7.2 Installing and Configuring the User Application WAR

NOTE:For WebLogic 10.3, the installation program requires the Java 2 Platform Standard Edition Development Kit version 1.6 JDK from JRockit. If you use a different version, the installation procedure does not successfully configure the User Application WAR file. The installation appears to succeed, but you encounter errors when trying to start the User Application.

  1. Navigate to the directory containing your installation files.

  2. Launch the installer for your platform from the command line, using the JRockit Java environment:

    Solaris

    $ /opt/WL/bea/jrockit_160_05/bin/java -jar IdmUserApp.jar
    

    Windows

    C:\WL\bea\jrockit_160_05\bin\java -jar IdmUserApp.jar
    

    When the installation program launches, you are prompted for the language.

  3. Use the following information to select the language, confirm the license agreement, and select the Application Server platform:

    Installation Screen

    Description

    Roles Based Provisioning Module (RBPM) for Novell Identity Manager

    Select the language for the installation program. The default is English.

    License Agreement

    Read the License Agreement, then select I accept the terms of the License Agreement.

    Application Server Platform

    Select WebLogic.

    If the User Application WAR file is in a different directory from the installer, the installer prompts for the path to the WAR.

    If the WAR is in the default location, you can click Restore Default Folder. Or, to specify the location of the WAR file, click Choose and select a location.

    When you’re installing on WebLogic, you need to launch the installation program by using the BEA’s Java environment (jrockit). If you select WebLogic as the application server, and do not use jrockit to launch the installation, you will see a pop-up error message, and the installation will terminate:

  4. Use the following information to select the installation type, choose an install folder, and configure the database:

    Installation Screen

    Description

    Installation Type

    Roles Based Provisioning: Select this option to install the Roles Based Provisioning Module. This is the only installation type supported with this release.

    Choose Install Folder

    Specify where you want the installer to put the files.

    Database Platform

    Select the database platform. The database and JDBC driver must already be installed. For WebLogic, the options include the following:

    • Oracle (supports Oracle 10g and 11g only; support for Oracle 9i has been removed)

    • Microsoft SQL Server

    Database Host and Port

    Host: Specify the database server’s hostname or IP address. For a cluster, specify the same hostname or IP address for each member of the cluster.

    Port: Specify the database’s listener port number. For a cluster, specify the same port for each member of the cluster.

    Database Username and Password

    Database Name (or SID): For MySQL, MS SQL Server, or PostgreSQL provide the name of your preconfigured database. For Oracle, provide the Oracle System Identifier (SID) that you previously created. For a cluster, specify the same database name or SID for each member of the cluster.

    Database Username: Specify the database user. For a cluster, specify the same database user for each member of the cluster.

    Database Password: Specify the database password. For a cluster, specify the same database password for each member of the cluster.

    Database Driver JAR file Provide the Thin Client JAR for the Database Server. This is required.

    SQL Output File

    In this release, the database tables can be created during the User Application installation, rather than when the Application Server starts (as in previous releases).

    The SQL Output File screen gives you the option to create a schema file, which the Database Administrator can use to create the tables, instead of having the Installation program create the tables.

    If you want to generate a schema file, select the Write SQL to file checkbox and provide a name for the file in the Schema Output File field.

    Database Administrator

    This screen is pre-populated with the same username and password from the Database Username and Password page. If the database user that was specified earlier does not have enough permissions to create tables in the Database Server, then a different user ID that has the necessary rights needs to be entered.

    Update database or New database

    If the database that will be used is new or empty, then select the New button. If the database is an existing one from a previous installation, select the Existing button.

    Test Database Connection

    To confirm that the information provided in the previous screens was correct, you can test the database connection by selecting the Test Database Connection checkbox:

  5. Use the following information to configure Java and IDM, as well as audit settings and security.

    Installation Screen

    Description

    Java Install

    Specify the Java root install folder. The Java Install provides the path to Java based on your JAVA_HOME environment variable and gives you the option to correct it:

    At this point, the Installation program also validates that the Java selected is the correct one for the Application Server selected. In addition, it validates that it can write to the cacerts in the JRE that was specified.

