Instalador Active Directory
Instalador Active Directory
Instalador Active Directory
Version 6.0
SC27-4384-02
SC27-4384-02
Note
Before using this information and the product it supports, read the information in Notices on page 125.
Edition notice
Note: This edition applies to version 6.0 of IBM Security Identity Manager (product number 5724-C34) and to all
subsequent releases and modifications until otherwise indicated in new editions.
Copyright IBM Corporation 2012, 2013.
US Government Users Restricted Rights Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Contents
Figures . . . . . . . . . . . . . . . v
Tables . . . . . . . . . . . . . . . vii
Preface . . . . . . . . . . . . . . . ix
About this publication . . . . . .
Access to publications and terminology
Accessibility . . . . . . . . .
Technical training. . . . . . . .
Support information . . . . . . .
Statement of Good Security Practices .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. ix
. ix
. x
. x
. x
. x
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 1
. 2
. 3
5
5
5
6
6
6
.
.
.
.
11
12
13
13
. 13
. 14
. 14
.
.
.
.
.
.
.
.
. 17
. 18
.
.
.
.
.
19
20
21
25
28
.
.
.
.
.
.
.
.
.
.
.
29
30
33
34
36
36
41
42
43
44
44
. 47
. 47
48
. 49
. 49
. 50
. 50
. 50
. 51
. 53
. 53
. 54
56
. 57
.
.
.
.
.
.
.
57
58
58
58
59
59
59
iii
Unregistering a certificate . . . . . . . . 60
Exporting a certificate and key to a PKCS12 file 60
. 62
.
.
.
.
62
63
63
64
.
.
.
.
64
65
65
66
.
.
.
.
68
72
73
74
.
.
.
.
.
.
.
79
81
81
81
81
81
81
.
.
.
.
81
82
82
83
iv
. 94
. 95
. 96
. 96
Appendix A. Files
. 99
. 99
. . . . . . . . . 101
schema.dsml file . . . .
Object identifier . . .
Attribute definition . .
Classes . . . . . .
CustomLabels.properties file
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
101
102
103
104
104
.
.
by
.
.
.
.
.
.
. . .
. . .
action.
. . .
. . .
. . .
. . .
. . .
. . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
105
114
115
115
116
116
116
116
117
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 119
. 120
. 120
. 94
. 93
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Figures
1.
2.
3.
.
. 51
. 52
. 53
vi
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Tables
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
Preinstallation roadmap . . . . . . . .
Installation roadmap . . . . . . . . .
Prerequisites to install the adapter . . . .
Default values . . . . . . . . . .
Installation options . . . . . . . . .
Options for the main configuration menu
Options for the DAML protocol menu . .
Options for the event notification menu
Registry keys and description . . . . .
Options for modify context . . . . . .
DN elements and definitions . . . . . .
Options for the activity logging menu
Attribute configuration option descriptions
Registry key descriptions . . . . . . .
Options for advanced settings menu . . .
Arguments and descriptions for the agentCfg
help menu . . . . . . . . . . . .
. 9
. 9
. 10
. 17
. 17
20
. 22
26
. 30
. 31
. 33
35
37
. 38
. 43
17.
18.
19.
20.
21.
22.
23.
24.
25.
26.
27.
Profile files. . . . . . . . . . . . . 70
Troubleshooting the Active Directory Adapter
errors . . . . . . . . . . . . . . 83
Data types and values for syntax tags
103
Attributes, descriptions, and corresponding
data types . . . . . . . . . . . . 105
Attributes, descriptions, and corresponding
data types. . . . . . . . . . . . . 114
Add request attributes . . . . . . . . 115
Change request attributes . . . . . . . 116
Delete request attributes . . . . . . . . 116
Suspend request attributes . . . . . . . 116
Restore request attributes . . . . . . . 116
Reconciliation attributes . . . . . . . . 117
. 45
vii
viii
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Preface
About this publication
The Active Directory Adapter with 64-bit Support Installation and Configuration Guide
provides the basic information that you can use to install and configure the IBM
Security Identity Manager Active Directory Adapter. The Active Directory Adapter
enables connectivity between the IBM Security Identity Manager server and a
managed resource. The IBM Security Identity Manager server is the server for your
IBM Security Identity Manager product.
Online publications
IBM posts product publications when the product is released and when the
publications are updated at the following locations:
IBM Security Identity Manager library
The product documentation site (http://www-01.ibm.com/support/
knowledgecenter/SSRMWJ/welcome) displays the welcome page and
navigation for the library.
IBM Security Systems Documentation Central
IBM Security Systems Documentation Central provides an alphabetical list
of all IBM Security Systems product libraries and links to the online
documentation for specific versions of each product.
IBM Publications Center
The IBM Publications Center site ( http://www-05.ibm.com/e-business/
linkweb/publications/servlet/pbi.wss) offers customized search functions
to help you find all the IBM publications you need.
ix
Accessibility
Accessibility features help users with a physical disability, such as restricted
mobility or limited vision, to use software products successfully. With this product,
you can use assistive technologies to hear and navigate the interface. You can also
use the keyboard instead of the mouse to operate all features of the graphical user
interface.
Technical training
For technical training information, see the following IBM Education website at
http://www.ibm.com/software/tivoli/education.
Support information
IBM Support provides assistance with code-related problems and routine, short
duration installation or usage questions. You can directly access the IBM Software
Support site at http://www.ibm.com/software/support/probsub.html.
Appendix C, Support information, on page 119 provides details about:
v What information to collect before contacting IBM Support.
v The various methods for contacting IBM Support.
v How to use IBM Support Assistant.
v Instructions and problem-determination resources to isolate and fix the problem
yourself.
Note: The Community and Support tab on the product information center can
provide additional support resources.
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Domain 2
Join
You can use Active Directory to create a universal group and make it a member
of the group you wish to join. Do not add users directly to the universal group.
Instead create a group in the local domain and add it to the universal group.
You can then add users to the group in the local domain. See your Microsoft
Active Directory documentation for more information. This configuration is
supported by the adapter.
With this configuration, you join Domain 2 users to the local group in Domain 2
and by association they are members of the cross domain group in Domain 1.
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
SUPPORTED
Domain 1
Domain 2
Local Group in
Domain 2
of
Join
Member of
Universal Group
er
b
em
Because you can create multiple service instances on the IBM Security Identity
Manager server that point to the same adapter, ensure that you do not specify
base points that overlap. If you use a base point for one service instance that
contains the base point of another service instance, only the users in the
contained base point are returned as duplicates of the parent base point.
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Active Directory uses Kerberos, and possibly NTLM, to authenticate the Active
Directory Adapter. When the user name and password are NULL, ADSI binds to
the object using the security context of the calling thread, which is either the
security context of the user account under which the application is running or the
context of the client user account that the calling thread represents.
When SSL communication is set up between the adapter and Active Directory, it
allows data transfer over the network in encrypted form.
Procedure
1. Go to Control Panel > Add Remove Programs > Windows Components. Click
Components.
2. Select Certificate Services and click Next.
3. A dialog box is displayed. Click Yes to continue.
4. Select Remote Administration mode. Click Next.
5. Select Enterprise root CA. Click Next .
6. Specify the information to identify this CA. Click Next.
7. Accept the default location or specify a different location to store data related
to the certificate server. Click Next.
8. If Internet Information Services is running, a dialog box is displayed. Click OK
to stop the service and continue with the certificate installation.
9. Click Finish to complete the installation.
Note: A restart of the server is not required for SSL communication.
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Get the trusted root certificate from certificate server. Usually the certificate is
present in the c:\winnt\system32\certsrv\certEnroll folder. For example, a
certificate name might be ps0721.agents2.com_PS0721CA(1).crt
2. Copy the certificate on the workstation where Active Directory Adapter is
installed.
3. Double click the certificate.
4.
5.
6.
7.
