ebook img

Oracle Fusion Middleware Administering Oracle Identity Manager PDF

697 Pages·2016·12.21 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Oracle Fusion Middleware Administering Oracle Identity Manager

Oracle®FusionMiddleware 1[] AdministeringOracleIdentityManager 11gRelease2(11.1.2.3.0) E56651-11 July2018 OracleFusionMiddlewareAdministeringOracleIdentityManager,11gRelease2(11.1.2.3.0) E56651-11 Copyright©1991,2018,Oracleand/oritsaffiliates.Allrightsreserved. PrimaryAuthor: AnjuPoovaiah ContributingAuthor: DebapriyaDatta Contributor:SanjayRallapalli Thissoftwareandrelateddocumentationareprovidedunderalicenseagreementcontainingrestrictionson useanddisclosureandareprotectedbyintellectualpropertylaws.Exceptasexpresslypermittedinyour licenseagreementorallowedbylaw,youmaynotuse,copy,reproduce,translate,broadcast,modify,license, transmit,distribute,exhibit,perform,publish,ordisplayanypart,inanyform,orbyanymeans.Reverse engineering,disassembly,ordecompilationofthissoftware,unlessrequiredbylawforinteroperability,is prohibited. Theinformationcontainedhereinissubjecttochangewithoutnoticeandisnotwarrantedtobeerror-free.If youfindanyerrors,pleasereportthemtousinwriting. IfthisissoftwareorrelateddocumentationthatisdeliveredtotheU.S.Governmentoranyonelicensingit onbehalfoftheU.S.Government,thenthefollowingnoticeisapplicable: U.S.GOVERNMENTENDUSERS:Oracleprograms,includinganyoperatingsystem,integratedsoftware, anyprogramsinstalledonthehardware,and/ordocumentation,deliveredtoU.S.Governmentendusers are"commercialcomputersoftware"pursuanttotheapplicableFederalAcquisitionRegulationand agency-specificsupplementalregulations.Assuch,use,duplication,disclosure,modification,and adaptationoftheprograms,includinganyoperatingsystem,integratedsoftware,anyprogramsinstalledon thehardware,and/ordocumentation,shallbesubjecttolicensetermsandlicenserestrictionsapplicableto theprograms.NootherrightsaregrantedtotheU.S.Government. Thissoftwareorhardwareisdevelopedforgeneraluseinavarietyofinformationmanagement applications.Itisnotdevelopedorintendedforuseinanyinherentlydangerousapplications,including applicationsthatmaycreateariskofpersonalinjury.Ifyouusethissoftwareorhardwareindangerous applications,thenyoushallberesponsibletotakeallappropriatefail-safe,backup,redundancy,andother measurestoensureitssafeuse.OracleCorporationanditsaffiliatesdisclaimanyliabilityforanydamages causedbyuseofthissoftwareorhardwareindangerousapplications. OracleandJavaareregisteredtrademarksofOracleand/oritsaffiliates.Othernamesmaybetrademarksof theirrespectiveowners. IntelandIntelXeonaretrademarksorregisteredtrademarksofIntelCorporation.AllSPARCtrademarks areusedunderlicenseandaretrademarksorregisteredtrademarksofSPARCInternational,Inc.AMD, Opteron,theAMDlogo,andtheAMDOpteronlogoaretrademarksorregisteredtrademarksofAdvanced MicroDevices.UNIXisaregisteredtrademarkofTheOpenGroup. Thissoftwareorhardwareanddocumentationmayprovideaccesstoorinformationaboutcontent, products,andservicesfromthirdparties.OracleCorporationanditsaffiliatesarenotresponsibleforand expresslydisclaimallwarrantiesofanykindwithrespecttothird-partycontent,products,andservices unlessotherwisesetforthinanapplicableagreementbetweenyouandOracle.OracleCorporationandits affiliateswillnotberesponsibleforanyloss,costs,ordamagesincurredduetoyouraccesstooruseof third-partycontent,products,orservices,exceptassetforthinanapplicableagreementbetweenyouand Oracle. Contents LLiissttooffFTiagbuleress Preface............................................................................................................................................................. xxv Audience................................................................................................................................................... xxv DocumentationAccessibility................................................................................................................. xxv RelatedDocuments................................................................................................................................. xxv Conventions............................................................................................................................................ xxvi What's New In This Guide................................................................................................................... xxvii UpdatesinJuly2018DocumentationRefreshfor11gRelease2(11.1.2.3.0)................................. xxvii UpdatesinApril2018DocumentationRefreshfor11gRelease2(11.1.2.3.0)............................... xxvii UpdatesinJanuary2018DocumentationRefreshfor11gRelease2(11.1.2.3.0)........................... xxvii UpdatesinDecember2017DocumentationRefreshfor11gRelease2(11.1.2.3.0)....................... xxvii UpdatesinOctober2016DocumentationRefreshfor11gRelease2(11.1.2.3.0).......................... xxvii UpdatesinJuly2016DocumentationRefreshfor11gRelease2(11.1.2.3.0)................................ xxviii UpdatesinApril2016DocumentationRefreshfor11gRelease2(11.1.2.3.0).............................. xxviii UpdatesinJanuary2016DocumentationRefreshfor11gRelease2(11.1.2.3.0).......................... xxviii UpdatesinAugust2015DocumentationRefreshfor11gRelease2(11.1.2.3.0).......................... xxviii UpdatesinJune2015DocumentationRefreshfor11gRelease2(11.1.2.3.0)................................ xxviii NewandChangedFeaturesfor11gRelease2(11.1.2.3.0).............................................................. xxviii OtherSignificantChangesinthisDocumentfor11gRelease2(11.1.2.3.0)................................... xxix Part I Overview 1 Product Overview 1.1 WhatisOracleIdentityManager?............................................................................................ 1-1 1.2 WhataretheDifferentModesofOracleIdentityManager?................................................ 