7.4 Configuring Identity Manager

After Identity Manager is installed, you must configure different components to have a fully functioning solution.

7.4.1 Synchronizing Data

Identity Manager uses drivers to synchronize data between different applications, databases, operating systems, and directories. After Identity Manager is installed, you need to create and configure one or more drivers for each system you want to synchronize data with.

Each driver has a documentation guide that explains the requirements and configuration steps required to synchronize data. The driver guides are located at the Identity Manager 4.0.2 Drivers documentation Web site.

Use the specific driver guide for each managed system to create a driver to synchronize identity data.

7.4.2 Mapping Roles

When you have information synchronizing between the different systems, use the Role Mapping Administrator (RMA) to manage the roles in the different systems. For more information, see the Novell Identity Manager Role Mapping Administrator 4.0.2 User Guide.

7.4.3 Configuring the User Application

The next step is to add a business perspective to the Identity Manager solution with the User Application. The User Application enables you to address the following business needs:

  • Providing a convenient way to perform roles-based provisioning actions.

  • Ensuring that your organization has a method for verifying that personnel are fully aware of organizational policies and are taking steps to comply with these policies.

  • Providing user self-service, allowing a new user to self-register, and providing access to anonymous or guest users.

  • Ensuring that access to corporate resources complies with organizational policies and that provisioning occurs within the context of the corporate security policy.

  • Reducing the administrative burden of entering, updating, and deleting user information across all systems in the enterprise.

  • Managing manual and automated provisioning of identities, services, resources, and assets.

  • Supporting complex workflows.

The User Application: Administration Guide contains the information on how to configure these features of the User Application.

7.4.4 Configuring Auditing, Reporting, and Compliance

The last and most important step in creating your Identity Manager solution is to configure the auditing, reporting, and compliance features so you can verify that your solution is in compliance with your business policies. Use the following guides to set up and configure these features: