-8 lists the default entries in this lookup definition. You can add entries in this lookup definition if you want to map new target system attributes for provisioning. See Section 4.4, "Adding New Standard Attributes for Provisioning" for more information.

Lookup.SAP.CUP.ProvisionAttrMap

This lookup definition holds mappings between process form fields and single-valued attributes on SAP GRC Compliant User Provisioning.

Note: This lookup definition is created only after you configure the Compliant User Provisioning feature.

This lookup definition is preconfigured. Table 1-10 lists the default entries in this lookup definition. You can add entries in this lookup definition if you want to map new attributes for provisioning. See Section 4.5, "Adding New Standard SAP GRC Compliant User Provisioning Attributes for Provisioning" for more information.

Lookup.SAP.UM.ProvChildAttrMap

This lookup definition holds mappings between process form fields and multivalued target system attributes.

This lookup definition is preconfigured. Table 1-9 lists the default entries in this lookup definition. You can add entries in this lookup definition if you want to map new multivalued target system attributes for provisioning. See Section 4.6, "Adding New Standard Multivalued Attributes for Provisioning" for more information.

Lookup.SAP.CUP.ProvisionRoleAttrMap

This lookup definition holds mappings between process form fields and multivalued attributes on SAP GRC Compliant User Provisioning.

Note: This lookup definition is created only after you configure the Compliant User Provisioning feature.

This lookup definition is preconfigured. Table 1-9 lists the default entries in this lookup definition.

Lookup.SAP.UM.ProvCheckBoxMapping

This lookup definition is used to map check box attributes of the target system with their values when selected and deselected. It is used during provisioning.

By default, there are no entries in this lookup definition. You must add entries only if you want to add a check box attribute on the target system for provisioning. See Step 4 in Section 4.4, "Adding New Standard Attributes for Provisioning" for more information.

Lookup.SAP.UM.ProvValidation

This lookup definition is used to configure validation of attribute values entered on the process form during provisioning operations.

You manually create entries in this lookup definition. See Section 4.9, "Configuring Validation of Data During Reconciliation and Provisioning" for more information.

Lookup.SAP.UM.ReconAttrMap

This lookup definition holds mappings between resource object fields and single-valued target system attributes.

This lookup definition is preconfigured. Table 1-4 lists the default entries in this lookup definition. You can add entries in this lookup definition if you want to map new target system attributes for reconciliation. See Section 4.2, "Adding New Attributes for Reconciliation" for more information.

Lookup.SAP.UM.ReconChildAttrMap

This lookup definition holds mappings between resource object fields and multivalued target system attributes.

This lookup definition is preconfigured. Table 1-5 lists the default entries in this lookup definition. You can add entries in this lookup definition if you want to map new target system attributes for reconciliation. See Section 4.3, "Adding New Standard and Custom Multivalued Attributes for Reconciliation" for more information.

Lookup.SAP.UM.CustomChildAttrMap

This lookup definition holds mappings between resource object fields and custom multivalued target system attributes.

You can add entries in this lookup definition if you want to map custom target system attributes for reconciliation. See Section 4.3, "Adding New Standard and Custom Multivalued Attributes for Reconciliation" for more information.

Lookup.SAP.UM.RoleChildformMappings

Code Key: Dummy role child form attribute name

Decode: Corresponding actual role child form attribute name

This lookup definition is used during SoD validation of entitlement requests.

This lookup definition is preconfigured. Table 2-9 lists the entries in this lookup definition.

Lookup.SAP.UM.ReconCheckBoxMapping

This lookup definition maps check box attributes of the target system with their values when selected and deselected. It is used during reconciliation.

By default, there are no entries in this lookup definition. You must add entries only if you want to add a check box attribute on the target system for reconciliation. See Step 7 in Section 4.2, "Adding New Attributes for Reconciliation" for more information.

Lookup.SAP.UM.ReconTransformation

This lookup definition is used to configure transformation of attribute values that are fetched from the target system during user reconciliation.

You manually create entries in this lookup definition. See Section 4.10, "Configuring Transformation of Data During User Reconciliation" for more information.

