IBM Security Identity Manager: IBM Security Privileged Identity Manager .

1y ago
11 Views
1 Downloads
1.19 MB
32 Pages
Last View : 19d ago
Last Download : 3m ago
Upload by : Josiah Pursley
Transcription

IBM Security Identity ManagerVersion 6.0IBM Security Privileged IdentityManager Adapter User GuideIBM

IBM Security Identity ManagerVersion 6.0IBM Security Privileged IdentityManager Adapter User GuideIBM

iiIBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

ContentsTables . . . . . . . . . . . . . . . vChapter 1. Overview . . . . . . . . . 1Prerequisites. 2Chapter 2. User account management . . 3Reconciling user accounts . . . . . . . . . . 3Reconciling support data without reconciling useraccounts . . . . . . . . . . . . . . . 4Reconciling user accounts using a filter . . . . 4Adding user accounts . . . . . . . . . . . 5Modifying user accounts . . . . . . . . . . 5User unassignment from groups . . . . . . . 6Password changes for user accounts . . . . . 6User account suspension . . . . . . . . . 6User account restoration . . . . . . . . . 6Deleting user accounts . . . . . . . . . . . 6Chapter 3. ISPIM roles managementReconciling roles . .Adding roles . . .Modifying ISPIM rolesDeleting ISPIM roles . . 7.7778Adding groups . . . . . . . . . . . . . 9Modifying ISPIM groups . . . . . . . . . . 9Deleting ISPIM groups . . . . . . . . . . 10Chapter 5. ISPIM administrativedomains management . . . . . . . . 11Reconciling administrative domains .Adding administrative domains . .Modifying administrative domains .Deleting ISPIM administrative domainsChapter 6. Reference.11111112. . . . . . . . 13Adapter attributes . . . . . . . . .IBM Security Privileged Identity Manageraccount form attributes . . . . . .IBM Security Privileged Identity ManagerAdapter role form attributes . . . . .IBM Security Privileged Identity ManagerAdapter group form attributes . . . .IBM Security Privileged Identity ManagerAdapter admin domain form attributes . 13. 13. 17. 19. 19Index . . . . . . . . . . . . . . . 21Chapter 4. ISPIM groups management. . 9Reconciling groups . 9iii

ivIBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Tables1.2.3.Prerequisites checklist . . . . . . . . . 2Support data . . . . . . . . . . . . 4Account form attributes . . . . . . . . 134.5.6.Role form attributes . . . . .Group form attributes . . . .Admin domain form attributes . 17. 19. 20v

viIBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Chapter 1. OverviewAn adapter is an interface between a managed resource and the IBM SecurityIdentity server. The IBM Security Privileged Identity Manager Adapter providesconnectivity between the IBM Security Identity Manager server and the IBMSecurity Privileged Identity Manager server.The IBM Security Privileged Identity Manager Adapter automates the managementof user accounts and different service groups such as ISPIM roles, ISPIM groups,and ISPIM administrative domains.The IBM Security Privileged Identity Manager Adapter automates the followingtasks:User account managementv Adding user accountsv Changing user account passwordsv Modifying user accounts attributesv Suspending and restoring user accountsv Retrieving user accounts for the first timev Deleting user accountsv Reconciling user accountsService group management on the IBM Security Privileged Identity Managerserverv Adding groupsv Modifying groups attributes, including adding and removing membersv Deleting groupsv Adding rolesv Modifying role attributes, including adding and removing membersv Deleting rolesv Adding and deleting administrative domain business unitsv Modifying administrative domain attributes, including adding andremoving administratorsv Reconciliation of other support data from the IBM Security PrivilegedIdentity Manager server to IBM Security Identity ManagerThe adapter runs as a shared library JAR in the IBM Security Identity Managerserver. The adapter communicates with the IBM Security Privileged IdentityManager server through the IBM Security Privileged Identity Manager RESTApplication Programming Interface.1

