Sun Identity Manager Overview

Preface

Sun Identity Manager 8.1 Overview answers the question What is SunTM Identity Manager and how does it work? The book describes Identity Manager product architecture, as well as information on how to plan a high-availability deployment.

Who Should Use This Book

This guide is for IT professionals who are looking to better understand Sun Identity Manager 8.1 and associated software. It will be of special value to IT professionals who are either in the process of evaluating Identity Manager, or who are in the beginning stages of planning an Identity Manager deployment.

How This Book Is Organized

This guide is organized into the following chapters:

Chapter 1, Product Overview describes the purpose of Identity Manager and highlights the application's major features.

Chapter 2, Product Architecture describes the Identity Manager architecture, the Service Provider architecture, and the web services architecture. Guidelines for system separation and physical proximity are also covered.

Chapter 3, Clustering and High Availability provides guidance on how to implement a high availability / fault tolerant (HA/FT) Identity Manager environment. It will also help you assess the amount of availability that your Identity Manager deployment requires.

Related Books

The Sun Identity Manager 8.1 documentation set includes the following books.

Primary Audience 

Title 

Description 

All Audiences 

Sun Identity Manager Overview

Provides an overview of Identity Manager features and functionality. Provides product architecture information and describes how Identity Manager integrates with other Sun products, such as Sun Open SSO Enterprise and Sun Role Manager. 

Sun Identity Manager 8.1 Release Notes

Describes known issues, fixed issues, and late-breaking information not already provided in the Identity Manager documentation set. 

System Administrators 

Installation Guide

Describes how to install Identity Manager and optional components such as the Sun Identity Manager Gateway and PasswordSync. 

Upgrade Guide

Provides instructions on how to upgrade from an older version of Identity Manager to a newer version.  

System Administrator’s Guide

Contains information and instructions to help system administrators manage, tune, and troubleshoot their Identity Manager installation. 

Business Administrators 

Business Administrator’s Guide

Describes how to use Identity Manager provisioning and auditing features. Contains information about the user interfaces, user and account management, reporting, and more. 

System Integrators 

Deployment Guide

Describes how to deploy Identity Manager in complex IT environments. Topics covered include working with identity attributes, data loading and synchronization, configuring user actions, applying custom branding, and so on. 

Deployment Reference

Contains information about workflows, forms, views, and rules, as well as the XPRESS language.  

Resources Reference

Provides information about installing, configuring, and using resource adapters. 

Service Provider 8.1 Deployment

Describes how to deploy Sun Identity Manager Service Provider, and how views, forms, and resources differ from the standard Identity Manager product.  

Web Services Guide

Describes how to configure SPML support, which SPML features are supported (and why), and how to extend support in the field. 

Documentation Updates

Corrections and updates to this and other Sun Identity Manager publications are posted to the Identity Manager Documentation Updates website:

http://blogs.sun.com/idmdocupdates/

An RSS feed reader can be used to periodically check the website and notify you when updates are available. To subscribe, download a feed reader and click a link under Feeds on the right side of the page. Starting with version 8.0, separate feeds are available for each major release.

Related Third-Party Web Site References

Third-party URLs are referenced in this document and provide additional, related information.


Note –

Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.


Documentation, Support, and Training

The Sun web site provides information about the following additional resources:

Sun Welcomes Your Comments

Sun is interested in improving its documentation and welcomes your comments and suggestions. To share your comments, go to http://docs.sun.com and click Feedback.

Typographic Conventions

The following table describes the typographic conventions that are used in this book.

Table P–1 Typographic Conventions

Typeface 

Meaning 

Example 

AaBbCc123

The names of commands, files, and directories, and onscreen computer output 

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.

AaBbCc123

What you type, contrasted with onscreen computer output 

machine_name% su

Password:

aabbcc123

Placeholder: replace with a real name or value 

The command to remove a file is rm filename.

AaBbCc123

Book titles, new terms, and terms to be emphasized 

Read Chapter 6 in the User's Guide.

A cache is a copy that is stored locally.

Do not save the file.

Note: Some emphasized items appear bold online.

Shell Prompts in Command Examples

The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P–2 Shell Prompts

Shell 

Prompt 

C shell 

machine_name%

C shell for superuser 

machine_name#

Bourne shell and Korn shell 

$

Bourne shell and Korn shell for superuser 

#