8. Click OK.
9. Click Next.
10. Click Finish to complete the installation of the certificate.
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Preinstallation roadmap
To install the adapter, you must complete several tasks.
Table 1. Preinstallation roadmap
What to do
Installation roadmap
To install the adapter, you must complete a task sequence.
Table 2. Installation roadmap
What to do
Create a service.
Prerequisites
Verify that all hardware, software, and authorization prerequisites are met before
installing the Active Directory Adapter.
Table 3 describes the prerequisites.
Table 3. Prerequisites to install the adapter
Prerequisite
Description
System
Operating system
Network connectivity
Version 6.0
Software download
After you have purchased IBM Security Identity Manager, you can download the
adapter software from your account in IBM Passport Advantage Online.
Go to IBM Passport Advantage.
See the IBM Security Identity Manager Download Document for instructions.
Note:
You can also obtain additional adapter information from IBM Support.
10
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. If you downloaded the installation software from Passport Advantage,
perform the following steps:
a. Create a temporary directory on the computer on which you want to
install the software.
b. Extract the contents of the compressed file into the temporary directory.
2. Start the installation program with the SetupAD64.exe file in the temporary
directory.
3. Select the language and click OK to display the Introduction window.
4. On the Introduction window, click Next.
5. Select either Typical installation or Update installation and click Next to
display the Choose Install Folder window. Remember that the adapter must
already exist if you want to perform an updated installation.
6. Specify where you want to install the adapter in the Directory Name field. Do
one of the following.
v Click Next to accept the default location.
v Click Browse and navigate to a different directory and click Next.
7. Do the following at the Software License Agreement window:
v Review the license agreement and select Accept.
Copyright IBM Corp. 2012, 2013
11
v Click Next.
8. Review the installation settings at the Pre-Installation Summary window and
do one of the following:
v Click Previous and return to a previous window to change any of these
settings.
v Click Install when you are ready to begin the installation.
9. Click Done on the Install Complete window.
10. After you finish the installation, create a user account for the adapter and
import the adapter profile. See Adapter user account creation on page 13
and Importing the adapter profile into the IBM Security Identity Manager
server on page 13.
Installation verification
To determine whether the adapter is installed correctly, verify that required
components exist.
bin
data
license
The license directory contains files that provide license information in
supported languages.
log
The log directory contains the adapter log files. After the adapter
installation is complete, the adapter creates WinADAgent.log file.
AdkApi.dll
ErmApi.dll
ErmApiDaml.dll
icudt36.dll
icuuc36.dll
v libeay32.dll
12
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
v ssleay32.dll
Review the installer log file
IBM_Windows_AD_Adapter_for_ITIM_(64_Bit)_InstallLog.log located in the
installation directory for any errors.
Procedure
1. Run the mmc.exe command from the Start menu or a command prompt.
2. Add the certificate snap-in.
Select Service Account and click Next.
Select Local computer and click Next.
Select ISIM Active Directory Adapter and click Next.
Right-click Trusted Root Certification Authorities and select All
Tasks\Import...
7. Select the CA certificate file and import the file to the truststore.
8. Restart the adapter service.
3.
4.
5.
6.
Importing the adapter profile into the IBM Security Identity Manager
server
You must import the adapter profile into the IBM Security Identity Manager server
before you use the adapter.
13
v You must have root or Administrator authority on the IBM Security Identity
Manager server.
The adapter profile is included in the JAR file for the adapter:
adapternameProfile.jar
Procedure
1. Log in to the IBM Security Identity Manager server with an account that has
the authority to do administrative tasks.
2. Import the adapter profile (or service type) by using the import service type
feature for your IBM Security Identity Manager product. Refer to the online
help or the product documentation for specific instructions about importing
service types.
What to do next
If you receive an error that is related to the schema when you import the adapter
profile, refer to the trace.log file for information about the error. The trace.log
file location is specified with the handler.file.fileDir property that is defined in
the IBM Security Identity Manager enRoleLogging.properties file. The
enRoleLogging.properties file is installed in the IBM Security Identity Manager
\data directory.
Procedure
1. Create a service using the Active Directory Adapter profile. See Creating an
adapter service for information about this task.
2. Create a user account by using the service. See Adapter user account creation
on page 13 for information about this task.
If you are unable to create a service by using the Active Directory Adapter
profile or you are unable to create a user account, the adapter profile is not
installed correctly. You might need to import the adapter profile again.
14
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Log on to the IBM Security Identity Manager server with an account that has
the authority to perform administrative tasks.
2. In the My Work pane, click Manage Services and click Create.
3. On the Select the Type of Service page, select Active Directory Profile.
4. Click Next to display the adapter service form.
5. Complete the following fields on the service form:
On the General Information tab:
Service Name
Specify a name that defines this adapter service on the IBM
Security Identity Manager server.
Description
Optional: Specify a description for this service.
URL
Specify the location and port number of the adapter. The port
number is defined in the protocol configuration by using the
agentCfg program. For more information, see Modifying
protocol configuration settings on page 21. URL is a required
field.
If https is specified as part of the URL, the adapter must be
configured to use SSL authentication. If the adapter is not
configured to use SSL authentication, specify http for the URL.
For more information, see Chapter 7, SSL authentication
configuration, on page 47.
User Id
Specify the DAML protocol user name. The user name is
defined in the protocol configuration by using the agentCfg
program. For more information, see Modifying protocol
configuration settings on page 21.
Password
Specify the password for the DAML protocol user name. This
password is defined in the protocol configuration by using the
agentCfg program. For more information, see Modifying
protocol configuration settings on page 21.
Owner
Optional: Specify the service owner, if any.
Service Prerequisite
Optional: Specify an existing IBM Security Identity Manager
service that is a prerequisite for the adapter service.
On the Status and information tab
This page contains read only information about the adapter and
managed resource. These fields are examples. The actual fields vary
depending on the type of adapter and how the service form is
configured. The adapter must be running to obtain the information.
Click Test Connection to populate the fields.
Chapter 4. Adapter installation
15
16
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
When you install the adapter by using the specified command, the adapter
is installed with these default values.
Table 4. Default values
Installation directory
%SYSTEM_DRIVE_ROOT%:\tivoli\agents\
ADAgent
Adapter name
ADAgent
Installation option
Full installation
Note:
v The -D option is followed by a variable and a value pair without any
space after the -D option.
v You must wrap arguments with quotation marks when the arguments
contain spaces.
Table 5. Installation options
Option
Value
-DUSER_INSTALL_DIR=Value
17
Value
-DLICENSE_ACCEPTED=Value Accept the IBM license for the adapter, the value must be
TRUE.
When you do not specify this option, the default value is
FALSE.
For example:
SetupAD64.exe r "c:\temp\WinAD64Response.txt"
Note: If you run this command to only generate the response file,
you must uninstall the adapter by using the uninstaller.
Creating the response file manually
You can also manually create the response file with the following
content:
#Start of Response file
#Choose Install Folder
#--------------------USER_INSTALL_DIR=c:\\tivoli\\agents\\ADAgent
#Has the license been accepted
#----------------------------LICENSE_ACCEPTED=TRUE
#End of Response file
After you create the response file, you can use it as:
SetupAD64.exe i silent -f "Full path of response file"
18
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Start the adapter service. Use the Windows Services tool.
2. Configure the Directory Access Markup Language (DAML) protocol for the
adapter to establish communication with the IBM Security Identity Manager
server. See Modifying protocol configuration settings on page 21.
3. Configure the adapter for event notification. See Configuring event
notification on page 25.
4. Install a certificate on the workstation where the adapter is installed and also
on the IBM Security Identity Manager server to establish secure communication
between them. See Chapter 7, SSL authentication configuration, on page 47.
5. Install the adapter profile on the IBM Security Identity Manager server. See
Importing the adapter profile into the IBM Security Identity Manager server
on page 13.
6. Configure the adapter service form. See Creating an adapter service on page
14.
