14.5 Changing Network Settings for Identity Governance Components

Identity Governance allows you to change your network setting or the runtime instance settings after you have completed the installation. You change the network setting for the different Identity Governance components in different utilities and there are multiple places that you must ensure that you change the network setting to have it take effect.

You must change your network setting on the servers running the different Identity Governance components. You must then perform the following additional steps to change the network settings for the Identity Governance components.

You must perform the following steps for each component, even if the components reside on the same server. The different components contain different settings that store networking information. Use the following information to change the Identity Governance network settings for the different Identity Governance components.

14.5.1 Changing the Network Settings for Identity Governance

You change the network settings for Identity Governance through the Identity Governance Configuration utility. You must change the settings in multiple locations to ensure that Identity Governance uses the new network settings.

  1. Ensure that you update the IP address and DNS name of the server and Apache Tomcat using the server and Apache Tomcat documentation.

  2. Stop Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  3. (Conditional) If you clustered Identity Governance stop Apache Tomcat on each node in the cluster. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  4. Update the DNS names in the setenv script that sets the environment variables for Apache Tomcat.

    1. Open the setenv file in a text editor. The default location of the file is:

      • Linux: /opt/netiq/idm/apps/tomcat/bin/setenv.sh

      • Windows: C:\netiq\idm\apps\tomcat\bin\setenv.bat

    2. Change the IP address or DNS name associated with com.netiq.idm.osp.client.host to the new fully-qualified DNS name.

    3. Save and close the file.

  5. (Conditional) If you clustered Identity Governance repeat Step 4 on each node of the cluster.

  6. Update the DNS names in the ism-configuration.properties file.

    1. Open the ism-configuration.properties file in a text editor.

      • Linux: /opt/netiq/idm/apps/tomcat/conf/ism-configuration.properties

      • Windows: C:\netiq\idm\apps\tomcat\ism-configuration.properties

    2. Change the IP address or DNS name associated with the following attributes to the new fully-qualified DNS name:

      • com.netiq.idm.osp.url.host

      • com.netiq.iac.url.local.host

      • com.netiq.rpt.authserver.url

      • com.netiq.rpt.access.review.url

      • com.netiq.rpt.landing.url

      • com.netiq.rpt.rpt-web.redirect.url

    3. Save and close the file.

  7. (Conditional) If you clustered Identity Governance repeat Step 6 on each node in the cluster.

  8. Update the DNS names in the Identity Governance Configuration utility.

    1. Ensure that the Identity Governance database is running.

    2. Start the Identity Governance Configuration utility with the database password. The default location is:

      • Linux: /opt/netiq/idm/apps/idgov/bin/configutil.sh

      • Windows: C:\netiq\idm\apps\idgov\bin\configutil.bat

      For example, use the following command in Linux environments:

      ./configutil.sh -password %PASSWORD%

    3. Change the IP address or DNS name associated with the following attributes on the specified tabs to the new fully-qualified DNS name:

      Tab

      Setting

      Authentication Server Details

      • IG Redirect URL

      • IG Request Redirect URL

      Network Topology

      Nodes Host Name

      Workflow Settings

      JMS broker URI

    4. Exit the utility.

  9. (Conditional) If you have clustered Identity Governance repeat Step 8 on each node in the cluster.

    IMPORTANT:Do not restart Apache Tomcat until the networking settings have been changed for each node in the cluster.

  10. Start Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  11. (Conditional) If you clustered Identity Governance start Apache Tomcat on each node in the cluster. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

14.5.2 Changing the Network Settings for the Authentication Service

The steps to change the network settings for the authentication service depend on which authentication service you are using. Use the following information to change the network settings for your authentication service:

Changing the Network Settings for OSP

To change the network setting for OSP requires that you change the network settings for the server or servers running OSP and change the network setting in Apache Tomcat.

  1. Ensure that you update the IP address and DNS name of the server and Apache Tomcat using the server and Apache Tomcat documentation.

  2. Stop Apache Tomcat on the OSP server. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  3. (Conditional) If you have clustered OSP stop Apache Tomcat on each node in the cluster. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  4. Update the DNS names in the setenv script that sets the environment variables for Apache Tomcat.

    1. Open the setenv file in a text editor. The default location of the file is:

      • Linux: /opt/netiq/idm/apps/tomcat/bin/setenv.sh

      • Windows: C:\netiq\idm\apps\tomcat\bin\setenv.bat

    2. Change the IP address or DNS name associated with com.netiq.idm.osp.client.host to the new fully-qualified DNS name.

    3. Save and close the file.

  5. (Conditional) If you clustered OSP repeat Step 4 on each node in the cluster.

  6. Update the DNS names in the ism-configuration.properties file.

    1. Open the ism-configuration.properties file in a text editor.

      • Linux: /opt/netiq/idm/apps/tomcat/conf/ism-configuration.properties

      • Windows: C:\netiq\idm\apps\tomcat\ism-configuration.properties

    2. Change the IP address or DNS name associated with the following attributes to the new fully-qualified DNS name:

      • com.netiq.idm.osp.url.host

      • com.netiq.iac.url.local.host

      • com.netiq.rpt.authserver.url

      • com.netiq.rpt.access.review.url

      • com.netiq.rpt.landing.url

      • com.netiq.rpt.rpt-web.redirect.url

    3. Save and close the file.

  7. (Conditional) If you clustered OSP repeat Step 6 on each node in the cluster.

