3 Using the Connector

After you deploy the connector, you must configure it to meet your requirements.

This chapter is divided into the following sections:

Note:

These sections provide both conceptual and procedural information about configuring the connector. It is recommended that you read the conceptual information before you perform the procedures.

3.1 Scheduled Jobs for Lookup Field Synchronization

Lookup field synchronization involves copying additions or changes made to the target system lookup fields into the lookup definitions in Oracle Identity Manager.

The following scheduled jobs are used for lookup field synchronization:

  • SAP UM CommType Lookup Reconciliation

  • SAP UM Company Lookup Reconciliation

  • SAP UM ContractUserType Lookup Reconciliation

  • SAP UM DateFormat Lookup Reconciliation

  • SAP UM DecimalNot Lookup Reconciliation

  • SAP UM LangComm Lookup Reconciliation

  • SAP UM Parameter Lookup Reconciliation

  • SAP UM Profile Lookup Reconciliation

  • SAP UM Role Lookup Reconciliation

  • SAP UM Systems Lookup Reconciliation

  • SAP UM TimeZone Lookup Reconciliation

  • SAP UM Title Lookup Reconciliation

  • SAP UM UserGroup Lookup Reconciliation

  • SAP UM UserType Lookup Reconciliation

Note:

Before running a scheduled job for lookup field synchronization, you must copy all the third-party libraries to the following directory:

OIM_HOME/xellerate/ConnectorDefaultDirectory/targetsystems-lib/sap-11.1.1.5.0

You can specify values for the attributes of these scheduled jobs. Table 3-1 describes the attributes of these scheduled jobs. Configuring Scheduled Jobs describes the procedure to configure scheduled jobs.

Table 3-1 Attributes of the Scheduled Jobs for Lookup Field Synchronization

Attribute Description

Code Key Attribute

Name of the connector or target system attribute that is used to populate the Code Key column of the lookup definition (specified as the value of the Lookup Name attribute).

Depending on the scheduled job you are using, the default values are as follows:

  • For SAP UM CommType Lookup Reconciliation: COMM_TYPE

  • For SAP UM Company Lookup Reconciliation: COMPANY

  • For SAP UM ContractUserType Lookup Reconciliation: USERTYP

  • For SAP UM DateFormat Lookup Reconciliation: _LOW

  • For SAP UM DecimalNot Lookup Reconciliation: _LOW

  • For SAP UM LangComm Lookup Reconciliation: SPRAS

  • For SAP UM Parameter Lookup Reconciliation: PARAMID

  • For SAP UM Profile Lookup Reconciliation: SUBSYSTEM

  • For SAP UM Role Lookup Reconciliation: SUBSYSTEM

  • For SAP UM Systems Lookup Reconciliation: RCVSYSTEM

  • For SAP UM TimeZone Lookup Reconciliation: TZONE

  • For SAP UM Title Lookup Reconciliation: TITLE_MEDI

  • For SAP UM UserGroup Lookup Reconciliation: USERGROUP

  • For SAP UM UserType Lookup Reconciliation: _LOW

Note: You must not change the value of this attribute.

Decode Attribute

Enter the name of the connector or target system attribute that is used to populate the Decode column of the lookup definition (specified as the value of the Lookup Name attribute).

Depending on the scheduled job you are using, the default values are as follows:

  • For SAP UM CommType Lookup Reconciliation: COMM_TEXT

  • For SAP UM Company Lookup Reconciliation: COMPANY

  • For SAP UM ContractUserType Lookup Reconciliation: UTYPTEXT

  • For SAP UM DateFormat Lookup Reconciliation: _TEXT

  • For SAP UM DecimalNot Lookup Reconciliation: _TEXT

  • For SAP UM LangComm Lookup Reconciliation: SPTXT

  • For SAP UM Parameter Lookup Reconciliation: PARTEXT

  • For SAP UM Profile Lookup Reconciliation: USRSYSPRF

  • For SAP UM Role Lookup Reconciliation: USRSYSACT

  • For SAP UM Systems Lookup Reconciliation: RCVSYSTEM

  • For SAP UM TimeZone Lookup Reconciliation: DESCRIPT

  • For SAP UM Title Lookup Reconciliation: TITLE_MEDI

  • For SAP UM UserGroup Lookup Reconciliation: TEXT

  • For SAP UM UserType Lookup Reconciliation: _TEXT

Filter

Enter a filter to filter out records to be stored in the lookup definition.

For more information about the Filter attribute, see Limited Reconciliation.

IT Resource Name

Name of the IT resource for the target system installation from which you want to reconcile records.

Default value: SAP UM ITResource

Lookup Name

Enter the name of the lookup definition in Oracle Identity Manager that must be populated with values fetched from the target system.

Note: If the lookup name that you specify as the value of this attribute is not present in Oracle Identity Manager, then this lookup definition is created while the scheduled job is run.

Depending on the scheduled job you are using, the default values are as follows:

  • For SAP UM CommType Lookup Reconciliation: Lookup.SAPABAP.CommType

  • For SAP UM Company Lookup Reconciliation: Lookup.SAPABAP.Company

  • For SAP UM ContractUserType Lookup Reconciliation: Lookup.SAPABAP.ContractualUserType

  • For SAP UM DateFormat Lookup Reconciliation: Lookup.SAPABAP.DateFormat

  • For SAP UM DecimalNot Lookup Reconciliation: Lookup.SAPABAP.DecimalNotation

  • For SAP UM LangComm Lookup Reconciliation: Lookup.SAPABAP.LangComm

  • For SAP UM Parameter Lookup Reconciliation: Lookup.SAPABAP.Parameter

  • For SAP UM Profile Lookup Reconciliation: Lookup.SAPABAP.Profile

  • For SAP UM Role Lookup Reconciliation: Lookup.SAPABAP.Roles

  • For SAP UM Systems Lookup Reconciliation: Lookup.SAPABAP.System

  • For SAP UM TimeZone Lookup Reconciliation: Lookup.SAPABAP.TimeZone

  • For SAP UM Title Lookup Reconciliation: Lookup.SAPABAP.UserTitle

  • For SAP UM UserGroup Lookup Reconciliation: Lookup.SAPABAP.UserGroups

  • For SAP UM UserType Lookup Reconciliation: Lookup.SAPABAP.UserType

Object Class

Enter the name of the class of the object you want to reconcile.

Depending on the scheduled job you are using, the default values are as follows:

  • For SAP UM CommType Lookup Reconciliation: commtype

  • For SAP UM Company Lookup Reconciliation: company

  • For SAP UM ContractUserType Lookup Reconciliation: contractualusertype

  • For SAP UM DateFormat Lookup Reconciliation: dateformat

  • For SAP UM DecimalNot Lookup Reconciliation: decimalnotation

  • For SAP UM LangComm Lookup Reconciliation: languagecommunication

  • For SAP UM Parameter Lookup Reconciliation: parameters

  • For SAP UM Profile Lookup Reconciliation: profiles

  • For SAP UM Role Lookup Reconciliation: activityGroups

  • For SAP UM Systems Lookup Reconciliation: cuaSystems

  • For SAP UM TimeZone Lookup Reconciliation: timeZones

  • For SAP UM Title Lookup Reconciliation: title

  • For SAP UM UserGroup Lookup Reconciliation: __GROUP__

  • For SAP UM UserType Lookup Reconciliation: usertype

Object Type

Enter the name of the type of object you want to reconcile.

