Oracle Enterprise Single Sign-on Provisioning Gateway. Novell Identity Manager Integration and Installation Guide Release

Similar documents
Oracle Enterprise Single Sign-on Provisioning Gateway

Oracle Information Rights Management Oracle IRM Windows Authentication Extension Guide 10gR3 August 2008

Oracle Enterprise Single Sign-on Kiosk Manager

Oracle Enterprise Single Sign-on Kiosk Manager. User Guide Release E

Primavera Portfolio Management Reporting Views for SQL Server databases

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release E

Oracle Enterprise Manager

Adaptive Risk Manager Challenge Question Cleanup 10g ( ) December 2007

USING ADMINISTRATOR FEATURES


OIPA System Requirements. Oracle Insurance Policy Administration - Life Release 8.1 E May 2009

Oracle Enterprise Single Sign-on Provisioning Gateway

Oracle Information Rights Management Sealed for Lotus Notes Extension 10gR3 PR3 May 2008

System Monitoring Plug-in Installation Guide for Microsoft Internet Information Services Release 4 ( ) Versions Supported

PEOPLESOFT FINANCIALS/SUPPLY CHAIN MANAGEMENT 9 MAINTENANCE PACK 13 DELTA

Oracle Enterprise Manager. Description. Versions Supported. Prerequisites

JD Edwards EnterpriseOne 8.12 Standalone Client Installation Guide. for the Oracle Application Server

Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved.

Oracle Application Access Controls Governor. Release Notes Release 8.0.1

GRCC Reporting Framework BIP for GRCC Admin/Implementation Guide

Governance, Risk, and Compliance Controls Suite. Hardware and Sizing Recommendations. Software Version 7.2

Oracle Enterprise Manager. Description. Platforms Supported. Versions Supported

Siebel Application Deployment Manager Guide. Version 8.0, Rev. A April 2007

New Features in Primavera Professional 15.2

Oracle Alert Documentation Updates

IVS Explorer User s Guide. Oracle Insurance Policy Administration - Life Release 8.1 E May 2009

Oracle Enterprise Manager

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle Database. Products Available on the Oracle Database Examples Media. Oracle Database Examples. Examples Installation Guide 11g Release 1 (11.

PDF Quick Reference. Oracle Health Sciences InForm CRF Submit Release Part Number: E

Oracle Enterprise Single Sign-on Authentication Manager

Getting Started with Attunity Replicate on Amazon EC2. Version 6.0

Oracle Retail Demand Forecasting Installation Guide Release 12.0 May 2006

Primavera Portfolio Management 9.1 Bridge for Microsoft Office Project Server 2007 Users Guide


Oracle Enterprise Manager. Description. Versions Supported. Prerequisites

Primavera Portfolio Management 9.1 Bridge for Primavera P6 Users Guide

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

Oracle Workflow Builder for Windows 2000 or Windows XP. Oracle XML Gateway Message Designer for Windows 2000

Cover Page. Oracle Report Parser System Administration Guide 10g Release 3 ( ) March 2007

Oracle Enterprise Manager. Description. Versions Supported. System Monitoring Plug-in Installation Guide for EMC CLARiiON System Release 5 (

Oracle Enterprise Single Sign-on Logon Manager How-To: Configuring ESSO-LM Event Logging with Microsoft SQL Server 2005 Release

AutoVue Document Print Service. Overview

Oracle Enterprise Single Sign-On Provisioning Gateway Sun Java System Identity Manager Connector Guide Release E

Microsoft Active Directory Plug-in User s Guide Release

Oracle Enterprise Manager Ops Center

Oracle Insurance QuickView Service Ordering User Guide. Version 8.0

Adaptive Risk Manager Offline PoC Guide 10g ( ) December 2007

Copyright

Oracle Enterprise Manager

AutoVue Integration SDK. Security and Authentication Guide

Adaptive Strong Authenticator Configuration Guide 10g ( ) December 2007

Oracle is a registered trademark of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners.