7. Use the adapter configuration program, agentCfg, to view or modify the
adapter parameters. See Starting the adapter configuration tool.
8. Configure the adapter account form. See the product documentation.
9. Restart the adapter service after you modify the adapter configuration settings.
Procedure
1. Browse to the Windows command prompt.
2. In the command prompt, change to the bin subdirectory of the adapter. Run
the following command if the adapter is in the default location:
cd C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin\
19
Results
From the Main Configuration menu screen, you can configure the protocol, view
statistics, and modify settings, including configuration, registry, and advanced
settings.
Table 6. Options for the main configuration menu
Option
Configuration task
Viewing statistics
Related tasks:
Accessing help and other options on page 44
Use the agentCfg help menu to display the help arguments that you can use to
find information about the adapter.
Modifying protocol configuration settings on page 21
The adapter uses the DAML protocol to communicate with the IBM Security
Identity Manager server.
20
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Access the Agent Main Configuration menu.
2. Type A to display the configuration settings for the adapter.
Configuration Settings
------------------------------------------Name
: adapter_nameAgent
Version
: 6.0.4.1200
ADK Version
: 6.0.1017
ERM Version
: 6.0.4.1200
Adapter Events : FALSE
License
: NONE
Asynchronous ADD Requests : TRUE (Max.Threads:3)
Asynchronous MOD Requests : TRUE(Max.Threads:3)
Asynchronous DEL Requests : TRUE (Max.Threads:3)
Asynchronous SEA Requests : TRUE (Max.Threads:3)
Available Protocols
: DAML
Configured Protocols
: DAML
Logging Enabled
: TRUE
Logging Directory
: C:\Program Files\IBM\ISIM\Agents\adapter_name\log
Log File Name
: adapter_name.log
Max. log files
: 3
Max.log file size (Mbytes) : 1
Debug Logging Enabled
: TRUE
Detail Logging Enabled
: FALSE
Thread Logging Enabled
: FALSE
Press any key to continue
Procedure
1. Access the Agent Main Configuration menu.
2. Type B. The DAML protocol is configured and available by default for the
adapter.
21
4. Type a letter to display the Protocol Properties menu for the configured
protocol with protocol properties.
The following screen is an example of the DAML protocol properties.
DAML Protocol Properties
-------------------------------------------------------A. USERNAME
B. PASSWORD
C. MAX_CONNECTIONS
D. PORTNUMBER
E. USE_SSL
F. SRV_NODENAME
G. SRV_PORTNUMBER
H. HOSTADDR
I. VALIDATE_CLIENT_CE
J. REQUIRE_CERT_REG
K. READ_TIMEOUT
X. Done
Select menu option:
******
******
100
45580
FALSE
9443
ANY
FALSE
FALSE
0
Configuration task
22
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Configuration task
The HOSTADDR option is useful when the system where the adapter is
running has more than one network adapter. You can select which IP
address the adapter must listen to.
The default value is ANY.
23
Configuration task
24
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
v To identify the server that uses the DAML protocol and to configure SSL
authentication, take the following steps:
1. Access the Agent Main Configuration menu.
2. At the Agent Protocol Configuration menu, select Configure Protocol.
3.
4.
5.
6.
7. Type the letter of the menu option for the SRV_PORTNUMBER property.
8. Specify the port number that the adapter uses to connect to the server for
event notification.
9. Press Enter to display the Protocol Properties menu with new settings.
The example menu describes all the options that are displayed when you enable
event notification. If you disable event notification, none of the options are
displayed.
v To set event notification for the IBM Security Identity Manager server, take the
following steps:
Chapter 6. Configuring the adapter for IBM Security Identity Manager
25
3. At the Agent Main Configuration menu, type the letter of the menu option
that you want to change.
Note:
Enable option A for the values of the other options to take effect. Each
time that you select this option, the state of the option changes.
Press Enter to return to the Agent Event Notification menu without
changing the value.
Table 8. Options for the event notification menu
Option
Configuration task
If you select this option, the adapter updates the IBM Security Identity
Manager server with changes to the adapter at regular intervals. If
Enabled - Adapter is selected, the adapter code processes event
notification by monitoring a change log on the managed resource.
When the option is set to:
v Disabled, all options except Start event notification now and Set
attributes to be reconciled are available. Pressing the A key changes
the setting to Enabled - ADK.
v Enabled - ADK, all options are available. Pressing the A key changes
the setting to Disabled or if your adapter supports event notification,
changes to Enabled - Adapter.
v Enabled - Adapter, all options are available except: Time interval
between reconciliations, Set processing cache size, Start event
notification now, Reconciliation process priority, and Set attributes to
be reconciled. Pressing the A key changes the setting to Disabled.
Type A to toggle between the options.
26
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Configuration task
If you select this option, event notification starts. This option is not
available if you select Disabled or Enabled - Adapter.
Displays the Event Notification Entry Types menu. This option is not
available if you select Disabled or Enabled - Adapter.
Displays the Remove Context menu. This option displays the following
prompt:
Delete context context1? [no]:
Press Enter to exit without deleting the context or type Yes and press
Enter to delete the context.
When you select the Set password attribute names, you can set the
names of the attributes that contain passwords. These values are not
stored in the state database and changes are not sent as events. This
option avoids the risk of sending a delete request for the old password
in clear text when IBM Security Identity Manager changes a password.
Changes from IBM Security Identity Manager are recorded in the local
database for event notification. A subsequent event notification does not
retrieve the password. It sends a delete request for the old password in
clear text that is listed in the IBM Security Identity Manager logs.
27
4. If you changed the value for options B, C, E, or F, press Enter. The other
options are automatically changed when you type the corresponding letter of
the menu option.
The Event Notification menu is displayed with your new settings.
Related concepts:
SSL certificate management with certTool on page 53
Use the certTool utility to manage private keys and certificates.
Related tasks:
Modifying an event notification context on page 30
Some adapters support multiple services.
Setting event notification triggers
By default, all the attributes are queried for value changes.
Modifying protocol configuration settings on page 21
The adapter uses the DAML protocol to communicate with the IBM Security
Identity Manager server.
Starting the adapter configuration tool on page 19
Use the adapter configuration program, agentCfg, to view or modify the adapter
parameters.
Procedure
1. Access the Agent Main Configuration Menu. See Starting the adapter
configuration tool on page 19.
2. At the Event Notification Menu, type E to display the Event Notification Entry
Types Menu.
Event Notification Entry Types
------------------------------------------A. erADGroup
B. erADAccount
C. erADContainer
D. erADMailStore
X. Done
Select menu option:
Your adapter types might be different from this example. The types are not
displayed in the menu until the following conditions are met:
a. Enable event notification
b. Create and configure a context
c. Perform a full reconciliation operation
28
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
3. Type A for a list of attributes returned during a group reconciliation. Type B for
a list of attributes returned during a user reconciliation. Type C for a list of the
container attributes returned during reconciliation. Type D for a list of the mail
store attributes returned during reconciliation.
The Event Notification Attribute Listing for the selected type is displayed. The
default setting lists all attributes that the adapter supports. The following list is
an example of attributes. The attributes might be different for other adapters.
Event Notification Attribute Listing
------------------------------------(a) **erADEAlias
(b) **erADAllowDialin
(d) **erADBasePoint
(e) **erCompany
(g) **erADContainerCN
(h) **erADContainerDN
(c) **erADBadLoginCount
(f) **erADContainer
(i) **erADContainerRDN
(p)rev
page 1 of 3 (n)ext
----------------------------X. Done
Select menu option:
4. To exclude an attribute from an event notification, type the letter of the menu
option.
Note: Attributes that are marked with two asterisks (**) are returned during
the event notification. Attributes that are not marked with ** are not returned
during the event notification.
Procedure
1. On Windows operating systems, click Start > Programs > Administrative Tools
> Domain Security Policy to display the Default Domain Security Settings
page.