1-2 1.3 HowdoesOracleIdentityManagerInteractwithOtherITSystems?................................ 1-4 1.4 HowdoesOracleIdentityManagerInteractwithOtherOracleIdentityandAccess ManagementProducts? 1-4 1.5 HowdoUsersInteractwithOracleIdentityManager?........................................................ 1-6 2 Product Architecture 2.1 OracleIdentityManagerComponents.................................................................................... 2-1 2.2 Multi-tieredArchitecture........................................................................................................... 2-1 iii 2.2.1 UnderstandingtheUserInterfaceTier............................................................................. 2-2 2.2.2 UnderstandingtheApplicationTier................................................................................. 2-2 2.2.3 UnderstandingtheDatabaseTier...................................................................................... 2-4 2.2.4 UnderstandingtheConnectorTier................................................................................... 2-4 3 Oracle Identity System Administration Interface 3.1 LoggingintoOracleIdentityManagerSystemAdministrationConsole.......................... 3-1 3.2 OverviewoftheOracleIdentityManagerSystemAdministrationConsole..................... 3-1 3.2.1 Links...................................................................................................................................... 3-2 3.2.1.1 Accessibility................................................................................................................... 3-2 3.2.1.2 Sandboxes...................................................................................................................... 3-3 3.2.1.3 Help................................................................................................................................ 3-3 3.2.1.3.1 TopPane................................................................................................................. 3-3 3.2.1.3.2 LowerLeftPane..................................................................................................... 3-5 3.2.1.3.3 LowerRightPane.................................................................................................. 3-5 3.2.1.4 SignOut......................................................................................................................... 3-5 3.2.2 LeftandRightPanes........................................................................................................... 3-5 3.2.2.1 Policies............................................................................................................................ 3-6 3.2.2.2 ProvisioningConfiguration........................................................................................ 3-6 3.2.2.3 SystemEntities.............................................................................................................. 3-7 3.2.2.4 SystemConfiguration.................................................................................................. 3-7 3.2.2.5 Upgrade......................................................................................................................... 3-8 3.2.2.6 Workflows..................................................................................................................... 3-8 Part II Policy Administration 4 Managing Workflows 4.1 UnderstandingWorkflowRules............................................................................................... 4-1 4.1.1 RequestProcessFlow.......................................................................................................... 4-2 4.1.2 RequestLifecycle................................................................................................................. 4-3 4.1.2.1 RequestStages............................................................................................................... 4-3 4.1.2.2 SingleRequestLifecycle.............................................................................................. 4-6 4.1.2.3 BulkRequestLifecycle................................................................................................. 4-7 4.2 ConfiguringApprovalWorkflowRules.................................................................................. 4-8 4.2.1 UnderstandingRuleConditions........................................................................................ 4-9 4.2.2 UnderstandingSystem-DefinedOperationsandRules.............................................. 4-10 4.2.3 CreatingApprovalWorkflowRules.............................................................................. 4-13 4.2.4 ConfiguringCustomRuleConditions........................................................................... 4-16 4.2.5 ModifyingApprovalWorkflowRules.......................................................................... 4-23 4.2.6 DeletingApprovalWorkflowRules.............................................................................. 4-24 4.2.7 UnderstandingApprovalWorkflowRuleEvaluation................................................ 4-24 4.3 ManagingRequestApprovalinanUpgradedDeploymentofOracleIdentityManager....... 4-25 4.3.1 UnderstandingRequestProcessFlowWithApprovalWorkflowRulesDisabled. 4-26 4.3.2 MigratingApprovalPoliciestoApprovalWorkflowRules...................................... 4-27 4.3.3 EnablingApprovalWorkflowRules............................................................................. 4-28 4.3.3.1 EnablingtheApprovalWorkflowRulesFeature................................................. 4-28 iv 4.3.3.2 UnderstandingIn-FlightRequestLifecycle........................................................... 4-28 4.4 MovingWorkflowPoliciesFromTesttoProduction......................................................... 