2 Records Manager Updates

equestionnaire User Guide

Oracle Enterprise Manager

Oracle Retail Category Management Release Notes Release April 2007

Synchronous SAP Connector

Oracle Standard Management Pack

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need. Installing and Updating Local Software Packages 12c Release

Oracle Retail Replenishment Optimization Installation Guide Release April 2008

Technical Enhancements

Secure Configuration Guide

New Features in Primavera P6 16.2

Oracle Enterprise Manager. 1 Introduction. System Monitoring Plug-in for Oracle Enterprise Manager Ops Center Guide 11g Release 1 (

Oracle VueLink for Documentum

Oracle Governance, Risk and Compliance Controls. Deployment with WebLogic Release 8.6.0

1 Important Configuration Changes

1 Review Information About this Guide

Defining Constants and Variables for Oracle Java CAPS Environments

Oracle Retail Demand Forecasting Installation Guide Release June 2007

Oracle Retail Invoice Maching Installation Guide Release March 2006

Oracle Fusion Middleware. 1 Oracle Team Productivity Center Server System Requirements. 2 Installing the Oracle Team Productivity Center Server

Module Code Entries Utility Oracle FLEXCUBE Universal Banking Release [December] [2016]

Oracle Enterprise Single Sign-on Provisioning Gateway. Installation and Setup Guide Release E

Copyright

Overview of the Plug-In. Versions Supported

Oracle Enterprise Single Sign-on Logon Manager

Application Server Installation Guide for OPSS - CSF Oracle FLEXCUBE Universal Banking Release [May] [2016]

Oracle Hospitality Suite8 Export to Outlook User Manual Release 8.9. July 2015

Oracle Exadata Healthchecks Plug-in Contents

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need. Creating vservers 12c Release 1 ( )

1 Review Information About this Guide

Oracle Web Service Manager Implementation Guide Oracle FLEXCUBE Universal Banking Release [April] [2014]

Oracle Utilities Smart Grid Gateway Adapter for Echelon

Contents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9

Microsoft Internet Information Services (IIS) Plug-in User s Guide Release

Oracle NoSQL Database Integration with SQL Developer. Release 18.1

Agile e Installation Manual for Agile e6.0.4 on Windows Server. Part Number: INSWINSERVER-604B

Oracle Enterprise Manager. Description. Versions Supported

Contents About Connecting the Content Repository... 5 Prerequisites for Configuring a Content Repository and Unifier... 5

Oracle is a registered trademark, and Oracle Rdb, Oracle RMU and Oracle SQL/Services are trademark or registered trademarks of Oracle Corporation.

Oracle Identity Manager

JD Edwards World Electronic Burst and Bind Guide. Version A9.1

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need

Overview of the Plug-In. Versions Supported. Deploying the Plug-In

Release Notes. Oracle Insurance Policy Administration Release 8.1 E May 2009

Microsoft.NET Framework Plug-in User s Guide Release

Oracle Retail Integration Bus Hospital Administration User Guide Release 12.0 May 2006

What s New for Oracle Cloud Stack Manager. Topics: July Oracle Cloud. What's New for Oracle Cloud Stack Release

Transcription:

Oracle Enterprise Single Sign-on Provisioning Gateway Novell Identity Manager Integration and Installation Guide Release 11.1.1.2.0 E17537-02 November 2010

Oracle Enterprise Single Sign-on P rovisioning Gateway Novell Identity Manager Integration and Installation Guide, Release 11.1.1.2.0 E17537-02 Copyright 2010, Oracle. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial Computer Software- -Restricted Rights (June 1987). Oracle USA, Inc., 500 Oracle Parkway, Redwood City, CA 94065. The Programs are not intended for use in any nuclear, aviation, mass transit, medical, or other inherently dangerous applications. It shall be the licensee's responsibility to take all appropriate fail-safe, backup, redundancy and other measures to ensure the safe use of such applications if the Programs are used for such purposes, and we disclaim liability for any damages caused by such use of the Programs. Oracle, JD Edwards, PeopleSoft, and Siebel are registered trademarks of Oracle Corporation and/or its affiliates. Other names may be trademarks of their respective owners. The Programs may provide links to Web sites and access to content, products, and services from third parties. Oracle is not responsible for the availability of, or any content provided on, third-party Web sites. You bear all risks associated with the use of such content. If you choose to purchase any products or services from a third party, the relationship is directly between you and the third party. Oracle is not responsible for: (a) the quality of third-party products or services; or (b) fulfilling any of the terms of the agreement with the third party, including delivery of products or services and warranty obligations related to purchased products or services. Oracle is not responsible for any loss or damage of any sort that you may incur from dealing with any third party.

