Oracle® Identity Manager Connector Guide for RSA Authentication Manager Release 9.0.4 Part Number E11207-04 |
|
|
View PDF |
After you deploy the connector, you must configure it to meet your requirements. This chapter discusses the following connector configuration procedures:
Note:
These sections provide both conceptual and procedural information about configuring the connector. It is recommended that you read the conceptual information before you perform the procedures.Note:
This chapter provides both conceptual and procedural information about customizing the connector. It is recommended that you read the conceptual information before you perform the procedures.As mentioned earlier in this guide, reconciliation involves duplicating in Oracle Identity Manager additions of and modifications to user accounts on the target system. This section discusses the following topics related to configuring reconciliation:
By default, all target system records that are added or modified after the last reconciliation run are reconciled during the current reconciliation run. You can customize this process by specifying the subset of added or modified target system records that must be reconciled. You do this by creating filters for the reconciliation module.
For this connector, you create a filter by specifying values for the CustomReconQuery
, CompareType
, and GroupTokenizerForCustomReconQuery
of Scheduled Task attributes while performing the procedure described in the "Configuring the Reconciliation Scheduled Tasks" section.
You can use the following attributes to build the query condition:
Last Name
First Name
Default Login
Permanent or Temporary
By Token
By User Extension
Group
The following table lists sample query conditions:
CustomReconQuery | CompareType | Description |
---|---|---|
[none] |
Note: You can specify any value, but it must not be an empty value because scheduler does not allow empty values attributes. | Gets all users that are available in the target system |
Last Name=D |
Begins With |
Gets all users whose last name starts with D |
Last Name=Doe |
Equals To |
Gets all users with Doe as their last name |
Last Name=oe |
Contains |
Gets all users whose last name contains oe |
First Name=J |
Begins With |
Gets all users whose first name starts with J |
First Name=John |
Equals To |
Gets all users with John as their first name |
First Name=oh |
Contains |
Gets all user whose first name contains oh |
First Name |
With Empty Value |
Gets all users with empty values as first name |
First Name |
With Non Empty Value |
Gets all users with nonempty values as first name |
Default Login=j |
Begins With |
Gets all users whose default login starts with j |
Default Login=john |
Equals To | Gets all users with john as their default login |
Default Login=oh |
Contains |
Gets all users whose default login contains oh |
By Token |
Lost Tokens |
Gets all users with token status as Lost |
By Token |
All With Passwords |
Gets all users who have a password |
By Token |
All With Expired Tokens |
Gets all users with token status as Expired |
By User Extension |
All With Extension |
Gets all users that have extension data |
By User Extension |
All Without Extension |
Gets all users that do not have extension data |
By User Extension=key1 |
All With Extension Keys |
Gets all users that have extension data with key as key1 |
By User Extension=key1 |
All Without Extension Keys |
Gets all users that do not have extension data with key containing key1 |
Permanent or Temporary |
All Permanent |
Gets all permanent users |
Permanent or Temporary |
All Temporary |
Gets all temporary users |
If you want to reconcile users with more than one group, then you can specify multiple groups as the value of CustomReconQuery
, for example, CustomReconQuery=grp1,grp2,grp3
. In this example, the group names are separated by commas. You can specify the separator by specifying the value of GroupTokenizerForCustomReconQuery
, as shown:
GroupTokenizerForCustomReconQuery=,
The following table lists sample query conditions with values for GroupTokenizerForCustomReconQuery
:
CustomReconQuery | CompareType | GroupTokenizerForCustomReconQuery | Description |
---|---|---|---|
Group=grpParent,grpChild1
Note: If the group name consists of comma, you can specify any other separator, such as $. |
Note: You can specify any value, but it must not be an empty value because scheduler does not allow empty value for attributes. | $ |
Gets all users who belong to the grpParent,grpChild1 group |
Group=grpParent,grpChild1$ grpParent,grpChild2 |
Any value | $ | Gets all users who belong to the grpParent,grpChild1 group or the grpParent,grpChild2 group |
While configuring the connector, the target system can be designated as a trusted source or target resource. If you designate the target system as a trusted source, then both newly created and modified user accounts are reconciled in Oracle Identity Manager. If you designate the target system as a target resource, then only modified user accounts are reconciled in Oracle Identity Manager.