4-30 4.5 RunningOracleIdentityManagerWithoutWorkflows.................................................... 4-31 4.5.1 DisablingSOAServer....................................................................................................... 4-31 4.5.2 UnderstandingtheImpactofDisablingWorkflows................................................... 4-31 5 Managing Access Policies 5.1 TerminologiesUsedinAccessPolicies.................................................................................... 5-1 5.2 FeaturesofAccessPolicies........................................................................................................ 5-2 5.2.1 DirectProvisioning.............................................................................................................. 5-3 5.2.2 RevokingorDisablingthePolicy...................................................................................... 5-3 5.2.3 DenyingaResource............................................................................................................. 5-4 5.2.4 EvaluatingPolicies............................................................................................................... 5-4 5.2.5 EvaluatingPoliciesforReconciledandBulkLoad-CreatedAccounts........................ 5-5 5.2.6 AccessPolicyPriority.......................................................................................................... 5-6 5.2.7 AccessPolicyData............................................................................................................... 5-7 5.2.8 ProvisioningMultipleInstancesoftheSameResourceviaAccessPolicybyUsing AccountDiscriminator 5-7 5.3 CreatingAccessPolicies............................................................................................................. 5-8 5.4 ManagingAccessPolicies....................................................................................................... 5-11 5.5 ProvisioningMultipleInstancesoftheSameResourceviaAccessPolicy...................... 5-12 5.5.1 EnablingMultipleAccountProvisioning...................................................................... 5-12 5.5.2 CreatingSeparateAccountsfortheSameUserandSameResourceonaSingleTarget System 5-13 5.5.3 ProvisioningMultipleInstancesofaResourcetoMultipleTargetSystems........... 5-14 5.5.4 LimitationofProvisioningMultipleInstancesofaResourceviaAccessPolicy..... 5-15 5.6 TroubleshootingIssueswithEvaluateUserPolicyScheduledJob.................................. 5-16 Part III Form Management 6 Managing Forms 6.1 CreatingFormsByUsingtheFormDesigner......................................................................... 6-1 6.2 SearchingFormsByUsingtheFormDesigner....................................................................... 6-3 6.3 ModifyingFormsByUsingtheFormDesigner..................................................................... 6-3 6.3.1 RemovingorHidingFormAttributes.............................................................................. 6-4 Part IV System Entities 7 Configuring Custom Attributes 7.1 CreatingaCustomAttribute..................................................................................................... 7-1 7.2 CreatingaCustomChildForm................................................................................................. 7-5 7.3 CreatingaCustomChildFormAttribute............................................................................... 7-6 7.4 ModifyingaCustomAttribute................................................................................................. 7-8 7.5 AddingaCustomAttribute....................................................................................................... 7-9 7.5.1 EnablingtheSubmitButtonAfterAddingaUDFtotheModifyUserForm.......... 7-14 7.5.2 AddingaCustomAttributeCategoryintoCreateUserForm................................... 7-15 v 7.5.3 CustomizingUnauthenticatedPage.............................................................................. 7-16 7.6 AddingaCustomAttributetoanApplicationInstanceForm......................................... 7-17 7.6.1 RegeneratingView........................................................................................................... 7-17 7.6.2 UpdatingtheApplicationInstanceFormByUsingWebCenterComposer............ 7-18 7.7 MovingUDFsfromTesttoProduction................................................................................ 7-19 7.7.1 MovingUDFsAddedtoEntities.................................................................................... 7-19 7.7.1.1 ExportingtheUDFfromtheTestEnvironment.................................................... 7-19 7.7.1.2 ImportingtheUDFintotheProductionEnvironment........................................ 7-20 7.7.2 MovingUDFsAddedtoCatalogEntities..................................................................... 7-20 7.8 SynchronizingUser-DefinedFieldsBetweenOracleIdentityManagerandLDAP...... 7-21 7.9 CreatingCascadedLOVs........................................................................................................ 7-21 7.10 LocalizingDisplayLabelsofUDFs....................................................................................... 7-25 7.11 ConfiguringaFieldasMandatoryAttributeintheRequestCatalog.............................. 7-25 Part V Application Management 8 Managing IT Resources 8.1 CreatingITResources................................................................................................................. 8-1 8.2 ManagingITResources.............................................................................................................. 8-3 8.2.1 ViewingITResources.......................................................................................................... 8-3 8.2.2 ModifyingITResources...................................................................................................... 