Sun Java[TM] System Identity Manager 7.1 Release Notes

Documentation Additions and Corrections

This section contains new and corrected information that was required after the Identity Manager 7.1 documentation set was published. This information is organized as follows:


Identity Manager Installation

This section provides new information and documentation corrections related to Sun Java™ System Identity Manager Installation.


Identity Manager Upgrade

This section provides new information and documentation corrections for Sun Java™ System Identity Manager Upgrade.

Other Custom Repository Objects

Record the names of any other custom repository objects that you created or updated. You might have to export these objects from your current installation and then re-import them to the newer version of Identity Manager after upgrading.

You can use Identity Manager’s SnapShot feature to create a baseline or “snap shot” of the customized repository objects in your deployment, which can be very useful when you are planning an upgrade.

SnapShot copies the following, specific object types from your system for comparison:

You can then compare two snapshots to determine what changes have been made to certain system objects before and after upgrade.


Note

This feature is not intended for detailed, on-going XML diffs — it is only a minimal tool for “first-pass” comparisons.


To create a snapshot:

  1. From the Identity Manager Debug page ( ), click the SnapShot button to view the SnapShot Management page.
  2. Figure 1  SnapShot Management Page
    Example SnapShot Management Page.

  3. Type a name for the snapshot in the Create text box, and then click the Create button.
  4. When Identity Manager adds the snapshot, the snapshot’s name displays in the Compare menu list and to the right of the Export label.

To compare two snapshots:

  1. Select the snapshots from each of the two Compare menus ( ).
  2. Figure 2  SnapShot Management Page
    Select a snapshot name from each Compare menu list.

  3. Click the Compare button.
    • If there are no object changes, then the page indicates that no differences were found.
    • If object changes were found, then the page displays the object type and name, and whether an object is different, absent, or present.
    • For example, if an object is present in baseline_1, but is not present in baseline_2, then the baseline_1 column indicates Present and the baseline_2 column indicates Absent.

You can export a snapshot in XML format. Click the snapshot name to export the snapshot file.

To delete a snapshot, select the snapshot from the Delete menu, and then clicking the Delete button.


Identity Manager Administration Guide

This section provides new information and documentation corrections for Sun Java™ System Identity Manager Administration.

Chapter 3, User and Account Management

Chapter 5, Administration

           Delegations to Deleted Users

Chapter 11, Identity Auditing

The following information has been added to this chapter.

Resolving Auditor Capabilities Limitations

By default, capabilities needed to perform auditing tasks are contained in the Top organization (object group). As a result, only those administrators who control Top can assign these capabilities to other administrators.

You can resolve this limitation by adding the capabilities to another organization. Identity Manager provides two utilities, located in the sample/scripts directory, to assist with this task.

  1. Run the following command to list all capabilities (AdminGroups) and their associated organizations (object groups):
  1. Edit the CSV file to adjust the capabilities organizational locations as desired.
  2. Run this command to update Identity Manager.

Chapter 13, Service Provider Administrator

The section titled “Configure Synchronization” should state the default synchronization interval for Service Provider synchronization tasks defaults to 1 minute.


Identity Manager Resources Reference

This section contains new information and documentation corrections for the Sun Java™ System Identity Manager Resources Reference:


Identity Manager Technical Deployment Overview

This section contains new information and documentation corrections for Sun Java™ System Identity Manager Technical Deployment Overview:

  1. Edit the following three rules within the EndUserRuleLibrary as indicated below:
  2. Edit this rule

    To make this change...

    getAccountId

    To use employeeId only (and remove firstName and lastName)

    getEmailAddress

    To use employeeId only (remove firstName, lastName, and ".")

    verifyFirstname 

    To change length check from 2 to 1 to allow for single character Asian first names

  3. Edit the End User Anon Enrollment Completion form to remove the firstName and lastName arguments from calls to the getAccountId and getEmailAddress rules.


Identity Manager Workflows, Forms, and Views

This section contains new information and documentation corrections for Sun Java™ System Identity Manager Workflows, Forms, and Views.