Depending on the scheduled job you are using, the default values are as follows:

  • For SAP UM CommType Lookup Reconciliation: commtype

  • For SAP UM Company Lookup Reconciliation: company

  • For SAP UM ContractUserType Lookup Reconciliation: contractualusertype

  • For SAP UM DateFormat Lookup Reconciliation: dateformat

  • For SAP UM DecimalNot Lookup Reconciliation: decimalnotation

  • For SAP UM LangComm Lookup Reconciliation: languagecommunication

  • For SAP UM Parameter Lookup Reconciliation: parameters

  • For SAP UM Profile Lookup Reconciliation: profiles

  • For SAP UM Role Lookup Reconciliation: activityGroups

  • For SAP UM Systems Lookup Reconciliation: cuaSystems

  • For SAP UM TimeZone Lookup Reconciliation: timeZones

  • For SAP UM Title Lookup Reconciliation: title

  • For SAP UM UserGroup Lookup Reconciliation: GROUP

  • For SAP UM UserType Lookup Reconciliation: usertype

3.2 Scheduled Jobs for SAP BusinessObjects AC Lookup Field Synchronization

Lookup field synchronization involves copying additions or changes made to the target system lookup fields into the lookup definitions in Oracle Identity Manager.

The following scheduled jobs are used for SAP BusinessObjects AC lookup field synchronization:

  • SAP AC UM BusinessProcess Lookup Reconciliation

  • SAP AC UM CommType Lookup Reconciliation

  • SAP AC UM Company Lookup Reconciliation

  • SAP AC UM ContractUserType Lookup Reconciliation

  • SAP AC UM DateFormat Lookup Reconciliation

  • SAP AC UM DecimalNot Lookup Reconciliation

  • SAP AC FunctionalArea Lookup Reconciliation

  • SAP AC UM ItemProvAction Lookup Reconciliation

  • SAP AC UM LangComm Lookup Reconciliation

  • SAP AC UM Parameter Lookup Reconciliation

  • SAP AC UM Priority Lookup Reconciliation

  • SAP AC UM Profile Lookup Reconciliation

  • SAP AC UM ReqInitSystem Lookup Reconciliation

  • SAP AC UM RequestType Lookup Reconciliation

  • SAP AC UM Role Lookup Reconciliation

  • SAP AC UM Systems Lookup Reconciliation

  • SAP AC UM TimeZone Lookup Reconciliation

  • SAP AC UM Title Lookup Reconciliation

  • SAP AC UM User Delete Recon

  • SAP AC UM UserGroup Lookup Reconciliation

  • SAP AC UM User Recon

  • SAP AC UM UserType Lookup Reconciliation

You can specify values for the attributes of these scheduled jobs. Table 3-2 describes the attributes of these scheduled jobs. Configuring Scheduled Jobs describes the procedure to configure scheduled jobs.

Table 3-2 Attributes of the Scheduled Jobs for SAP BusinessObjects AC Lookup Field Synchronization

Attribute Description

Code Key Attribute

Name of the connector or target system attribute that is used to populate the Code Key column of the lookup definition (specified as the value of the Lookup Name attribute).

Depending on the scheduled job you are using, the default values are as follows:

  • SAP AC UM BusinessProcess Lookup Reconciliation: LCODE

  • SAP AC UM CommType Lookup Reconciliation: COMM_TYPE

  • SAP AC UM Company Lookup Reconciliation: COMPANY

  • SAP AC UM ContractUserType Lookup Reconciliation: USERTYP

  • SAP AC UM DateFormat Lookup Reconciliation: _LOW

  • SAP AC UM DecimalNot Lookup Reconciliation: _LOW

  • SAP AC UM FunctionalArea Lookup Reconciliation: LCODE

  • SAP AC UM ItemProvAction Lookup Reconciliation: LCODE

  • SAP AC UM LangComm Lookup Reconciliation: SPRAS

  • SAP AC UM Parameter Lookup Reconciliation: PARAMID

  • SAP AC UM Priority Lookup Reconciliation: LCODE

  • SAP AC UM Profile Lookup Reconciliation: SUBSYSTEM

  • SAP AC UM ReqInitSystem Lookup Reconciliation: REQSYSCODE

  • SAP AC UM RequestType Lookup Reconciliation: LCODE

  • SAP AC UM Role Lookup Reconciliation: SUBSYSTEM

  • SAP AC UM Systems Lookup Reconciliation: RCVSYSTEM

  • SAP AC UM TimeZone Lookup Reconciliation: TZONE

  • SAP AC UM Title Lookup Reconciliation: TITLE_MEDI

  • SAP AC UM UserGroup Lookup Reconciliation: USERGROUP

  • SAP AC UM UserType Lookup Reconciliation: _LOW

Note: You must not change the value of this attribute.

Decode Attribute

Enter the name of the connector or target system attribute that is used to populate the Decode column of the lookup definition (specified as the value of the Lookup Name attribute).

Depending on the scheduled job you are using, the default values are as follows:

  • SAP AC UM BusinessProcess Lookup Reconciliation: LDECODE

  • SAP AC UM CommType Lookup Reconciliation: COMM_TEXT

  • SAP AC UM Company Lookup Reconciliation: COMPANY

  • SAP AC UM ContractUserType Lookup Reconciliation: UTYPTEXT

  • SAP AC UM DateFormat Lookup Reconciliation: _TEXT

  • SAP AC UM DecimalNot Lookup Reconciliation: _TEXT

  • SAP AC UM FunctionalArea Lookup Reconciliation: LDECODE

  • SAP AC UM ItemProvAction Lookup Reconciliation: LDECODE

  • SAP AC UM LangComm Lookup Reconciliation: SPTXT

  • SAP AC UM Parameter Lookup Reconciliation: PARTEXT

  • SAP AC UM Priority Lookup Reconciliation: LDECODE

  • SAP AC UM Profile Lookup Reconciliation: USRSYSPRF

  • SAP AC UM ReqInitSystem Lookup Reconciliation: REQSYSDECODE

  • SAP AC UM RequestType Lookup Reconciliation: LDECODE

  • SAP AC UM Role Lookup Reconciliation: USRSYSACT

  • SAP AC UM Systems Lookup Reconciliation: RCVSYSTEM

  • SAP AC UM TimeZone Lookup Reconciliation: DESCRIPT

  • SAP AC UM Title Lookup Reconciliation: TITLE_MEDI

  • SAP AC UM UserGroup Lookup Reconciliation: TEXT

  • SAP AC UM UserType Lookup Reconciliation: _TEXT

IT Resource Name

Name of the IT resource for the target system installation from which you want to reconcile records.