2. Expand Local Policy and then select Audit Policy.
3. Double-click the Audit account management policy to display the Audit
account management Properties page.
4. Select the Define these policy settings check box and then select Success and
Failure check boxes.
5. Click OK.
29
Procedure
1. On a Windows operating system, click Start > Programs > Administrative
Tools > Event Viewer to display the Event Viewer (Local) page.
2. Right-click Security and then select Properties to display the Security
Properties page.
3. On the General tab, set the log size to at least 2048 KB in the Maximum log
size field.
4. Click OK.
Results
The adapter creates these registry keys under \\HKEY_LOCAL_MACHINE\SOFTWARE\
Access360\adapter_nameAgent\CTXT_Context_Name.
Table 9. Registry keys and description
Registry key
Description
LastChanged_Context_Name
LastChanged_Context_Name_CNT
LastChanged_Context_Name_ GRP
LastChanged_Context_Name_EMB
LastChanged_Context_Name_GRPCNT
Procedure
1. Access the Agent Main Configuration menu.
2. From Event Notification, type the Event Notification menu option.
3. From the Event Notification menu, type the Modify Event Notification
Context option to display a list of available contexts. For example:
30
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Options:
Table 10. Options for modify context
Option
Configuration task
Related tasks:
Starting the adapter configuration tool on page 19
Use the adapter configuration program, agentCfg, to view or modify the adapter
parameters.
Procedure
1. Access the Agent Main Configuration menu.
2. At the Modify Context menu for the context, type A to display the
Reconciliation Attribute Passed to Agent menu.
31
erADDomainPassword
erADPreferredExchangeServers
erADPreferredExchangeServersOnly
erADPreferredLyncServers
erADPreferredLyncServersOnly
If you modify these attributes, the new value must be the same as what is
entered on the adapter service form. If the field is blank on the service form,
you do not have to specify an attribute value.
Related tasks:
Starting the adapter configuration tool on page 19
Use the adapter configuration program, agentCfg, to view or modify the adapter
parameters.
Procedure
1. Access the Agent Main Configuration menu.
2. Type the option for Event Notification to display the Event Notification menu.
3. Type the option for Modify Event Notification Context, then enter the option of
the context that you want to modify.
4. At the Modify Context menu for the context, type B to display the following
prompt:
Enter Target DN:
5. Type the target DN for the context and press Enter. The target DN for the event
notification context must be in the following format:
erservicename=erservicename,o=organizationname,ou=tenantname,rootsuffix
32
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Definition
erservicename
ou
rootsuffix
Results
The Modify Context Menu displays the new target DN.
Related tasks:
Starting the adapter configuration tool on page 19
Use the adapter configuration program, agentCfg, to view or modify the adapter
parameters.
Procedure
1. From the Agent Main Configuration menu, type the Event Notification
option.
2. From Event Notification, type the Remove Event Notification Context option
to display the Modify Context menu.
3. Select the context that you want to remove.
4. Confirm that you want to remove a context and press Enter to remove the
baseline database for event notification contexts.
Procedure
1. Access the Agent Main Configuration Menu.
2. At the Main Menu prompt, type D.
3. Do one of the following actions:
v Change the value of the configuration key and press Enter. The default
configuration key is agent. Ensure that your password is complex.
v Press Enter to return to the Main Configuration Menu without changing the
configuration key.
33
Results
The following message is displayed:
Configuration key is successfully changed.
Procedure
1. Access the Agent Main Configuration menu.
2. At the Main Menu prompt, type E to display the Agent Activity Logging
menu. The following screen displays the default activity logging settings.
Agent Activity Logging Menu
------------------------------------A. Activity Logging (Enabled).
B. Logging Directory (current: C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\log).
C. Activity Log File Name (current: adapter_nameAgent.log).
D. Activity Logging Max. File Size ( 1 mbytes)
E. Activity Logging Max. Files ( 3 )
F. Debug Logging (Enabled).
G. Detail Logging (Disabled).
H. Base Logging (Disabled).
I. Thread Logging (Disabled).
X. Done
Select menu option:
34
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Configuration task
Set this option to enabled to have the adapter maintain a dated log file
of all transactions.
When the option is set to:
v Disabled, pressing the A to key changes to enabled.
v Enabled, pressing the A to key changes to disabled.
Type A to toggle between the options.
If this option is set to enabled, the adapter maintains a detailed log file
of all transactions. The detail logging option must be used for
diagnostic purposes only. Detailed logging enables more messages from
the adapter and might increase the size of the logs.
When the option is set to:
v Disabled, pressing the G key changes the value to enabled.
v Enabled, pressing the G key changes the value to disabled.
Type G to toggle between the options.
35
Configuration task
If this option is set to enabled, the adapter maintains a log file of all
transactions in the Adapter Development Kit (ADK) and library files.
Base logging substantially increases the size of the logs.
When the option is set to:
v Disabled, pressing the H key changes the value to enabled.
v Enabled, pressing the H key changes the value to disabled.
Type H to toggle between the options.
If this option is enabled, the log file contains thread IDs, in addition to a
date and timestamp on every line of the file.
When the option is set to:
v Disabled, pressing the I key changes the value to enabled.
v Enabled, pressing the I key changes the value to disabled.
Type I to toggle between the options.
Related tasks:
Starting the adapter configuration tool on page 19
Use the adapter configuration program, agentCfg, to view or modify the adapter
parameters.
Procedure
1. Type F (Registry Settings) at the main menu prompt to display the Registry
menu:
adapter_name and version Agent Registry Menu
------------------------------------------A. Modify Non-encrypted registry settings.
B. Modify encrypted registry settings.
C. Multi-instance settings.
X. Done
Select menu option:
Procedure
1. At the Agent Registry Menu, type A to display the Non-encrypted Registry
Settings Menu.
36
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
E.
Prev Page
X.
Done
2. Type the letter of the menu option for the action that you want to perform on
an attribute.
Table 13. Attribute configuration option descriptions
Option
Configuration task
Remove attribute
37
Results
The following table describes the registry keys and their available settings:
Table 14. Registry key descriptions
Key
Description
CreateUNCHomeDirectories
If this key is set to TRUE, the key enables creation of the UNC home directory.
The default value is FALSE.
DeleteUNCHomeDirectories
If this key is set to TRUE, the key enables deletion of the UNC home directory
on delete. The default value is FALSE.
delRoamingProfileOnDeprovision
If this key is set to TRUE, the key enables user profile directory deletion when
the user is de-provisioned. After successfully deleting the user from the Active
Directory, the adapter deletes the user home directory, subdirectories, and files.
If this key is set to FALSE, or if the key does not exist, the adapter does not
delete the user home directory. The default value is FALSE.
delUNCHomeDirOnDeprovision
If this key is set to TRUE, the key enables UNC Home directory deletion when
the user is de-provisioned. After successfully deleting the user from the Active
Directory, the adapter deletes the user home directory, subdirectories, and files.
If this key is set to FALSE, or if the key does not exist, the adapter does not
delete the user home directory. The default value is FALSE.
ForceRASServerLookup
If this key is set to TRUE, the RASServer is always found from the domain
information.
If this key is set to FALSE, one of these conditions exist:
v If the target server is specified in the base point, the target server is used as
the RAS server.
v If the target server is not specified in the base point, the RAS server is found
from the domain information.
The default value is FALSE.
ForceTerminalServerLookup
If this key is set to TRUE, the terminal server is always found from the domain
information.
If this key is set to FALSE, one of these conditions exist:
v If the target server is specified in the base point, the target server is used as
the terminal server.
v If the target server is not specified in the base point, the terminal server is
found from the domain information.
The default value is FALSE.
ManageHomeDirectories
If this key is set to TRUE, the adapter performs Add and Delete operations for
actual directories.
If this key is set to FALSE, the adapter updates only the home directory
information in the Active Directory. The default value is FALSE.