Note:
You can skip this section if you do not want to designate the target system as a trusted source for reconciliation.Configuring trusted source reconciliation involves the following steps:
Import the XML file for trusted source reconciliation, RSAAuthManagerXLResourceObject.xml
, by using the Deployment Manager. This section describes the procedure to import the XML file.
Note:
Only one target system can be designated as a trusted source. If you import theRSAAuthManagerXLResourceObject.xml
file while you have another trusted source configured, then both connector reconciliations would stop working.Set the IsTrusted
scheduled task attribute to True
. You specify a value for this attribute while configuring the user reconciliation scheduled task, which is described later in this guide.
To import the XML file for trusted source reconciliation:
Open the Oracle Identity Manager Administrative and User Console.
Click the Deployment Management link on the left navigation bar.
Click the Import link under Deployment Management. A dialog box for locating files is displayed.
Locate and open the RSAAuthManagerXLResourceObject.xml
file, which is in the OIM_HOME
/xellerate/XLIntegrations/AuthManager/xml
directory. Details of this XML file are shown on the File Preview page.
Click Add File. The Substitutions page is displayed.
Click Next. The Confirmation page is displayed.
Click Import.
In the message that is displayed, click Import to confirm that you want to import the XML file and then click OK.
After you import the XML file for trusted source reconciliation, you must set the value of the IsTrusted
reconciliation scheduled task attribute to True
. This procedure is described in the "Configuring the Reconciliation Scheduled Tasks" section.
When you perform the procedure described in the "Step 5: Importing the Connector XML Files" section, the scheduled tasks for lookup fields and user reconciliations are automatically created in Oracle Identity Manager. To configure the scheduled task:
Expand the Xellerate Administration folder.
Select Task Scheduler.
Click Find. The details of the predefined scheduled task are displayed.
Enter a number in the Max Retries field. This number represents the number of times Oracle Identity Manager must attempt to complete the task before assigning the FAILED
status to the task.
Ensure that the Disabled and Stop Execution check boxes are not selected.
In the Start region, double-click the Start Time field. From the date-time editor that is displayed, set the date and time at which you want the task to run.
In the Interval region, set the following schedule parameters:
To set the task to run on a recurring basis, select the Daily, Weekly, Recurring Intervals, Monthly, or Yearly option.
If you select the Recurring Intervals option, then you must also specify the time interval at which you want to run the task on a recurring basis.
To set the task to run only once, select the Once option.
Provide values for the user-configurable attributes of the scheduled task. Refer to the following table for information about the values to be specified.
See Also:
Oracle Identity Manager Design Console Guide for information about adding and removing task attributesAttribute | Description | Sample Value |
---|---|---|
IsTrusted |
Specifies whether or not reconciliation must be performed in trusted mode. | True or False |
Server |
Name of the IT resource. | ACE Server Remote |
Target System Recon - Resource Object name |
Name of the target system resource object corresponding to the RSA Authentication Manager User. | Auth Manager User |
Target System Recon - Token Resource Object name |
Name of the target system resource object corresponding to the RSA Authentication Manager User Token, which was assigned to user. | Auth Manager Token |
Trusted Source Recon - Resource Object name |
Name of the trusted source Resource Object. | Xellerate User |
IsDeleteAllowed |
Specifies whether or not the users who have been deleted in the target system should be deleted in Oracle Identity Manager. | True or False |
Start Record |
Specifies the record number from which the reconciliation for CustomReconQuery and CompareType must begin.
If Scheduler Task fails after reconciling 10000 records, then you can specify the value of |
1 |
BatchSize |
Specifies the number of records to be reconciled in a batch.
Caution: If you specify a very high value for |
1000 |
FieldMapForCustomQuery |
Specifies the lookup defintion name that contains the mapping between the CustomReconQuery field name and the target system equivalent number for that field name.