Default value: SAP AC UM IT Resource

Lookup Name

Enter the name of the lookup definition in Oracle Identity Manager that must be populated with values fetched from the target system.

Note: If the lookup name that you specify as the value of this attribute is not present in Oracle Identity Manager, then this lookup definition is created while the scheduled job is run.

Depending on the scheduled job you are using, the default values are as follows:

  • SAP AC UM BusinessProcess Lookup Reconciliation: Lookup.SAPACABAP.Bproc

  • SAP AC UM CommType Lookup Reconciliation: Lookup.SAPACABAP.CommType

  • SAP AC UM Company Lookup Reconciliation: Lookup.SAPACABAP.Company

  • SAP AC UM ContractUserType Lookup Reconciliation: Lookup.SAPACABAP.ContractualUserType

  • SAP AC UM DateFormat Lookup Reconciliation: Lookup.SAPACABAP.DateFormat

  • SAP AC UM DecimalNot Lookup Reconciliation: Lookup.SAPACABAP.DecimalNotation

  • SAP AC UM FunctionalArea Lookup Reconciliation: Lookup.SAPACABAP.Funcarea

  • SAP AC UM ItemProvAction Lookup Reconciliation: Lookup.SAPAC10ABAP.ItemProvAction

  • SAP AC UM LangComm Lookup Reconciliation: Lookup.SAPACABAP.LangComm

  • SAP AC UM Parameter Lookup Reconciliation: Lookup.SAPACABAP.Parameter

  • SAP AC UM Priority Lookup Reconciliation: Lookup.SAPACABAP.Priority

  • SAP AC UM Profile Lookup Reconciliation: Lookup.SAPACABAP.Profile

  • SAP AC UM ReqInitSystem Lookup Reconciliation: Lookup.SAPACABAP.ReqInitSystem

  • SAP AC UM RequestType Lookup Reconciliation: Lookup.SAPAC10ABAP.RequestType

  • SAP AC UM Role Lookup Reconciliation: Lookup.SAPACABAP.Roles

  • SAP AC UM Systems Lookup Reconciliation: Lookup.SAPACABAP.System

  • SAP AC UM TimeZone Lookup Reconciliation: Lookup.SAPACABAP.TimeZone

  • SAP AC UM Title Lookup Reconciliation: Lookup.SAPACABAP.UserTitle

  • SAP AC UM UserGroup Lookup Reconciliation: Lookup.SAPACABAP.UserGroups

  • SAP AC UM UserType Lookup Reconciliation: Lookup.SAPACABAP.UserType

Object Class

Enter the name of the class of the object you want to reconcile.

Depending on the scheduled job you are using, the default values are as follows:

  • SAP AC UM BusinessProcess Lookup Reconciliation: BusProc

  • SAP AC UM CommType Lookup Reconciliation: commtype

  • SAP AC UM Company Lookup Reconciliation: company

  • SAP AC UM ContractUserType Lookup Reconciliation: contractualusertype

  • SAP AC UM DateFormat Lookup Reconciliation: dateformat

  • SAP AC UM DecimalNot Lookup Reconciliation: decimalnotation

  • SAP AC UM FunctionalArea Lookup Reconciliation: FunctionArea

  • SAP AC UM ItemProvAction Lookup Reconciliation: ItemProvActionType

  • SAP AC UM LangComm Lookup Reconciliation: languagecommunication

  • SAP AC UM Parameter Lookup Reconciliation: parameters

  • SAP AC UM Priority Lookup Reconciliation: PriorityType

  • SAP AC UM Profile Lookup Reconciliation: profiles

  • SAP AC UM ReqInitSystem Lookup Reconciliation: SYSTEM

  • SAP AC UM RequestType Lookup Reconciliation: RequestType

  • SAP AC UM Role Lookup Reconciliation: activityGroups

  • SAP AC UM Systems Lookup Reconciliation: cuaSystems

  • SAP AC UM TimeZone Lookup Reconciliation: timeZones

  • SAP AC UM Title Lookup Reconciliation: title

  • SAP AC UM UserGroup Lookup Reconciliation: __GROUP__

  • SAP AC UM UserType Lookup Reconciliation: usertype

Object Type

Enter the name of the type of object you want to reconcile.

Depending on the scheduled job you are using, the default values are as follows:

  • SAP AC UM BusinessProcess Lookup Reconciliation: BusProc

  • SAP AC UM CommType Lookup Reconciliation: commtype

  • SAP AC UM Company Lookup Reconciliation: company

  • SAP AC UM ContractUserType Lookup Reconciliation: contractualusertype

  • SAP AC UM DateFormat Lookup Reconciliation: dateformat

  • SAP AC UM DecimalNot Lookup Reconciliation: decimalnotation

  • SAP AC UM FunctionalArea Lookup Reconciliation: FunctionArea

  • SAP AC UM ItemProvAction Lookup Reconciliation: ItemProvActionType

  • SAP AC UM LangComm Lookup Reconciliation: languagecommunication

  • SAP AC UM Parameter Lookup Reconciliation: parameters

  • SAP AC UM Priority Lookup Reconciliation: PriorityType

  • SAP AC UM Profile Lookup Reconciliation: profiles

  • SAP AC UM ReqInitSystem Lookup Reconciliation: SYSTEM

  • SAP AC UM RequestType Lookup Reconciliation: RequestType

  • SAP AC UM Role Lookup Reconciliation: activityGroups

  • SAP AC UM Systems Lookup Reconciliation: cuaSystems

  • SAP AC UM TimeZone Lookup Reconciliation: timeZones

  • SAP AC UM Title Lookup Reconciliation: title

  • AP AC UM UserGroup Lookup Reconciliation: GROUP

  • SAP AC UM UserType Lookup Reconciliation: usertype

3.3 Guidelines on Performing Reconciliation

These are the guidelines that you must apply while performing reconciliation operations.

Apply the following guidelines while configuring reconciliation:

  • On SAP CUA, an account that is directly created on the target system must be assigned a master system before changes to that account can be detected and brought to Oracle Identity Manager during reconciliation.

  • On a Microsoft Windows platform, if you encounter the org.quartz.SchedulerException exception during a reconciliation run, then download and install the Microsoft Visual C++ 2005 SP1 Redistributable Package from the Microsoft Web site.

3.4 Configuring Reconciliation

You can configure the connector to specify the type of reconciliation and its schedule.

As mentioned earlier in this guide, reconciliation involves duplicating in Oracle Identity Manager the creation of and modifications to user accounts on the target system.

This section discusses the following topics related to configuring reconciliation:

3.4.1 Full Reconciliation and Incremental Reconciliation

Full reconciliation involves reconciling all existing user records from the target system into Oracle Identity Manager. After you deploy the connector, you must first perform full reconciliation. In addition, you can switch from incremental reconciliation to full reconciliation whenever you want to ensure that all target system records are reconciled in Oracle Identity Manager.