NotifyIntervalSeconds
This key specifies the interval (in seconds) after which the adapter enabled
event notification process starts. It can be modified by using the agentCfg tool.
The default value is 300 seconds.
ReconHomeDirSecurity
If this key is set to TRUE, the adapter brings the Home Security information
(NTFS security, share name, and share security) during a reconciliation. The
default value is FALSE. The reconciliation operation is fast when this key is set
to FALSE.
38
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
ReconPrimaryGroup
The recon operation does not add the primary group to the group list. The
memberof attribute in Active Directory stores the users group membership,
except the primary group. The primaryGroupID attribute in Active Directory
stores the primary group of the user. As a result the primary group must be
explicitly added to group list.
If this key is set to TRUE, the primary group is added to the group list.
If this key is set to FALSE, the primary group is not added to the group list.
The default value is FALSE.
SearchPasswordSettings
Most of the password attributes are stored in the Active Directory and are
directly retrieved. But some (for example, Require Unique Password and User
Cannot Change Password) are not stored in the Active Directory. These attributes
must be retrieved by using APIs.
If this key is set to TRUE, the password attributes are retrieved by using the
respective API.
If this key is set to FALSE, the attributes are not retrieved. The default value is
FALSE. When this key is set to FALSE, the password flag attributes are not
retrieved and the reconciliation operation is fast.
UnlockOnPasswordReset
If this key is set to TRUE, the adapter activates the user on a password change
request. The default value is FALSE.
useDefaultDC
This key provides failover capability for the adapter when the host specified in
the base point is not available. If the adapter cannot connect to the host
specified in the base point and the key is set to TRUE, the adapter connects to
the base point without the host name.
If this key is set to TRUE, the key affects RASServer and Terminal server
lookup behavior. The default value is FALSE.
useSSL
This key enables SSL communication between the adapter and the Active
Directory.
If this key is set to TRUE, the adapter uses SSL to communicate with the Active
Directory.
If this key is set to FALSE or does not exist, the adapter does not use SSL. The
default value is FALSE.
WtsDisableSearch
WtsEnabled
If this key is set to TRUE, the key enables processing of Windows Terminal
Server (WTS) attributes. The default value is FALSE.
39
Description
UseGroup
ReconMailboxPermissions
When this key is set to FALSE, the adapter does not retrieve the Mailbox
Permission information. The reconciliation operation is fast when this key is set
to FALSE. The default value is TRUE.
UPNSearchEnabled
When the registry key UPNSearchEnabled is set to FALSE, the adapter does not
perform a search on the User Principal Name for uniqueness. It creates the user
account with the supplied or generated value of the User Principal Name.
When the registry key UPNSearchEnabled is set to TRUE, the adapter performs
a search on the User Principal Name to ensure the uniqueness. The default
value is TRUE.
Note: This key is used only for the user add operation.
UseITIMCNAttribute
When this key is set to TRUE, the adapter uses IBM Security Identity Manager
common schema attribute cn. The adapter processes the cn attribute for add,
modify, and reconciliation operations. When this key is set to FALSE, the adapter
uses the erADFullName attribute for add, modify, and reconciliation operations.
When you set this registry key to FALSE, you must customize the account form.
For more information, see Configuring the cn attribute on page 74.
The default value is TRUE.
MailUserRenameDelay
When you rename a user account with mail status, the Active Directory might
take time to reestablish the user account mail status. This behavior causes the
adapter to fail the exchange attributes in the rename request with the error
message Error setting attribute name. User does not have a mailbox. In this case,
renaming means modifying the Eruid and the User Principal Name attribute.
When you use this key, the adapter waits before it modifies the exchange
attribute when a user account is renamed. For example, set this key is set to 10
seconds. Submit a user account rename request. The adapter waits for 10
seconds before modifying the exchange attributes that are in the request.
The default value of the registry key is 0 seconds.
Note: The adapter uses this key only when the Eruid, User Principal Name,
and the exchange attributes are modified.
40
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
SearchTimeout
In some of the Active Directory setups, the adapter might not complete the
reconciliation operation. This failure occurs when the Microsoft ADSI API
GetNextRow halts indefinitely.
The adapter monitors the reconciliation operation. Set this registry key to a
non-zero value. The adapter process ends if there is no activity by the adapter
in the reconciliation operation for the time in seconds specified in this key.
When you set the value of this registry key to 0 and if the adapter halts during
the reconciliation operation, the reconciliation operation does not complete and
the operation is timed out on IBM Security Identity Manager. In this case,
restart the adapter service.
The default value of the registry key is 0 seconds.
Procedure
1. Type B (Modifying Encrypted Registry Settings) at the Registry menu prompt to
display the Encrypted Registry settings menu.
41
Procedure
1. Access the Agent Main Configuration menu.
2. At the Main Menu prompt, type G to display the Advanced Settings menu.
The following screen displays the default thread count settings.
adapter_name and version number Advanced settings menu
A. Single Thread Agent (current:FALSE)
B. ADD max. thread count. (current:3)
C. MODIFY max. thread count. (current:3)
D. DELETE max. thread count. (current:3)
E. SEARCH max. thread count. (current:3)
F. Allow User EXEC procedures (current:FALSE)
G. Archive Request Packets (current:FALSE)
H. UTF8 Conversion support (current:TRUE)
I. Pass search filter to agent (current:FALSE)
J. Thread Priority Level (1-10) (current:4)
X. Done
Select menu option:
42
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
3. Type the letter of the menu option that you want to change.
4. Change the value and press Enter to display the Advanced Settings menu with
new settings.
Related tasks:
Starting the adapter configuration tool on page 19
Use the adapter configuration program, agentCfg, to view or modify the adapter
parameters.
Viewing statistics
You can view an event log for the adapter.
Procedure
1. Access the Agent Main Configuration Menu.
2. At the Main Menu prompt, type H to display the activity history for the
adapter.
43
----------------------------------------------------------------02/15/06
000001
000000
000000
000000
000000
000001
----------------------------------------------------------------X. Done
Procedure
1. Access the Agent Main Configuration menu.
2. At the Main Menu prompt, type I to display the Code Page Support menu.
adapter_name and version number Codepage Support Menu
------------------------------------------* Configured codepage: US-ASCII
------------------------------------------*
*******************************************
* Restart Agent After Configuring Codepages
*******************************************
A. Codepage Configure.
X. Done
Select menu option:
44
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. At the Main Menu prompt, type X to display the DOS command prompt.
2. Type agentCfg -help at the prompt to display the help menu and list of
commands.
-version
;Show version
-hostname < value> ;Target nodename to connect to (Default:Local host IP address)
-findall
;Find all agents on target node
-list
;List available agents on target node
-agent < value>
;Name of agent
-tail
;Display agents activity log
-portnumber < value> ;Specified agents TCP/IP port number
-netsearch < value> ;Lookup agents hosted on specified subnet
-codepages
;Display list of available codepages
-help
;Display this help screen
Table 16. Arguments and descriptions for the agentCfg help menu
Argument
Description
-version
-hostname value
-findall
-list
-agent value
-tail
-portnumber value
45
Table 16. Arguments and descriptions for the agentCfg help menu (continued)
Argument
Description
-netsearch value
-codepages
-help
3. Type agentCfg before each argument you want to run, as shown in the
following examples.
agentCfg -list
Displays:
v A list of all the adapters on the local host
v The host IP address, the IP address of the local host
v The node on which the adapter is installed.
The default node for the server must be 44970. The output is like the
following example:
Agents installed on node 127.0.0.1
----------------------agentnameAgent
(44970)
46
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Disable the User Account Control (UAC) security.
2. Install the required certificate.
3. (Optional) If required, enable the UAC security.
Related concepts:
SSL certificate management with certTool on page 53
Use the certTool utility to manage private keys and certificates.
