Table Of ContentOracle®FusionMiddleware
1[]
AdministeringOracleIdentityManager
11gRelease2(11.1.2.3.0)
E56651-11
July2018
OracleFusionMiddlewareAdministeringOracleIdentityManager,11gRelease2(11.1.2.3.0)
E56651-11
Copyright©1991,2018,Oracleand/oritsaffiliates.Allrightsreserved.
PrimaryAuthor: AnjuPoovaiah
ContributingAuthor: DebapriyaDatta
Contributor:SanjayRallapalli
Thissoftwareandrelateddocumentationareprovidedunderalicenseagreementcontainingrestrictionson
useanddisclosureandareprotectedbyintellectualpropertylaws.Exceptasexpresslypermittedinyour
licenseagreementorallowedbylaw,youmaynotuse,copy,reproduce,translate,broadcast,modify,license,
transmit,distribute,exhibit,perform,publish,ordisplayanypart,inanyform,orbyanymeans.Reverse
engineering,disassembly,ordecompilationofthissoftware,unlessrequiredbylawforinteroperability,is
prohibited.
Theinformationcontainedhereinissubjecttochangewithoutnoticeandisnotwarrantedtobeerror-free.If
youfindanyerrors,pleasereportthemtousinwriting.
IfthisissoftwareorrelateddocumentationthatisdeliveredtotheU.S.Governmentoranyonelicensingit
onbehalfoftheU.S.Government,thenthefollowingnoticeisapplicable:
U.S.GOVERNMENTENDUSERS:Oracleprograms,includinganyoperatingsystem,integratedsoftware,
anyprogramsinstalledonthehardware,and/ordocumentation,deliveredtoU.S.Governmentendusers
are"commercialcomputersoftware"pursuanttotheapplicableFederalAcquisitionRegulationand
agency-specificsupplementalregulations.Assuch,use,duplication,disclosure,modification,and
adaptationoftheprograms,includinganyoperatingsystem,integratedsoftware,anyprogramsinstalledon
thehardware,and/ordocumentation,shallbesubjecttolicensetermsandlicenserestrictionsapplicableto
theprograms.NootherrightsaregrantedtotheU.S.Government.
Thissoftwareorhardwareisdevelopedforgeneraluseinavarietyofinformationmanagement
applications.Itisnotdevelopedorintendedforuseinanyinherentlydangerousapplications,including
applicationsthatmaycreateariskofpersonalinjury.Ifyouusethissoftwareorhardwareindangerous
applications,thenyoushallberesponsibletotakeallappropriatefail-safe,backup,redundancy,andother
measurestoensureitssafeuse.OracleCorporationanditsaffiliatesdisclaimanyliabilityforanydamages
causedbyuseofthissoftwareorhardwareindangerousapplications.
OracleandJavaareregisteredtrademarksofOracleand/oritsaffiliates.Othernamesmaybetrademarksof
theirrespectiveowners.
IntelandIntelXeonaretrademarksorregisteredtrademarksofIntelCorporation.AllSPARCtrademarks
areusedunderlicenseandaretrademarksorregisteredtrademarksofSPARCInternational,Inc.AMD,
Opteron,theAMDlogo,andtheAMDOpteronlogoaretrademarksorregisteredtrademarksofAdvanced
MicroDevices.UNIXisaregisteredtrademarkofTheOpenGroup.
Thissoftwareorhardwareanddocumentationmayprovideaccesstoorinformationaboutcontent,
products,andservicesfromthirdparties.OracleCorporationanditsaffiliatesarenotresponsibleforand
expresslydisclaimallwarrantiesofanykindwithrespecttothird-partycontent,products,andservices
unlessotherwisesetforthinanapplicableagreementbetweenyouandOracle.OracleCorporationandits
affiliateswillnotberesponsibleforanyloss,costs,ordamagesincurredduetoyouraccesstooruseof
third-partycontent,products,orservices,exceptassetforthinanapplicableagreementbetweenyouand
Oracle.