To perform a full reconciliation run, ensure that no value is specified for the Filter attribute. However, to reconcile user records, set the value for the Latest token attribute as 0 (Zero) in the scheduled job:

At the end of the reconciliation run, the Latest Token attribute of the scheduled job for user record reconciliation is automatically set to the time stamp at which the run ended. From the next run onward, only records created or modified after this time stamp are considered for reconciliation. This is incremental reconciliation.

3.4.2 Batched Reconciliation

This section discusses the batchSize attribute of the Lookup.SAPABAP.Configuration lookup definition.

By default, all target system records that are added or modified after the last reconciliation run are reconciled during the current reconciliation run. Depending on the number of records to be reconciled, this process may require a large amount of time. In addition, if the connection breaks during reconciliation, then the process would take longer to complete.

You can configure batched reconciliation to avoid such problems.

To configure batched reconciliation, specify a value for the following attribute while performing the procedure described in Setting Up the Configuration Lookup Definition in Oracle Identity Manager:

batchSize: Use this attribute to specify the number of records that must be included in each batch.

After you configure batched reconciliation, if reconciliation fails during a batched reconciliation run, then you only need to rerun the scheduled task without changing the values of the task attributes.

3.4.3 Limited Reconciliation

By default, all target system records that are added or modified after the last reconciliation run are reconciled during the current reconciliation run. You can customize this process by specifying the subset of added or modified target system records that must be reconciled. You do this by creating filters for the reconciliation module.

The connector provides a Filter attribute that allows you to use any of the resource attributes to filter the target system records.

The syntax for this parameter is as follows:

Note:

You can use a shortcut for the <and> and <or> operators. For example: <filter1> & <filter2> instead of and (<filter1>, <filter2>), analogically replace or with |.

syntax = expression ( operator expression )* 
operator = 'and' | 'or' 
expression = ( 'not' )? filter 
filter = ('equalTo' | 'contains' | 'containsAllValues' | 'startsWith'
| 'endsWith'  | 'greaterThan' | 'greaterThanOrEqualTo' | 'lessThan' 
| 'lessThanOrEqualTo' )  '(' 'attributeName' ',' attributeValue ')' 
attributeValue = singleValue  |  multipleValues
singleValue = 'value'
multipleValues = '[' 'value_1' (',' 'value_n')* ']'

For example, to limit the number of reconciled accounts to only matching account names, you could use the following expression:

equalTo('FirstName;ADDRESS','AP10A1')

While deploying the connector, follow the instructions in Configuring Scheduled Jobs to specify attribute values.

3.4.4 Reconciliation Scheduled Jobs for the SAP UM Connector

You can use reconciliation scheduled job to reconcile user account data from the target system.

You must specify values for the attributes of the following scheduled tasks:

3.4.4.1 SAP UM User Recon

You use the SAP UM User Recon scheduled job to reconcile user data from the target system. Table 3-3 describes the attributes of this scheduled job.

Table 3-3 Attributes of the SAP UM User Recon Scheduled Job

Attribute Description

Filter

Expression for filtering records. Use the following syntax:

syntax = expression ( operator expression )* 
operator = 'and' | 'or' 
expression = ( 'not' )? filter 
filter = ('equalTo' | 'contains' | 'containsAllValues' 
| 'startsWith' | 'endsWith'  | 'greaterThan' | 'greaterThanOrEqualTo'
| 'lessThan' | 'lessThanOrEqualTo' )  '(' 'attributeName' ',' attributeValue')' 
attributeValue = singleValue  |  multipleValues
singleValue = 'value'
multipleValues = '[' 'value_1' (',' 'value_n')* ']'

Default value: None

See Limited Reconciliation for more information.

Incremental Recon Attribute

Time stamp at which the last reconciliation run started

Default value: Last Updated

Note: Do not enter a value for this attribute. The reconciliation engine automatically enters a value for this attribute.

IT Resource Name

Name of the IT resource instance that the connector must use to reconcile data

Sample value: SAP UM IT Resource

Latest Token

This attribute holds the time stamp (in the YYYYMMDDHHMMSS format) at which the last reconciliation run ended. For the next reconciliation run, only target system records that have been added or modified after this time stamp are considered for reconciliation.

For consecutive reconciliation runs, the connector automatically enters a value for this attribute. However, you can use this attribute to switch from incremental reconciliation to full reconciliation. See Full Reconciliation and Incremental Reconciliation for more information.

Note: The reconciliation engine automatically enters a value in this attribute.

Sample value: 20120417123006

Object Type

Type of object you want to reconcile

Default value: User

Resource Object Name

Name of the resource object against which reconciliation runs must be performed

Default value: SAP UM Resource Object

Scheduled Task Name

Name of the scheduled task

Default value: SAP UM User Recon

3.4.4.2 SAP UM User Delete Recon

You use the SAP UM User Delete Recon scheduled job to reconcile data about deleted users from the target system. Table 3-4 describes the attributes of this scheduled job.

Table 3-4 Attributes of the SAP UM User Delete Recon Scheduled Job

Attribute Description

Disable User

Enter yes if you want the connector to disable accounts (in Oracle Identity Manager) corresponding to accounts deleted on the target system. Enter no if you want the connector to revoke accounts in Oracle Identity Manager.

Default value: no

IT Resource Name

Name of the IT resource instance that the connector must use to reconcile data

Sample value: SAP UM ITResource

Object Type

Type of object you want to reconcile

Default value: User

Resource Object Name

Name of the resource object against which reconciliation runs must be performed

Default value: SAP UM Resource Object

Scheduled Task Name

Name of the scheduled task

Default value: SAP UM User Delete Recon

Sync Token

Time stamp at which the last reconciliation run ended in YYYYMMDDHHMMSS format (for example, 20120417123006). For the next reconciliation run, only target system records that have been deleted after this time stamp are considered for reconciliation.

If you set this attribute to an empty value, then incremental reconciliation operations fetch all the records (perform full reconciliation).

Note: Do not enter a value for this attribute. The reconciliation engine automatically enters a value in this attribute.

3.4.4.3 SAP AC UM User Recon

You use the SAP AC UM User Recon scheduled job to reconcile users from SAP BusinessObjects AC target system. Table 3-5 describes the attributes of this scheduled job.

Table 3-5 Attributes of the SAP AC UM User Recon Scheduled Job

Attribute Description

Filter

Expression for filtering records. Use the following syntax:

syntax = expression ( operator expression )* 
operator = 'and' | 'or' 
expression = ( 'not' )? filter 
filter = ('equalTo' | 'contains' | 'containsAllValues' 
| 'startsWith' | 'endsWith'  | 'greaterThan' | 'greaterThanOrEqualTo'
| 'lessThan' | 'lessThanOrEqualTo' )  '(' 'attributeName' ',' attributeValue')' 
attributeValue = singleValue  |  multipleValues
singleValue = 'value'
multipleValues = '[' 'value_1' (',' 'value_n')* ']'

Default value: None

See Limited Reconciliation for more information.

