41.1 Checklist for Installing Identity Reporting

NetIQ recommends that you complete the steps in the following checklist:

Checklist Items

  1. Learn about the interaction among Identity Manager components. For more information, see Identity Reporting.

  1. Decide which servers you want to use for your Identity Manager components. For more information, see Recommended Installation Scenarios and Server Setup.

  1. Review the considerations for installing Identity Reporting. For more information, see Prerequisites for Installing the Identity Reporting Components.

  1. Review the hardware and software requirements for the computers that will host Identity Reporting. For more information, see System Requirements for Identity Reporting.

  1. (Conditional) For computers running a SLES 12 SP1 or later operating system, ensure that you have installed the appropriate set of libraries for a guided installation. For more information, see Installing Identity Manager on SLES 12 SP1 or Later Servers.

  1. (Conditional) For computers running an RHEL 6.x or RHEL 7.x operating system, ensure that you have installed the appropriate set of libraries. For more information, see Installing Identity Manager on RHEL 6.x or 7.x Servers.

  1. Ensure that you have installed the identity applications. For more information, see Section 33.0, Planning to Install the Identity Applications.

  1. Install Sentinel. For more information, see Section 14.0, Installing SLM for IGA

  1. Ensure that the server where you want to install Identity Reporting has an application server, such as Tomcat. For more information, see Section 28.0, Installing PostgreSQL and Tomcat.

  1. (Conditional) To use the Apache Log4j service to record events in Tomcat, ensure that you have the appropriate files. For more information, see Using the Apache Log4j Service to Log Sign-on.

  1. Install Identity Reporting:

  1. Complete the Identity Reporting set up. For more information, see Section 43.0, Configuring Identity Reporting.

  1. Configure the Managed System Gateway and Data Collection Service drivers. For more information, see Configuring Drivers for Identity Reporting.

  1. Deploy and start the drivers. For more information, see Deploying and Starting Drivers for Identity Reporting.

  1. Configure the environment for the drivers. For more information, see Configuring the Runtime Environment.

  1. Configure Identity Manager and eDirectory to send data to the drivers. For more information, see Setting Auditing Flags for the Drivers.