Novell Identity Manager Installation and Configuration Guide Contents About This Document... 4 Purpose... 4 Scope... 4 Deployment Instructions... 5 Prerequisites... 5 Copy the.jar Files... 5 Configure ECMA Script... 6 Configure Policies... 7 Configure Policies on Input Transformation of Publisher Channel... 7 Configure Policies on Command Transformation of Subscriber Channel... 14 Configure Policies on Output Transformation of Subscriber Channel... 18 Creating Custom Attributes for Storing Passlogix Call Status... 19 Creating Password Policies... 20 Configuring Property Files... 21 After Configuration... 21 Page 3 of 21

Novell Identity Manager Installation and Configuration Guide About This Document Purpose The purpose of this document is to provide detailed instructions for deploying the Novell Identity Manager (NIM) integration solution. Scope The document covers deployment for the following use cases: 1. Create a new user in Novell Identity Manager, create an account in AD, then create a user and add user credentials in ESSO-PG. 2. Modify a user's password in Novell Identity Manager, then change the AD account password and propagate it to ESSO-PG. 3. Disable a user in Novell Identity Manager, disable the AD account, and delete the user s credentials from ESSO-PG. 4. Enable a user in Novell Identity Manager, enable an AD account, and recreate the user s credentials in ESSO-PG. 5. Delete a user in Novell Identity Manager, delete an AD account, and delete the user and the user s credentials from ESSO-PG. Page 4

Deployment Instructions Deployment Instructions Prerequisites The ESSO-PG server and the ESSO-PG Administrative Console must be installed. All components of Novell Identity Manager are installed, and you are able to do AD provisioning from the Novell imanager console. Creating users on Novell Identity Manager should be provisioned on AD; that is, edirectory should be synchronized with AD by an AD Driver. The user with the same logon name as the user you are creating in Novell Identity Manager should be present in the ESSO-PG repository, in case the repository for ESSO-PG is not the root service. Copy the.jar Files Copy the following ESSO-PG jar files to \NDS\lib\ on the Novell Identity Manager Windows machine: or Copy the following ESSO-PG jar files to /opt/novell/edirectory/lib/dirxml/classes/ on the Novell Identity Manager Linux machine: 1. axis-1.2.1.jar 2. axis-ant-1.2.1.jar 3. bcprov-jdk13-128.jar 4. commons-discovery-0.2.jar 5. commons-logging-1.0.4.jar 6. jaxrpc.jar 7. log4j-1.2.9.jar 8. animpasslogix.jar 9. opensaml-1.0.1.jar 10. PMCLI.jar 11. saaj.jar 12. wsdl4j-1.5.1.jar 13. wss4j.jar 14. xmlsec-1.3.0.jar Page 5 of 21

Novell Identity Manager Installation and Configuration Guide Configure ECMA Script ECMA Script functions will be called by policies which we configure on the publisher and subscriber channels of the respective target system driver. These ECMA Script functions will call appropriate the JAVA functions, which are deployed with animpasslogix.jar. Java functions will make appropriate calls to ESSO-PG. To configure the ECMA script: 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Advanced > Insert. 3. Enter the name Passlogix ECMA Script and click OK. importpackage(packages.com.passlogix.nim.integration); function addpasslogixcred(useridwithdn, applicationname, password, completeassociation, userappid) { var tc = new PasslogixNIM(); var out = tc.addpasslogixcredential(useridwithdn, applicationname, password, completeassociation, userappid); return String(out); } function modifypasslogixcred(useridwithdn, applicationname, password, completeassociation, userappid) { var tc = new PasslogixNIM(); var out = tc.modifypasslogixcredential(useridwithdn, applicationname, password, completeassociation, userappid); return String(out); } function deletepasslogixcred(useridwithdn, applicationname, password, completeassociation, userappid) { var tc = new PasslogixNIM(); var out = tc.deletepasslogixcredential(useridwithdn, applicationname, password, completeassociation, userappid); return String(out); } function deletepasslogixuser(useridwithdn) { var tc = new PasslogixNIM(); var out = tc.deletepasslogixuser(useridwithdn); return String(out); } function enablepasslogixuser(useridwithdn, applicationname, password, completeassociation, userappid) { var tc = new PasslogixNIM(); var out = tc.addpasslogixcredentialenable(useridwithdn, applicationname, password, completeassociation, userappid); Page 6