Incremental Recon Attribute

Time stamp at which the last reconciliation run started

Default value: Last Updated

Note: Do not enter a value for this attribute. The reconciliation engine automatically enters a value for this attribute.

IT Resource Name

Name of the IT resource instance that the connector must use to reconcile data

Sample value: SAP AC UM IT Resource

Latest Token

This attribute holds the time stamp (in the YYYYMMDDHHMMSS format) at which the last reconciliation run ended. For the next reconciliation run, only target system records that have been added or modified after this time stamp are considered for reconciliation.

For consecutive reconciliation runs, the connector automatically enters a value for this attribute. However, you can use this attribute to switch from incremental reconciliation to full reconciliation. See Full Reconciliation and Incremental Reconciliation for more information.

Note: The reconciliation engine automatically enters a value in this attribute.

Sample value: 20120417123006

Object Type

Type of object you want to reconcile

Default value: User

Resource Object Name

Name of the resource object against which reconciliation runs must be performed

Default value: SAP AC UM Resource Object

Scheduled Task Name

Name of the scheduled task

Default value: SAP AC UM User Recon

3.4.4.4 SAP AC UM User Delete Recon

You use the SAP AC UM User Delete Recon scheduled job to reconcile deleted users from SAP BusinessObjects AC target system. Table 3-6 describes the attributes of this scheduled job.

Table 3-6 Attributes of the SAP AC UM User Delete Recon Scheduled Job

Attribute Description

IT Resource Name

Name of the IT resource instance that the connector must use to reconcile data

Default value: = SAP AC UM IT Resource

Object Type

Type of object you want to reconcile

Default value: User

Resource Object Name

Name of the resource object against which reconciliation runs must be performed

Default value: SAP AC UM Resource Object

Scheduled Task Name

Name of the scheduled task

Default value: SAP AC UM User Delete Recon

Sync Token

Time stamp at which the last reconciliation run ended in YYYYMMDDHHMMSS format (for example, 20120417123006). For the next reconciliation run, only targets ystem records that have been deleted after this time stamp are considered for reconciliation.

If you set this attribute to an empty value, then incremental reconciliation operations fetch all the records (perform full reconciliation).

Note: Do not enter a value for this attribute. The reconciliation engine automatically enters a value in this attribute.

Default value: <String>0</String>

Disable User

Enter yes if you want the connector to disable accounts (in Oracle Identity Manager)corresponding to accounts deleted on the target system. Enter no if you want theconnector to revoke accounts in Oracle Identity Manager.

Default value: no

3.4.4.5 SAP AC UM Request Status

You use the SAP AC UM Request Status scheduled job to reconcile request status from SAP BusinessObjects AC target system. Table 3-7 describes the attributes of this scheduled job.

Table 3-7 Attributes of the SAP AC UM Request Status Scheduled Job

Attribute Description

IT Resource Name

Name of the IT resource instance that the connector must use to reconcile data

Default value: SAP AC UM IT Resource

Object Type

Type of object you want to reconcile

Default value: STATUS

Resource Object Name

Name of the resource object against which reconciliation runs must be performed

Default value: SAP AC UM Resource Object

Scheduled Task Name

Name of the scheduled task

Default value: SAP AC UM Request Status

3.5 Configuring Scheduled Jobs

This section describes the procedure to configure scheduled jobs. You can apply this procedure to configure the scheduled jobs for lookup field synchronization and reconciliation.

See Scheduled Jobs for Lookup Field Synchronization, Scheduled Jobs for SAP BusinessObjects AC Lookup Field Synchronization, and Reconciliation Scheduled Jobs for the SAP UM Connector for information about scheduled jobs and their attributes.

To configure a scheduled job:

  1. If you are using Oracle Identity Manager release 11.1.1.x, then you must perform the following steps:

    1. Log in to Oracle Identity System Administration.

    2. On the Welcome to Oracle Identity Manager Self Service page, click Advanced in the upper-right corner of the page.

  2. If you are using Oracle Identity Manager release 11.1.2.x, then you must perform the following steps:

    1. Log in to Oracle Identity System Administration.

    2. In the left pane, under System Management, click Scheduler.

  3. Search for and open the scheduled job as follows:

    1. On the Welcome to Oracle Identity Manager Advanced Administration page, in the System Management region, click Search Scheduled Jobs.

    2. On the left pane, in the Search field, enter the name of the scheduled job as the search criterion. Alternatively, you can click Advanced Search and specify the search criterion.

    3. In the search results table on the left pane, click the scheduled job in the Job Name column.

  4. On the Job Details tab, you can modify the parameters of the scheduled job:

    • Retries: Enter an integer value in this field. This number represents the number of times the scheduler tries to start the job before assigning the Stopped status to the job.

    • Schedule Type: Depending on the frequency at which you want the job to run, select the appropriate schedule type.

    Note:

    See Creating Jobs in Oracle Fusion Middleware Administering Oracle Identity Manager for detailed information about schedule types.

    In addition to modifying the job details, you can enable or disable a job.

  5. On the Job Details tab, in the Parameters region, specify values for the attributes of the scheduled task.

  6. Click Apply to save the changes.

    Note:

    You can use the Scheduler Status page in Identity System Administration to either start, stop, or reinitialize the scheduler.

3.6 Guidelines on Performing Provisioning

These are the guidelines that you must apply while performing provisioning.

3.6.1 Guidelines on Performing Provisioning in Supported Deployment Configuration

These are the guidelines that you must apply while performing provisioning operations in any of the supported deployment configurations.

  • Through provisioning, if you want to create and disable an account at the same time, then you can set the value of the Valid Through attribute to a date in the past. For example, while creating an account on 31-Jul, you can set the Valid Through date to 30-Jul. With this value, the resource provisioned to the OIM User is in the Disabled state immediately after the account is created.

    However, on the target system, if you set the Valid Through attribute to a date in the past while creating an account, then the target system automatically sets Valid Through to the current date. The outcome of this Create User provisioning operation is as follows:

    • The value of the Valid Through attribute on Oracle Identity Governance and the target system do not match.

    • On the target system, the user can log in all through the current day. The user cannot log in from the next day onward.

    You can lock the user on the target system so that the user is not able to log in the day the account is created.

  • Remember that if password or system assignment fails during a Create User provisioning operation, then the user is not created.

  • When you try to provision a multivalued attribute, such as a role or profile, if the attribute has already been set for the user on the target system, then the status of the process task is set to Completed in Oracle Identity Governance. If required, you can configure the task so that it shows the status Rejected in this situation. See Modifying Process Tasks in Oracle Fusion Middleware Developing and Customizing Applications for Oracle Identity Governance for information about configuring process tasks.