Chapter 2, Identity Manager Workflow

Chapter 3, Identity Manager Forms

Related Information

About Auditing-Related Form Processing

Specifying User Forms

Default Auditing-Related Forms

Why Customize These Forms?

Scan Task Variables

Chapter 4, Identity Manager Views

Common Attributes

The high-level attributes of the Org view are listed in the following table.

Name

Editable?

Data Type

Required?

orgName

Read

String

System-Generated

orgDisplayName

Read/Write

String

Yes

orgType

Read/Write

String

No

orgId

Read

String

System-Generated

orgAction

Write

String

No

orgNewDisplayName

Write

String

No

orgParentName

Read/Write

String

No

orgChildOrgNames

Read

List

System-Generated

orgApprovers

Read/Write

List

No

allowsOrgApprovers

Read

List

System-Generated

allowedOrgApproverIds

Read

List

System-Generated

orgUserForm

Read/Write

String

No

orgViewUserForm

Read/Write

String

No

orgPolicies

Read/Write

List

No

orgAuditPolicies

Read/Write

List

No

renameCreate

Read/Write

String

No

renameSaveAs

Read/Write

String

No

orgName

Identifies the UID for the organization.This value differs from most view object names because organizations can have the same short name, but different parent organizations.

orgDisplayName

Specifies the short name of the organization. This value is used for display purposes only and does not need to be unique.

orgType

Defines the organization type where the allowed values are junction or virtual. Organizations that are not of types junction or virtual have no value.

orgId

Specifies the ID that is used to uniquely identify the organization within Identity Manager.

orgAction

Supported only for directory junctions, virtual organizations, and dynamic organizations. Allowed value is refresh. When an organization is a directory junction or virtual organization, the behavior of the refresh operation depends on the value of orgRefreshAllOrgsUserMembers.

orgNewDisplayName

Specifies the new short name when you are renaming the organization.

orgParentName

Identifies the full pathname of the parent organization.

orgChildOrgNames

Lists the Identity Manager interface names of all direct and indirect child organizations.

orgApprovers

Lists the Identity Manager administrators who are required to approve users added to or modified in this organization.

allowedOrgApprovers

Lists the potential user names who could be approvers for users added to or modified in this organization.

allowedOrgApproverIds

Lists the potential user IDs who could be approvers for users added to or modified in this organization.

orgUserForm

Specifies the userForm used by members users of this organization when creating or editing users.

orgViewUserForm

Specifies the view user form that is used by member users of this organization when viewing users.

orgPolicies

Identifies policies that apply to all member users of this organization. This is a list of objects that are keyed by type string: Each policy object contains the following view attributes, which are prefixed by orgPolicies[<type>]. <type> represents policy type (for example, Lighthouse account).

orgAuditPolicies

Specifies the audit policies that apply to all member users of this organization.

renameCreate

When set to true, clones this organization and creates a new one using the value of orgNewDisplayName.

renameSaveAs

When set to true, renames this organization using the value of orgNewDisplayName.

Directory Junction and Virtual Organization Attributes

Name

Editable?

Data Type

Required?

orgContainerId

Read

String

System-generated

orgContainerTypes

Read

List

System-generated

orgContainers

Read

List

System-generated

orgParentContainerId

Read

String

System-generated

orgResource

Read/Write

String

yes, if directory junction or virtual organization

orgResourceType

Read

String

System-generated

orgResourceId

Read

String

System-generated

orgRefreshAllOrgsUserMembers

Write

String

No

orgContainerId

Specifies the dn of the associated LDAP directory container (for example, cn=foo,ou=bar,o=foobar.com).

orgContainerTypes

Lists the allowed resource object types that can contain other resource objects.

orgContainers

Lists the base containers for the resource used by the Identity Manager interface to display a list to choose from.

orgParentContainerId

Specifies the dn of the associated parent LDAP directory container (for example, ou=bar,o=foobar.com).