Lookup.SAP.UM.ReconValidation

This lookup definition is used to configure validation of attribute values that are fetched from the target system during reconciliation.

You manually create entries in this lookup definition. See Section 4.9, "Configuring Validation of Data During Reconciliation and Provisioning" for more information.

Lookup.SAP.UM.ProfileChildformMappings

Code Key: Dummy profile child form attribute name

Decode: Corresponding actual profile child form attribute name

This lookup definition is used during SoD validation of entitlement requests.

This lookup definition is preconfigured. Table 2-8 lists the entries in this lookup definition.

Lookup.SAP.UM.SoDConfiguration

This lookup definition holds configuration values that are used by the connector during SoD operations.

See Section 2.3.14.2, "Specifying Values for SoD-Related Entries in the Lookup.SAP.UM.SoDConfiguration Lookup Definition" for information about specifying values for the entries in this lookup definition.

Lookup.SAP.UM.CustomAttrMap

This lookup definition holds details of custom attributes that you want to include for reconciliation.

See Step 6 in Section 4.2, "Adding New Attributes for Reconciliation" for information about creating entries in this lookup definition.


1.7 Connector Objects Used During Reconciliation

The SAP User Management User Recon scheduled task is used to initiate a reconciliation run. This scheduled task is discussed in Section 3.4.3, "Reconciliation Scheduled Tasks".

See Also:

The "Reconciliation" section in Oracle Fusion Middleware User's Guide for Oracle Identity Manager for conceptual information about reconciliationOracle Fusion Middleware User's Guide for Oracle Identity Manager

This section discusses the following topics:

1.7.1 User Attributes for Reconciliation

The Lookup.SAP.UM.ReconAttrMap lookup definition maps resource object fields and target system attributes. The Code Key column stores the names of resource object fields. The format of the Decode column is as follows:

FIELD_TYPE;FIELD_NAME;STRUCTURE_NAME

In this format, FIELD_TYPE can be TEXT, LOOKUP, CHECKBOX, or DATE.

Table 1-4 lists entries in this lookup definition.

Table 1-4 Entries in the Lookup.SAP.UM.ReconAttrMap Lookup Definition

Resource Object Field Target System Attribute

Accounting Number

TEXT;ACCNT;LOGONDATA

Alias

TEXT;USERALIAS;ALIAS

Building

TEXT;BUILDING_P;ADDRESS

Communication Type

LOOKUP;COMM_TYPE;ADDRESS

Company

LOOKUP;COMPANY;COMPANY

Contractual User Type

LOOKUP;LIC_TYPE;UCLASS|UCLASSSYS

Cost Center

TEXT;KOSTL;DEFAULTS

Date Format

LOOKUP;DATFM;DEFAULTS

Decimal Notation

LOOKUP;DCPFM;DEFAULTS

Department

TEXT;DEPARTMENT;ADDRESS

E Mail

TEXT;E_MAIL;ADDRESS

Fax Extension

TEXT;FAX_EXTENS;ADDRESS

Fax Number

TEXT;FAX_NUMBER;ADDRESS

First Name

TEXT;FIRSTNAME;ADDRESS

Floor

TEXT;FLOOR_P;ADDRESS

Function

TEXT;FUNCTION;ADDRESS

Lang Communication

LOOKUP;LANGU_P;ADDRESS

Last Name

TEXT;LASTNAME;ADDRESS

Logon Language

LOOKUP;LANGU;DEFAULTS

Room Number

TEXT;ROOM_NO_P;ADDRESS

Start Menu

TEXT;START_MENU;DEFAULTS

Telephone Extension

TEXT;TEL1_EXT;ADDRESS

Telephone Number

TEXT;TEL1_NUMBR;ADDRESS

Time Zone

LOOKUP;TZONE;LOGONDATA

Title

LOOKUP;TITLE_P;ADDRESS

User Group

LOOKUP;CLASS;LOGONDATA

User Type

TEXT;USTYP;LOGONDATA

Valid From

DATE;GLTGV;LOGONDATA

Valid Through

DATE;GLTGB;LOGONDATA


The Lookup.SAP.UM.ReconChildAttrMap lookup definition maps resource object fields and multivalued target system attributes. Table 1-5 lists entries in this lookup definition.

