2.1 About the Identity Reporting Installation Process

The process of installing the Identity Reporting Module requires that you run two separate install programs:

You need to run the EAS install program before running the Identity Reporting Module.

NOTE:You must have the Roles Based Provisioning Module (RBPM) installed and configured before beginning the installation of the reporting module. You must also install the User Application driver and assign the Report Administrator role to any users you want to be able to access the reporting module.

The remaining topics in this section provide instructions for running the stand-alone versions of each of these install programs. You can also use the Integrated Installer for Identity Manager, which runs these install programs for you. For more information, see the Identity Manager 4.0.2 Integrated Installation Guide

The Identity Reporting Module relies on the following drivers:

These drivers are installed automatically by the Integrated Installer for Identity Manager, so the steps provided in this section are only necessary if you are running the stand-alone versions of the install programs.

2.1.1 System Requirements

The Event Auditing Service (EAS) runs on SUSE Linux Enterprise Server 11 (32-bit and 64-bit), as well as Red Hat Enterprise Linux 5.7 and 6.0 (32-bit and 64-bit). You need to launch the installer for EAS on a SUSE Linux Enterprise Server or Red Hat Enterprise Linux machine.

NOTE:EAS requires that ksh be installed on the SLES machine. A standard installation of SLES includes ksh. If you remove it, the init.d script will not execute properly.

The reporting module can be installed and run in a variety of environments.

IMPORTANT:The reporting module must have an exclusive EAS running on a separate Linux machine. You cannot have multiple reporting instances communicating with a single EAS environment.

To use the reporting module, you must meet the system requirements listed in Table 2-1. Certified platforms have been fully tested. Supported platforms are expected to be functional, but have not been fully tested.

Table 2-1 System Requirements for the Identity Reporting Module

Required System Component

System Requirements

Application Server

The reporting module runs on JBoss, WebSphere, and WebLogic.

The reporting module with JBoss Enterprise Application Platform 5.1.2 (or JBoss Community Edition 5.1.0) requires JRE 1.6.0_31 from Sun and is certified on:

  • Windows Server 2003 SP2 (32-bit)

  • Windows Server 2008 R2 SP1 (64-bit only)

  • Windows Server 2008 SP2 (32-bit and 64-bit)

  • Open Enterprise Server 2 SP3 (32-bit and 64-bit)

  • Open Enterprise Server 11 (64-bit only)

  • SUSE Linux Enterprise Server 10 SP4 (32-bit and 64-bit)

  • SUSE Linux Enterprise Server 11 SP1 (32-bit and 64-bit)

  • Red Hat Linux 5.7 (32-bit and 64-bit)

  • Red Hat Enterprise Linux 6.0 (32-bit and 64-bit)

The reporting module on WebSphere 7.0 requires the IBM J9 VM (build 2.4, J2RE 1.6.0). It is certified on these platforms:

  • Windows Server 2003 SP2 (32-bit only)

  • Windows Server 2008 R2 SP1 (64-bit only)

  • Windows Server 2008 SP2 (32-bit and 64-bit)

  • Open Enterprise Server 2 SP3 (32-bit and 64-bit)

  • Open Enterprise Server 11 (64-bit only)

  • SUSE Linux Enterprise Server 10 SP4 (32-bit and 64-bit)

  • SUSE Linux Enterprise Server 11 SP1 (32-bit and 64-bit)

  • Red Hat Linux 5.7 (32-bit and 64-bit)

  • Red Hat Enterprise Linux 6.0 (32-bit and 64-bit)

The reporting module on WebLogic 10.3.5 (11gR1 requires JRockit JVM 1.6.0_05 and is certified on these platforms.

  • Windows Server 2003 SP2 (32-bit)

  • Windows Server 2008 R2 SP1 (64-bit)

  • Windows Server 2008 SP2 (32-bit and 64-bit)

  • Open Enterprise Server 2 SP3 (32-bit and 64-bit)

  • Open Enterprise Server 11 (64-bit only)

  • SUSE Linux Enterprise Server 10 SP4 (32-bit and 64-bit)

  • SUSE Linux Enterprise Server 11 SP1 (32-bit and 64-bit)

  • Red Hat Linux 5.7 (32-bit and 64-bit)

  • Red Hat Enterprise Linux 6.0 (32-bit and 64-bit)

Virtualization

The reporting module supports virtualization on the following platforms as long as the guest operating system is one that is certified by the User Application:

  • Red Hat Enterprise Linux Virtualization

  • Xen

  • VMWare ESX/ESXi

  • Windows Server 2008 R2 Virtualization with Hyper-V

Database Server

PostgreSQL 8.4.3. (This is the only database certified with the reporting module.)

Metadirectory

eDirectory 8.8.7 with Identity Manager 4.0.2

For the list of certified operating systems, see the Identity Manager and eDirectory documentation.

Browser

The User Application is certified with both Firefox and Internet Explorer, as described below.

FireFox 9 is certified on:

  • Windows XP with SP3

  • Windows 7

  • SUSE Linux Enterprise Desktop 11

  • SUSE Linux Enterprise Server 11

  • Novell OpenSUSE 11.2

  • Apple Mac

Internet Explorer 8 is certified on:

  • Windows XP with SP3

Internet Explorer 9 is certified on:

  • Windows 7

Uninstalling EAS or the Identity Reporting Module In order to conserve disk space, the installation programs for EAS and the Identity Reporting Module do not install a Java virtual machine (JVM). Therefore, if you need to uninstall one or more components, you need to be sure you have a JVM available and also make sure that the JVM is in the PATH. If you encounter an error during an uninstall, add the location of a JVM to the local PATH environment variable and run the uninstall program again.