Contents
LLiissttooffFTiagbuleress
Preface............................................................................................................................................................. xxv
Audience................................................................................................................................................... xxv
DocumentationAccessibility................................................................................................................. xxv
RelatedDocuments................................................................................................................................. xxv
Conventions............................................................................................................................................ xxvi
What's New In This Guide................................................................................................................... xxvii
UpdatesinJuly2018DocumentationRefreshfor11gRelease2(11.1.2.3.0)................................. xxvii
UpdatesinApril2018DocumentationRefreshfor11gRelease2(11.1.2.3.0)............................... xxvii
UpdatesinJanuary2018DocumentationRefreshfor11gRelease2(11.1.2.3.0)........................... xxvii
UpdatesinDecember2017DocumentationRefreshfor11gRelease2(11.1.2.3.0)....................... xxvii
UpdatesinOctober2016DocumentationRefreshfor11gRelease2(11.1.2.3.0).......................... xxvii
UpdatesinJuly2016DocumentationRefreshfor11gRelease2(11.1.2.3.0)................................ xxviii
UpdatesinApril2016DocumentationRefreshfor11gRelease2(11.1.2.3.0).............................. xxviii
UpdatesinJanuary2016DocumentationRefreshfor11gRelease2(11.1.2.3.0).......................... xxviii
UpdatesinAugust2015DocumentationRefreshfor11gRelease2(11.1.2.3.0).......................... xxviii
UpdatesinJune2015DocumentationRefreshfor11gRelease2(11.1.2.3.0)................................ xxviii
NewandChangedFeaturesfor11gRelease2(11.1.2.3.0).............................................................. xxviii
OtherSignificantChangesinthisDocumentfor11gRelease2(11.1.2.3.0)................................... xxix
Part I Overview
1 Product Overview
1.1 WhatisOracleIdentityManager?............................................................................................ 1-1
1.2 WhataretheDifferentModesofOracleIdentityManager?................................................ 1-2
1.3 HowdoesOracleIdentityManagerInteractwithOtherITSystems?................................ 1-4
1.4 HowdoesOracleIdentityManagerInteractwithOtherOracleIdentityandAccess
ManagementProducts? 1-4
1.5 HowdoUsersInteractwithOracleIdentityManager?........................................................ 1-6
2 Product Architecture
2.1 OracleIdentityManagerComponents.................................................................................... 2-1
2.2 Multi-tieredArchitecture........................................................................................................... 2-1
iii
2.2.1 UnderstandingtheUserInterfaceTier............................................................................. 2-2
2.2.2 UnderstandingtheApplicationTier................................................................................. 2-2
2.2.3 UnderstandingtheDatabaseTier...................................................................................... 2-4
2.2.4 UnderstandingtheConnectorTier................................................................................... 2-4
3 Oracle Identity System Administration Interface
3.1 LoggingintoOracleIdentityManagerSystemAdministrationConsole.......................... 3-1
3.2 OverviewoftheOracleIdentityManagerSystemAdministrationConsole..................... 3-1
3.2.1 Links...................................................................................................................................... 3-2
3.2.1.1 Accessibility................................................................................................................... 3-2
3.2.1.2 Sandboxes...................................................................................................................... 3-3
3.2.1.3 Help................................................................................................................................ 3-3
3.2.1.3.1 TopPane................................................................................................................. 3-3
3.2.1.3.2 LowerLeftPane..................................................................................................... 3-5
3.2.1.3.3 LowerRightPane.................................................................................................. 3-5
3.2.1.4 SignOut......................................................................................................................... 3-5
3.2.2 LeftandRightPanes........................................................................................................... 3-5
3.2.2.1 Policies............................................................................................................................ 3-6
3.2.2.2 ProvisioningConfiguration........................................................................................ 3-6
3.2.2.3 SystemEntities.............................................................................................................. 3-7
3.2.2.4 SystemConfiguration.................................................................................................. 3-7
3.2.2.5 Upgrade......................................................................................................................... 3-8
3.2.2.6 Workflows..................................................................................................................... 3-8
Part II Policy Administration
4 Managing Workflows
4.1 UnderstandingWorkflowRules............................................................................................... 4-1
4.1.1 RequestProcessFlow.......................................................................................................... 4-2
4.1.2 RequestLifecycle................................................................................................................. 4-3
4.1.2.1 RequestStages............................................................................................................... 4-3
4.1.2.2 SingleRequestLifecycle.............................................................................................. 4-6
4.1.2.3 BulkRequestLifecycle................................................................................................. 4-7
4.2 ConfiguringApprovalWorkflowRules.................................................................................. 4-8
4.2.1 UnderstandingRuleConditions........................................................................................ 4-9