PrerequisitesUse the Prerequisites checklist to install and configure the adapter before youperform any of the user account, group, or role management tasks, whereapplicable.Table 1. Prerequisites checklistTaskFor more information, seeInstall the adapter.See the adapter's Installation andConfiguration GuideImport the adapter profile into the IBMSecurity Identity server.See the adapter's Installation andConfiguration GuideCreate an adapter service.See the adapter's Installation andConfiguration GuideNote: After you create an IBM SecurityPrivileged Identity Manager Adapter service,the IBM Security Identity Manager servercreates a default provisioning policy for theadapter service. You can customize aprovisioning policy for the IBM SecurityPrivileged Identity Manager Adapter serviceaccording to the requirements of yourorganization. For more information, see thesection about customizing a provisioningpolicy in the IBM Security Identity Managerproduct documentation.Configure the adapter.See the adapter's Installation andConfiguration GuidePerform a reconciliation operation to retrieve Managing reconciliation schedules in theuser accounts and store them in the IBMIBM Security Identity Manager productSecurity Identity server.documentationAdopt orphan accounts on IBM SecurityIdentity Manager.2Assigning an orphan account to a user inthe IBM Security Identity Manager productdocumentationIBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Chapter 2. User account managementIBM Security Identity Manager manages user accounts that are stored on the IBMSecurity Privileged Identity Manager server by using the IBM Security PrivilegedIdentity Manager Adapter.You can perform the following operations:v Add, modify, or delete an accountv Suspend or restore an accountv Reconcile accountsYou can manage:v Accounts for a specific personv Accounts for a service instancev Specific accounts by using the search function of IBM Security Identity ManagerThe reconciliation operation retrieves the user account information from themanaged server and stores it in the IBM Security Identity Manager directoryserver.The operation also retrieves support data such as groups and roles.You can schedule reconciliation to run at specific times and to return specificparameters. Running a reconciliation before its schedule time does not cancel thescheduled reconciliation. For more information about scheduling reconciliation andrunning a scheduled reconciliation, see the IBM Security Identity Manager productdocumentation.You can perform the following reconciliation tasks at any time from IBM SecurityIdentity Manager:v Reconciling support datav Reconciling a single user accountReconciling user accountsReconciliation synchronizes the accounts and supporting data between IBMSecurity Identity server and the managed server. Reconciliation is required so thatdata is consistent and up-to-date.The reconciliation operation retrieves the user account information from the IBMSecurity Privileged Identity Manager server and stores it in the directory server ofIBM Security Identity Manager.You can schedule reconciliation to run at specific times and to return specificparameters. Running a reconciliation before its schedule time does not cancel thescheduled reconciliation. For more information about scheduling reconciliation andrunning a scheduled reconciliation, see the IBM Security Identity Manager productdocumentation.You can perform the following reconciliation tasks at any time from IBM SecurityIdentity Manager:3

v Reconciling support datav Reconciling a single user accountReconciling support data without reconciling user accountsPerform support data reconciliation when you want an updated list of groups,roles, business units, group views, role classifications, and role access types fromthe IBM Security Privileged Identity Manager server.About this taskWhen you perform support data reconciliation, the adapter retrieves the supportdata information without processing the user account information.Table 2. Support dataSupport data forIncludes the following attributesIBM Security Privileged Identity Manageruser accountv erpimparentbusinessunitv erpimorgrolesv erpimgroupsv erpimadmindomainsISPIM rolev erpimparentbusinessunitv erpimroleclassificationv erpimroleownersv erpimroleaccesstypeISPIM groupv erpimparentbusinessunitv erpimgroupviewISPIM administrative domainv erpimparentbusinessunitProcedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Services.3. Select the service that you want to manage, through any of these options.v On the Manage Services page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.v Enter the name of the service in the Search information field and clickSearch.4. Select the name of the service that you created for the IBM Security PrivilegedIdentity Manager Adapter and click the arrow icon.5. Select Reconcile Now.6. On the Reconcile Now page, click Define query.7. Select the Reconcile supporting data only check box and click Submit.Reconciling user accounts using a filterYou can limit the accounts that are returned during a reconciliation operation byspecifying a filter in valid LDAP query syntax.4IBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

About this taskFilter reconciliation takes less time than reconciling all the user accounts. Performfilter reconciliation when you want to do any of these tasks:v Modify a specific user account.v Obtain information about a specific user account.Procedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Services.3. On the Manage Services page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.4. Select the name of the service that you created for the IBM Security PrivilegedIdentity Manager Adapter and click the arrow icon.5. Select Reconcile Now.6. On the Select Query page, click Define query.7. In the Reconcile accounts that match this filter field, type a filter expression invalid LDAP query syntax. Use the eruid attribute of the erPIMAccount objectclass. For example, to reconcile a single user account for userA, type(eruid userA)userA is the name of the user account that you want to reconcile.To reconcile all user accounts beginning with the letter b or c, type:( (eruid b*)(eruid c*))8. Click Submit.Adding user accountsYou can add user accounts at any time for either an existing person or a newperson in the organization. You can change the adapter attributes that define theaccounts on the account form.Complete the fields in the account form. See “IBM Security Privileged IdentityManager account form attributes” on page 13 for the required and optional formattributes.For specific procedures, see the IBM Security Identity Manager productdocumentation.Note: When the operation returns a WARNING status, the warning message orthe log file does not show which attributes are not configured. You must view theaccount in the console to see which attributes are successfully set.Modifying user accountsYou can modify user account attributes at any time in IBM Security IdentityManager.All of the fields in the account form can be modified except for the Business unitfield (erPIMParentBusinessUnit attribute). See “Adapter attributes” on page 13.Chapter 2. User account management5