Deployment Instructions } return String(out); Configure Policies New policies are created as follows: Four new policies will be created and placed on input transformation of the publisher channel. Four new policies will be created and placed on command transformation of the subscriber channel. One new policy will be created and placed on output transformation of the subscriber channel. These policies detect the presence of certain data in the XML data flowing between Novell Identity Manager and the target system and use that data as the criteria to make various calls to the ECMA script. These policies have to be configured on the subscriber and publisher channels for every target system driver, which is supposed to be integrated with ESSO-PG. Application names and login names need to be changed in respective policies pertaining to different target systems. Configure Policies on Input Transformation of Publisher Channel 1. Passlogix Add Credential Logic Policy Passlogix add credential policies will be used to add credentials in ESSO-PG when a new user is created in Novell Identity Manager. After creation of an account on the target system, one association key will be generated and then can be traced on the channel. This policy will check the presence of add-association in XML data. If add-association is present, it queries the target account login name and calls the ECMA script. The attribute to be queried is configurable, and can be specified in the policy content. The ECMA script will make a call to ESSO-PG. The content of this policy would be similar to the example below. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Input Transformation Policies (of publisher channel) > Insert. 3. Enter the name 'Passlogix Add Credential Logic' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>passlogix Add Credential Logic</description> <conditions> <and> <if-operation op="equal">add-association</ifoperation> </and> </conditions> <actions> <do-set-local-variable name="attrval"> <token-dest-attr name="cn"/> Page 7 of 21

Novell Identity Manager Installation and Configuration Guide <!-- AD Server 2003 specified below is the application name on ESSO. It can be different for different applications and would need to be changed on policies of the respective target system driver. --> <do-set-local-variable name="appname"> <token-text xml:space="preserve">ad Server 2003</token-text> <do-set-local-variable name="userpwd" scope="driver"> <token-dest-attr name="nspmdistributionpassword"/> <do-set-local-variable name="completeassociationuserid"> <token-query datastore="src"> <arg-association> <token-xpath expression="self::addassociation"/> </arg-association> <!-- the loginname specified below is the login attribute on a particular target system. The name of this attribute can vary from one target system to another. --> <token-text xml:space="preserve">loginame</token-text> </token-query> <do-set-local-variable name="associationattr"> <token-xpath expression="self::add-association"/> <do-add-dest-attr-value name="passlogixaddstatus"> <arg-value type="string"> <token-xpath expression="es:addpasslogixcred($attrval,$appname,$userpwd,$completeassoci ationuserid,$associationattr)"/> </arg-value> </do-add-dest-attr-value> <do-set-local-variable name="isaddoperationexist" scope="driver"> Page 8

Deployment Instructions </policy> <token-text xml:space="preserve">n</token-text> </actions> </rule> 2. Passlogix Modify Password Logic Policy The Passlogix Modify Password policy is used to modify passwords in ESSO-PG when a user's password is changed in Novell Identity Manager. This policy finds add-association keys and queries the target account login name. It then calls the ECMA script. The ECMA script will make a call to ESSO-PG. The content of this policy would be similar to the example below. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Input Transformation Policies (of publisher channel) > Insert. 3. Enter the name 'Passlogix Modify Credential Logic' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>modify Password Logic</description> <conditions> <and> <if-operation mode="nocase" op="equal">status</if-operation> <if-xpath op="true">self::status[@level = 'success']/operation-data/password-subscribe-status/association[text()!= '']</ifxpath> </and> </conditions> <actions> <do-set-local-variable name="attrval"> <token-local-variable name="mdlocvaruid"/> <!-- AD Server 2003 specified below is the application name on ESSO. It can be different for different applications and would need to be changed on policies of the respective target system driver. --> 2003</token-text> <do-set-local-variable name="appname"> <token-text xml:space="preserve">ad Server <do-set-local-variable name="pwdval"> Page 9 of 21