4.2.2 UnderstandingSystem-DefinedOperationsandRules.............................................. 4-10
4.2.3 CreatingApprovalWorkflowRules.............................................................................. 4-13
4.2.4 ConfiguringCustomRuleConditions........................................................................... 4-16
4.2.5 ModifyingApprovalWorkflowRules.......................................................................... 4-23
4.2.6 DeletingApprovalWorkflowRules.............................................................................. 4-24
4.2.7 UnderstandingApprovalWorkflowRuleEvaluation................................................ 4-24
4.3 ManagingRequestApprovalinanUpgradedDeploymentofOracleIdentityManager.......
4-25
4.3.1 UnderstandingRequestProcessFlowWithApprovalWorkflowRulesDisabled. 4-26
4.3.2 MigratingApprovalPoliciestoApprovalWorkflowRules...................................... 4-27
4.3.3 EnablingApprovalWorkflowRules............................................................................. 4-28
4.3.3.1 EnablingtheApprovalWorkflowRulesFeature................................................. 4-28
iv
4.3.3.2 UnderstandingIn-FlightRequestLifecycle........................................................... 4-28
4.4 MovingWorkflowPoliciesFromTesttoProduction......................................................... 4-30
4.5 RunningOracleIdentityManagerWithoutWorkflows.................................................... 4-31
4.5.1 DisablingSOAServer....................................................................................................... 4-31
4.5.2 UnderstandingtheImpactofDisablingWorkflows................................................... 4-31
5 Managing Access Policies
5.1 TerminologiesUsedinAccessPolicies.................................................................................... 5-1
5.2 FeaturesofAccessPolicies........................................................................................................ 5-2
5.2.1 DirectProvisioning.............................................................................................................. 5-3
5.2.2 RevokingorDisablingthePolicy...................................................................................... 5-3
5.2.3 DenyingaResource............................................................................................................. 5-4
5.2.4 EvaluatingPolicies............................................................................................................... 5-4
5.2.5 EvaluatingPoliciesforReconciledandBulkLoad-CreatedAccounts........................ 5-5
5.2.6 AccessPolicyPriority.......................................................................................................... 5-6
5.2.7 AccessPolicyData............................................................................................................... 5-7
5.2.8 ProvisioningMultipleInstancesoftheSameResourceviaAccessPolicybyUsing
AccountDiscriminator 5-7
5.3 CreatingAccessPolicies............................................................................................................. 5-8
5.4 ManagingAccessPolicies....................................................................................................... 5-11
5.5 ProvisioningMultipleInstancesoftheSameResourceviaAccessPolicy...................... 5-12
5.5.1 EnablingMultipleAccountProvisioning...................................................................... 5-12
5.5.2 CreatingSeparateAccountsfortheSameUserandSameResourceonaSingleTarget
System 5-13
5.5.3 ProvisioningMultipleInstancesofaResourcetoMultipleTargetSystems........... 5-14
5.5.4 LimitationofProvisioningMultipleInstancesofaResourceviaAccessPolicy..... 5-15
5.6 TroubleshootingIssueswithEvaluateUserPolicyScheduledJob.................................. 5-16
Part III Form Management
6 Managing Forms
6.1 CreatingFormsByUsingtheFormDesigner......................................................................... 6-1
6.2 SearchingFormsByUsingtheFormDesigner....................................................................... 6-3
6.3 ModifyingFormsByUsingtheFormDesigner..................................................................... 6-3
6.3.1 RemovingorHidingFormAttributes.............................................................................. 6-4
Part IV System Entities
7 Configuring Custom Attributes
7.1 CreatingaCustomAttribute..................................................................................................... 7-1
7.2 CreatingaCustomChildForm................................................................................................. 7-5
7.3 CreatingaCustomChildFormAttribute............................................................................... 7-6
7.4 ModifyingaCustomAttribute................................................................................................. 7-8
7.5 AddingaCustomAttribute....................................................................................................... 7-9
7.5.1 EnablingtheSubmitButtonAfterAddingaUDFtotheModifyUserForm.......... 7-14
7.5.2 AddingaCustomAttributeCategoryintoCreateUserForm................................... 7-15
v
7.5.3 CustomizingUnauthenticatedPage.............................................................................. 7-16
7.6 AddingaCustomAttributetoanApplicationInstanceForm......................................... 7-17
7.6.1 RegeneratingView........................................................................................................... 7-17
7.6.2 UpdatingtheApplicationInstanceFormByUsingWebCenterComposer............ 7-18
7.7 MovingUDFsfromTesttoProduction................................................................................ 7-19
7.7.1 MovingUDFsAddedtoEntities.................................................................................... 7-19
7.7.1.1 ExportingtheUDFfromtheTestEnvironment.................................................... 7-19
7.7.1.2 ImportingtheUDFintotheProductionEnvironment........................................ 7-20