orgResource

Specifies the name of the Identity Manager resource used to synchronize directory junction and virtual organizations (for example, West Directory Server).

orgResourceType

Indicates the type of Identity Manager Resource from which to synchronize directory junction and virtual organizations (for example, LDAP).

orgResourceId

Specifies the ID of the Identity Manager resource that is used to synchronize directory junctions and virtual organizations.

orgRefreshAllOrgsUserMembers

If true and if the value of orgAction is refresh, synchronizes Identity organization user membership with resource container user membership for the selected organization and all child organizations. If false, resource container user membership will not be synchronized, only the resource containers to Identity organizations for the selected organization and all child organizations.

Dynamic Organization Attributes

Name

Editable?

Data Type

Required?

orgUserMembersRule

Read/Write

String

No

orgUserMembersRuleCacheTimeout

Read/Write

String

No

orgUserMembersRule

Identifies (by name or UID) the rule whose authType is UserMembersRule, which is evaluated at run-time to determine user membership.

orgUserMembersCacheTimeout

Specifies the amount of time (in milliseconds) before the cache times out if the user members returned by the orgUserMembersRule are to be cached. A value of 0 indicates no caching.

The discussion of the User view now includes the following discussion of the accounts[Lighthouse].delegates attributes: (ID-15468)

accounts[Lighthouse].delegates

Lists delegate objects, indexed by workItemType, where each object specifies delegate information for a specific type of work item

accounts[Lighthouse].delegatesHistory

Lists delegate objects, indexed from 0 to n, where n is the current number of delegate history objects up to the delegate history depth

This attribute has one unique attribute: selected, which is a Boolean that indicates the currently selected delegate history object.

accounts[Lighthouse].delegatesOriginal

Original list of delegate objects, indexed by workItemType, following a get operation or checkout view operation.

All accounts[Lighthouse].delegates* attributes take the following attributes:

Attributes of accounts[Lighthouse].delegate* Attributes

Description

 

 

workItemType

Identifies the type of workItem being delegated. See the description of the Delegate Object Model in the Identity Manager Technical Deployment Overview section of this Documentation Addendum for a valid list of workItem types.

workItemTypeObjects

Lists the names of the specific roles, resources, or organizations on which the user is delegating future workItem approval requests. This attribute is valid when the value of workItemType is roleApproval, resourceApproval, or organizationApproval.

If not specified, this attribute by default specifies the delegation of future workItem requests on all roles, resources, or organizations on which this user is an approver.

toType

Type to delegate to. Valid values are:

manager

delegateWorkItemsRule

selectedUsers

toUsers

Lists the names of the users to delegate to (if toType is selectedUsers).

toRule

Specifies the name of the rule that will be evaluated to determine the set of users to delegate to (if toType is delegateWorkItemsRule).

startDate

Specifies the date when delegation will start.

endDate

Specifies the date when delegation will end.

Referencing a DelegateWorkItems View Object from a Form

The following code sample illustrates how to reference a DelegateWorkItems view delegate object from a form:

<Field name='delegates[*].workItemType'>

<Field name=’delegates[*].workItemTypeObjects’>

<Field name=’delegates[*].toType’>

<Field name='delegates[*].toUsers'>

<Field name=’delegates[*].toRule’>

<Field name='delegates[*].startDate'>

<Field name='delegates[*].endDate'>

where supported index values (*) are workItemType values.

Name

Editable?

Type

Required?

name

 

String

Yes

status

 

String

Yes

user

 

String

Yes

userId

 

String

Yes

attestorHint

 

String

No

userView

 

GenericObject

Yes

reviewInstanceId

 

String

Yes

reviewStartDate

 

String

Yes

scanId

 

String

Yes

scanInstanceId

 

String

Yes

approvalWorkflowName

 

String

Yes

organizationId

 

String

Yes

attestorComments.name

 

String

No

attestorComments.attestor

 

String

No

attestorComments.time

 

String

No

attestorComments.timestamp

 

String

No

attestorComments.status

 

 