2.1.2 About the EAS Installer

The installer for the Event Auditing Service (EAS) performs these functions:

  • Installs and optionally configures the service

  • Configures the user who is able to perform administration tasks for the service

  • Configures the DBA used by the service to interact with the database

  • Allows you to define the port on which the PostgreSQL database runs

EAS runs on SUSE Linux Enterprise Server 11, as well as Red Hat Enterprise Linux 6.0 (32-bit and 64-bit). You need to launch the installer for EAS on one of these certified platforms.

Check the clocks before running the EAS installer If the times of your machines are not in synchronization when you install the Event Auditing Service (EAS), there may be problems with your configuration. You cannot install EAS on Windows. It must be installed on Linux. Therefore, the Linux server where EAS is installed must be synchronized with the machine where you are installing the rest of your components.

Prerequisites for Red Hat Enterprise Linux or SUSE Linux

This section outlines several prerequisites for installing EAS on Red Hat Enterprise Linux or SUSE Linux. Before installing EAS on RHEL or SLES, ensure that these prerequisites are met.

These prerequisites apply to RHEL 5.7 and 6.0.

Verify that the hostname returns properly In order for the installer to work properly, the Linux system must be able to properly return the hostname. To do this, add the hostname to the /etc/hosts file to the line containing the IP address (for example, 127.0.0.1), then enter hostname -f to make sure that the hostname is displayed properly.

Change the Kernel SHMMAX Parameter to EnablePostgreSQL You must change the kernel SHMMAX parameter to enable the database to run on the Linux server. To change the kernel SHMMAX parameter on RHEL 6.x, append the following information to the /etc/sysctl.conf file.

# for Sentinel Postgresql
kernel.shmmax=1073741824

NOTE:The value shown above for the kernel SHMMAX parameter is a minimum value. Your system may require more memory.

To set the SHMMAX parameter on RHEL 6.0, execute these commands:

cd /proc/sys/kernel
echo new_val_to_set > shmmax

For more information, see Managing Kernel Resources in the PostgreSQL documentation.

Configure the Firewall for Syslog Port Forwarding If you want to forward the syslog file, you must configure the server for port forwarding. The installers give you the option to configure the server. However, if your are not able to configure the server during the installation process, execute the following command:

iptables -t nat -A PREROUTING -p udp --destination-port 514 -j REDIRECT –toports 1514

Check for Openssl libraries version changes EAS requires Openssl libraries, usually libssl.so.0.9.8 and libcrypto.so.0.9.8. Before installing EAS, see if the version of the .so files matches. Otherwise, create a soft-link.

In Red Hat Enterprise Linux 6.x, these libraries are found under /usr/lib and /usr/lib64 for 32-bit and 64-bit operating systems, respectively. RHEL 6.x may also use a bundled upgrade version such as: libssl.so.1.0.0.

ln -s libssl.so.1.0.0 libssl.so.0.9.8
ln -s libcrypto.so.1.0.0 libcrypto.so.0.9.8

In Red Hat Enterprise Linux 5.x, these libraries are found under /lib and /lib64 for 32-bit and 64-bit OS respectively.

ln -s libssl.so.0.9.8e libssl.so.0.9.8
ln -s libcrypto.so.0.9.8e libcrypto.so.0.9.8

Check KornShell availability KornShell is usually bundled with all of the Linux operating system environments. However, you should make sure it is installed, since some of the installation scripts use KornShell (found at /bin/ksh).

2.1.3 About the Identity Reporting Installer

The installer for the reporting module performs these functions:

  • Allows you to choose an application server platform

  • Deploys the client WAR file to the application server

    This WAR file contains the user interface components for reporting.

  • Deploys the core WAR file

    This WAR file contains the core REST services needed for reporting.

  • Deploys the authentication services WAR file

    This WAR file contains the authentication services, which control authentication to the reporting module.

  • Defines the location of the server for the Event Auditing Service (installed separately)

  • Creates the reporting schema in the Security Information and Event Management (SIEM) database

  • Configures the PostgreSQL JDBC driver that connects to the SIEM database

  • Configures the authentication services for the reporting module

  • Configures the e-mail delivery system for the reporting module

  • Configures the core reporting services for the reporting module

Check the clocks before running the reporting installer Before running the installer, be sure that all servers have the same time. If the times of your machines are not in synchronization when you install the Identity Reporting Module, some reports might be empty when executed. This might occur if the Metadirectory and reporting servers are running on different machines, and the time stamp value of the Metadirectory server is ahead compared to the reporting server. This happens only for new users when the time between the servers is out of synchronization. If a user is created and then modified, the reports are populated with data.

Changing from Standard Edition to Advanced Edition If you change from the Standard Version to the Advanced Edition, the version change for the reporting module might not show immediately. The version change occurs after the next batch of events is processed.

2.1.4 Users Created During the Installation Process

The EAS installation process creates a novell group and novell user. The novell user is created without a password. If you want to log in as the novell user later (for example, to install patches), create a password for this user after the installation is completed.

In addition, when you install EAS and the Identity Reporting Module, the following database users are created automatically:

Table 2-2 Database Users Created By the Install Process

User name

Description

dbauser

Administrator of the PostgreSQL server and owner of the EAS schema and views.

admin

User identity for use with EAS administrative utilities.

idmrptsrv and idmrptuser

Owner of the Identity Reporting schema and views, as well as credentials used for Identity Reporting database connectivity.

rptuser and appuser

Reserved for compatibility with Sentinel.