  • When you perform the Lock User or Unlock User provisioning operation, remember that the connector makes the required change on the target system without checking whether the account is currently in the Locked or Unlocked state. This is because the target system does not provide a method to check the current state of the account.

  • The target system does not accept non-English letters in the E-mail Address field. Therefore, during provisioning operations, you must enter only English language letters in the E-mail Address field on the process form.

  • On a Microsoft Windows platform, if you encounter the java.lang.UnsatisfiedLinkError exception during a provisioning operation, then download and install the Microsoft Visual C++ 2005 SP1 Redistributable Package from the Microsoft Web site.

3.6.2 Guidelines on Performing Provisioning After Configuring Access Request Management

These are the guidelines that you must apply while performing provisioning operations after configuring the Access Request Management feature of the connector.

  • During a Create User operation performed when the Access Request Management is configured, first submit process form data. Submit child form data after the user is created on the target system. This is because when Access Request Management is enabled, the connector supports modification of either process form fields or child form fields in a single Modify User operation.

  • The following fields on the process form are mandatory parameters on SAP GRC Access Request Management:

    Note:

    When the Access Request Management feature is configured, you must enter values for these fields even though some of them are not marked as mandatory fields on Oracle Identity System Administration.

    • AC Manager

    • AC Manager email

    • AC Priority

    • AC System

    • AC Requestor ID

    • AC Requestor email

    • AC Request Reason

    The following fields may be mandatory or optional based on the configuration in SAP GRC system:

    • AC Manager First Name

    • AC Manager Last Name

    • AC Manager Telephone

    • AC Request Due Date

    • AC Functional Area

    • AC Business Process

    • AC Requestor First Name

    • AC Requestor Last Name

    • AC Requestor Telephone

    • AC Company

  • As mentioned earlier in this guide, SAP GRC Access Request Management does not process passwords. Therefore, any value entered in the Password field is ignored during Create User provisioning operations. After a Create User operation is performed, the user for whom the account is created on the target system must apply one of the following approaches to set the password:

    • To use the Oracle Identity Governance password as the target system password, change the password through Oracle Identity Governance.

    • Directly log in to the target system, and change the password.

  • You perform an Enable User operation by setting the Valid From field to a future date. Similarly, you perform a Disable User operation by setting the Valid Through field to the current date. Both operations are treated as Modify User operations.

  • When you delete a user (account) on Oracle Identity System Administration (process form), a Delete User request is created.

  • When you select the Lock User check box on the process from, a Lock User request is created.

  • When you deselect the Lock User check box on the process from, an Unlock User request is created.

  • The Enable User and Disable User operations are implemented through the Valid From and Valid Through fields on the process form.

  • In a Modify User operation, you can specify values for parameters that are mapped with SAP GRC Access Request Management and parameters that are directly updated on the target system. A request is created SAP GRC Access Request Management only for parameters whose mappings are present in these lookup definitions. If you specify values for parameters that are not present in these lookup definitions, then the connector sends them to directly the target system.

  • You cannot perform an assign or revoke groups operation in SAP UM AC account on GRC server. Groups must be managed in the SAP ECC system (backend ABAP system).

3.7 Performing Provisioning Operations in Oracle Identity Manager Release 11.1.2

You create a new user in Oracle Identity Self Service by using the Create User page. You provision or request for accounts on the Accounts tab of the User Details page.

To configure provisioning operations in Oracle Identity Manager release 11.1.2.x:

Note:

The time required to complete a provisioning operation that you perform the first time by using this connector takes longer than usual.

  1. Log in to Oracle Identity System Administration.

  2. Create and activate a sandbox. For detailed instructions on creating and activating a sandbox, see Managing Sandboxes in Oracle Fusion Middleware Developing and Customizing Applications for Oracle Identity Manager.

  3. Create an application instance and specify values for the following fields in the Create Application Instance page. See Creating Application Instances in Oracle Fusion Middleware Administering Oracle Identity Manager.

    • Name: The name of the application instance.

    • Display Name: The display name of the application instance.

    • Description: A description of the application instance.

    • Resource Object: The resource object name. Click the search icon next to this field to search for and select SAP UM Resource Object.

    • IT Resource Instance: The IT resource instance name. Click the search icon next to this field to search for and select SAP UM IT Resource.

    • Form: Select the form name, for example, SAPUM. To do so, click Create. against the Form list, specify the form name, and then create it. On the Create Application Instance page, click the Refresh icon next to the Form field. From this list, select the form name that you created.

  4. Publish the sandbox.

  5. Run lookup field synchronization.

  6. Search for and run the Entitlement List scheduled job to populate the ENT_LIST table.

  7. Publish the application instance (created in Step 3) to an organization. To do so:

    1. On the Organizations tab of the Application Instance page, click Assign.

    2. In the Select Organizations dialog box, select the organization to which you want to publish the application instance.

    3. Select the Apply to entitlements checkbox.

    4. Click OK.

  8. Search for and run the Catalog Synchronization Job scheduled job.

  9. Log in to Oracle Identity System Administration.

  10. Create a user. See Managing Users in Oracle Fusion Middleware Performing Self Service Tasks with Oracle Identity Manager for more information about creating a user.

  11. On the Account tab, click Request Accounts.

  12. In the Catalog page, search for and add to cart the application instance created in Step 3, and then click Checkout.

  13. Specify value for fields in the application form and then click Ready to Submit.

  14. Click Submit.

  15. If you want to provision entitlements, then:

    1. On the Entitlements tab, click Request Entitlements.

    2. In the Catalog page, search for and add to cart the entitlement, and then click Checkout.

    3. Click Submit.

3.8 Performing Provisioning Operations in an SoD-Enabled Environment

Provisioning a resource for an OIM User involves using Oracle Identity Manager to create a target system account for the user.

The following are types of provisioning operations:

  • Direct provisioning

  • Request-based provisioning of accounts

  • Request-based provisioning of entitlements

  • Provisioning triggered by policy changes

This section discusses the following topics:

3.8.1 Overview of the Provisioning Process in an SoD-Enabled Environment

The following is the sequence of steps that take places during a provisioning operation performed in an SoD-enabled environment:

  1. The provisioning operation triggers the appropriate adapter.

  2. SAP BusinessObjects SoD Invocation Library (SIL) Provider passes the entitlement data to the Web service of SAP BusinessObjects AC.

  3. After SAP BusinessObjects AC runs the SoD validation process on the entitlement data, the response from the process is returned to Oracle Identity Manager.

  4. The status of the process task that received the response depends on the response itself. If the entitlement data clears the SoD validation process, then the adapter carries provisioning data to the corresponding BAPI on the target system and the status of the process task changes to Completed. This translates into the entitlement being granted to the user. If the SoD validation process returns the failure response, then status of the process task changes to Canceled.

3.8.2 Guidelines on Performing Provisioning Operations in an SoD-Enabled Environment

These are the guidelines that you must apply while performing provisioning operations in an SoD-enabled environment.