47
SSL protocol uses signed digital certificates from a certificate authority (CA) for
authentication. SSL secures communication in a configuration. SSL provides
encryption of the data that is exchanged between the applications. Encryption
makes data that is transmitted over the network intelligible only to the intended
recipient.
Signed digital certificates enable two applications that connect in a network to
authenticate their identity. An application that acts as an SSL server presents its
credentials to verify to an SSL client. The SSL client then verifies that the
application is the entity it claims to be. You can configure an application that acts
as an SSL server so that it requires the application that acts as an SSL client to
present its credentials in a certificate. In this way, the two-way exchange of
certificates is completed. A third-party certificate authority issues signed certificates
for a fee. Some utilities, such as those provided by OpenSSL, can also provide
signed certificates.
You must install a certificate authority certificate (CA certificate) to verify the
origin of a signed digital certificate. When an application receives a signed
certificate from another application, it uses a CA certificate to verify the certificate
originator. A certificate authority can be:
v Well-known and widely used by other organizations.
v Local to a specific region or a company.
Many applications, such as web browsers, use the CA certificates of well-known
certificate authorities. Using a well-known CA eliminates or reduces the task of
distributing CA certificates throughout the security zones in a network.
48
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Self-signed certificates
You can use self-signed certificates to test an SSL configuration before you create
and install a signed certificate that is provided by a certificate authority.
A self-signed certificate contains a public key, information about the certificate
owner, and the owner signature. It has an associated private key; however, it does
not verify the origin of the certificate through a third-party certificate authority.
After you generate a self-signed certificate on an SSL server application, you must:
1. Extract it.
2. Add it to the certificate registry of the SSL client application.
This procedure is equivalent to installing a CA certificate that corresponds to a
server certificate. However, you do not include the private key in the file when
you extract a self-signed certificate to use as the equivalent of a CA certificate.
Use a key management utility to:
v Generate a self-signed certificate.
v Generate a private key.
v Extract a self-signed certificate.
v Add a self-signed certificate.
Usage of self-signed certificates depends on your security requirements. To obtain
the highest level of authentication between critical software components, do not
use self-signed certificates or use them selectively. You can authenticate
applications that protect server data with signed digital certificates. You can use
self-signed certificates to authenticate web browsers or adapters.
If you are using self-signed certificates, you can substitute a self-signed certificate
for a certificate and CA certificate pair.
49
50
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Truststore
CA
Certificate
A
Verify
Send Certificate A
Certificate
A
Procedure
1. On the adapter, complete these steps:
a. Start the certTool utility.
b. To configure the SSL-server application with a signed certificate issued by a
certificate authority:
1) Create a certificate signing request (CSR) and private key. This step
creates the certificate with an embedded public key and a separate
private key and places the private key in the PENDING_KEY registry
value.
2) Submit the CSR to the certificate authority by using the instructions that
are supplied by the CA. When you submit the CSR, specify that you
want the root CA certificate to be returned with the server certificate.
2. On the IBM Security Identity Manager server, do one of these steps:
v If you used a signed certificate that is issued by a well-known CA:
a. Ensure that the IBM Security Identity Manager server stored the root
certificate of the CA (CA certificate) in its truststore.
b. If the truststore does not contain the CA certificate, extract the CA
certificate from the adapter and add it to the truststore of the server.
v If you generated the self-signed certificate on the IBM Security Identity
Manager server, the certificate is installed and requires no additional steps.
v If you generated the self-signed certificate with the key management utility
of another application:
a. Extract the certificate from the keystore of that application.
b. Add it to the truststore of the IBM Security Identity Manager server.
Related tasks:
Starting certTool on page 54
To start the certificate configuration tool named certTool for the adapter, complete
these steps:
51
Hello
Verify
Truststore
Send Certificate A
Certificate
A
Keystore
Certificate
B
Verify
CA
Certificate
B
Before you do the following procedure, configure the adapter and IBM Security
Identity Manager server for one-way SSL authentication. If you use signed
certificates from a CA:
v The CA provides a configured adapter with a private key and a signed
certificate.
v The signed certificate of the adapter provides the CA certification for the IBM
Security Identity Manager server.
To complete the certificate configuration for two-way SSL, do the following tasks:
Procedure
1. On the IBM Security Identity Manager server, create a CSR and private key.
Next, obtain a certificate from a CA, install the CA certificate, install the newly
signed certificate, and extract the CA certificate to a temporary file.
2. On the adapter, add the CA certificate that was extracted from the keystore of
the IBM Security Identity Manager server to the adapter.
Results
After you configure the two-way certificate, each application has its own certificate
and private key. Each application also has the certificate of the CA that issued the
certificates.
Related tasks:
Configuring certificates for one-way SSL authentication on page 50
In this configuration, the IBM Security Identity Manager server and the IBM
Security Identity Manager adapter use SSL.
52
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Certificate A
CA Certificate C
IBM Security
Identity
Manager A
Adapter
CA Certificate A
Hello
IBM Security
Identity
Manager
B
Server
Certificate A
Certificate C
Hello
Web server
C
Certificate C
If the web server is configured for two-way SSL authentication, it verifies the
identity of the adapter. The adapter sends its signed certificate to the web server
(not shown in the illustration). To enable two-way SSL authentication between the
adapter and web server, perform the following process:
Procedure
1. Configure the web server to use client authentication.
2. Follow the procedure for creating and installing a signed certificate on the web
server.
3. Install the CA certificate on the adapter with the certTool utility.
4. Add the CA certificate corresponding to the signed certificate of the adapter to
the web server.
What to do next
If you want the software to send an event notification when the adapter initiates a
connection to the web server (used by the IBM Security Identity Manager server),
see the IBM Security Identity Manager product documentation.
53
Starting certTool
To start the certificate configuration tool named certTool for the adapter, complete
these steps:
Procedure
1. Click Start > Programs > Accessories > Command Prompt.
2. At a DOS command prompt, change to the bin directory for the adapter. If the
directory is in the default location, type the following command:
cd C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin\
Results
From the Main menu, you can generate a private key and certificate request, install
and delete certificates, register and unregister certificates, and list certificates. The
following sections summarize the purpose of each group of options.
By using the first set of options (A through D), you can generate a CSR and install
the returned signed certificate on the adapter.
A. Generate private key and certificate request
Generate a CSR and the associated private key that is sent to the certificate
authority.
B. Install certificate from file
Install a certificate from a file. This file must be the signed certificate that is
returned by the CA in response to the CSR that is generated by option A.
C. Install certificate and key from a PKCS12 file
Install a certificate from a PKCS12 format file that includes both the public
certificate and a private key. If options A and B are not used to obtain a
certificate, the certificate that you use must be in PKCS12 format.
D. View current installed certificate
View the certificate that is installed on the workstation where the adapter
is installed.
54
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
With the second set of options, you can install root CA certificates on the adapter.
A CA certificate validates the corresponding certificate that is presented by a client,
such as the IBM Security Identity Manager server.
E. List CA certificates
Show the installed CA certificates. The adapter communicates only with
IBM Security Identity Manager servers whose certificates are validated by
one of the installed CA certificates.
F. Install a CA certificate
Install a new CA certificate so that certificates generated by this CA can be
validated. The CA certificate file can either be in X.509 or PEM encoded
formats.
G. Delete a CA certificate
Remove one of the installed CA certificates.
Options H through K apply to adapters that must authenticate the application to
which the adapter is sending information. An example of an application is the IBM
Security Identity Manager server or the web server. Use these options to register
certificates on the adapter. For IBM Security Identity Manager version 4.5 or earlier,
register the signed certificate of the IBM Security Identity Manager server with an
adapter to enable client authentication on the adapter. If you do not upgrade an
existing adapter to use CA certificates, you must register the signed certificate that
is presented by the IBM Security Identity Manager server with the adapter.