  8. Update the DNS name in the Identity Governance Configuration Update utility.

    1. Launch the Identity Governance Configuration Update utility on the Identity Governance server. For more information, see Section 14.1.4, Using the Identity Governance Configuration Update Utility.

    2. Click the Authentication tab.

    3. Click Show Advanced Options at the end of the page.

    4. Update the OAuth server host and OAuth ports with the new fully qualified DNS name and port.

    5. Update the truststore file path and password for the new certificate.

    6. Click OK to save the changes and the Identity Governance Configuration Update utility automatically closes.

  9. (Conditional) If you clustered OSP repeat Step 8 on each node in the cluster.

    IMPORTANT:Do not restart Apache Tomcat until the networking settings have been changed for each node in the cluster.

  10. Start Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  11. (Conditional) If you clustered OSP start Apache Tomcat on each node in the cluster. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

Changing the Network Settings for Access Manager

To change the network setting for Access Manager requires that you change the networking setting in Access Manager first and then make the changes in Identity Governance.

  1. Ensure that you update the IP address and DNS name of the server and Apache Tomcat using the server and Apache Tomcat documentation.

  2. Change the IP address and DNS name in Access Manager. For more information, see Configuring Access Managerin the Access Manager 4.5 Administration Guide.

  3. Stop Apache Tomcat on the Identity Governance server. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  4. (Conditional) If you have clustered Identity Governance stop Apache Tomcat on each node in the cluster.

  5. Update the DNS name in the Identity Governance Configuration Update utility.

    1. Launch the Identity Governance Configuration Update utility on the Identity Governance server. For more information, see Section 14.1.4, Using the Identity Governance Configuration Update Utility.

    2. Click the Authentication tab.

    3. Click Show Advanced Options at the end of the page.

    4. Update the OAuth server host and OAuth ports with the new Access Manager fully qualified DNS name and port.

    5. Update the truststore file path and password for the new certificate.

    6. Click OK to save the changes and the Identity Governance Configuration Update utility automatically closes.

  6. (Conditional) If you have clustered Identity Governance repeat Step 5 on each node in the cluster.

    IMPORTANT:Do not restart Apache Tomcat until the networking settings have been changed for each node in the cluster.

  7. Start Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  8. (Conditional) If you clustered Identity Governance start Apache Tomcat on each node in the cluster. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

14.5.3 Changing the Networking Settings for Identity Reporting

You can change the networking settings for Identity Reporting. You must perform the following steps if you have Identity Reporting installed on the same server as Identity Governance or if it is installed on a separate server.

  1. Ensure that you update the IP address and DNS name of the server and Apache Tomcat using the server and Apache Tomcat documentation.

  2. (Conditional) If you clustered Identity Reporting ensure that you change the IP address and DNS name of each node in the cluster and each instance of Apache Tomcat using the server and Apache Tomcat documentation.

  3. Stop Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  4. (Conditional) If you clustered Identity Reporting, stop Apache Tomcat on each node in the cluster. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  5. Update the DNS names in the setenv script that sets the environment variables for Apache Tomcat.

    1. Open the setenv file in a text editor. The default location of the file is:

      • Linux: /opt/netiq/idm/apps/tomcat/bin/setenv.sh

      • Windows: C:\netiq\idm\apps\tomcat\bin\setenv.bat

    2. Change the IP address or DNS name associated with com.netiq.idm.osp.client.host to the new fully-qualified DNS name.

    3. Save and close the file.

  6. (Conditional) If you clustered Identity Reporting, repeat Step 5 on each node in the cluster.

  7. Update the DNS names in the ism-configuration.properties file.

    1. Open the ism-configuration.properties file in a text editor.

      • Linux: /opt/netiq/idm/apps/tomcat/conf/ism-configuration.properties

      • Windows: C:\netiq\idm\apps\tomcat\ism-configuration.properties

    2. Change the IP address or DNS name associated with the following attributes to the new fully-qualified DNS name:

      • com.netiq.idm.osp.url.host

      • com.netiq.iac.url.local.host

      • com.netiq.rpt.authserver.url

      • com.netiq.rpt.access.review.url

      • com.netiq.rpt.landing.url

      • com.netiq.rpt.rpt-web.redirect.url

    3. Save and close the file.

  8. (Conditional) If you clustered Identity Reporting repeat Step 7 on each node in the cluster.

  9. Update the DNS Name in the Identity Governance Configuration Update utility.

    1. Launch the Identity Governance Configuration Update utility. For more information, see Section 14.1.4, Using the Identity Governance Configuration Update Utility.

    2. Click the Reporting tab.

    3. Scroll down, in Landing Page > URL link to landing page specify the new fully qualified hostname of the Apache Tomcat instances that runs Identity Reporting including the port.

    4. Ensure that Reporting Administrators > URL link to Identity Governance contains the proper URL to access Identity Governance.

    5. (Conditional) If you use a reverse proxy server for Identity Reporting in the Outbound Proxy > Use proxy field, ensure that the connection information to the reverse proxy server is correct.

    6. Click OK to save the changes and the Identity Governance Configuration Update utility automatically closes.

  10. (Conditional) If you have clustered Identity Reporting repeat Step 9.

    IMPORTANT:Do not restart Apache Tomcat until the networking settings have been changed for each Identity Reporting node in the cluster.

  11. Start Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.

  12. (Conditional) If you have clustered Identity Reporting start Apache Tomcat on each node in the cluster. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.