Oracle® Fusion Middleware Installation and Configuration Guide for Identity Synchronization for Windows 6.0 11g Release 1 (11.1.1.7.0) Part Number E28963-01 |
|
|
PDF · Mobi · ePub |
Sun Java System Identity Synchronization for Windows allows passwords and other specified user attributes to flow between Sun Java System Directory Server and other systems.
This part of the guide explains how to install and configure Identity Synchronization for Windows for use in a production environment.
For the latest information about new features and about enhancements in this release of Identity Synchronization for Windows, see the Release Notes for Oracle Directory Server Enterprise Edition.
Note:
User interfaces that are depicted in this document are subject to change in future versions of the product.
This part includes the following chapters:
Chapter 1, "Understanding the Product" describes Identity Synchronization for Windows product features, system components and their distribution, command-line utilities, and deployment examples.
Chapter 2, "Preparing for Installation" describes the installation and configuration processes and information you need to know when preparing to install the product.
Chapter 3, "Installing Core" explains how to use the Identity Synchronization for Windows installation program and how to install its Core component.
Chapter 4, "Configuring Core Resources" explains how to add and configure Core resources by using the Console.
Chapter 5, "Installing Connectors" provides instructions for installing the Identity Synchronization for Windows Connectors and Directory Server Plug-ins.
Chapter 6, "Synchronizing Existing Users and User Groups" explains how to link and resynchronize existing users and user groups for new Identity Synchronization for Windows installations.
Chapter 7, "Removing the Software" explains how to remove Identity Synchronization for Windows, including how to prepare for the uninstallation and how to uninstall the Console manually.
Chapter 8, "Configuring Security" describes how to configure a secure system. This chapter covers how to harden security, secure replicated configurations, enable SSL, and add Active Directory CA certificates to certificate databases.
Chapter 9, "Understanding Audit and Error Files" provides information about audit and error logging, including instructions on how to set logging levels, how to view and understand your log files, and directory source status.
Appendix A, "Using the Identity Synchronization for Windows Command Line Utilities" shows how to use command-line utilities to perform various tasks.
Appendix B, "Identity Synchronization for Windows LinkUsers XML Document Sample" provides sample Linkusers
XML configuration files that you can use to customize your deployment.
Appendix C, "Running Identity Synchronization for Windows Services as Non-Root on Solaris" explains how to run Identity Synchronization for Windows services as a non-root
user on the Solaris operating system.
Appendix D, "Defining and Configuring Synchronization User Lists for Identity Synchronization for Windows" provides information about Synchronization User List definitions and multiple domain configurations.
Appendix E, "Identity Synchronization for Windows Installation Notes for Replicated Environments" provides an overview of the steps required to configure and secure a multimaster replication deployment.