| Skip Navigation Links | |
| Exit Print View | |
|
Oracle Identity Synchronization for Windows 6.0 Deployment Planning Guide |
2. Case Study: Deploying in a Multimaster Replication Environment
3. Case Study: Deploying in a High-Availability Environment Over a Wide Area Network Using SSL
A. Pluggable Authentication Modules
B. Identity Manager and Identity Synchronization for Windows Cohabitation
Connector Layers - Accessor, Controller, and Agent
In Java Components
In Java Components
Example Bank’s Technical Requirements
Actions
Password Changes on Active Directory
Connector Layers - Accessor, Controller, and Agent
Example Bank’s Technical Requirements
Identity Synchronization for WindowsDeployment Considerations
Active Directory Information
Primary Installation
Primary Installation
Example Bank’s Technical Requirements
Example Bank’s Technical Requirements
Password Changes on Active Directory
Active Directory Information
Creating a Special Active Directory User for Identity Synchronization for Windows
SUL_NT
Multiple Domains
To Assign Administration Rights to the Special User
Connector Layers - Accessor, Controller, and Agent
In Java Components
In Java Components
Configuring the Attributes Settings
Actions
Running idsync resync
To Configure the Object Creation Settings
To Configure the Object Creation Settings
Configuring the Attribute Modification Settings
Directory Server Plugin
Directory Server Plugin
Actions
Connector Layers - Accessor, Controller, and Agent
To Configure the Creation Attributes
To Configure the Creation Attributes
To Configure the Creation Attributes
Creating a Special Active Directory User for Identity Synchronization for Windows
Windows NT Information
Multiple Domains
Running idsync resync
Logging and Debugging
Pluggable Authentication Modules
Specifying Rules for Authentication and Password Management
When to Failover
Specifying Rules for Authentication and Password Management
When to Failover
Step 2: Configuring Identity Synchronization for Windows
Configuring Systems to Prevent Eavesdropping
Specifying Rules for Authentication and Password Management
Glossary