8-3 8.2.3 DeletingITResources.......................................................................................................... 8-4 9 Managing Generic Connectors 9.1 CreatingGenericTechnologyConnectors............................................................................... 9-1 9.1.1 DeterminingProviderRequirements................................................................................ 9-1 9.1.2 SelectingtheProviderstoInclude .................................................................................... 9-2 9.1.3 AddressingthePrerequisites............................................................................................. 9-2 9.1.4 UsingIdentitySystemAdministrationtoCreatetheConnector.................................. 9-3 9.1.4.1 Step1:ProvideBasicInformationPage.................................................................... 9-3 9.1.4.2 Step2:SpecifyParameterValuesPage...................................................................... 9-5 9.1.4.3 Step3:ModifyConnectorConfigurationPage..................................................... 9-12 9.1.4.3.1 AddingorEditingFieldsinDataSets............................................................. 9-18 9.1.4.3.2 RemovingFieldsfromDataSets...................................................................... 9-25 9.1.4.3.3 RemovingMappingsBetweenFields.............................................................. 9-25 9.1.4.3.4 RemovingChildDataSets................................................................................ 9-25 9.1.4.4 Step4:VerifyConnectorFormNamesPage......................................................... 9-26 9.1.4.5 Step5:VerifyConnectorInformationPage........................................................... 9-27 9.1.5 ConfiguringReconciliation............................................................................................. 9-28 9.1.6 ConfiguringProvisioning................................................................................................ 9-28 9.1.7 CreatingtheFormandPublishingtheApplicationInstance..................................... 9-29 9.1.8 EnablingLogging.............................................................................................................. 9-29 9.2 ManagingGenericTechnologyConnectors......................................................................... 9-30 9.2.1 ModifyingGenericTechnologyConnectors................................................................. 9-30 9.2.2 ExportingGenericTechnologyConnectors.................................................................. 9-31 9.2.3 ImportingGenericTechnologyConnectors.................................................................. 9-31 vi 10 Managing Application Instances 10.1 ApplicationInstanceConcepts.............................................................................................. 10-2 10.1.1 MultipleAccountsPerApplicationInstance................................................................ 10-2 10.1.2 Entitlements....................................................................................................................... 10-2 10.1.3 DisconnectedApplicationInstances.............................................................................. 10-3 10.1.4 ApplicationInstanceSecurity......................................................................................... 10-3 10.2 ManagingApplicationInstances........................................................................................... 10-4 10.2.1 CreatingApplicationInstances....................................................................................... 10-4 10.2.2 SearchingApplicationInstances.................................................................................... 10-5 10.2.3 ModifyingApplicationInstances................................................................................... 10-6 10.2.3.1 ModifyingApplicationInstanceAttributes........................................................... 10-6 10.2.3.2 ManagingOrganizationsAssociatedWithApplicationInstances.................... 10-6 10.2.3.2.1 PublishinganApplicationInstancetoOrganizations.................................. 10-7 10.2.3.2.2 RevokingOrganizationsFromanApplicationInstance.............................. 10-8 10.2.3.3 ManagingEntitlementsAssociatedWithApplicationInstances....................... 10-8 10.2.3.3.1 ModifyingEntitlementAttributes................................................................... 10-8 10.2.3.3.2 PublishinganEntitlementtoanOrganization............................................... 10-8 10.2.3.3.3 RevokinganEntitlementfromanOrganization............................................ 10-9 10.2.4 DeletingApplicationInstances....................................................................................... 10-9 10.2.5 CreatingandModifyingForms.................................................................................... 10-10 10.2.5.1 CreatingFormsAssociatedWithApplicationInstances................................... 10-11 10.2.5.2 ModifyingFormsAssociatedWithApplicationInstances................................ 10-12 10.2.5.3 LocalizingApplicationInstanceForm................................................................. 10-13 10.3 ConfiguringApplicationInstances..................................................................................... 10-15 10.3.1 ConfiguringanResourceObject................................................................................... 10-15 10.3.2 ConfiguringITResource................................................................................................ 10-15 10.3.3 ConfiguringPasswordPoliciesforApplicationInstances....................................... 10-16 10.4 DevelopingEntitlements...................................................................................................... 10-17 10.4.1 AvailableEntitlementsandAssignedEntitlements.................................................. 