The format of Decode entries in this lookup definition is as follows:

FIELD_TYPE;FIELD_NAME;TABLE_NAME;OIM_CHILD_TABLE_NAME

In this format, FIELD_TYPE can be TEXT, LOOKUP, CHECKBOX, or DATE.

Table 1-5 Entries in the Lookup.SAP.UM.ReconChildAttrMap Lookup Definition

Child Form Field Target System Attribute

End Date

DATE;TO_DAT;ACTIVITYGROUPS;User Role

Profile Name

LOOKUP;PROFILE|BAPIPROF;PROFILES;User Profile

Profile System Name

LOOKUP;SUBSYSTEM;PROFILES;User Profile

Role Name

LOOKUP;AGR_NAME;ACTIVITYGROUPS;User Role

Role System Name

LOOKUP;SUBSYSTEM;ACTIVITYGROUPS;User Role

Start Date

DATE;FROM_DAT;ACTIVITYGROUPS;User Role


1.7.2 Reconciliation Rules

See Also:

Oracle Fusion Middleware User's Guide for Oracle Identity Manager for generic information about reconciliation matching and action rules

The following sections provide information about the reconciliation rules for this connector:

1.7.2.1 Reconciliation Rule

The following is the process-matching rule:

Rule name: SAP UM Recon Rule

Rule element: User Login Equals User ID

In this rule element:

  • User Login is the User ID field of the OIM User form.

  • User ID is the user ID of the SAP account.

1.7.2.2 Viewing Reconciliation Rules in the Design Console

After you deploy the connector, you can view the reconciliation rule for reconciliation by performing the following steps:

Note:

Perform the following procedure only after the connector is deployed.

  1. Log in to the Oracle Identity Manager Design Console.

  2. Expand Development Tools.

  3. Double-click Reconciliation Rules.

  4. Search for and open SAP UM Recon Rule. Figure 1-5 shows this reconciliation rule.

    Figure 1-5 Reconciliation Rule

    Description of Figure 1-5 follows
    Description of "Figure 1-5 Reconciliation Rule"

1.7.3 Reconciliation Action Rules

Note:

No action is performed for rule conditions that are not predefined for this connector. You can define your own action rule for such rule conditions. For information about modifying or creating reconciliation action rules, see one of the following guides:

The following sections provide information about the reconciliation rules for this connector:

1.7.3.1 Reconciliation Action Rules for Reconciliation

Table 1-6 lists the action rules for reconciliation.

Table 1-6 Action Rules for Reconciliation

Rule Condition Action

No Matches Found

Assign to Administrator With Least Load

One Entity Match Found

Establish Link

One Process Match Found

Establish Link


1.7.3.2 Viewing Reconciliation Action Rules in the Design Console

After you deploy the connector, you can view the reconciliation action rules for reconciliation by performing the following steps:

  1. Log in to the Oracle Identity Manager Design Console.

  2. Expand Resource Management, and double-click Resource Objects.

  3. If you want to view the reconciliation action rules for reconciliation, then search for and open the SAP UM Resource Object resource object.

  4. Click the Object Reconciliation tab, and then click the Reconciliation Action Rules tab. The Reconciliation Action Rules tab displays the action rules defined for this connector. Figure 1-6 shows the reconciliation action rules for reconciliation.

    Figure 1-6 Reconciliation Action Rules

    Description of Figure 1-6 follows
    Description of "Figure 1-6 Reconciliation Action Rules"

1.8 Connector Objects Used During Provisioning

Provisioning involves creating or modifying user data on the target system through Oracle Identity Manager.

See Also:

The "Provisioning" section in Oracle Fusion Middleware User's Guide for Oracle Identity Manager for conceptual information about provisioning

This section discusses the following topics:

1.8.1 User Provisioning Functions

Table 1-7 lists the supported user provisioning functions and the adapters that perform these functions. The functions listed in the table correspond to either a single or multiple process tasks.

