Table of Contents
- Title and Copyright Information
- Preface
- What's New in This Guide
- 1 Introduction to Identity Governance Framework
-
2
Using the Identity Directory API
- 2.1 Overview of the Identity Directory API
- 2.2 Identity Directory API Configuration
- 2.3 Design Recommendations for Identity Directory API
-
2.4
Examples of Using the Identity Directory API
- 2.4.1 Initializing and Obtaining Identity Directory Handle
- 2.4.2 Initializing and Obtaining Identity Directory Handle from JPS Context
- 2.4.3 Initializing and Obtaining In-Memory Identity Directory Handle
- 2.4.4 Adding a User
- 2.4.5 Obtaining a User for Given Principal
- 2.4.6 Modifying a User
- 2.4.7 Obtaining a User for Given ID Value
- 2.4.8 Searching Users Using Complex Search Filter
- 2.4.9 Changing User Password
- 2.4.10 Resetting User Password
- 2.4.11 Authenticating a User
- 2.4.12 Deleting a User
- 2.4.13 Creating a Group
- 2.4.14 Searching Groups
- 2.4.15 Obtaining Management Chain
- 2.4.16 Obtaining Reportees of a User
- 2.4.17 Adding a Member to a Group
- 2.4.18 Deleting a Member From a Group
- 2.4.19 Obtaining All The Groups For Which User is a Member
- 2.4.20 Using Logical NOT Operator in a Search Filter
- 2.5 Supported Cipher Suites in Identity Directory Service in AIX
- 2.6 Adding Supported Cipher Suites in adapters.os_xml
-
3
Using the ArisID API
- 3.1 About the ArisID API
- 3.2 Configuring the ArisID API
- 3.3 Design Recommendations for the ArisID API
- 3.4 Generating ArisID Beans
- 3.5 Examples of Using IDX User and Role Beans
- 3.6 Understanding OpenLDAP Considerations
-
4
Migrating to Identity Directory API
- 4.1 Overview of Migrating to Identity Directory API
- 4.2 Migrating the Application to Identity Directory API
- 4.3 Understanding the Comparison Between User and Role API With IDS API
- 4.4 Moving From a Test to a Production Environment
-
4.5
Tuning Configuration Parameters for IDS
- 4.5.1 Configuration Parameters for IDS
- 4.5.2 WLST Commands to Set Tuning Parameters Using File-Based Configuration
- 4.5.3 Constants to Set Tuning Parameters Using In-Memory Configuration
- 4.5.4 Handling Firewall and Load Balancer Timeout Errors
- 4.5.5 Configuring TLS Protocol Versions and Cipher Suites for Secure Connections
- 4.6 Allowing Pass-through Attributes in IDS