Sun Identity Manager 8.1 Resources Reference publication provides reference and procedural information to help you connect to resources and manage accounts on these resources.
SunTM Identity Manager Resources Reference was designed for deployers and administrators who will configure and deploy Identity Manager to manage resources.
Deployers should have a background in programming and should be comfortable with XML, Java, Emacs and/or IDEs such as Eclipse or NetBeans.
Administrators may not have a programming background, but should be highly skilled in one or more resource domains such as LDAP, Active Directory, or SQL.
Before reading this book, you should be familiar with the Sun Identity Manager Overview.
Identity Manager Resources Reference is organized into these chapters:
Chapter 1, Overview of the Resources Reference. Identifies installation, configuration, and implementation information for Identity Manager resource adapter-based resources.
Individual chapters for each supported adapter-based resource. These chapters are presented in alphabetical order.
Chapter 49, Implementing the AttrParse Object. Provides information needed to customize the AttrParse facility, which mainframe-based resource adapters use to extract information from the resource.
Chapter 50, Adding Actions to Resources. Describes how to create and implement actions on various types of resources in Identity Manager.
Chapter 51, Synchronizing LDAP Passwords. Describes the Identity Manager product enhancements that support password synchronization from the Sun JavaTM System Directory Server to the Identity Manager system.
Chapter 52, Active Directory Synchronization Failover. Describes how to limit the number of repeated events that occur when you switch to a new domain controller.
Chapter 53, Mainframe Connectivity. Describes how to connect to a mainframe resource using IBM’s Host on Demand or the Attachmate 3270 Mainframe Adapter for Sun Emulator Class Library.
Chapter 54, Enabling Secure Network Communications (SNC) Connections. Describes how to enable the Access Enforcer, SAP, and SAP HR resource adapters to communicate with SAP systems securely using Secure Network Communications (SNC).
Chapter 55, Deprecated Resource Adapters. Lists no longer supported resource adapters.
Chapter 56, Identity Connectors Overview. This chapter introduces identity connectors, a newly supported feature of Identity Manager. Connectors provide an alternative to resource adapters for managing identities and other object types in native resources.
Individual chapters for each supported connector-based resource. These chapters are presented in alphabetical order.
The Sun Identity Manager 8.1 documentation set includes the following books.
Primary Audience |
Title |
Description |
---|---|---|
All Audiences |
Provides an overview of Identity Manager features and functionality. Provides product architecture information and describes how Identity Manager integrates with other Sun products, such as Sun Open SSO Enterprise and Sun Role Manager. |
|
Describes known issues, fixed issues, and late-breaking information not already provided in the Identity Manager documentation set. |
||
System Administrators |
Describes how to install Identity Manager and optional components such as the Sun Identity Manager Gateway and PasswordSync. |
|
Provides instructions on how to upgrade from an older version of Identity Manager to a newer version. |
||
Contains information and instructions to help system administrators manage, tune, and troubleshoot their Identity Manager installation. |
||
Business Administrators |
Describes how to use Identity Manager provisioning and auditing features. Contains information about the user interfaces, user and account management, reporting, and more. |
|
System Integrators |
Describes how to deploy Identity Manager in complex IT environments. Topics covered include working with identity attributes, data loading and synchronization, configuring user actions, applying custom branding, and so on. |
|
Contains information about workflows, forms, views, and rules, as well as the XPRESS language. |
||
Provides information about installing, configuring, and using resource adapters. |
||
Describes how to deploy Sun Identity Manager Service Provider, and how views, forms, and resources differ from the standard Identity Manager product. |
||
Describes how to configure SPML support, which SPML features are supported (and why), and how to extend support in the field. |
Corrections and updates to this and other Sun Identity Manager publications are posted to the Identity Manager Documentation Updates website:
http://blogs.sun.com/idmdocupdates/
An RSS feed reader can be used to periodically check the website and notify you when updates are available. To subscribe, download a feed reader and click a link under Feeds on the right side of the page. Starting with version 8.0, separate feeds are available for each major release.
Third-party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused or alleged to be caused by or in connection with use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
Sun is interested in improving its documentation and welcomes your comments and suggestions. To share your comments, go to http://docs.sun.com and click Feedback.
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX® system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell |
machine_name% |
C shell for superuser |
machine_name# |
Bourne shell and Korn shell |
$ |
Bourne shell and Korn shell for superuser |
# |
The Windows command-line prompt is C:\.