No

name

Identifies the User Entitlement (by a unique identifier).

status

Specifies the state of User Entitlement object. Valid states include PENDING, ACCEPTED, REJECTED, REMEDIATING, CANCELLED.

user

Identifies the name of the associated WSUser for this entitlement.

userId

Specifies the ID of the associated WSUser.

attestorHint

Displays the (String) hint to the attestor that is provided by the Review Determination Rule. This hints acts as “advice” from the rule to the attestor.

userView

Contains the User view that is captured by User Entitlement scanner. This view contains zero or more resource accounts depending on the configuration of the Access Scan object.

reviewInstanceId

Specifies the ID of the PAR Task instance.

reviewStartDate

Indicates the (String) start date of the PAR task (in canonical format).

scanId

Specifies the ID of AccessScan Task definition.

scanInstanceId

Specifies the ID of AccessScan Task instance.

approvalWorkflowName

Identifies the name of workflow to be run for approval. This value comes from the Access Scan Task definition.

organizationId

Specifies the ID of the WSUser's organization at the time of the scan.

attestorComments

Lists attestation records for the entitlement. Each attestation record indicates an action or statement made about the entitlement, including approval, rejection, and rescan.

attestorComments[timestamp].name

Timestamp used to identify this element in the list.

attestorComments[timestamp].attestor

Identifies the WSUser name of the attestor making the comment on the entitlement.

attestorComments[timestamp].time

Specifies the time at which the attestor attested this record. May differ from the timestamp.

attestorComments[timestamp].status

Indicates the status assigned by the attestor. This can be any string, but typically is a string that indicates the action taken by the attestor -- for example, approve, reject, rescan, remediate.

attestorComments[name].comment

Contains comments added by attestor.

Chapter 6, XPRESS Language

This chapter has been substantially updated. See the.pdf titled XPRESS in the same directory as these Release Notes.

Chapter 8, HTML Display Components

How to Use the objectSelector Example Code

  1. From the Identity Manager IDE, open the Administrator Library UserForm object.
  2. Add the following code to this form:
  3. <Include>

       <ObjectRef type='UserForm' name='Scalable Selection Library'/>

    </Include>

  4. Select the accounts[Lighthouse].adminRoles field within the AdministratorFields field.
  5. Replace the entire accounts[Lighthouse].adminRoles with the following reference:
  6. <FieldRef name='scalableWaveset.adminRoles'/>

  7. Save the object.
  8. When you subsequently edit a user and select the Security tab, Identity Manager displays the customized form. Clicking ... opens the Selector component and exposes a search field. Use this field to search for admin roles that begin with a text string and set the value of the field to one or more values.

    To restore the form, import $WSHOME/sample/formlib.xml from Configure > Import Exchange File.

    See the Scalable Selection Library in sample/formlib.xml for other examples of using the objectSelector template to manage resources and roles in environments with many objects.

  9. The discussion of the TabPanel component now contains the following description of the validatePerTab property: (ID-15501)

Appendix A, Form and Process Mappings


Identity Manager Deployment Tools

This section contains new information and documentation corrections for the Sun Java™ System Identity Manager Deployment Tools:

What’s New?

Substantial information was added to the following chapters in the Identity Manager Deployment Tools book:

Updates

This section provides corrections and additions to the Identity Manager Deployment Tools documentation:


Identity Manager Tuning, Troubleshooting, and Error Messages

This section provides new information and documentation corrections for Sun Java™ System Identity Manager Tuning, Troubleshooting, and Error Messages.


Identity Manager Service Provider Edition Deployment

This section provides new information and documentation corrections for Sun Java™ System Identity Manager SPE Deployment.

Chapter 5, Other Objects in Identity Manager SPE

Identity Manager Identity Manager SPE now supports link correlation and link confirmation rules.

Link Correlation Rule

The linkTargets IDMXUser view option allows the caller to specify the list of resources that should be targeted for linking. When using forms, the list can be provided as a form property with the same name. Form properties are assimilated into view options when the IDMXUser view is checked in.