7.7.2 MovingUDFsAddedtoCatalogEntities..................................................................... 7-20
7.8 SynchronizingUser-DefinedFieldsBetweenOracleIdentityManagerandLDAP...... 7-21
7.9 CreatingCascadedLOVs........................................................................................................ 7-21
7.10 LocalizingDisplayLabelsofUDFs....................................................................................... 7-25
7.11 ConfiguringaFieldasMandatoryAttributeintheRequestCatalog.............................. 7-25
Part V Application Management
8 Managing IT Resources
8.1 CreatingITResources................................................................................................................. 8-1
8.2 ManagingITResources.............................................................................................................. 8-3
8.2.1 ViewingITResources.......................................................................................................... 8-3
8.2.2 ModifyingITResources...................................................................................................... 8-3
8.2.3 DeletingITResources.......................................................................................................... 8-4
9 Managing Generic Connectors
9.1 CreatingGenericTechnologyConnectors............................................................................... 9-1
9.1.1 DeterminingProviderRequirements................................................................................ 9-1
9.1.2 SelectingtheProviderstoInclude .................................................................................... 9-2
9.1.3 AddressingthePrerequisites............................................................................................. 9-2
9.1.4 UsingIdentitySystemAdministrationtoCreatetheConnector.................................. 9-3
9.1.4.1 Step1:ProvideBasicInformationPage.................................................................... 9-3
9.1.4.2 Step2:SpecifyParameterValuesPage...................................................................... 9-5
9.1.4.3 Step3:ModifyConnectorConfigurationPage..................................................... 9-12
9.1.4.3.1 AddingorEditingFieldsinDataSets............................................................. 9-18
9.1.4.3.2 RemovingFieldsfromDataSets...................................................................... 9-25
9.1.4.3.3 RemovingMappingsBetweenFields.............................................................. 9-25
9.1.4.3.4 RemovingChildDataSets................................................................................ 9-25
9.1.4.4 Step4:VerifyConnectorFormNamesPage......................................................... 9-26
9.1.4.5 Step5:VerifyConnectorInformationPage........................................................... 9-27
9.1.5 ConfiguringReconciliation............................................................................................. 9-28
9.1.6 ConfiguringProvisioning................................................................................................ 9-28
9.1.7 CreatingtheFormandPublishingtheApplicationInstance..................................... 9-29
9.1.8 EnablingLogging.............................................................................................................. 9-29
9.2 ManagingGenericTechnologyConnectors......................................................................... 9-30
9.2.1 ModifyingGenericTechnologyConnectors................................................................. 9-30
9.2.2 ExportingGenericTechnologyConnectors.................................................................. 9-31
9.2.3 ImportingGenericTechnologyConnectors.................................................................. 9-31
vi
10 Managing Application Instances
10.1 ApplicationInstanceConcepts.............................................................................................. 10-2
10.1.1 MultipleAccountsPerApplicationInstance................................................................ 10-2
10.1.2 Entitlements....................................................................................................................... 10-2
10.1.3 DisconnectedApplicationInstances.............................................................................. 10-3
10.1.4 ApplicationInstanceSecurity......................................................................................... 10-3
10.2 ManagingApplicationInstances........................................................................................... 10-4
10.2.1 CreatingApplicationInstances....................................................................................... 10-4
10.2.2 SearchingApplicationInstances.................................................................................... 10-5
10.2.3 ModifyingApplicationInstances................................................................................... 10-6
10.2.3.1 ModifyingApplicationInstanceAttributes........................................................... 10-6
10.2.3.2 ManagingOrganizationsAssociatedWithApplicationInstances.................... 10-6
10.2.3.2.1 PublishinganApplicationInstancetoOrganizations.................................. 10-7
10.2.3.2.2 RevokingOrganizationsFromanApplicationInstance.............................. 10-8
10.2.3.3 ManagingEntitlementsAssociatedWithApplicationInstances....................... 10-8
10.2.3.3.1 ModifyingEntitlementAttributes................................................................... 10-8
10.2.3.3.2 PublishinganEntitlementtoanOrganization............................................... 10-8
10.2.3.3.3 RevokinganEntitlementfromanOrganization............................................ 10-9
10.2.4 DeletingApplicationInstances....................................................................................... 10-9
10.2.5 CreatingandModifyingForms.................................................................................... 10-10
10.2.5.1 CreatingFormsAssociatedWithApplicationInstances................................... 10-11