10-18 10.4.2 EntitlementDataCaptureProcess............................................................................... 10-18 10.4.3 MarkingEntitlementAttributesonChildProcessForms........................................ 10-19 10.4.4 DuplicateValidationforEntitlementsorChildData................................................ 10-20 10.4.5 ConfiguringScheduledTasksforWorkingwithEntitlementData........................ 10-21 10.4.5.1 EntitlementList........................................................................................................ 10-22 10.4.5.2 EntitlementAssignments....................................................................................... 10-22 10.4.6 DeletingEntitlements..................................................................................................... 10-22 10.4.7 RefreshingtheEntitlementListPostDeleteforNewEntries.................................. 10-23 10.4.8 DisablingtheCaptureofModificationstoAssignedEntitlements......................... 10-24 10.4.9 Entitlement-RelatedReports......................................................................................... 10-24 10.4.9.1 EntitlementAccessList........................................................................................... 10-25 10.4.9.2 EntitlementAccessListHistory............................................................................ 10-25 10.4.9.3 UserResourceEntitlement..................................................................................... 10-25 10.4.9.4 UserResourceEntitlementHistory...................................................................... 10-25 10.5 ManagingDisconnectedResources..................................................................................... 10-25 10.5.1 DisconnectedResourcesArchitecture......................................................................... 10-26 10.5.2 ManagingDisconnectedApplicationInstance........................................................... 10-27 10.5.2.1 CreatingaDisconnectedApplicationInstance................................................... 10-27 vii 10.5.2.2 CreatingaDisconnectedApplicationInstanceforanExistingDisconnected Resource 10-29 10.5.3 ProvisioningOperationsonaDisconnectedApplicationInstance......................... 10-29 10.5.3.1 ProcessFormUpdates............................................................................................ 10-30 10.5.4 ManagingEntitlementforDisconnectedResource................................................... 10-30 10.5.4.1 ConfiguringEntitlementGrant............................................................................. 10-30 10.5.5 StatusChangesinManualProcessTaskAction........................................................ 10-32 10.5.6 CustomizingProvisioningSOAComposite............................................................... 10-32 10.5.6.1 CustomizingHumanTaskAssignmentviaSOAComposer............................ 10-32 10.5.6.2 CustomizingbyModifyingtheOutoftheBoxComposite............................... 10-33 10.5.7 TroubleshootingDisconnectedResources.................................................................. 10-33 11 Managing Connector Lifecycle 11.1 LifecycleofaConnector.......................................................................................................... 11-2 11.2 ConnectorLifecycleandChangeManagementTerminology........................................... 11-4 11.3 ViewingConnectorDetails..................................................................................................... 11-5 11.4 InstallingConnectors............................................................................................................... 11-6 11.4.1 OverviewoftheConnectorDeploymentProcess........................................................ 11-6 11.4.2 CreatingtheUserAccountforInstallingConnectors................................................. 11-7 11.4.3 InstallingaConnector...................................................................................................... 11-7 11.4.4 PostInstallationSteps.................................................................................................... 11-10 11.5 DefiningConnectors.............................................................................................................. 11-12 11.6 CloningConnectors............................................................................................................... 11-21 11.6.1 GuidelinesforCloningaConnector............................................................................ 11-22 11.6.2 CloningaConnector....................................................................................................... 11-22 11.6.3 PostcloningSteps............................................................................................................ 11-33 11.7 ExportingConnectorObjectDefinitionsinConnectorXMLFormat............................. 11-33 11.8 UpgradingConnectors.......................................................................................................... 11-34 11.8.1 UpgradeUseCasesSupportedbytheConnectorUpgradeFeature....................... 11-35 11.8.2 ConnectorObjectChangesSupportedbytheUpgradeConnectorsFeature........ 11-37 11.8.2.1 ResourceObjectChanges....................................................................................... 11-37 11.8.2.2 ProcessDefinitionChanges.................................................................................... 11-37 11.8.2.3 ResourceBundleChanges...................................................................................... 11-38 11.8.2.4 ProcessFormChanges............................................................................................ 11-38 11.8.2.5 LookupDefinitionChanges................................................................................... 