You can change the roles and groups in which the account belongs, including theadministrative domains that the account administers. To apply the changes,manage or add members to the ISPIM role, ISPIM group and ISPIM administrativedomain service groups.Note: When the operation returns a WARNING status, the warning message orthe log file does not show which attributes are not configured. You must view theaccount in the console to see which attributes are successfully set.User unassignment from groupsWhen you use IBM Security Identity Manager to unassign a user from a group, theadapter modifies the user account on the managed resource.The adapter also removes the value of that group from the user account on IBMSecurity Identity Manager.Password changes for user accountsYou can change the password of any of the IBM Security Privileged IdentityManager accounts that exist on IBM Security Identity Manager.For information about changing passwords, see the IBM Security Identity Managerproduct documentation.User account suspensionWhen you suspend a user account, the status of the user account on IBM SecurityIdentity Manager becomes inactive.The user account on the managed resource becomes unavailable for use.Suspending a user account does not remove the user account from IBM SecurityIdentity Manager. For more information about suspending user accounts, see theIBM Security Identity Manager product documentation.User account restorationThe restore operation reinstates the suspended user accounts to IBM SecurityIdentity Manager.After restoring a user account, the status of the user account on IBM SecurityIdentity Manager becomes active and the user account on the managed resourcebecomes available for use. For more information about restoring user accounts, seethe IBM Security Identity Manager product documentation.Deleting user accountsUse the IBM Security Identity Manager deprovision feature to delete user accounts.For more information about deleting user accounts, see the IBM Security IdentityManager product documentation.When you delete a user account from IBM Security Identity Manager, the adapterremoves the user from the managed resource.When you delete an IBM Security Privileged Identity Manager user account, boththe user and the associated IBM Security Identity Manager accounts are deleted onthe IBM Security Privileged Identity Manager.6IBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Chapter 3. ISPIM roles managementIBM Security Identity Manager manages ISPIM roles that are stored on the IBMSecurity Privileged Identity Manager server by using the IBM Security PrivilegedIdentity Manager Adapter.You can perform the following operations:v Add rolesv Modify role attributesv Delete rolesReconciling rolesISPIM roles act as support data for IBM Security Privileged Identity Manageraccounts.To reconcile ISPIM roles, do a full reconciliation or reconcile support data only. See“Reconciling support data without reconciling user accounts” on page 4.Adding rolesYou can add roles at any time. You can change the adapter attributes that definethe role on the role form.Complete the fields in the role form. See “IBM Security Privileged IdentityManager Adapter role form attributes” on page 17 for the required and optionalform attributes.Modifying ISPIM rolesYou can add or remove members to an ISPIM role form. You can also modify otherattributes of a role by changing the attribute value on the role form. You cannotchange the Business unit field (erPIMParentBusinessUnit attibute), the Approvalworkflow on the managed resource field (erPIMRolePIMWorkflow attribute), andthe Role classification field (erPIMRoleClassification attribute).Procedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Groups.3. On the Manage Groups page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.4. Select the service that contains the ISPIM role to be managed and then clickContinue.5. On the Select Group page, select Group Type ISPIM role to display all theISPIM roles that are created for that service and click Search.6. On the Groups table, select the menu of the ISPIM role to be managed andclick the appropriate option.OptionDescriptionIf you want to add ISPIM usersClick Add members.7