10.2.5.2 ModifyingFormsAssociatedWithApplicationInstances................................ 10-12
10.2.5.3 LocalizingApplicationInstanceForm................................................................. 10-13
10.3 ConfiguringApplicationInstances..................................................................................... 10-15
10.3.1 ConfiguringanResourceObject................................................................................... 10-15
10.3.2 ConfiguringITResource................................................................................................ 10-15
10.3.3 ConfiguringPasswordPoliciesforApplicationInstances....................................... 10-16
10.4 DevelopingEntitlements...................................................................................................... 10-17
10.4.1 AvailableEntitlementsandAssignedEntitlements.................................................. 10-18
10.4.2 EntitlementDataCaptureProcess............................................................................... 10-18
10.4.3 MarkingEntitlementAttributesonChildProcessForms........................................ 10-19
10.4.4 DuplicateValidationforEntitlementsorChildData................................................ 10-20
10.4.5 ConfiguringScheduledTasksforWorkingwithEntitlementData........................ 10-21
10.4.5.1 EntitlementList........................................................................................................ 10-22
10.4.5.2 EntitlementAssignments....................................................................................... 10-22
10.4.6 DeletingEntitlements..................................................................................................... 10-22
10.4.7 RefreshingtheEntitlementListPostDeleteforNewEntries.................................. 10-23
10.4.8 DisablingtheCaptureofModificationstoAssignedEntitlements......................... 10-24
10.4.9 Entitlement-RelatedReports......................................................................................... 10-24
10.4.9.1 EntitlementAccessList........................................................................................... 10-25
10.4.9.2 EntitlementAccessListHistory............................................................................ 10-25
10.4.9.3 UserResourceEntitlement..................................................................................... 10-25
10.4.9.4 UserResourceEntitlementHistory...................................................................... 10-25
10.5 ManagingDisconnectedResources..................................................................................... 10-25
10.5.1 DisconnectedResourcesArchitecture......................................................................... 10-26
10.5.2 ManagingDisconnectedApplicationInstance........................................................... 10-27
10.5.2.1 CreatingaDisconnectedApplicationInstance................................................... 10-27
vii
10.5.2.2 CreatingaDisconnectedApplicationInstanceforanExistingDisconnected
Resource 10-29
10.5.3 ProvisioningOperationsonaDisconnectedApplicationInstance......................... 10-29
10.5.3.1 ProcessFormUpdates............................................................................................ 10-30
10.5.4 ManagingEntitlementforDisconnectedResource................................................... 10-30
10.5.4.1 ConfiguringEntitlementGrant............................................................................. 10-30
10.5.5 StatusChangesinManualProcessTaskAction........................................................ 10-32
10.5.6 CustomizingProvisioningSOAComposite............................................................... 10-32
10.5.6.1 CustomizingHumanTaskAssignmentviaSOAComposer............................ 10-32
10.5.6.2 CustomizingbyModifyingtheOutoftheBoxComposite............................... 10-33
10.5.7 TroubleshootingDisconnectedResources.................................................................. 10-33
11 Managing Connector Lifecycle
11.1 LifecycleofaConnector.......................................................................................................... 11-2
11.2 ConnectorLifecycleandChangeManagementTerminology........................................... 11-4
11.3 ViewingConnectorDetails..................................................................................................... 11-5
11.4 InstallingConnectors............................................................................................................... 11-6
11.4.1 OverviewoftheConnectorDeploymentProcess........................................................ 11-6
11.4.2 CreatingtheUserAccountforInstallingConnectors................................................. 11-7
11.4.3 InstallingaConnector...................................................................................................... 11-7
11.4.4 PostInstallationSteps.................................................................................................... 11-10
11.5 DefiningConnectors.............................................................................................................. 11-12
11.6 CloningConnectors............................................................................................................... 11-21
11.6.1 GuidelinesforCloningaConnector............................................................................ 11-22
11.6.2 CloningaConnector....................................................................................................... 11-22
11.6.3 PostcloningSteps............................................................................................................ 11-33
11.7 ExportingConnectorObjectDefinitionsinConnectorXMLFormat............................. 11-33
11.8 UpgradingConnectors.......................................................................................................... 11-34
11.8.1 UpgradeUseCasesSupportedbytheConnectorUpgradeFeature....................... 11-35
11.8.2 ConnectorObjectChangesSupportedbytheUpgradeConnectorsFeature........ 11-37