A link correlation rule selects resource accounts that the user might own. Given the view of the user, a link correlation rule returns an identity, a list of identities, or an option map.

If the rule returns an option map, then the view handler uses the map to look for resource accounts and obtains a list of identities that satisfy these options. For example, the searchFilter option of the getResourceObjects FormUtil method can be used to pass a search filter to an LDAP resource adapter.

A link correlation rule must have the authType attribute set to SPERule with the subtype set to SUBTYPE_SPE_LINK_CORRELATION_RULE.

Link Confirmation Rule

A link confirmation rule eliminates any resource accounts from the list of potential accounts that the link correlation rule selects. Given the view of the user and the list of candidate resource accounts, a link confirmation rule selects at most one resource account from the candidate list. The view of the user is visible under the 'view' path, while the list of candidates is available under the 'candidates' path.

If the link correlation rule selects no more than one resource account, the link confirmation rule is optional.


Note

Unlike Identity Manager confirmation rules, a link confirmation rule is invoked only once during the linking process.


A link confirmation rule must have the authType attribute set to SPERule with the subtype set to SUBTYPE_SPE_LINK_CONFIRMATION_RULE.

LighthouseContext API

Several convenience methods have been added to the SessionFactory class. The table on page 16 should be updated as follows.

Connection Type

Method

Description

Local anonymous

getServerInternalContext()

Returns a fully authorized context without any authentication.

Local authenticated

getSPESession(String user, EncryptedData password)

Constructs a session for the Service Provider user interface.

Local authenticated

getSPESession(Map credentials)

Constructs a session for the Service Provider user interface. The map specifies the credentials of the user, including the values of the user and password keys.

Local pre-authenticated

getSPEPreAuthenticatedSession(String user)

Constructs a pre-authenticated session for the Service Provider user interface.

Remote anonymous

Not applicable

This connection type is only available through SPML.

Remote authenticated

getSession(URL url, String user, EncryptedData pass)

Returns an authenticated session.


Localization Scope

Historically, Identity Manager does not localize resource objects and functions, primarily because they are mostly samples that get loaded (through init.xml) during initialization of Identity Manager, and because the attributes of object types can vary between actual customer deployments, depending on the level of customizations. Following is a list of areas where users might encounter English: (ID-16349)


Using helpTool

With the Identity Manager 6.0 release, a new feature has been added that allows you to search the online help and documentation files, which are in HTML format. The search engine is based on the SunLabs “Nova” search engine technology.

There are two stages to using the Nova engine: indexing and retrieval. During the indexing stage, the input documents are analyzed and an index is created which is used during the retrieval stage. During retrieval, it is possible to pull “passages” that consist of the context in which the query terms were found. The passage retrieval process requires the original HTML files to be present, so these files must exist in a location in the file system accessible by the search engine.

helpTool is a Java program that performs two basic functions:

You execute helpTool from the command line, as follows:

$ java -jar helpTool.jar

usage: HelpTool

-d Destination directory

-h This help information

-i Directory or JAR containing input files, no wildcards

-n Directory for Nova index

-o Output file name

-p Indexing properties file

Rebuilding/Re-Creating the Online Help Index

The HTML files for online help are packaged in a JAR file. You must extract these files to a directory for the search engine. Use the following procedure:

  1. Unpack the helpTool distribution to a temporary directory. (Details TBD)
  2. In this example, we will extract the files to /tmp/helpTool.

  3. In a UNIX shell or Windows command window, change directory to the location where the Identity Manager application was deployed to your web container.
  4. For example, a directory for Sun Java System Application Server might look like the following:

    /opt/SUNWappserver/domains/domain1/applications/j2ee-modules/idm

  5. Change your current working directory to the help/ directory.

  6. Note

    It is important to run helpTool from this directory or the index will not build correctly. In addition, you should remove the old index files by deleting the contents of the index/help/ subdirectory.


  7. Gather the following information for your command line arguments:
    • Destination directoryhtml/help/en_US

    • Note

      Use the locale string appropriate for your installation.


