Sun Identity Manager 8.1 Installation describes how to install SunTM Identity Manager software.
This guide is for system deployers and system administrators who will install Sun Identity Manager 8.1 and perform initial integration tasks. This guide is not for administrators who are upgrading Identity Manager to a newer version. Please see Sun Identity Manager 8.1 Upgrade if you need to upgrade an existing installation of Identity Manager.
Before reading this book, you should be familiar with the Sun Identity Manager Overview.
This guide is organized into five parts:
Part I contains the steps to complete before you install Identity Manager.
Part II contains the Identity Manager installation steps.
Part III includes information on installing optional components.
Part IV describes how to start the Administrator interface and verify that the installation was successful.
Part V contains miscellaneous information that you might need during the installation process. It also includes information on how to uninstall Identity Manager.
The Sun Identity Manager 8.1 documentation set includes the following books.
Primary Audience |
Title |
Description |
---|---|---|
All Audiences |
Provides an overview of Identity Manager features and functionality. Provides product architecture information and describes how Identity Manager integrates with other Sun products, such as Sun Open SSO Enterprise and Sun Role Manager. |
|
Describes known issues, fixed issues, and late-breaking information not already provided in the Identity Manager documentation set. |
||
System Administrators |
Describes how to install Identity Manager and optional components such as the Sun Identity Manager Gateway and PasswordSync. |
|
Provides instructions on how to upgrade from an older version of Identity Manager to a newer version. |
||
Contains information and instructions to help system administrators manage, tune, and troubleshoot their Identity Manager installation. |
||
Business Administrators |
Describes how to use Identity Manager provisioning and auditing features. Contains information about the user interfaces, user and account management, reporting, and more. |
|
System Integrators |
Describes how to deploy Identity Manager in complex IT environments. Topics covered include working with identity attributes, data loading and synchronization, configuring user actions, applying custom branding, and so on. |
|
Contains information about workflows, forms, views, and rules, as well as the XPRESS language. |
||
Provides information about installing, configuring, and using resource adapters. |
||
Describes how to deploy Sun Identity Manager Service Provider, and how views, forms, and resources differ from the standard Identity Manager product. |
||
Describes how to configure SPML support, which SPML features are supported (and why), and how to extend support in the field. |
Corrections and updates to this and other Sun Identity Manager publications are posted to the Identity Manager Documentation Updates website:
http://blogs.sun.com/idmdocupdates/
An RSS feed reader can be used to periodically check the website and notify you when updates are available. To subscribe, download a feed reader and click a link under Feeds on the right side of the page. Starting with version 8.0, separate feeds are available for each major release.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
Sun is interested in improving its documentation and welcomes your comments and suggestions. To share your comments, go to http://docs.sun.com and click Feedback.
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |
The Windows command-line prompt is C:\.