  • When you assign a role to a user through provisioning, you set values for the following attributes:

    • Role System Name

    • Role Name

    • Start Date

    • End Date

    However, when you update a role assignment, you can specify values only for the Start Date and End Date attributes. You cannot set new values for the Role System Name and Role Name attributes. This also applies to new child forms that you add.

  • You can only assign profiles. You cannot update an assigned profile.

3.8.3 Direct Provisioning in an SoD-Enabled Environment

This section describes the prerequisites and the procedure to perform direct provisioning. It contains the following sections:

3.8.3.1 Enabling the Use of the Process Form During Direct Provisioning in an SoD-Enable Environment

Note:

Perform the procedure in this section only in the following situations:

  • The first time you perform direct provisioning.

  • If you switch from request-based provisioning to direct provisioning.

When you run the Connector Installer, the configuration for direct provisioning of SAP user accounts is installed. Although the process form is displayed during direct provisioning, the connector cannot complete direct provisioning operations unless you enable the use of the process form. If you want to enable the use of the process form during direct provisioning, then perform the procedure described later in this section.

To enable the use of the process form during direct provisioning:

Note:

Request-based provisioning is disabled after you perform this procedure.

  1. Log in to the Design Console.

  2. Disable the Auto Save Form feature as follows:

    1. Expand Process Management, and then double-click Process Definition.

    2. Search for and open the SAP UM Process Form process definition.

    3. Deselect the Auto Save Form check box.

    4. Click the Save icon.

  3. If the Self Request Allowed feature is enabled, then:

    1. Expand Resource Management, and then double-click Resource Objects.

    2. Search for and open the SAP UM Resource Object resource object.

    3. Deselect the Self Request Allowed check box.

    4. Click the Save icon.

3.8.3.2 Performing Direct Provisioning

To provision a resource by using the direct provisioning approach:

  1. Log in to Oracle Identity System Administration.

  2. If you want to first create an OIM User and then provision a target system account, then:

    1. On the Welcome to Identity Administration page, in the Users region, click Create User.

    2. On the Create User page, enter values for the OIM User fields, and then click Save.

  3. If you want to provision a target system account to an existing OIM User, then:

    1. On the Welcome to Identity Administration page, search for the OIM User by selecting Users from the drop-down list on the left pane.

    2. From the list of users displayed in the search results, select the OIM User. The user details page is displayed on the right pane.

  4. On the user details page, click the Resources tab.

  5. From the Action menu, select Add Resource. Alternatively, you can click the add resource icon with the plus (+) sign. The Provision Resource to User page is displayed in a new window.

  6. On the Step 1: Select a Resource page, select SAP UM Resource Object from the list and then click Continue.

  7. On the Step 2: Verify Resource Selection page, click Continue.

  8. On the Step 5: Provide Process Data page for process data, enter the details of the account that you want to create on the target system and then click Continue.

  9. On the Step 5: Provide Process Data page for profile data, search for and select profiles for the user on the target system and then click Continue.

  10. On the Step 5: Provide Process Data page for role data, search for and select roles for the user on the target system and then click Continue.

  11. On the Step 6: Verify Process Data page, verify the data that you have provided and then click Continue.

  12. The "Provisioning has been initiated" message is displayed. Close the window displaying this message.

  13. On the Resource tab of the user details page, click Refresh to view the newly provisioned resource.

  14. To view the Resource Provisioning Details page, which shows the details of the process tasks that were run:

    On the Resources tab of the user details page, from the Action menu, select Resource History.

  15. The SOD Check Status field is updated with SOD Check Completed status.

  16. As the administrator assigning a resource to a user, you can either end the process when a violation is detected or modify the assignment data and then resend it. To modify the assignment data, on the Resource tab of the user details page, select the row containing the resource, and then click Open.

  17. In the Edit Form window that is displayed, you can modify the role and profile data that you had selected earlier.

    Note:

    To modify a set of entitlements In the Edit Form window, you must first remove all entitlements and then add the ones that you want to use.

    In the following screenshot, one of the roles selected earlier is marked for removal:

  18. After invoking the risk analysis web service, the results of the SoD validation process are brought to Oracle Identity Manager. If you open the process form, the results will be displayed as shown in the screenshot in Step 17.

3.8.4 Request-Based Provisioning in an SoD-Enabled Environment

In request-based provisioning, an end user creates a request for a resource by using the Administrative and User Console. Administrators or other users can also create requests for a particular user. Requests for a particular resource on the resource can be viewed and approved by approvers designated in Oracle Identity Manager.

Note:

Perform the procedure described in this section only if you are using Oracle Identity Manager release 11.1.1.x.

See Configuring SoD (Segregation of Duties) for related information.

The request-based provisioning operation involves both end users and approvers. Typically, these approvers are in the management chain of the requesters. The request-based provisioning process described in this section covers steps to be performed by both entities.

In the example used in this section, the end user creates a request for two roles on the target system. The request clears the SoD validation process and is approved by the approver.

The following sections provide more information about request-based provisioning:

3.8.4.1 Creation of Request-Based Provisioning by End-Users

The following are types of request-based provisioning:

  • Request-based provisioning of accounts: OIM Users are created but not provisioned target system resources when they are created. Instead, the users themselves raise requests for provisioning accounts.

  • Request-based provisioning of entitlements: OIM Users who have been provisioned target system resources (either through direct or request-based provisioning) raise requests for provisioning entitlements.

The following steps are performed by the end user in a request-based provisioning operation:

  1. Log in to Oracle Identity System Administration.
  2. On the Welcome page, click Advanced on the top right corner of the page.
  3. On the Welcome to Identity Manager Advanced Administration page, click the Administration tab, and then click the Requests tab.
  4. From the Actions menu on the left pane, select Create Request.

    The Select Request Template page is displayed.

  5. From the Request Template list, select Provision Resource and then click Next.
  6. On the Select Users page, specify a search criterion in the fields to search for the user that you want to provision the resource, and then click Search. A list of users that match the search criterion you specified is displayed in the Available Users list.
  7. From the Available Users list, select the user to whom you want to provision the account.

    If you want to create a provisioning request for more than one user, then from the Available Users list, select the users to whom you want to provision the account.

  8. Click Move or Move All to include your selection in the Selected Users list, and then click Next.
  9. On the Select Resources page, click the arrow button next to the Resource Name field to display the list of all available resources.
  10. From the Available Resources list, select SAP UM Resource Object, move it to the Selected Resources list, and then click Next.
  11. On the Resource Details page, enter details of the account that must be created on the target system. and then click Next.
  12. On the Justification page, you can specify values for the following fields, and then click Finish:
    • Effective Date

    • Justification

    On the resulting page, a message confirming that your request has been sent is displayed along with the Request ID.

  13. If you click the request ID, then the Request Details page is displayed.
  14. On the Resource tab of the Request Details page, click the View Details link in the row containing the resource for which the request was created. The Resource Details page in displayed in a new window.