11-39 11.8.2.6 AdapterChanges..................................................................................................... 11-39 11.8.2.7 RuleChanges............................................................................................................ 11-40 11.8.2.8 ITResourceTypeChanges..................................................................................... 11-40 11.8.2.9 ITResourceChanges............................................................................................... 11-40 11.8.2.10 ScheduledTaskChanges........................................................................................ 11-40 11.8.3 WhatHappensWhenYouUpgradeaConnector...................................................... 11-40 11.8.4 SummaryoftheUpgradeProcedure........................................................................... 11-41 11.8.5 ProceduretoUpgradeaConnector............................................................................. 11-42 11.8.5.1 PreupgradeProcedure............................................................................................ 11-42 11.8.5.2 UpgradeProcedure................................................................................................. 11-43 11.8.5.3 PostupgradeProcedure.......................................................................................... 11-57 11.8.6 ProceduretoUpgradea9.xConnectorVersiontoanICFBasedConnector......... 11-62 viii 11.9 UninstallingConnectors....................................................................................................... 11-63 11.9.1 UseCasesSupportedbytheUninstallConnectorsUtility....................................... 11-63 11.9.2 OverviewoftheConnectorUninstallProcess............................................................ 11-64 11.9.3 SettingUptheUninstallConnectorUtility................................................................. 11-65 11.9.4 UninstallingConnectorsandRemovingConnectorObjects.................................... 11-65 11.9.4.1 UninstallingaConnector........................................................................................ 11-66 11.9.4.2 RemovingAdapters,LookupDefinitions,ResourceObjects,andScheduledTasks. 11-67 11.9.4.3 RunningtheScripttoUninstallConnectorsandConnectorObjects............... 11-67 11.9.4.3.1 Preuninstall....................................................................................................... 11-67 11.9.4.3.2 Uninstall............................................................................................................. 11-67 11.9.4.3.3 Postuninstall...................................................................................................... 11-69 11.10 TroubleshootingConnectorManagementIssues.............................................................. 11-70 12 Managing Reconciliation 12.1 TypesofReconciliation........................................................................................................... 12-2 12.1.1 ReconciliationBasedontheObjectBeingReconciled................................................. 12-2 12.1.1.1 TrustedSourceReconciliation................................................................................. 12-3 12.1.1.2 AccountReconciliation............................................................................................. 12-4 12.1.1.3 ReconciliationProcessFlow..................................................................................... 12-6 12.1.2 ModeofReconciliation.................................................................................................... 12-8 12.1.3 ApproachUsedforReconciliation................................................................................. 12-9 12.2 ManagingReconciliationEvents......................................................................................... 12-10 12.2.1 SearchingEvents............................................................................................................. 12-10 12.2.1.1 PerformingaSimpleSearchforEvents................................................................ 12-10 12.2.1.2 PerforminganAdvancedSearchforEvents....................................................... 12-11 12.2.2 DisplayingEventDetails............................................................................................... 12-12 12.2.3 DeterminingEventActions........................................................................................... 12-14 12.2.4 Re-evaluatingEvents...................................................................................................... 12-14 12.2.5 ClosingEvents................................................................................................................. 12-15 12.2.6 LinkingReconciliationEvents...................................................................................... 12-15 12.2.6.1 AdHocLinking....................................................................................................... 12-16 12.2.6.2 ManualLinking........................................................................................................ 12-16 12.2.6.3 LinkingOrphanAccounts...................................................................................... 12-16 12.2.6.3.1 ForanEventWithMultipleMatches............................................................ 12-17 12.2.6.3.2 ForanEventWithNoMatches...................................................................... 12-17 Part VI Requests 13 Managing the Access Request Catalog 13.1 AccessRequestCatalog........................................................................................................... 13-1 13.1.1 AccessRequestChallenges.............................................................................................. 