2.1 Installation Checklist

The following checklist provides high-level steps for planning an installation of Identity Manager in your test or evaluation environment.

 

Checklist Items

  1. Learn about the interaction among Identity Manager components. For more information, see Section 1.0, Introduction.

  1. Review the considerations for installing the components to ensure that the computers meet the prerequisites and requirements:

    IMPORTANT:The identity applications and the Identity Reporting features require the Event Auditing Service to be installed. The Event Auditing Service can only be installed on a Linux computer. If you are using Windows computers, you must have at least one Linux computer for the Event Auditing Service.

  1. Review the components, software, and default settings that the integrated installation process adds to your servers. For more information, see Section 5.0, Understanding the Configuration Parameters.

  1. Review the default setup for the Identity Vault. For more information, see Section 1.3, Understanding the Default Identity Vault Structure.

  1. (Conditional) When installing components in a Red Hat Enterprise Linux 6.x environment, ensure that the computer has the correct libraries. For more information, see Installing Identity Manager on an RHEL 6.x or 7.x Server in the NetIQ Identity Manager Setup Guide.

  1. Run the integrated installation process:

  1. Configure the installed components:

  1. Complete the installation. For more information, see Section 6.0, Final Steps for the Integrated Installation Process.

  1. Activate Identity Manager. For more information, see Section 7.0, Activating Identity Manager Products.