Identity Governance 3.6 Installation and Configuration Guide

  Identity Governance 3.6 Installation and Configuration Guide
    Identity Governance Overview
      Understanding the Identity Governance Components
      Understanding the Installation Methods
      Understanding the Uninstallation Methods
      Understanding the Identity Governance Configuration Utilities
      Understanding REST Services for Identity Governance
    Planning to Install Identity Governance
      Making Decisions on How to Install Identity Governance
      Obtaining Identity Governance, Identity Reporting, and OSP
      Recommended Production Environment Installation Scenarios
      Hardware and Software Requirements
    Installing Components Required for Identity Governance, Identity Reporting, and OSP
      Checklist for Installing Required Components
      Understanding the Keystore for the Identity Service
      Installing Zulu OpenJDK
      Installing the Apache Tomcat Application Server
      Installing or Preparing a Database Server
      Preparing or Installing an Identity Service
      Installing an Authentication Service
      Securing Connections with TLS/SSL
      Installing Optional Components
    Installing an Authentication Service
      Understanding Authentication for Identity Governance
      Installing One SSO Provider for Identity Governance
      Integrating Access Manager with Identity Governance
    Creating Databases for Identity Governance and Identity Reporting
      Understanding the Identity Governance and Identity Reporting Databases
      Prerequisites for the Identity Governance and Identity Reporting Databases
      Clustering the Database
      Using the Identity Governance Installer to Create and Populate the Databases
      Using the Identity Governance Installer to Create and Populate the Database for Identity Reporting
      Manually Creating and Populating the Databases
      Adding the JDBC File to the Application Server
      Creating the Databases before Installing Identity Governance
      Creating a Temporary Database Administrator
      Creating the Schema for the Databases
      Configuring the Databases Using the SQL Scripts
      How to Change the Configuration Options for the Databases
    Installing Identity Governance
      Checklist for Installing Identity Governance
      Installing the Optional Components for Identity Governance
      Prerequisites for Identity Governance
      Identity Governance Installation Worksheet
      Installing Identity Governance
      Silently Installing Identity Governance and Identity Reporting
    Installing Identity Reporting
      Checklist for Installing Identity Reporting
      Prerequisites for Identity Reporting
      Understanding the Installation Process for the Identity Reporting Components
      Identity Reporting Installation Worksheet
      Installing Identity Reporting
      Silently Installing Identity Reporting
    Completing the Installation Process
      Checklist for Configuring Identity Governance
      Preparing One SSO Provider for Use
      Starting and Initializing Identity Governance
      Configuring Identity Reporting
      Completing the Cluster Configuration for Identity Governance
    Configuring Authentication Options for Identity Governance
      Configuring Identity Governance for Two-Factor Authentication
      Configuring Single Sign-on Access with Access Manager
      Using SAML Authentications from Access Manager to Provide Single Sign-On to Identity Governance through the OSP
      Configuring OSP to Use Kerberos for Single Sign-On
      Integrating Single Sign-on Access with Identity Manager Using OSP
      Ensuring Rapid Response to Authentication Requests
    Customizing Identity Governance
      Customizing the Name in the Identity Governance Application
      Localizing the Preferred Language of the User
      Customizing the User Interface
      Translating Content for Identity Governance and One SSO Provider
      Customizing the Identity Governance Style Sheet
    Adding Features after the Installation
      Configuring SSL/TLS Communication after the Installation
      Manually Generating the Database Schema after the Installation
      Enabling Auditing after the Installation
      Enabling Email Notifications after the Installation
    Upgrading Identity Governance
      Planning to Upgrade Identity Governance
      Securing Passwords for a Silent Install
      Upgrading Procedure for Identity Governance
      Changing Host File IP Addresses to DNS Names
      Applying the Latest Patches
      Moving Identity Reporting to a Separate Server
    Uninstalling the Identity Governance Components
      Uninstalling OSP
      Uninstalling Identity Governance or Uninstalling Identity Governance and Identity Reporting
      Uninstalling Identity Reporting
    Managing Identity Governance
      Accessing the Application and Administration Utilities
      Managing the Bootstrap Administrator
      Changing the Values for Authentication Matching and Identity Governance Services
      Managing Connected Systems Information
      Changing Network Settings for Identity Governance Components
      Increasing Logging Levels for Identity Governance and the Identity Governance Clients
      Updating the License Key
      Adjusting Timeout Values to Increase Performance
    Ports Used in Identity Governance
    Managing the Services the Installation Scripts Create
      Stopping, Starting, and Restarting the Apache Tomcat Service
      Stopping, Starting, and Restarting the ActiveMQ Service
    Legal Notice