    One of the fields on this page is the SODCheckStatus field. The value in this field can be SoD Check Not Initiated or SoDCheckCompleted. When the request is placed, the SODCheckStatus field contains the SoDCheckCompleted status.

  15. To view details of the approval, on the Request Details page, click the Approval Tasks tab.

    On this page, the status of the SODChecker task is pending.

3.8.4.2 Approving Request-Based Provisioning

This section discusses the role of the approver in a request-based provisioning operation.

The approver to whom the request is assigned can use the Pending Approvals feature to view details of the request.

In addition, the approver can click the View link to view details of the SoD validation process.

The approver can decide whether to approve or deny the request, regardless of whether the SoD engine accepted or rejected the request. The approver can also modify entitlements in the request.

The following steps are performed by the approver in a request-based provisioning operation:

  1. Log in to Oracle Identity System Administration.
  2. On the Welcome page, click Self-Service in the upper-right corner of the page.
  3. On the Welcome to Identity Manager Self Service page, click the Tasks tab.
  4. On the Approvals tab, in the first region, you can specify a search criterion for the request task that is assigned to you.
  5. From the search results table, select the row containing the request you want to approve, and then click Approve Task.

    A message confirming that the task has been approved is displayed and the request status is changed to Obtaining Operation Approval.

  6. Select the row containing the request which is approved, and then click Approve Task.

    A message confirming that the task has been approved is displayed and the request status is changed to Request Completed.

  7. Click the Administration tab and search for the user(s) for whom the request is completed.
  8. Select the user.

    The user detail information is displayed in the right pane.

  9. Click the Resources tab to view the resource being provisioned.
  10. Select the resource being provisioned, and then click Open to view the resource details.
  11. On the Resources tab of the User Details page, from the Action menu, select Resource History to view the resource provisioning tasks.

3.9 Switching Between SAP ERP and SAP CUA Target Systems

You can switch your target systems between SAP ERP and SAP CUA for reconciliation and provisioning.

The following sections provide information about the procedure to switch between the SAP ERP and SAP CUA target systems:

3.9.1 Switching Between the SAP R/3 and SAP CUA Target Systems for Reconciliation

To switch between SAP R/3 and SAP CUA target systems for reconciliation:

  1. If you are switching to SAP CUA, then set the value of the enableCUA entry to yes in the Lookup.SAPABAP.Configuration lookup definition. If you are switching to SAP R/3, then set the value to no.
  2. In the SAP UM User Recon and SAP UM User Delete Recon scheduled jobs, set values for the following attributes:
    • IT Resource Name: Enter the name of the required IT resource.

    • Latest Token: Enter 0 as the value of this attribute. Alternatively, if you have saved the time stamp value from the previous reconciliation run on the same target system, then you can enter that value in the Time Stamp attribute. See Reconciliation Scheduled Jobs for the SAP UM Connector for information about the scheduled task.

3.9.2 Switching Between the SAP R/3 and SAP CUA Target Systems for Provisioning

To switch between SAP R/3 and SAP CUA target systems for provisioning:

  1. If you are switching to SAP CUA, then set the value of the enableCUA entry to yes in the Lookup.SAPABAP.Configuration lookup definition. If you are switching to SAP R/3, then set the value to no.
  2. For every scheduled job used for lookup field synchronization, set the value of required IT resource in the IT Resource Name field and run it individually.

    Perform this step on all the scheduled jobs listed in Scheduled Jobs for Lookup Field Synchronization.

  3. Start the provisioning operation on Oracle Identity System Administration by selecting the required IT resource.

3.10 Switching From an SAP R/3 or SAP CUA Target Systems to an SAP BusinessObjects AC Target System and Vice Versa

You can switch from an SAP R/3 or SAP CUA target system to an SAP BusinessObjects AC target system and viceversa.

If you want to switch from an SAP R/3 or SAP CUA target system to a SAP BusinessObjects AC target system and vice versa, then perform the following steps:

  1. Ensure that you have set the environment variable for running the MDS Delete utility. In the weblogic.properties file, ensure that values are set for the wls_servername, application_name, and metadata_files properties. See Exporting All MDS Data for Oracle Identity Manager in Oracle Fusion Middleware Developing and Customizing Applications for Oracle Identity Manager for detailed information about setting up the environment for MDS utilities.
  2. Delete the existing request datasets using the following command:
    • On Microsoft Windows

      weblogicDeleteMetadata.bat
      
    • On UNIX

      weblogicDeleteMetadata.sh
      
  3. Run the PurgeCache utility to clear the cache for the content category Metadata. See Clearing Content Related to Connector Resource Bundles from the Server Cache for instructions.
  4. Import the request datasets for the target system to which you want to switch. Perform the procedure described in Importing Request Datasets Using Deployment Manager.
  5. Run the PurgeCache utility to clear the cache for the content category Metadata. See Clearing Content Related to Connector Resource Bundles from the Server Cache. for instructions.

3.11 Switching Between Request-Based Provisioning and Direct Provisioning

Note:

Perform the procedure described in this section only if you are using Oracle Identity Manager release 11.1.1. It is assumed that you have performed the procedure described in Enabling Request-Based Provisioning.

In request-based provisioning, an end user creates a request for a resource by using the Administrative and User Console. Administrators or other users can also create requests for a particular user. Requests for a particular resource on the resource can be viewed and approved by approvers designated in Oracle Identity Manager. Diret provisioning cannot be used if you enable request-based provisioning.

The following sections discuss the steps to be performed to switch between request-based provsioning and direct provisioning:

3.11.1 Switching from Request-Based Provisioning to Direct Provisioning

To switch from request-based provisioning to direct provisioning, do the following:

  1. Log in to the Design Console.

  2. Disable the Auto Save Form feature as follows:

    1. Expand Process Management, and then double-click Process Definition.

    2. Search for and open the SAP UM Process Form process definition.

    3. Deselect the Auto Save Form check box.

    4. Click the Save icon.

  3. If the Self Request Allowed feature is enabled, then:

    1. Expand Resource Management, and then double-click Resource Objects.

    2. Search for and open the SAP UM Resource Object resource object.

    3. Deselect the Self Request Allowed check box.

    4. Click the Save icon.

3.11.2 Switching from Direct Provisioning to Request-Based Provisioning

To switch from direct provisioning to request-based provisioning, do the following:

  1. Log in to the Design Console.

  2. Enable the Auto Save Form feature as follows:

    1. Expand Process Management, and then double-click Process Definition.

    2. Search for and open the SAP UM Process Form process definition.

    3. Select the Auto Save Form check box.

    4. Click the Save icon.

  3. If you want to enable end users to raise requests for themselves, then:

    1. Expand Resource Management, and then double-click Resource Objects.

    2. Search for and open the SAP UM Resource Object resource object.

    3. Select the Self Request Allowed check box.

    4. Click the Save icon.