This Sun Identity Manager 8.1 Technical Deployment Guide publication provides an overview of the reference and procedural information you will use to customize Sun Identity Manager for your environment.
TheSun Identity Manager 8.1 Technical Deployment Guide was designed for deployers and administrators who will create and update workflows, views, rules, system configurations and other configuration files necessary to customize Identity Manager for a customer installation during different phases of product deployment.
Deployers should have a background in programming and should be comfortable with XML, Java, Emacs and/or IDEs such as Eclipse or NetBeans.
This book is organized into these chapters:
Chapter 1, Working with Attributes introduces Identity attributes and how to use this feature to streamline the data flow through your Identity Manager deployment.
Chapter 2, Working with Authorization Types describes how to assign authorization rights to Identity Manager objects.
Chapter 3, Data Loading and Synchronization presents an overview of the reconciliation and other mechanisms for loading account information into Identity Manager. Reconciliation compares the set of users defined in Identity Manager to the set of accounts that are defined on an Identity Manager resource.
Chapter 4, Dataloading Scenario provides tips to consider when preparing to load account information into Identity Manager, including sample scenarios that illustrate some of the issues that you might encounter.
Chapter 5, Data Exporter describes how to plan for and implement the Data Exporter feature.
Chapter 6, Configuring User Actions describes how to add custom tasks to the Identity Manager Administrator Interface and configure user actions that you can execute from two areas of the interface.
Chapter 7, Private Labeling of Identity Manager describes how to customize IDM colors, logos, and header and footer content to meet the style standards of your organization.
Chapter 8, Customizing Message Catalogs describes how to create a message catalog so that you can override the default text displayed on the user and administrator interfaces.
Chapter 9, Developing Custom Adapters describes how to create custom Identity Manager resource adapters that are tailored to your company or customers.
Chapter 10, Editing Configuration Objects provides an overview of configuration objects and a discussion of the UserUIConfig object.
Chapter 11, Enabling Internationalization provides information on configuring Identity Manager to use multiple languages or display a language other than English.
Sun provides additional documentation and information to help you install, use, and configure Identity Manager. The Sun Identity Manager 8.1 library includes the following publications:
Primary Audience |
Title |
Description |
---|---|---|
All Audiences |
Provides an overview of Identity Manager features and functionality. Provides product architecture information and describes how Identity Manager integrates with other Sun products, such as Sun Open SSO Enterprise and Role Manager. |
|
Describes known issues, fixed issues, and late-breaking information not already provided in the Identity Manager documentation set. |
||
System Administrators |
Describes how to install Identity Manager and optional components such as the Sun Identity Manager Gateway and PasswordSync. |
|
Provides instructions on how to upgrade from an older version of Identity Manager to a newer version. |
||
Contains information and instructions to help system administrators manage, tune, and troubleshoot their Identity Manager installation. |
||
Business Administrators |
Describes how to use Identity Manager's provisioning and auditing features. Contains information on the user interfaces, user and account management, reporting, and more. |
|
System Integrators |
Describes how to deploy Identity Manager in complex IT environments. Topics covered include working with identity attributes, data loading and synchronization, configuring user actions, applying custom branding, and so on. |
|
Contains information on workflows, forms, views, and rules, as well as the XPRESS language. |
||
Provides information about installing, configuring, and using resource adapters. |
||
Describes how to deploy Sun Identity Manager Service Provider, and how views, forms, and resources differ from the standard Identity Managerproduct. |
||
Describes how to configure SPML support, which SPML features are supported (and why), and how to extend support in the field. |
In addition, the http://docs.sun.com web site enables you to access Sun technical documentation online. You can browse the archive or search for a specific book title or subject.
Corrections and updates to this and other Identity Manager publications are posted to the Identity Manager Documentation Updates website:
http://blogs.sun.com/idmdocupdates/
An RSS feed reader can be used to periodically check the website and notify you when updates are available. To subscribe, download a feed reader and click a link under Feeds on the right side of the page. Starting with version 8.0, separate feeds are available for each major release.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
Sun is interested in improving its documentation and welcomes your comments and suggestions. To share your comments, go to http://docs.sun.com and click Feedback.
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |