6.5 Installing Identity Governance

The following procedure describes how to install Identity Governance or Identity Governance and Identity Reporting on the same server using the guided installation or the console installation methods. To perform a silent, unattended installation, see Section 6.6, Silently Installing Identity Governance and Identity Reporting.

Ensure that you meet the prerequisites and requirements before starting the installation. For more information, see Section 6.3, Prerequisites for Identity Governance and Section 2.4.1, Identity Governance Server System Requirements.

To install Identity Governance or to install Identity Governance and Identity Reporting:

  1. Ensure that you have completed the Identity Governance Installation Worksheet. For more information, see Table 6-1.

  2. Log in as root on Linux server or as an administrator on Windows server to the server where you want to install Identity Governance.

  3. Download and extract the Identity Governance installation files. For more information, see Section 2.2, Obtaining Identity Governance, Identity Reporting, and OSP.

  4. If you are in a clustered environment, proceed to Step 5. If you are not using HTTPS for this installation, stop Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  5. From the directory that contains the installation files, complete one of the following actions:

    • Linux: Enter the following from a command prompt.

      • Guided:./identity-governance-install-linux.bin

      • Console:./identity-governance-install-linux.bin -i console

    • Windows: Enter the following from a command prompt.

      • Guided: identity-governance-install-win.exe

      • Console: identity-governance-install-win.exe -i console

    NOTE:To execute the file, you might need to use the chmod +x or sh command for Linux or use Run as administrator if you did not log in to your Windows server as an administrator.

  6. Read and accept the license agreement.

  7. Select whether to install Identity Governance, Identity Reporting, or both.

  8. Specify an installation path for each installed feature.

  9. Complete the installation following the prompts and using the information you gathered in the Table 6-1, Identity Governance Installation Worksheet.

  10. Review the pre-installation summary.

    NOTE:Application URL represents the URL that connects users to Identity Governance.

  11. Start the installation process.

  12. (Conditional) If prompted, accept or reject any untrusted certificates and acknowledge any errors.

    The installer checks to see if you selected SSL/TLS or https for communication to the connected systems. The installer attempts to retrieve those certificates and add them to the trust store. If you used a self-signed certificate for any of the connected systems, the installer prompts you to accept or reject the certificates because self-signed certificates are untrusted certificates. The installer adds the accepted certificates to the trust store. For more information, see Section 3.8, Securing Connections with TLS/SSL

    The installer displays errors in the following conditions:

    • A single warning about potential future failures for all rejected certificates

    • A single warning for any errors when connecting to the secured servers

  13. (Conditional) If you are in a clustered environment, or if you are using HTTPS, stop Apache Tomcat if it is still running. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  14. When the installation process completes, review the Identity_Governance_InstallLog.log file. The default location of the Identity_Governance_InstallLog.log file is here:

    • Linux: /opt/netiq/idm/apps/idgov/logs

    • Windows: C:\netiq\idm\apps\idgov\logs

  15. Proceed to Section 8.3, Starting and Initializing Identity Governance

    or

    If you are installing Identity Reporting on a separate server, proceed to Section 7.0, Installing Identity Reporting.