Novell Identity Manager Installation and Configuration Guide <token-local-variable name="mdlocvarpassword"/> <do-set-local-variable name="completeassociationuserid"> <token-query datastore="src"> <arg-association> <token-local-variable name="modifyassociation"/> </arg-association> <!-- the loginname specified below is the login attribute on a particular target system. The name of this attribute can vary from one target system to another. --> <token-text xml:space="preserve">loginame</token-text> </token-query> <do-set-local-variable name="associationattr"> <token-local-variable name="modifyassociation"/> <do-add-dest-attr-value name="passlogixmodpasswdstatus"> <arg-association> <token-xpath expression="self::status[@level = 'success']/operation-data/password-subscribestatus/association"/> </arg-association> <arg-value type="string"> <token-xpath expression="es:modifypasslogixcred($attrval,$appname,$pwdval,$completeasso ciationuserid,$associationattr)"/> </arg-value> </do-add-dest-attr-value> <do-set-local-variable name="ismodifyoperationexist" scope="driver"> <token-text xml:space="preserve">n</token-text> </actions> </rule> </policy> Page 10

Deployment Instructions 3. Passlogix Disable User Account Policy The Passlogix Disable User policy is used to delete credentials in ESSO-PG when a user is disabled in Novell Identity Manager. It checks for add-association keys and queries the login attribute on the target system. It then calls the ECMA script. The ECMA script will make a call to ESSO-PG. The content of this policy would be similar to the example below. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Input Transformation Policies (of publisher channel) > Insert. 3. Enter the name 'Passlogix Disable Credential Logic' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>disable User Account Logic</description> <conditions> <and> <if-operation mode="nocase" op="equal">status</if-operation> <if-xpath op="true">self::status[@level = 'success']</if-xpath> <if-local-variable name="isdisablingaccount" op="equal">y</iflocal-variable> </and> </conditions> <actions> <do-set-local-variable name="attrval"> <token-local-variable name="dssrcdn"/> <!-- AD Server 2003 specified below is the application name on ESSO. It can be different for different applications and would need to be changed on policies of the respective target system driver. --> <do-set-local-variable name="appname"> <token-text xml:space="preserve">ad Server 2003</tokentext> <do-set-local-variable name="pwdval"> <token-local-variable name="dsuserpwd"/> <do-set-local-variable name="completeassociationuserid"> <token-query datastore="src"> <arg-association> <token-local-variable name="disableassociation"/> </arg-association> Page 11 of 21

Novell Identity Manager Installation and Configuration Guide <!-- the loginname specified below is the login attribute on a particular target system. The name of this attribute can vary from one target system to another. --> <token-text xml:space="preserve">loginame</tokentext> </token-query> <do-set-local-variable name="associationattr"> <token-local-variable name="disableassociation"/> <do-add-dest-attr-value name="passlogixdisablestatus"> <arg-dn> <token-local-variable name="dssrcdn"/> </arg-dn> <arg-value type="string"> <token-xpath expression="es:deletepasslogixcred($attrval,$appname,$pwdval,$completeasso ciationuserid,$associationattr)"/> </arg-value> </do-add-dest-attr-value> <do-set-local-variable name="isdisablingaccount" scope="driver"> <token-text xml:space="preserve">n</token-text> </actions> </rule> </policy> 4. Passlogix Enable User Account Policy The Passlogix Enable User policy is used to recreate credentials in ESSO-PG when a user is enabled in Novell Identity Manager. It checks for add-association keys and queries the login attribute on the target system. It then calls the ECMA script. The ECMA script will make a call to ESSO-PG. The content of this policy would be similar to the example below. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Input Transformation Policies (of publisher channel) > Insert. 3. Enter the name 'Passlogix Enable Credential Logic' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> Page 12