OptionDescriptionIf you want to remove ISPIM usersClick Manage members.7. Search for the users who are to be added or removed from the role.OptionDescriptionIf you are on the Add Members pageClick Search. Search results display the listof users who can be made members of therole.If you are on the Manage Group MemberspageSearch results display the list of users whoare currently members of the role.8. Select the users and set the date when the addition or deletion becomeseffective.OptionDescriptionIf you are addingSelect the users and click OK. The Schedulepage is displayed.Select the effective date of the rolemembership addition and click Submit.If you are removingSelect the users and click Remove. TheConfirm page is displayed.Select the effective date of the role memberdeletion and click Remove.Deleting ISPIM rolesYou can delete an ISPIM role only if it does not have any members.Procedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Groups.3. On the Manage Groups page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.4. Select the service that contains the ISPIM role to be deleted and then clickContinue.5. On the Select Group page, select Group Type ISPIM role to display all theISPIM roles that are created for that service and click Search.6. On the Groups table, select the ISPIM role to be deleted and click Delete.7. On the Confirm page, click Delete.8IBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Chapter 4. ISPIM groups managementIBM Security Identity Manager manages ISPIM groups that are stored on the IBMSecurity Privileged Identity Manager server by using the IBM Security PrivilegedIdentity Manager Adapter.You can perform the following operations:v Add groupsv Modify group attributesv Delete groupsReconciling groupsISPIM groups act as support data for IBM Security Privileged Identity Manageraccounts.To reconcile ISPIM groups, do a full reconciliation or reconcile support data only.See “Reconciling support data without reconciling user accounts” on page 4.Adding groupsYou can add groups at any time. You can change the adapter attributes that definethe group on the group form.Complete the fields in the group form. See “IBM Security Privileged IdentityManager Adapter group form attributes” on page 19 for the required and optionalform attributes.Modifying ISPIM groupsYou can add or remove members to an ISPIM group (system role) form. You canalso modify other attributes of a group by changing the attribute value on thegroup form. You cannot change the Group name field (erPIMName attribute) andthe Business unit field (erPIMParentBusinessUnit attribute).Procedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Groups.3. On the Manage Groups page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.4. Select the service that contains the ISPIM group to be managed and then clickContinue.5. On the Select Group page, select Group Type ISPIM group to display all theISPIM groups that are created for that service and click Search.6. On the Groups table, select the context menu of the ISPIM group to bemanaged and click the appropriate option.OptionDescriptionIf you want to add members to the systemgroupClick Add members.9

OptionDescriptionIf you want to remove members from thesystem groupClick Manage members.7. Search for the users who are to be added or removed from the ISPIM group.OptionDescriptionIf you are on the Add Members pageClick Search. Search results display the listof users who can be made members of thesystem group.If you are on the Manage Group MemberspageClick Search. Search results display the listof users who are currently members of thesystem group.8. Select the users and set the date when the addition or deletion becomeseffective.OptionDescriptionIf you are adding members to the systemgroupSelect the users and click OK. The Schedulepage is displayed.Select the effective date of the system groupmembership addition and click Submit.If you are removing members from thesystem groupSelect the users and click Remove. TheConfirm page is displayed.Select the effective date of the system groupmembership deletion and click Remove.Deleting ISPIM groupsYou can delete a ISPIM group only if it does not have any members.Procedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Groups.3. On the Manage Groups page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.4. Select the service that contains the group to be deleted and then clickContinue.5. On the Select Group page, select Group Type ISPIM group to display all theISPIM groups that are created for that service and click Search.6. On the Groups table, select the system group to be deleted and click Delete.7. On the Confirm page, click Delete.10IBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Chapter 5. ISPIM administrative domains managementIBM Security Identity Manager manages ISPIM administrative domains that arestored on the IBM Security Privileged Identity Manager server by using the IBMSecurity Privileged Identity Manager Adapter.You can perform the following operations:v Add ISPIM administrative domainsv Modify ISPIM administrative domainsv Delete ISPIM administrative domainsReconciling administrative domainsISPIM administrative domains act as support data for IBM Security PrivilegedIdentity Manager accounts.To reconcile ISPIM administrative domains, do a full reconciliation or reconcilesupport data only. See “Reconciling support data without reconciling useraccounts” on page 4.Adding administrative domainsYou can add administrative domains at any time. You can change the adapterattributes that define the administrative domain on the admin domain form.See “IBM Security Privileged Identity Manager Adapter admin domain formattributes” on page 19 for the required and optional form attributes.Modifying administrative domainsYou can add or remove administrators from an ISPIM administrative domain. Youcan also modify other attributes of administrative domains by changing theattribute value on the admin domain form. You cannot change the Business Unitfield (erParentBusinessUnit attribute).Procedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Groups.3. On the Manage Groups page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.4. Select the service that contains the administrative domains to be managed andthen click Continue.5. On the Select Group page, select Group Type ISPIM admin domain todisplay all the administrative domains that are created for that service and clickSearch.6. On the Groups table, select the context menu of the administrator domain to bemanaged and click the appropriate option.11