11.8.2.1 ResourceObjectChanges....................................................................................... 11-37
11.8.2.2 ProcessDefinitionChanges.................................................................................... 11-37
11.8.2.3 ResourceBundleChanges...................................................................................... 11-38
11.8.2.4 ProcessFormChanges............................................................................................ 11-38
11.8.2.5 LookupDefinitionChanges................................................................................... 11-39
11.8.2.6 AdapterChanges..................................................................................................... 11-39
11.8.2.7 RuleChanges............................................................................................................ 11-40
11.8.2.8 ITResourceTypeChanges..................................................................................... 11-40
11.8.2.9 ITResourceChanges............................................................................................... 11-40
11.8.2.10 ScheduledTaskChanges........................................................................................ 11-40
11.8.3 WhatHappensWhenYouUpgradeaConnector...................................................... 11-40
11.8.4 SummaryoftheUpgradeProcedure........................................................................... 11-41
11.8.5 ProceduretoUpgradeaConnector............................................................................. 11-42
11.8.5.1 PreupgradeProcedure............................................................................................ 11-42
11.8.5.2 UpgradeProcedure................................................................................................. 11-43
11.8.5.3 PostupgradeProcedure.......................................................................................... 11-57
11.8.6 ProceduretoUpgradea9.xConnectorVersiontoanICFBasedConnector......... 11-62
viii
11.9 UninstallingConnectors....................................................................................................... 11-63
11.9.1 UseCasesSupportedbytheUninstallConnectorsUtility....................................... 11-63
11.9.2 OverviewoftheConnectorUninstallProcess............................................................ 11-64
11.9.3 SettingUptheUninstallConnectorUtility................................................................. 11-65
11.9.4 UninstallingConnectorsandRemovingConnectorObjects.................................... 11-65
11.9.4.1 UninstallingaConnector........................................................................................ 11-66
11.9.4.2 RemovingAdapters,LookupDefinitions,ResourceObjects,andScheduledTasks.
11-67
11.9.4.3 RunningtheScripttoUninstallConnectorsandConnectorObjects............... 11-67
11.9.4.3.1 Preuninstall....................................................................................................... 11-67
11.9.4.3.2 Uninstall............................................................................................................. 11-67
11.9.4.3.3 Postuninstall...................................................................................................... 11-69
11.10 TroubleshootingConnectorManagementIssues.............................................................. 11-70
12 Managing Reconciliation
12.1 TypesofReconciliation........................................................................................................... 12-2
12.1.1 ReconciliationBasedontheObjectBeingReconciled................................................. 12-2
12.1.1.1 TrustedSourceReconciliation................................................................................. 12-3
12.1.1.2 AccountReconciliation............................................................................................. 12-4
12.1.1.3 ReconciliationProcessFlow..................................................................................... 12-6
12.1.2 ModeofReconciliation.................................................................................................... 12-8
12.1.3 ApproachUsedforReconciliation................................................................................. 12-9
12.2 ManagingReconciliationEvents......................................................................................... 12-10
12.2.1 SearchingEvents............................................................................................................. 12-10
12.2.1.1 PerformingaSimpleSearchforEvents................................................................ 12-10
12.2.1.2 PerforminganAdvancedSearchforEvents....................................................... 12-11
12.2.2 DisplayingEventDetails............................................................................................... 12-12
12.2.3 DeterminingEventActions........................................................................................... 12-14
12.2.4 Re-evaluatingEvents...................................................................................................... 12-14
12.2.5 ClosingEvents................................................................................................................. 12-15
12.2.6 LinkingReconciliationEvents...................................................................................... 12-15
12.2.6.1 AdHocLinking....................................................................................................... 12-16
12.2.6.2 ManualLinking........................................................................................................ 12-16
12.2.6.3 LinkingOrphanAccounts...................................................................................... 12-16
12.2.6.3.1 ForanEventWithMultipleMatches............................................................ 12-17
12.2.6.3.2 ForanEventWithNoMatches...................................................................... 12-17
Part VI Requests
13 Managing the Access Request Catalog