Deployment Instructions <description>enable Passlogix User Account Logic</description> <conditions> <and> <if-operation mode="nocase" op="equal">status</if-operation> <if-xpath op="true">self::status[@level = 'success']</if-xpath> <if-local-variable name="isenablingaccount" op="equal">y</if-local-variable> </and> </conditions> <actions> <do-set-local-variable name="attrval"> <token-local-variable name="ensrcdn"/> <!-- AD Server 2003 specified below is the application name on ESSO. It can be different for different applications and would need to be changed on policies of the respective target system driver. --> <do-set-local-variable name="appname"> <token-text xml:space="preserve">ad Server 2003</token-text> <do-set-local-variable name="userpwd"> <token-local-variable name="enuserpwd"/> <do-set-local-variable name="completeassociationuserid"> <token-query datastore="src"> <arg-association> <token-local-variable name="enableassociation"/> </arg-association> <!-- the loginname specified below is the login attribute on a particular target system. The name of this attribute can vary from one target system to another. --> <token-text xml:space="preserve">loginame</token-text> </token-query> Page 13 of 21

Novell Identity Manager Installation and Configuration Guide <do-set-local-variable name="associationattr"> <token-local-variable name="enableassociation"/> <do-set-dest-attr-value name="passlogixenablestatus"> <arg-dn> <token-local-variable name="ensrcdn"/> </arg-dn> <arg-value type="string"> <token-xpath expression="es:enablepasslogixuser($attrval,$appname,$userpwd,$completeass ociationuserid,$associationattr)"/> </arg-value> </do-set-dest-attr-value> <do-set-local-variable name="isenablingaccount" scope="driver"> <token-text xml:space="preserve">n</token-text> </actions> </rule> </policy> Configure Policies on Command Transformation of Subscriber Channel 1. Set Local Variable for Modify Password Policy This policy will be created and placed on Command transformation of Subscriber channel. It sets the association key variable. The operation will be identified as Modify Password, and a variable called ismodifyoperationexist is used by the policy on the publisher channel. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Command Transformation Policies (of Subscriber channel) > Insert. 3. Enter the name 'Set Local Variable for Modify Password Operation' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>set Local Variable for Password</description> <conditions> <or> <if-operation mode="regex" op="equal">modify-password</ifoperation> Page 14

Deployment Instructions <if-op-attr name="nspmdistributionpassword" op="changing"/> </or> </conditions> <actions> <do-set-local-variable name="mdlocvaruid" scope="driver"> <token-xpath expression="@src-dn"/> <do-set-local-variable name="mdlocvarpassword" scope="driver"> <token-attr name="nspmdistributionpassword"/> <do-set-local-variable name="ismodifyoperationexist" scope="driver"> <token-text xml:space="preserve">y</token-text> <do-set-local-variable name="modifyassociation" scope="driver"> <token-association/> </actions> </rule> </policy> 2. Set Local Variable for User Delete Policy This policy will be created and placed on Command transformation of the Subscriber channel for setting variables to be retrieved from the corresponding policy on the Publisher channel. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Command Transformation Policies (of Subscriber channel) > Insert. 3. Enter the name 'Set Local Variable for Delete Operation' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>local variable seting for delete operation</description> <conditions> <and> <if-operation op="equal">delete</if-operation> </and> </conditions> <actions> <do-set-local-variable name="dlsrcdn" scope="driver"> <token-xpath expression="@src-dn"/> Page 15 of 21