OptionDescriptionIf you want to add administrators to thedomainClick Add members.If you want to remove administrators fromthe domainClick Manage members.7. Search for the users who are to be added or removed from the domain.OptionDescriptionIf you are on the Add Members pageClick Search. Search results display the listof users who can be made administrators ofthe domain.If you are on the Manage Group MemberspageSearch results display the list of users whoare currently administrators of the domain.8. Select the users and set the date when the addition or deletion becomeseffective.OptionDescriptionIf you are adding administratorsSelect the users and click OK. The Schedulepage is displayed.Select the effective date of the administratoraddition and click Submit.If you are removing administratorsSelect the users and click Remove. TheConfirm page is displayed.Select the effective date of the administratordeletion and click Remove.Deleting ISPIM administrative domainsYou can delete a ISPIM administrative domain as long as the administrativedomain does not have any administrators. ISPIM administrative domainadministrators show up as members of the administrative domain service group.Procedure1. Log on to IBM Security Identity Manager as an administrator.2. In the My Work pane, click Manage Groups.3. On the Manage Groups page, select the IBM Security Privileged IdentityManager profile from the Service type list and click Search.4. Select the service that contains the group to be deleted and then clickContinue.5. On the Select Group page, select Group Type ISPIM admin domain todisplay all the ISPIM administrative domains that are created for that serviceand click Search.6. On the Groups table, select the ISPIM administrative domain to be deleted andclick Delete.7. On the Confirm page, click Delete.12IBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Chapter 6. ReferenceReference information is organized to help you locate particular facts quickly suchas adapter attributes, application programming interfaces, files and commands,where applicable.Adapter attributesThe IBM Security Identity server communicates with the adapter by usingattributes, which are included in transmission packets that are sent over a network.You can manage the adapter attributes that are on the various adapter forms.IBM Security Privileged Identity Manager account formattributesYou can manage user accounts from IBM Security Identity Manager.Table 3. Account form attributesAttributesDescriptionBusiness unitThis attribute is required.This field is the organization that containsthe user account. This field maps to theerPIMParentBusinessUnit attribute in theerPIMAccount object class and to theerparent erglobalid attribute on the IBMSecurity Privileged Identity Manager server.User IDThis attribute is required.This field is the unique name for the useraccount. This field maps to the erUidattribute in the erPIMAccount object classand to the uid attribute on the IBM SecurityPrivileged Identity Manager server.Last nameThis attribute is required.This field is the user's surname. This fieldmaps to the erPIMLastName attribute in theerPIMAccount object class and to the snattribute on the IBM Security PrivilegedIdentity Manager server.Full nameThis attribute is required.This field is the user's complete name. Thisfield maps to the erPIMFullName attribute inthe erPIMAccount object class and to the cnattribute on the IBM Security PrivilegedIdentity Manager server.13

Table 3. Account form attributes (continued)AttributesDescriptionChange password at next logon?This attribute is optional.This field indicates whether the user mustchange password on the next log on to theIBM Security Privileged Identity Managerserver. This field maps to theerPIMChangePassword attribute in theerPIMAccount object class and to theerchangepswdrequired attribute on the IBMSecurity Privileged Identity Manager server.First nameThis attribute is optional.This field is the user's given name. This fieldmaps to the erPIMFirstName attribute in theerPIMAccount object class and to thegivenname attribute on the IBM SecurityPrivileged Identity Manager server.InitialsThis attribute is optional.This field is the user's initials. This fieldmaps to the erPIMInitials attribute in theerPIMAccount object class and to theinitials attribute on the IBM SecurityPrivileged Identity Manager server.Home addressThis attribute is optional.The field is the user's home address. Thisfield maps to the erPIMInitials attribute inthe erPIMAccount object class and to thehomepostaladdress attribute on the IBMSecurity Privileged Identity Manager server.Shared secretThis attribute is optional.This field is the user's shared secret that isused to get the password when a newaccount is created. This field maps to theerPIMSharedSecret attribute in theerPIMAccount object class and to theersharedsecret attribute on the IBMSecurity Privileged Identity Manager server.Organizational rolesThis attribute is optional.This field is the roles that the user has. Thisfield maps to the erPIMOrgRoles attribute inthe erPIMAccount object class and to theerroles attribute on the IBM SecurityPrivileged Identity Manager server.14IBM Security Identity Manager: IBM Security Privileged Identity Manager Adapter User Guide

Table 3. Account form attributes (continued)AttributesDescriptionOffice numberThis attribute is optional.This field is the user's office number. Thisfield maps to the erPIMOfficeNumberattribute in the erPIMAccount object classand to the roomnumber attribute on the IBMSecurity Privileged Identity Manager server.Employee numberThis attribute is optional.This field is the user's employee number.This field maps to the erPIMEmployeeNumberattribute in the erPIMAccount object classand to the employeenumber attribute on theIBM Security Privileged Identity Managerserver.ManagerThis attribute is optional.This field is the user's manager. This fieldmaps to the erPIMManager attribute in theerPIMAccount object class and to the managerattribute on the IBM Security PrivilegedIdentity Manager server.Postal addressThis attribute is optional.This field is the user's mailing address. Thisfield maps to the erPIMPostalAddressattribute in the erPIMAccount object classand to the postaladdress attribute on theIBM Security Privileged Identity Managerserver.Administrative assistantThis attribute is optional.This field is the user's businessadministrative assistant. This field maps tothe erPIMAdminAssistant attribute in theerPIMAccount object class and to thesecretary attribute on the IBM SecurityPrivileged Identity Manager server.E-mail addressThe user's email address. This field maps tothe erPIMEmailAddress attribute in theerPIMAccount object class and to the mailattribute on the IBM Security PrivilegedIdentity Manager server.Chapter 6. Reference15

Table

The IBM Security Privileged Identity Manager Adapter automates the management of user accounts and dif fer ent service gr oups such as ISPIM r oles, ISPIM gr oups, . Service group management on the IBM Security Privileged Identity Manager server v Adding gr oups v Modifying gr oups attributes, including adding and r emoving members

Related Documents:

IBM Security Identity server The following servers ar e supported: v IBM Security Identity Manager server V ersion 6.0 v IBM Security Identity Manager server V ersion 7.0 v IBM Security Privileged Identity Manager V ersion 2.0 v IBM Security Identity Governance and Intelligence server V ersion 5.2.2 PeopleSoft Enterprise V ersion 9.0 V ersion 9.1

IBM Security Identity server The following servers ar e supported: v IBM Security Identity Manager server V ersion 6.0 v IBM Security Identity Manager server V ersion 7.0 v IBM Security Privileged Identity Manager V ersion 2.0 v IBM Security Identity Governance and Intelligence server V ersion 5.2.2 T ivoli Dir ectory Integrator adapters .

v A list of publications in the "IBM Security Privileged Identity Manager library." v Links to "Online publications." v A link to the "IBM Terminology website" on page x. IBM Security Privileged Identity Manager library The following documents are available online in the IBM Security Privileged Identity Manager library:

The Cisco Unified Communications Manager Adapter pr ovides connectivity between the IBM Security Identity server and the Cisco Unified Communications Manager server . The adapter r uns as a service, independent of whether you ar e logged on to IBM Security Identity Manager . The Cisco Unified Communications Manager Adapter automates the following

The IBM Security Privileged Identity Manager is an appliance-based solution that pr ovides privileged cr edential and access management, application identity management, and session r ecor ding. Privileged identity management overview IBM Security Privileged Identity Manager helps or ganizations manage, automate, and track the use of shar ed .

Modi ed IBM IBM Informix Client SDK 4.10 03/2019 Modi ed IBM KVM for IBM z Systems 1.1 03/2019 Modi ed IBM IBM Tivoli Application Dependency Discovery Manager 7.3 03/2019 New added IBM IBM Workspace Analyzer for Banking 6.0 03/2019 New added IBM IBM StoredIQ Suite 7.6 03/2019 New added IBM IBM Rational Performance Test Server 9.5 03/2019 New .

The first supported configuration includes a single IBM Security Identity server , a single workstation r unning the Notes client with one instance of the Lotus Notes Adapter , and a single Lotus Domino server .}} Security } Identity Manager Server Lotus Note Client Security Identity Manager Adapter Lotus Domino Server Figure 1.

Revolution itself, and the events that immediately followed it. 2. Theoretical tools to help you interpret (explain/analyze) the American Revolution: You will learn basic revolutionary theory as it has been developed by historians and political scientists, and apply it to the American Revolution. 3.