13.1 AccessRequestCatalog........................................................................................................... 13-1
13.1.1 AccessRequestChallenges.............................................................................................. 13-1
13.1.2 Concepts............................................................................................................................. 13-2
13.1.3 CatalogUsecases.............................................................................................................. 13-3
13.2 AbouttheAccessRequestCatalog........................................................................................ 13-5
13.2.1 FeaturesandBenefits....................................................................................................... 13-5
ix
13.2.2 Architecture....................................................................................................................... 13-6
13.3 ConfiguringtheAccessRequestCatalog............................................................................. 13-7
13.3.1 AddingMoreAttributestotheDefaultSearchForm.................................................. 13-7
13.3.2 ConfiguringApplicationSelectionLimitinEntitlementSearch............................... 13-7
13.3.3 ConfiguringCatalogtoUseaCustomSearchForm................................................... 13-7
13.4 AdministeringtheAccessRequestCatalog......................................................................... 13-7
13.4.1 Pre-requisites..................................................................................................................... 13-7
13.4.1.1 SettinguptheCatalogSystemAdministrator...................................................... 13-8
13.4.1.2 DefiningtheCatalogMetadata............................................................................... 13-8
13.4.2 CommonTasks.................................................................................................................. 13-9
13.4.2.1 OnboardApplicationsandRoles ........................................................................... 13-9
13.4.2.1.1 PrepareanOnboardingchecklist .................................................................... 13-9
13.4.2.1.2 OnboardingRoles............................................................................................. 13-10
13.4.2.1.3 OnboardingApplicationInstances................................................................ 13-10
13.4.2.1.4 OnboardingEntitlements................................................................................ 13-11
13.4.2.2 BootstrappingtheCatalog...................................................................................... 13-12
13.4.2.2.1 BootstrappingtheCatalogwithRoles........................................................... 13-12
13.4.2.2.2 BootstrappingtheCatalogwithApplicationInstances.............................. 13-13
13.4.2.2.3 BootstrappingtheCatalogwithEntitlements.............................................. 13-13
13.4.2.3 OngoingSynchronization....................................................................................... 13-14
13.4.2.4 EnrichingtheCatalog.............................................................................................. 13-14
13.4.2.4.1 EditingaCatalogItemOnline........................................................................ 13-14
13.4.2.4.2 EnrichingtheCataloginbulkfromexternalsources.................................. 13-15
13.4.2.4.3 Loadingdatafromanexternalsource........................................................... 13-15
13.4.2.5 ManagingCatalogItems......................................................................................... 13-16
13.4.2.5.1 DeletingaCatalogItemsofTypeRoles........................................................ 13-16
13.4.2.5.2 DeletingCatalogItemsofTypeApplicationInstances.............................. 13-16
13.4.2.5.3 DeletingCatalogItemsoftypeEntitlements................................................ 13-17
13.4.3 ConfiguringCatalogAuditing...................................................................................... 13-17
13.4.4 ConfiguringHierarchicalAttributesofEntitlements................................................ 13-18
13.4.5 DatabaseBestPracticesforAccessRequestCatalog................................................. 13-20
13.4.5.1 One-TimeOptimizationsforOracleTextIndex................................................. 13-20
13.4.5.2 TextIndexOptimization......................................................................................... 13-22
13.5 ManagingtheLifecycleoftheCatalog............................................................................... 13-23
13.5.1 OverviewofCatalogCustomization........................................................................... 13-23
13.5.2 TesttoProductionproceduresforCatalogcustomizations..................................... 13-25
13.5.2.1 ExportingusingtheSandboxandDeploymentManager................................. 13-25
13.5.2.2 ImportingUsingtheDeploymentManagerandSandbox................................ 13-26
13.5.3 LimitationsoftheTesttoProductionprocedures..................................................... 13-27
13.6 Troubleshooting..................................................................................................................... 13-27
13.6.1 Catalogsynchronizationissues.................................................................................... 13-28
13.6.2 Catalogsecurityissues................................................................................................... 13-31
13.6.3 CatalogSearchIssues..................................................................................................... 13-33
13.6.4 CommonReasonsforRequestFailure......................................................................... 13-34
Part VII System Configuration
x
Description:Oracle Fusion Middleware Administering Oracle Identity Manager, 11g Release 2 This software or hardware and documentation may provide access to or . Logging in to Oracle Identity Manager System Administration Console.