See Also:

Oracle Fusion Middleware User's Guide for Oracle Identity Manager for generic information about process tasks and adapters

Table 1-7 User Provisioning Functions

Function Adapter

Create a user account

SAPU Create User

Update a user account

SAPU Modify User

Update the user ID of an account

SAPU Update User ID

Delete a user account

SAPU Delete User

Lock or unlock a user account

SAPU Lock UnLock User

Enable a user account

SAPU Enable User

Disable a user account

SAPU Disable User

Link a user account with an SAP HRMS account

SAPU Create Link

Change the password of an account

SAPU Modify Password

Add (provision) a multivalued attribute (for example, role or profile)

SAPU Add Multivalue Data

Add (provision) a custom multivalued attribute

SAPU Add Custom Multivalue Data

Remove (revoke) a multivalued attribute (for example, role or profile)

SAPU Remove Multivalue Data

Update a multivalued attribute (for example, role or profile)

SAPU Update Multivalue Data

Remove (revoke) a multivalued attribute

SAPU Remove Custom Multivalue Data

Update a custom attribute added on the target system

SAPU Custom Attr Modify


1.8.2 User Attributes for Provisioning

The Lookup.SAP.UM.ProvAttrMap lookup definition maps process form fields with single-valued target system attributes. The Code Key column holds the names of process form fields. The format of values in the Decode column is as follows:

FIELD_TYPE;FIELD_NAME;STRUCTURE_NAME;FIELD_NAME_X;STRUCTURE_NAME_X

In this format:

  • FIELD_TYPE can be TEXT, DATE, CHECKBOX, or LOOKUP.

  • FIELD_NAME is the name of the field.

  • STRUCTURE_NAME is the name of the structure.

  • FIELD_NAME_X is the name of the field used to indicate whether or not the value in FIELD_NAME must be applied.

  • STRUCTURE_NAME_X is the name of the structure that holds FIELD_NAME_X.

Table 1-8 lists the entries in this lookup definition.