RSA ACE Server API accepts numbers to indicate the field name in the target system. |
UD_Lookup.Ace.CustomRecon.FieldMap |
CompareTypeMapForCustomQuery |
Specifies the lookup definition name, which contains the mapping between CompareType and its equivalent number in the target system. The CompareType is mentioned in the task scheduler.
RSA ACE Server accepts numbers to indicate the operator on field to search for the mapping. |
UD_Lookup.Ace.CustomRecon.CompareTypeMap |
CustomReconQuery |
Query condition on which reconciliation must be based.
If you specify a query condition for this attribute, then the target system records are searched based on the query condition. If you want to reconcile all the target system records, then specify [None] as the value for this attribute. For more information about this parameter, refer to the "Limited Reconciliation" section. |
[None] |
CompareType |
Specifies the type of comparison used in the query condition of CustomReconQuery. | Equals To |
NumberOfCharactersInEachUser |
Indicates the memory allocated for each user in C code.
Caution: If you specify a very low value for |
500 |
Organization |
Specifies the name of the organization under which users are created during trusted source reconciliation. | Xellerate Users |
Xellerate Type |
Specifies the user type created during trusted source reconciliation.
If you reconcile users in trusted mode, then you must specify a value for this attribute. |
End-User |
Role |
Specifies the type of employment of a user in trusted source reconciliation. | Full-Time |
TrustedDeleteReconObjectStatusLis t |
Indicates the status of the list of users that need to be deleted while performing delete reconciliation in trusted mode.
f you perform delete reconciliation in trusted mode, then you must specify the statuses, separated by a comma. |
Enabled, Disabled, Active |
TargetDeleteReconObjectStatusList |
Indicates the status of the list of users that needs to be deleted during target resource reconciliation.
If you delete users during target resource reconciliation, then you must specify the statuses, separated by a comma. |
Enabled, Disabled, Provisioned |
TrustedDeleteReconExemptedUserIDs |
Specifies the list of user IDs that must be excluded from trusted delete reconciliation. | XELOPERATOR, XELSELFREG, XELSYSADM |
GroupTokenizerForCustomReconQuery |
Specifies the token for the groups provided in CustomReconQuery.
For more information about |
$ |
IsEnableLog |
Specifies whether or not to generate a log file when performing reconciliation.
The default value for the Note: The log file always appends the existing log file. As a result, the file size may exceed disk space. Therefore, set the value of When the value is set to |
Yes or No |
LogFileLocationInRemoteManager |
Specifies the location in the Remote Manager where the log file is to be generated.
The default value is Note: The Remote Manager absolute path is the location in which Remote Manager's |
D:\RM\log |
Click Save. The scheduled task is created. The INACTIVE
status is displayed in the Status field, because the task is not currently running. The task is run at the date and time that you set in Step 7.
Stopping Reconciliation
Suppose the User Reconciliation Scheduled Task for the connector is running and user records are being reconciled. If you want to stop the reconciliation process:
Perform Steps 1 through 4 of the procedure to configure reconciliation scheduled tasks.
Select the Stop Execution check box in the task scheduler.
Click Save.
As mentioned earlier in this guide, provisioning involves creating or modifying a user's account information on the target system through Oracle Identity Manager. Refer to the "Supported Functionality" section for a listing of the provisioning functions that are available with this connector.
This section discusses the following topics related to configuring provisioning:
Note:
You must perform these procedures if you want to use the provisioning features of Oracle Identity Manager for this target system.Adapters are used to implement provisioning functions. The following adapters are imported into Oracle Identity Manager when you import the connector XML file:
ACE ASSIGN TO GROUP
ACE DELETE USER
ACE CREATE USER
SetRSAUserAttribute
ACE PrePop DefLogin
ACE PrePop FirstName
ACE PrePop GrpLogin
ACE PrePop LastName
ACE ASSIGN TOKEN
ACE REMOVE TOKEN
ACE DISABLE TOKEN
ACE SET PIN
ACE SET PIN TO NTC
ACE TRACK LOST TOKEN
ACE ENABLE TOKEN
ACE TEST LOGIN
ACE ADD USER EXTENSION DATA TO USER
ACE UPDATE USER EXTENSION DATA FOR USER
ACE DEL USER EXTENSION DATA TO USER
Set Temporary User
You must compile these adapters before they can be used in provisioning operations.