    • Input file../WEB-INF/lib/idm.jar
    • Nova index directoryindex/help
    • Output file nameindex_files_help.txt

    • Note

      The name of the file is not important — but the tool will exit if this file already exists.


    • Indexing properties fileindex/index.properties
  8. Run the following command:
  9. $ java -jar /tmp/helpTool/helpTool.jar -d html/help/en_US -i ../
    WEB-INF/lib/idm.jar -n index/help -o help_files_help.txt -p index/index.properties

    Extracted 475 files.

    [15/Dec/2005:13:11:38] PM Init index/help AWord 1085803878
    [15/Dec/2005:13:11:38] PM Making meta file: index/help/MF: 0
    [15/Dec/2005:13:11:38] PM Created active file: index/help/AL
    [15/Dec/2005:13:11:40] MP Partition: 1, 475 documents, 5496 terms.
    [15/Dec/2005:13:11:40] MP Finished dumping: 1 index/help 0.266
    [15/Dec/2005:13:11:40] IS 475 documents, 6.56 MB, 2.11 s, 11166.66 MB/h
    [15/Dec/2005:13:11:40] PM Waiting for housekeeper to finish
    [15/Dec/2005:13:11:41] PM Shutdown index/help AWord 1085803878

Rebuilding/Re-Creating the Documentation Index

Use the following procedure to rebuild or re-create the documentation index:

  1. Unpack the helpTool distribution to a temporary directory. (Details TBD)
  2. In this example, we will extract the files to /tmp/helpTool.

  3. In a UNIX shell or Windows command window, change directory to the location where the Identity Manager application was deployed to your web container.
  4. For example, a directory for Sun Java System Application Server might look like:

    /opt/SUNWappserver/domains/domain1/applications/j2ee-modules/idm

  5. Change your current working directory to the help/ directory.

  6. Note

    You must run helpTool from this directory or the index will not build correctly. In addition you should remove the old index files by deleting the contents of the index/docs/ subdirectory.


  7. Gather the following information for your command line arguments:
    • Destination directoryhtml/docs
    • Input files../doc/HTML/en_US

    • Note

      The tool will copy the en_US/ directory and subdirectories to the destination.


    • Nova index directoryindex/docs
    • Output file nameindex_files_docs.txt

    • Note

      The name of the file is not important – but the tool will exit if this file already exists.


    • Indexing properties fileindex/index.properties
  8. Run the following command:
  9. $ java -jar /tmp/helpTool/helpTool.jar -d html/docs -i ../doc/HTML/en_US -n index/docs -o help_files_docs.txt -p index/index.properties

    Copied 84 files.

    Copied 105 files.

    Copied 1 files.

    Copied 15 files.

    Copied 1 files.

    Copied 58 files.

    Copied 134 files.

    Copied 156 files.

    Copied 116 files.

    Copied 136 files.

    Copied 21 files.

    Copied 37 files.

    Copied 1 files.

    Copied 13 files.

    Copied 2 files.

    Copied 19 files.

    Copied 20 files.

    Copied 52 files.

    Copied 3 files.

    Copied 14 files.

    Copied 3 files.

    Copied 3 files.

    Copied 608 files.

    [15/Dec/2005:13:24:25] PM Init index/docs AWord 1252155067

    [15/Dec/2005:13:24:25] PM Making meta file: index/docs/MF: 0

    [15/Dec/2005:13:24:25] PM Created active file: index/docs/AL

    [15/Dec/2005:13:24:28] MP Partition: 1, 192 documents, 38488 terms.

    [15/Dec/2005:13:24:29] MP Finished dumping: 1 index/docs 0.617

    [15/Dec/2005:13:24:29] IS 192 documents, 14.70 MB, 3.81 s, 13900.78 MB/h

    [15/Dec/2005:13:24:29] PM Waiting for housekeeper to finish

    [15/Dec/2005:13:24:30] PM Shutdown index/docs AWord 1252155067