The following figure illustrates Modeler operations that are available when you right-click an application.
Figure A-5 Application Operations
Table A-5 Application Operations
Operation |
Description |
---|---|
Undo Change Location |
Returns an item to its previous status. |
Disconnect eDir-to-eDir |
(Viewable when you select an eDir-to-eDir application) Separates the eDir-to-eDir application into two eDirectory drivers. |
Straighten Connection |
Straightens a driver connection line. If a line is not within a few degrees of being horizontal or vertical, this option is dimmed. |
Distribute |
Evenly distributes applications vertically or horizontally. Press Ctrl, select the items that you want to distribute, then select a pattern. |
Align |
Aligns the selected objects horizontally and vertically. For more information, see Table A-6. |
Change to eDirectory Tree |
(Viewable when you select an eDirectory application.) Runs the Driver Configuration Wizard to install an eDir-to-eDir driver. Places a tree icon in the Identity Vault. |
Change to Identity Vault/Meta-Directory |
(Viewable when you select an eDirectory application.) Runs the Driver Configuration Wizard to install an eDir-to-eDir driver. Places a vault con in the Identity Vault. |
Show/Hide Subsystems |
Lets you model an application’s or operating system’s subsystems. For example, if you have a Linux system, you can open it and drop MySQL inside as a subapplication that runs on Linux. This is for diagramming purposes only, but can be convenient for accurately capturing the structure of the enterprise systems around which you are building the identity solution. |
Add to Group |
Creates a Domain Group, and adds the selected items to it. The selected items are removed from any group that they were previously associated with. |
Show Dataflow View |
Displays the flow of information between the application and the driver in the Developer view. Launches the Dataflow view and lists Dataflow on the menu. For more information, see Section 8.0, Managing the Flow of Data. |
Remote Control Desktop |
Launches a remote control session for the selected application. The host server must have an existing VNC server running. |
Manage Application Schema |
Enables you to manage a copy of the managed system’s schema. You can make changes to a copy of the application schema so that you can test the Identity Manager drivers in Designer. See Managing a Copy of an Application Schema. |
Document Selection |
Launches the Document Generation Wizard, which documents the application. |
Driver > DirXML Script Tracing |
Turns on or off the tracing of rules, conditions, condition groups, actions, and tokens at the driver level. |
Driver > Show Policy Sets |
Launches the Policy Set and Policy Flow views. For more information, see |
Driver > Simulate |
Runs the Simulate Policy Transformation program against the selected driver. |
Driver > Run Configuration Wizard |
Guides you through creating a driver. After you fill in the wizard’s forms, Designer automatically generates policies that configure the driver to function as described in the forms. |
Driver > Password Synchronization |
Configures and displays the flow of password synchronization. For more information, see Integrating Passwords. |
Driver > Document Selection |
Launches the Document Generation Wizard, which documents the driver. |
Driver > Export to Configuration File |
Exports the driver to a .xml file. iManager can consume this format, and Designer can re-import it. For more information, see Exporting to a File. |
Driver > Import from Configuration File |
Allows you to browse to and import a driver configuration file |
Driver > Import |
Enables you to connect to a server, browse to and select a driver, and import the objects into the driver. |
Driver > Deploy |
Prepares a deployment summary and then deploys selected objects and attributes. |
Driver > Compare |
Allows you to compare the information structure in Designer on an object, to the object that is deployed or running on an eDirectory server. |
Driver > Driver Configuration > Import Attributes |
Imports attributes from an existing driver. |
Driver > Driver Configuration > Deploy Attributes |
Deploys the modified or imported attributes. |
Driver > Driver Configuration > Compare Attributes |
Allows you to compare the attributes of a policy to the attributes that are already deployed. |
Driver > Status for All Drivers |
Reports whether the drivers are stopped or running. |
Driver > Start Driver |
Starts the driver. |
Driver > Stop Driver |
Stops the driver. |
Driver > Set Driver Trace Level |
Allows you to specify how much information you want to see in a trace level log from the driver. Settings go from 0-5. |
Driver > Restart Driver |
Restarts the drivers. |
Driver > Set Up Driver Security |
Launches the Driver Security Equals/Exclusions dialog box. Enables you to configure the selected driver’s security equivalences and to exclude selected users from administrative roles. If you select multiple drivers, this dialog box lets you add, modify, and remove common security equivalences and exclusions of the selected drivers. |
Driver > Properties |
Launches the driver’s property pages. Enables you to configure the driver. |
Delete |
Deletes the application and driver. |
Properties |
Enables you to configure Identity Vaults, driver sets, drivers, and applications. |