To compile adapters by using the Adapter Manager form:
Open the Adapter Manager form.
To compile all the adapters that you import into the current database, select Compile All.
To compile multiple (but not all) adapters, select the adapters you want to compile. Then, select Compile Selected.
Note:
Click Compile Previously Failed to recompile only those adapters that were not compiled successfully. Such adapters do not have anOK
compilation status.Click Start. Oracle Identity Manager compiles the selected adapters.
If Oracle Identity Manager is installed in a clustered environment, then copy the compiled adapters from the OIM_HOME
/xellerate/Adapter
directory to the same directory on each of the other nodes of the cluster. If required, overwrite the adapter files on the other nodes.
If you want to compile one adapter at a time, then use the Adapter Factory form.
See Also:
Oracle Identity Manager Tools Reference Guide for information about using the Adapter Factory and Adapter Manager formsTo view detailed information about an adapter:
Highlight the adapter in the Adapter Manager form.
Double-click the row header of the adapter, or right-click the adapter.
Select Launch Adapter from the shortcut menu that is displayed. Details of the adapter are displayed.
When you use this connector to run provisioning functions that are specific to software tokens, you must provide the required input parameters, such as the Token Code.
You can determine the values of these token-specific parameters only after the RSA Software Token application is installed on the Oracle Identity Manager server or on a user computer other than the Oracle Identity Manager server.
If you are using RSA SecurID software tokens, then:
Download RSA SecurID Token for Windows Desktops 3.0.5 from
Install the file on the Oracle Identity Manager server.
Copy the RSA SecurID software token file to an appropriate location on the Oracle Identity Manager server. The file to be copied is in the RSA Authentication Manager installation directory. The format of the directory path where you copy this file can be as follows:
target_dir_location/Token1File/
Note:
While assigning a software token to an ACE user, you must specify the name and complete location of this file (in thedb_file_location
/
file_name
.sdtid
format) in the Software Token File Name process form field.Import the .sdtid
file into the RSA SecurID Token software application as follows:
Click Start, and then select Programs.
Click RSA SecurID Software Token, and select the subcategory RSA SecurID Software Token.
The token screen is displayed.
Click the File menu, and then select Import Tokens. In the dialog box that is displayed, select the .sdtid
file mentioned in Step 3.
For example:
target_dir_location/Token1File/file_name.sdtid
Select the token serial number, and click Transfer Selected Tokens to Hard Drive. The software token is imported.
On the screen that is displayed, click View and then select Advanced View.
On the screen that is displayed, click View and then select Token View to view the software token number.
Note:
Perform this procedure only if you want to configure the connector for multiple installations of RSA Authentication Manager.You may want to configure the connector for multiple installations of RSA Authentication Manager. The following example illustrates this requirement:
The Tokyo, London, and New York offices of Example Multinational Inc. have their own installations of RSA Authentication Manager. The company has recently installed Oracle Identity Manager, and they want to configure Oracle Identity Manager to link all the installations of RSA Authentication Manager.
To meet the requirement posed by such a scenario, you must configure the connector for multiple installations of RSA Authentication Manager.
To configure the connector for multiple installations of the target system:
See Also:
Oracle Identity Manager Design Console Guide for detailed instructions on performing each step of this procedureCreate and configure one IT resource for each target system installation.
The IT Resources form is in the Resource Management folder. An IT resource is created when you import the connector XML file. You can use this IT resource as the template for creating the remaining IT resources, of the same resource type.
Configure reconciliation for each target system installation. Refer to the "Configuring Reconciliation" section for instructions. Note that you need to modify only the attributes that are used to specify the IT resource and to specify whether or not the target system installation is to be set up as a trusted source.
You can designate either a single or multiple installations of RSA Authentication Manager as the trusted source.
If required, modify the fields to be reconciled for the Xellerate User resource object.
When you use the Administrative and User Console to perform provisioning, you can specify the IT resource corresponding to the RSA Authentication Manager installation to which you want to provision the user.