If you configure the adapter for event notification or enable client authentication in
DAML, you must install the CA certificate. The CA certificate must correspond to
the signed certificate of the IBM Security Identity Manager server. Use option F,
Install a CA certificate.
H. List registered certificates
List all registered certificates that are accepted for communication.
I. Register a certificate
Register a new certificate. The certificate for registration must be in Base 64
encoded X.509 format or PEM.
J. Unregister a certificate
Unregister (remove) a certificate from the registered list.
K. Export certificate and key to PKCS12 file
Export a previously installed certificate and private key. You are prompted
for the file name and a password for encryption.
Related concepts:
View of the installed certificate on page 58
To list the certificate on your workstation, type D at the Main menu of certTool.
Related tasks:
Generating a private key and certificate request on page 56
A certificate signing request (CSR) is an unsigned certificate that is a text file.
Installing the certificate on page 57
After you receive your certificate from your trusted CA, install it in the registry of
the adapter.
Installing the certificate and key from a PKCS12 file on page 57
If the certTool utility did not generate a CSR to obtain a certificate, you must
install both the certificate and private key.
55
Procedure
1. At the Main Menu of the certTool, type A. The following message and prompt
are displayed:
Enter values for certificate request (press enter to skip value)
-------------------------------------------------------------------------
56
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
11. Press Enter to continue. The certificate request and input values are written to
the file that you specified. The file is copied to the adapter bin directory and
the Main menu is displayed again.
Results
You can now request a certificate from a trusted CA by sending the .pem file that
you generated to a certificate authority vendor.
Procedure
1. If you received the certificate as part of an email message, do the following
actions.
a. Copy the text of the certificate to a text file.
b. Copy that file to the bin directory of the adapter.
For Windows operating systems:
C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin
2. At the Main Menu prompt of the certTool, type B. The following prompt is
displayed:
Enter name of certificate file:
-------------------------------------------------------------------------
3. At Enter name of certificate file, type the full path to the certificate file and
press Enter.
The certificate is installed in the registry for the adapter, and Main Menu is
displayed again.
57
Procedure
1. Copy the PKCS12 file to the bin directory of the adapter.
For Windows operating systems:
C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin
2. At the Main Menu prompt for the certTool, type C to display the following
prompt:
Enter name of PKCS12 file:
-------------------------------------------------------------------------
3. At Enter name of PKCS12 file, type the name of the PKCS12 file that has the
certificate and private key information and press Enter. For example,
DamlSrvr.pfx.
4. At Enter password, type the password to access the file and press Enter.
Results
After you install the certificate and private key in the adapter registry, the certTool
displays Main Menu.
Installing a CA certificate
If you use client authentication, you must install a CA certificate that is provided
by a certificate authority vendor. You can install a CA certificate that was extracted
in a temporary file.
Procedure
1. At the Main Menu prompt, type F (Install a CA certificate).
The following prompt is displayed:
Enter name of certificate file:
2. At Enter name of certificate file, type the name of the certificate file, such as
DamlCACerts.pem and press Enter.
The certificate file opens and the following prompt is displayed:
[email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng
Install the CA? (Y/N)
3. At Install the CA, type Y to install the certificate and press Enter.
The certificate file is installed in the CACerts.pem file.
Viewing CA certificates
Use the certTool utility to view a private key and certificate that are installed the
adapter.
58
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
Type E at the Main Menu prompt.
Results
The certTool utility displays the installed CA certificates and the Main menu. The
following example shows an installed CA certificate:
Subject: o=IBM,ou=SampleCACert,cn=TestCA
Valid To: Wed Jul 26 23:59:59 2006
Deleting a CA certificate
You can delete a CA certificate from the adapter directories.
Procedure
1. At the Main Menu prompt, type G to display a list of all CA certificates that
are installed on the adapter.
0 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng
1 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Support,cn=Support
Enter number of CA certificate to remove:
Results
After the CA certificate is deleted from the CACerts.pem file, the certTool displays
the Main menu.
Procedure
To view a list of all registered certificates, type H on the Main Menu prompt.
The utility displays the registered certificates and the Main menu. The following
example shows a list of the registered certificates:
0 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng
1 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Support,cn=Support
Registering a certificate
You can register a certificate for the adapter.
Procedure
1. At the Main Menu prompt, type I to display the following prompt:
Enter name of certificate file:
2. At Enter name of certificate file, type the name of the certificate file that you
want to register and press Enter.
The subject of the certificate is displayed, and a prompt is displayed, for
example:
[email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng
Register this CA? (Y/N)
3. At Register this CA, type Y to register the certificate, and press Enter.
Chapter 7. SSL authentication configuration
59
Results
After you register the certificate to the adapter, the certTool displays the Main
menu.
Unregistering a certificate
You can unregister a certificate for the adapter.
Procedure
1. At the Main Menuprompt, type J to display the registered certificates. The
following example shows a list of lists registered certificates:
0 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng
1 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Support,cn=Support
2. Type the number of the certificate file that you want to unregister and press
Enter. For example:
[email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng
Unregister this CA? (Y/N)
3. At Unregister this CA, type Y to unregister the certificate and press Enter.
Results
After you remove the certificate from the list of registered certificate for the
adapter, the certTool displays the Main Menu.
Procedure
1. At the Main Menu prompt, type K to display the following prompt:
Enter name of PKCS12 file:
2. At the Enter name of PKCS12 file prompt, type the name of the PKCS12 file
for the installed certificate or private key and press Enter.
3. At the Enter Password prompt, type the password for the PKCS12 file and
press Enter.
4. At the Confirm Password prompt, type the password again and press Enter.
Results
After the certificate or private key is exported to the PKCS12 file, the certTool
displays the Main menu.
60
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Extend the Active Directory Adapter schema and add the custom attributes to
the Active Directory Server. For more information on extending the schema, see
Step 1: Extend the schema and add the extended attributes on page 62.
For information on the files that you can modify to customize the Active
Directory Adapter, see Appendix A, Files, on page 101.
2. Copy the JAR file to a temporary directory and extract the files. For more
information on extracting the files, see Step 2. Copy the ADprofile.jar file and
extract the files on page 62.
3. Add the extended attributes to the exschema.txt file. For more information on
extending the attributes, see Step 3. Modify the exschema.txt file on page 63.
4. Update the schema.dsml file on the IBM Security Identity Manager server. For
more information on updating this file, see Step 4: Update the schema.dsml
file on page 63.
5. Update the customlabels.properties file on the IBM Security Identity Manager
server. For more information on updating this file, see Step 5: Modify the
CustomLabels.properties file on page 64.
6. Install the new attributes on the IBM Security Identity Manager server. For
more information on updating this file, see Step 6: Create a JAR file and install
the new attributes on the IBM Security Identity Manager server on page 64.
7. Modify the form for the account. For more information on updating the form,
see Step 7: Optionally modify the adapter form on page 65.
61
Integer
Case sensitive string
Case insensitive string
UTC coded time
Consider prefixing the attribute names with erAD in order to easily identify the
attributes that are used with IBM Security Identity Manager.
Note:
v If Tivoli Directory Server is being used as the directory server application, the
name of the attribute must be unique within the first 16 characters.
v The Active Directory Adapter supports a multiline value for extended attributes
with string syntax.
v The extended attributes are supported only for the User account class.
Procedure
1.
2.
3.
4.
62
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Change to the \data directory for the adapter.
2. Create or open the exschema.txt file in a text editor.
3. Add the extended attributes to the file. List only 1 attribute per line. For
example:
erADString1
erADInteger
erADDate
erADBoolean
erADMultiValueString
Procedure
1. Change to the \ADprofile directory, where the schema.dsml file has been
created.
2. Edit the schema.dsml file to add an attribute definition for each extended
attribute. The Object Identifier (OID) must be incremented by 1, based on the
last entry in the file. For example, if the last attribute in the file uses the OID
1.3.6.1.4.1.6054.3.125.2.67, the first new attribute uses the OID
1.3.6.1.4.1.6054.3.125.2.68.