Table 1-8 Entries in the Lookup.SAP.UM.ProvAttrMap Lookup Definition

Process Form Field Target System Attribute

Accounting Number

TEXT;ACCNT;LOGONDATA;ACCNT;LOGONDATAX

Alias

TEXT;USERALIAS;ALIAS;BAPIALIAS;ALIASX

Building

TEXT;BUILDING_P;ADDRESS;BUILDING_P;ADDRESSX

Communication Type

LOOKUP;COMM_TYPE;ADDRESS;COMM_TYPE;ADDRESSX

Company

LOOKUP;COMPANY;COMPANY;COMPANY;COMPANYX

Contractual User Type

LOOKUP;LIC_TYPE;UCLASS;UCLASS;UCLASSX

Cost Center

TEXT;KOSTL;DEFAULTS;KOSTL;DEFAULTSX

Date Format

LOOKUP;DATFM;DEFAULTS;DATFM;DEFAULTSX

Decimal Notation

LOOKUP;DCPFM;DEFAULTS;DCPFM;DEFAULTSX

Department

TEXT;DEPARTMENT;ADDRESS;DEPARTMENT;ADDRESSX

E Mail

TEXT;E_MAIL;ADDRESS;E_MAIL;ADDRESSX

Fax Extension

TEXT;FAX_EXTENS;ADDRESS;FAX_EXTENS;ADDRESSX

Fax Number

TEXT;FAX_NUMBER;ADDRESS;FAX_NUMBER;ADDRESSX

First Name

TEXT;FIRSTNAME;ADDRESS;FIRSTNAME;ADDRESSX

Floor

TEXT;FLOOR_P;ADDRESS;FLOOR_P;ADDRESSX

Function

TEXT;FUNCTION;ADDRESS;FUNCTION;ADDRESSX

Language Communication

LOOKUP;LANGU_P;ADDRESS;LANGU_P;ADDRESSX

Last Name

TEXT;LASTNAME;ADDRESS;LASTNAME;ADDRESSX

Logon Language

LOOKUP;LANGU;DEFAULTS;LANGU;DEFAULTSX

Password

TEXT;BAPIPWD;PASSWORD;BAPIPWD;PASSWORDX

Room Number

TEXT;ROOM_NO_P;ADDRESS;ROOM_NO_P;ADDRESSX

Start Menu

TEXT;START_MENU;DEFAULTS;START_MENU;DEFAULTSX

Telephone Extension

TEXT;TEL1_EXT;ADDRESS;TEL1_EXT;ADDRESSX

Telephone Number

TEXT;TEL1_NUMBR;ADDRESS;TEL1_NUMBR;ADDRESSX

Time Zone

LOOKUP;TZONE;LOGONDATA;TZONE;LOGONDATAX

Title

LOOKUP;TITLE_P;ADDRESS;TITLE_P;ADDRESSX

User Group

LOOKUP;CLASS;LOGONDATA;CLASS;LOGONDATAX

User ID

TEXT;USERNAME;NONE;NONE;NONE

User Type

TEXT;USTYP;LOGONDATA;USTYP;LOGONDATAX

Valid From

DATE;GLTGV;LOGONDATA;GLTGV;LOGONDATAX

Valid Through

DATE;GLTGB;LOGONDATA;GLTGB;LOGONDATAX


The Lookup.SAP.UM.ProvChildAttrMap lookup definition maps process form fields with multivalued target system attributes. The Code Key column holds the names of the child form fields. The format of the Decode column is the same as that for the Lookup.SAP.UM.ProvAttrMap lookup definition.

Table 1-9 lists the entries in this lookup definition.

Table 1-9 Entries in the Lookup.SAP.UM.ProvChildAttrMap Lookup Definition

Child Form Field Target System Attribute

End Date

TEXT;TO_DAT;ACTIVITYGROUPS

Profile Name

LOOKUP;PROFILE|BAPIPROF;PROFILES

Profile System Name

LOOKUP;SUBSYSTEM;PROFILES

Role Name

LOOKUP;AGR_NAME;ACTIVITYGROUPS

Role System Name

LOOKUP;SUBSYSTEM;ACTIVITYGROUPS

Start Date

TEXT;FROM_DAT;ACTIVITYGROUPS


In the Compliant User Provisioning feature, the Lookup.SAP.CUP.ProvAttrMap lookup definition maps process form fields with single-valued attributes in SAP GRC Compliant User Provisioning. Table 1-10 lists entries in this lookup definition.

Table 1-10 Entries in the Lookup.SAP.CUP.ProvAttrMap Lookup Definition

Process Form Field Target System Attribute

CUP Requestor ID

requestorId;TEXT;STANDARD;NONE;MANDATORY

CUP Requestor First Name

requestorFirstName;TEXT;STANDARD;NONE;MANDATORY

CUP Requestor Last Name

requestorLastName;TEXT;STANDARD;NONE;MANDATORY

CUP Requestor Email

requestorEmailAddress;TEXT;STANDARD;NONE;MANDATORY

E Mail

emailAddress;TEXT;STANDARD;E_MAIL;MANDATORY

First Name

firstName;TEXT;STANDARD;FIRSTNAME;MANDATORY

Last Name

lastName;TEXT;STANDARD;LASTNAME;MANDATORY

User ID

userId;TEXT;STANDARD;NONE;MANDATORY

Valid From

validFrom;DATE;STANDARD;GLTGV;NONE

Valid Through

validTo;DATE;STANDARD;GLTGB;MANDATORY


In the Compliant User Provisioning feature, the Lookup.SAP.CUP.ProvisionRoleAttrMap lookup definition maps process form fields with multivalued attributes (roles and profiles) in SAP GRC Compliant User Provisioning. Table 1-10 lists entries in this lookup definition.

Table 1-11 Entries in the Lookup.SAP.CUP.ProvisionRoleAttrMap Lookup Definition

Process Form Field Target System Attribute

End Date

validTo;DATE

Profile Name

roleId;LOOKUP

Profile System Name

sysId;LOOKUP

Role Name

roleId;LOOKUP

Role System Name

sysId;LOOKUP

Start Date

validFrom;DATE


1.9 Roadmap for Deploying and Using the Connector

The following is the organization of information in the rest of this guide: