5.1 Checklist for Installing and Configuring Identity Governance

Before beginning the installation process, it is important that you review the following steps.

Checklist Items

  1. Ensure that your environment meets the prerequisites and requirements for hosting Identity Governance. For more information, see Prerequisites for Installing Identity Governance and Hardware and Software Requirements.

  1. Decide whether you want to install Identity Governance in a clustered environment. For more information about the requirements, see Ensuring High Availability for Identity Governance.

  1. Ensure that your environment has a supported version of Tomcat already installed. For more information about installing Tomcat, see Section 3.0, Installing Tomcat, PostgreSQL, and ActiveMQ for Identity Governance.

  1. Ensure that your environment has a supported version of OSP. For more information about installing OSP, see Section 4.0, Installing One SSO Provider.

  1. (Conditional) To use a Microsoft SQL Server database, ensure that your environment has a supported version already installed. For more information, see the following sections:

  1. (Conditional) To use an Oracle database, ensure that your environment has a supported version already installed. For more information, see the following sections:

  1. (Conditional) To use a PostgreSQL database, ensure that your environment has a supported version already installed. For more information, see the following sections:

  1. (Conditional) To use TLS auditing, the audit server should be up and running when you install Identity Governance so that the installer can connect to the audit server and retrieve the certificate to add to the keystore.

  1. Install Identity Governance and Identity Reporting (optional):

  1. To use third-party client connector software for gathering identity and application data, ensure that you add the appropriate .jar files. For more information, see Identity Governance Server System Requirements.

  1. Complete the setup for Identity Governance and its database. For more information, see Section 7.0, Completing the Installation Process.

  1. (Optional) Modify the SSL settings for communication with the authentication server. For more information, see Using the TLS/SSL Protocol for Secure Connections.

  1. (Optional) Modify the configuration settings for Identity Governance. For more information, see Section 10.0, Configuring Identity Governance Settings.

  1. (Optional) Add users who can log in to Identity Governance and assign them to authorizations in the application. For more information, see Adding Identity Governance Users.

  1. (Optional) Customize the user interface or the templates for email notifications and collectors. For more information, see Section 11.0, Customizing Identity Governance for Your Enterprise.

  1. (Optional) Create a single sign-on experience for users between Identity Governance and Identity Manager Home and Provisioning Dashboard. For more information, see Checklist for Integrating Identity Governance with Identity Manager.