    IDM Configuration

    Select the type of application server configuration:

    • Select default if this installation is on a single node that is not part of a cluster

      If you select default and decide you need a cluster later, then you must reinstall the User Application.

    • Select all if this installation is part of a cluster

    Application Context: The name of the application server configuration, the name of the application WAR file, and the name of the URL context. The installation script creates a server configuration and by default names the configuration based on Application name. Make a note of the application name and include it in the URL when you start the User Application from a browser.

    Audit Logging

    To enable logging, click Yes. To disable logging, click No.

    The next panel prompts you to specify the type of logging. Choose from the following options:

    • Novell Identity Audit or Novell Sentinel: Enables logging through a Novell auditing client for the User Application.

    • OpenXDAS: Events are logged to your OpenXDAS logging server.

    For more information on setting up logging, see the User Application: Administration Guide.

    Novell Audit

    Server: If you enable logging, specify the hostname or IP address for the server. If you turn logging off, this value is ignored.

    Log Cache Folder: Specify the directory for the logging cache.

    Security - Master Key

    Yes: Allows you to Import an existing master key. If you choose to import an existing encrypted master key, cut and paste the key into the install procedure window.

    No: Creates a new master key. After you finish the installation, you must manually record the master key as described in Section 9.1, Recording the Master Key.

    The installation procedure writes the encrypted master key to the master-key.txt file in the installation directory.

    Reasons to import an existing master key include:

    • You are moving your installation from a staging system to a production system and want to keep access to the database you used with the staging system.

    • You installed the User Application on the first member of a cluster and are now installing on subsequent members of the cluster (they require the same master key).

    • Because of a failed disk, you need to restore your User Application. You must reinstall the User Application and specify the same encrypted master key that the previous installation used. This gives you access to the previously stored encrypted data.

  6. Click Next to display the Roles Based Provisioning Module Configuration panel. (If you are not prompted for this information, you might not have completed the steps outlined in Section 2.5, Installing the Java Development Kit.)

    The default view of the Roles Based Provisioning Module Configuration panel shows these six fields:

    The Installation program will take the value from the Root Container DN and apply it to the following values:

    • User Container DN

    • Group Container DN

    The Installation program will take the value from the User Application Administrator fields and apply it to the following values:

    • Provisioning Administrator

    • Compliance Administrator

    • Roles Administrator

    • Security Administrator

    • Resources Administrator

    • RBPM Configuration Administrator

    If you want to be able to specify these values explicitly, you can click the Show Advanced Options button and change them:

  7. Use the following information to complete the installation.

    Installation Screen

    Description

    User Application Configuration

    The User Application install enables you to set User Application configuration parameters. Most of these parameters are also editable with configupdate.sh or configupdate.bat after installation; exceptions are noted in the parameter descriptions.

    For a cluster, specify identical User Application configuration parameters for each member of the cluster.

    See Section A.0, IDM User Application Configuration Reference for a description of each option.

    Pre-Installation Summary

    Read the Pre-Installation Summary page to verify your choices for the installation parameters.

    If necessary, use Back to return to earlier installation pages to change installation parameters.

    The User Application configuration page does not save values, so after you re-specify earlier pages in the installation, you must re-enter the User Application configuration values. When you are satisfied with your installation and configuration parameters, return to the Pre-Install Summary page and click Install.

    Install Complete

    Indicates that the installation is finished.

7.2.1 Viewing Installation and Log Files

If your installation completed without error, continue with Preparing the WebLogic Environment. If the installation issued errors or warnings, review the log files to determine the problems:

  • Identity_Manager_User_Application_InstallLog.log holds results of the basic installation tasks.

  • Novell-Custom-Install.log holds information about the User Application configuration done during installation.