Novell Identity Manager Installation and Configuration Guide <do-set-local-variable name="isdeleteuser" scope="driver"> <token-text xml:space="preserve">y</token-text> </actions> </rule> </policy> 3. Set Local Variable for Enable Account Policy This policy will be created and placed on Command transformation of the Subscriber channel for setting variables to be retrieved from corresponding policies on the Publisher channel. It verifies that the operation is modify ; that the source Login Disabled attribute is false; and that the destination Login Disabled is going to be changed. If all conditions are met, it sets the local variable isenablingaccount to Y to be used on the policy on the publisher channel. It also sets an association key. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Command Transformation Policies (of Subscriber channel) > Insert. 3. Enter the name 'Set Local Variable for Enable Operation' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>enable User</description> <conditions> <and> <if-operation mode="nocase" op="equal">modify</if-operation> <if-src-attr name="login Disabled" op="equal">false</if-src-attr> <if-op-attr name="login Disabled" op="changing"/> </and> </conditions> <actions> <do-set-local-variable name="enuserpwd" scope="driver"> <token-attr name="nspmdistributionpassword"/> <do-set-local-variable name="ensrcdn" scope="driver"> <token-xpath expression="@src-dn"/> <do-set-local-variable name="isenablingaccount" scope="driver"> <token-text xml:space="preserve">y</token-text> <do-set-local-variable name="enableassociation" scope="driver"> Page 16

Deployment Instructions <token-association/> </actions> </rule> </policy> 4. Set Local Variable for Disable Account Policy This policy will be created and placed on Command transformation of the Subscriber channel for setting variables to be retrieved from corresponding policies on the Publisher channel. It verifies that the operation is modify ; that the source Login Disabled attribute is true; and that the destination Login Enabled is going to be changed. If all conditions are met, it sets the local variable isdisablingaccount to Y to be used on the policy on the publisher channel. It also sets an association key. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Command Transformation Policies (of Subscriber channel) > Insert. 3. Enter the name 'Set Local Variable for Disable Operation' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>set local var for disable account</description> <conditions> <and> <if-operation mode="nocase" op="equal">modify</if-operation> <if-src-attr name="login Disabled" op="equal">true</if-src-attr> <if-op-attr name="login Disabled" op="changing"/> </and> </conditions> <actions> <do-set-local-variable name="dsuserpwd" scope="driver"> <token-attr name="nspmdistributionpassword"/> <do-set-local-variable name="dssrcdn" scope="driver"> <token-xpath expression="@src-dn"/> <do-set-local-variable name="isdisablingaccount" scope="driver"> <token-text xml:space="preserve">y</token-text> <do-set-local-variable name="disableassociation" scope="driver"> <token-association/> Page 17 of 21

Novell Identity Manager Installation and Configuration Guide </actions> </rule> </policy> Configure Policies on Output Transformation of Subscriber Channel Passlogix Delete User Policy in Output Transformation Channel on Subscriber Channel The Passlogix Delete User policy is used to delete a user and the user s credentials in ESSO-PG when the user is deleted in Novell Identity Manager. The content of this policy would be similar to the example below. 2. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > AD Driver > Overview > Output Transformation Policies (of Subscriber channel) > Insert. 3. Enter the name Passlogix Delete Credential Logic' and click OK. 4. Click Edit XML and paste the content (appearing below) in the dialog box. 5. Click Save. <?xml version="1.0" encoding="utf-8"?><policy> <rule> <description>delete Passlogix User Logic</description> <conditions> <or> <if-operation op="equal">removeassociation</if-operation> <if-operation mode="nocase" op="equal">delete</if-operation> </or> </conditions> <actions> <do-set-local-variable name="attrval"> <token-local-variable name="dlsrcdn"/> <do-status level="delete Passlogix User Status"> <token-xpath expression="es:deletepasslogixuser($attrval)"/> </do-status> </actions> </rule> </policy> Page 18

Deployment Instructions Creating Custom Attributes for Storing Passlogix Call Status The following fields need to be added in Novell Identity Manager to show the return status from various ESSO-PG calls. These fields are displayed individually for all the ESSO-PG applications for which credentials are added from Novell Identity Manager. The fields are: PasslogixAddStatus. Used to display the status when a user is created and credentials are added for an application. PasslogixDisableStatus. Used to display the status when a user is disabled and credentials are deleted for an application. PasslogixEnableStatus. Used to display the status when a user is enabled and credentials are recreated for an application. PassLogixModPasswdStatus. Used to display the status when a user s password is modified and the password is changed for an application. The fields will be created as below in Novell Identity Manager: 2. Navigate to Directory > Schema > Create Attribute. 3. For the Attribute name, enter PasslogixStatus. 4. Leave ASN1 ID blank. Click Next. 5. For Syntax, select 'Case Ignore String.' 6. Set attribute flags: select the check boxes for 'Public read' and 'Synchronized Immediately. ' 7. Click Finish. 8. Navigate to Directory > Schema > Add Attribute > (I) Available classes: User. 9. Select the attribute PasslogixStatus and move it to Optional attribute(s). 10. Navigate to Identity Manager > Identity Manager Overview > Driver Sets > ADDriver. 11. Click the green button. 12. Navigate to > Edit Property > select filter > select User Class. 13. Click 'Add Attribute.' 14. In the popup window, click show all attributes (if the created attribute is not displayed). 15. Select the check box for 'PasslogixStatus' and click OK. 16. Under User, click 'PasslogixStatus.' 17. On the right, select the 'synchronize' radio button for both the publisher and subscriber channels. Repeat this process to create the PasslogixDisableStatus, PasslogixEnableStatus, and PassLogixModPasswdStatus attributes. Page 19 of 21

Novell Identity Manager Installation and Configuration Guide Creating Password Policies You must create a password policy in Novell Identity Manager. To create the policy (if a simple password policy does not already exist): 2. Click Identity Manager. 3. Click Passwords. 4. Click New. 'Step 1 of 8: Name and describe the Password Policy' appears. 5. Provide a name for the policy, for example, 'Passlogix password policy.' 6. Click Next. 7. At 'Would you like to enable Universal Password,' click Yes. 8. Uncheck the 'Enable the Advanced Password Rules' box. 9. At 'Step 2 of 8: Select the Universal Password options,' click Next. 10. At 'Step 3 of 8: Add rules to the Password Policy,' click Next. 11. At 'Step 4 of 8: Enable the Forgotten Password feature,' click No. 12. Click Next. 13. In the Assign To box, select SENA. 14. At 'Step 7 of 8: Assign the Password Policy,' click Next. 15. At 'Step 8 of 8: Summary of the Password Policy,' click Finish. 16. Assign this password policy to root context of edirectory. Configuring Password Policies To configure password policies: 1. Click the created Password (or existing simple password policy). 2. In the pop-up windows, select the Universal Password tab. 3. Under this tab select 'Configuration Option.' 4. Verify that the following check boxes are selected: Enable Universal Password. Remove the NDS password when setting a Universal Password. Synchronize Distribution Password when setting a Universal Password. Allow a user to retrieve a password. Allow an admin to retrieve a password. The other check boxes should be deselected. 5. Assign this password policy to root context of edirectory. Page 20

Deployment Instructions Configuring Property Files On Windows: Create a folder called in C drive called NIMProperties. Paste "log4j.properties" and "PMClientConfiguration.properties" into this folder. On Linux: Paste "log4j.properties" and "PMClientConfiguration.properties" into /opt/ folder. Windows or Linux Next Steps: In the PMClientConfiguration.properties file change values for below keys as required: 1. javacli.serviceurl=<need to be replaced with the ESSO-PG url> 2. javacli.serviceuser=<need to be replaced with the ESSO-PG admin id> 3. javacli.serviceuserpassword=< need to be replaced with the ESSO-PG admin password> In the log4j.properties file change values for below keys as required: 1. Edit the "log4j.properties" file and search this entry - log4j.appender.ruleuserappender.file=c:\\nimpasslogixstatus.log 2. This is the full path of the log file generated by NIM Passlogix Integration code. This location can be changed to whatever location desired by the client. The file name can also be changed if desired. 3. When deploying the solution on Linux this path should be changed to "\opt\nimpasslogixstatus.log" or any other desired location where the code will have write permission to the file. The file name can also be changed if desired. After Configuration Restart the following components (in the order listed): 1. edirectory. 2. tomcat. Page 21 of 21