13-1 13.1.2 Concepts............................................................................................................................. 13-2 13.1.3 CatalogUsecases.............................................................................................................. 13-3 13.2 AbouttheAccessRequestCatalog........................................................................................ 13-5 13.2.1 FeaturesandBenefits....................................................................................................... 13-5 ix 13.2.2 Architecture....................................................................................................................... 13-6 13.3 ConfiguringtheAccessRequestCatalog............................................................................. 13-7 13.3.1 AddingMoreAttributestotheDefaultSearchForm.................................................. 13-7 13.3.2 ConfiguringApplicationSelectionLimitinEntitlementSearch............................... 13-7 13.3.3 ConfiguringCatalogtoUseaCustomSearchForm................................................... 13-7 13.4 AdministeringtheAccessRequestCatalog......................................................................... 13-7 13.4.1 Pre-requisites..................................................................................................................... 13-7 13.4.1.1 SettinguptheCatalogSystemAdministrator...................................................... 13-8 13.4.1.2 DefiningtheCatalogMetadata............................................................................... 13-8 13.4.2 CommonTasks.................................................................................................................. 13-9 13.4.2.1 OnboardApplicationsandRoles ........................................................................... 13-9 13.4.2.1.1 PrepareanOnboardingchecklist .................................................................... 13-9 13.4.2.1.2 OnboardingRoles............................................................................................. 13-10 13.4.2.1.3 OnboardingApplicationInstances................................................................ 13-10 13.4.2.1.4 OnboardingEntitlements................................................................................ 13-11 13.4.2.2 BootstrappingtheCatalog...................................................................................... 13-12 13.4.2.2.1 BootstrappingtheCatalogwithRoles........................................................... 13-12 13.4.2.2.2 BootstrappingtheCatalogwithApplicationInstances.............................. 13-13 13.4.2.2.3 BootstrappingtheCatalogwithEntitlements.............................................. 13-13 13.4.2.3 OngoingSynchronization....................................................................................... 13-14 13.4.2.4 EnrichingtheCatalog.............................................................................................. 13-14 13.4.2.4.1 EditingaCatalogItemOnline........................................................................ 13-14 13.4.2.4.2 EnrichingtheCataloginbulkfromexternalsources.................................. 13-15 13.4.2.4.3 Loadingdatafromanexternalsource........................................................... 13-15 13.4.2.5 ManagingCatalogItems......................................................................................... 13-16 13.4.2.5.1 DeletingaCatalogItemsofTypeRoles........................................................ 13-16 13.4.2.5.2 DeletingCatalogItemsofTypeApplicationInstances.............................. 13-16 13.4.2.5.3 DeletingCatalogItemsoftypeEntitlements................................................ 13-17 13.4.3 ConfiguringCatalogAuditing...................................................................................... 13-17 13.4.4 ConfiguringHierarchicalAttributesofEntitlements................................................ 13-18 13.4.5 DatabaseBestPracticesforAccessRequestCatalog................................................. 13-20 13.4.5.1 One-TimeOptimizationsforOracleTextIndex................................................. 13-20 13.4.5.2 TextIndexOptimization......................................................................................... 13-22 13.5 ManagingtheLifecycleoftheCatalog............................................................................... 13-23 13.5.1 OverviewofCatalogCustomization........................................................................... 13-23 13.5.2 TesttoProductionproceduresforCatalogcustomizations..................................... 13-25 13.5.2.1 ExportingusingtheSandboxandDeploymentManager................................. 13-25 13.5.2.2 ImportingUsingtheDeploymentManagerandSandbox................................ 13-26 13.5.3 LimitationsoftheTesttoProductionprocedures..................................................... 13-27 13.6 Troubleshooting..................................................................................................................... 13-27 13.6.1 Catalogsynchronizationissues.................................................................................... 13-28 13.6.2 Catalogsecurityissues................................................................................................... 13-31 13.6.3 CatalogSearchIssues..................................................................................................... 13-33 13.6.4 CommonReasonsforRequestFailure......................................................................... 13-34 Part VII System Configuration x

Description:
Oracle Fusion Middleware Administering Oracle Identity Manager, 11g Release 2 This software or hardware and documentation may provide access to or . Logging in to Oracle Identity Manager System Administration Console.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.