Table of Contents
- List of Figures
- List of Tables
- Title and Copyright Information
- Preface
-
1
Introduction to the Connector
- 1.1 Certified Components
- 1.2 Usage Recommendations
- 1.3 Certified Languages
- 1.4 Supported Connector Operations
- 1.5 Connector Architecture
- 1.6 Use Cases Supported by the Connector
-
1.7
Connector Features
- 1.7.1 User Provisioning
- 1.7.2 Full Reconciliation
- 1.7.3 Limited (Filtered)Reconciliation
- 1.7.4 Support for the Connector Server
- 1.7.5 Transformation and Validation of Account Data
- 1.7.6 Support for Cloning Applications and Creating Instance Applications
- 1.7.7 Secure Communication to the Target System
- 2 Creating an Application by Using the Connector
- 3 Configuring the Connector
- 4 Performing Post configuration Tasks for the Connector
- 5 Using the Connector
- 6 Extending the Functionality of the Connector
- 7 Frequently Asked Questions of the ARCON Privileged Access Management Connector
- 8 Files and Directories in the Connector Installation Package