Consider starting a new range of numbers for your custom attributes. For
example, start custom attributes with OID 1.3.6.1.4.1.6054.3.125.2.100. This
Chapter 8. Customizing the adapter
63
Procedure
1. Change to the ADprofile directory where the CustomLabels.properties file has
been created.
2. Edit the CustomLabels.properties file to add the attribute and its
corresponding label using the following format:
attribute=label
Step 6: Create a JAR file and install the new attributes on the IBM
Security Identity Manager server
After you modify the schema.dsml and CustomLabels.properties files, import these
files and any other files in the profile that were modified for the adapter, into the
IBM Security Identity Manager server to cause the changes to take effect.
64
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Create a new JAR file using the files in the \temp directory by running the
following commands:
cd c:\temp
jar -cvf ADprofile.jar ADprofile
2. Import the ADprofile.jar file into the IBM Security Identity Manager server.
For more information on importing the file, see Importing the adapter profile
into the IBM Security Identity Manager server on page 13.
3. Stop and start the IBM Security Identity Manager server.
Note: If you are upgrading an existing adapter profile, the new adapter profile
schema is not immediately used. Stop and start the IBM Security Identity
Manager server to refresh the cache and the adapter schema. For more
information on upgrading an existing adapter, see Updating the Active
Directory Adapter on page 93.
65
the accounts being restored might require a password. Remote services will discard
the password from the restore action for those managed resources that do not
require them.
To configure the Active Directory Adapter to prompt for a new password when
restoring accounts:
Procedure
1. Stop the IBM Security Identity Manager server.
2. Extract the files from the ADprofile.jar file. For more information on
customizing the adapter profile file, see Step 2. Copy the ADprofile.jar file
and extract the files on page 62.
3. Change to the \ADprofile directory, where the resource.def file has been
created.
4. Edit the resource.def file to add the new protocol options. For example:
<Property Name = "com.ibm.itim.remoteservices.ResourceProperties.
PASSWORD_NOT_REQUIRED_ON_RESTORE" Value = "FALSE"/>
<Property Name = "com.ibm.itim.remoteservices.ResourceProperties.
PASSWORD_NOT_ALLOWED_ON_RESTORE" Value = "FALSE"/>
Adding the two options in the example above ensures that you are prompted
for a password when an account is restored.
5. Create a new ADprofile.jar file using the resource.def file and import the
adapter profile file into the IBM Security Identity Manager server. For more
information, see Step 6: Create a JAR file and install the new attributes on the
IBM Security Identity Manager server on page 64.
6. Start the IBM Security Identity Manager server again.
Note: If you upgrade an existing adapter profile, the new adapter profile
schema is not immediately used. Stop and start the IBM Security Identity
Manager server to refresh the cache and therefore the adapter schema. For
more information on upgrading an existing adapter, see Updating the Active
Directory Adapter on page 93.
66
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
The syntax of the base point also allows for an optional workstation name to prefix
the base point DN, for example server1/dc=ibm,dc=com. This causes the adapter to
bind to a specific server instead of connecting to the first available server when
responding to an active directory bind request.
You can specify more that one target server for the base point on the Active
Directory Adapter service form on IBM Security Identity Manager and in the
Active Directory Adapter registry. Each target server must be separated by | as a
delimiter. For example,
Base Point DN on the service form with more than one target server:
DC01|DC02|DC03/OU=engineering,DC=irvine,DC=IBM,DC=com
Base Point DN on the service form with only one target server:
DC01/OU=engineering,DC=irvine,DC=IBM,DC=com
Base Point DN on the service form with no target server:
OU=engineering,DC=irvine,DC=IBM,DC=com
You can also specify target servers for the base point in the Active Directory
Adapter registry. For example,
Example 1
If the BasePoint specified on the service form is
OU=engineering,DC=irvine,DC=IBM,DC=com, you can specify the list of target
servers in the adapter registry by using the agentCfg.exe as you:
1. Create an Active Directory Adapter registry key, for example,
OU=engineering,DC=irvine,DC=IBM,DC=com.
2. Specify the value for the created registry key as DC01|DC02|DC03.
Example 2
If the BasePoint specified on the service form is DC01|DC02|DC03/
OU=engineering,DC=irvine,DC=IBM,DC=com, you can specify the list of target
servers in the adapter registry by using the agentCfg.exe as you:
1. Create an Active Directory Adapter registry key, for example,
OU=engineering,DC=irvine,DC=IBM,DC=com.
2. Specify the value for the created registry key as DC04|DC05|DC06.
The adapter iterates through all the target servers specified in the base point on the
service form, and then through the target servers specified in the adapter registry
key. The adapter uses the first available target server. You can specify the base
point without the target servers on the service form and use the registry key to
specify the target servers. The adapter uses the base point specified on the service
form to search a key with this base point value in the registry to get the target
servers specified as the value for this registry key.
Note:
v There is a limit of 240 characters for the Base Point DN attribute on the adapter
service form.
v The adapter service form and registry can specify their own set of target servers.
However, the target servers specified on the service form are considered a high
priority.
v When you do not provide a base point on the service form, the adapter does not
use the registry.
67
v Specify the target server by using the adapter registry because it is cached to
improve the performance compared to specifying on the adapter service form.
The target server list on the service form is not cached and is parsed in each
request to find all target servers.
v Use the agentCfg.exe to create and modify adapter registry keys. Restart the
adapter service after you add or modify the registry keys. When the base point
or target server have Unicode characters, use regedit to create registry keys
under HKEY_LOCAL_MACHINE\SOFTWARE\Access360\ADAgent\Specific.
Also, on the service form are the Admin User Account and Admin User Password
values. These optional values are only required if an administrator account is
defined for the base point of the adapter, and you want to use this account for
logging purposes. If these values are not defined, the adapter will use the account
assigned to the adapter service.
Note: Do not create services that overlap in scope in the directory tree. This could
result in duplicate account creation during reconciliation.
Procedure
v Set the UseGroup registry key to one of the following options by using the
agentCfg:
CN
DN
GUID
v Modify the profile files erADAccount.xml, erADGroup.xml, and resource.def. For
information about profile file modifications, see Table 17 on page 70.
68
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
v Build the ADprofile.jar and import the new profile on IBM Security Identity
Manager.
v Perform a full reconciliation operation.
Note: If an event notification is enabled, delete the event notification database
and perform a full reconciliation operation. When you do so, you are ensuring
that a new database is created with correct values.
v Modify the profile files erADAccount.xml, erADGroup.xml, and resource.def as
specified in the following table:
69
Modifications
required in
DN
erADAccount.xml
<formElement direction="inherit"
label="$ergroup" name="data.ergroup">
<searchFilter multiple="true" type="select">
<filter>(objectclass=eradgroup)</filter>
<base>contextual</base>
<attribute>erADGroupSamAccountName</attribute>
<sourceAttribute>erADGroupDN</sourceAttribute>
<delimiter></delimiter>
<size></size>
<width>300</width>
<objectClass>erADGroup</objectClass>
<showQueryUI>false</showQueryUI>
<paginateResults>true</paginateResults>
</searchFilter>
</formElement>
erADGroup.xml
<formElement direction="inherit"
label="$eradgroupismemberof"
name="data.eradgroupismemberof">
<searchFilter multiple="true" type="select">
<filter>(objectclass=eradgroup)</filter>
<base>contextual</base>
<attribute>erADGroupSamAccountName</attribute>
<sourceAttribute>erADGroupDN</sourceAttribute>
<delimiter></delimiter>
<size></size>
<width>300</width>
<objectClass>erADGroup</objectClass>
<showQueryUI>false</showQueryUI>
<paginateResults>true</paginateResults>
</searchFilter>
</formElement>
resource.def
<ServiceGroups>
<GroupDefinition ProfileName="ADGroupProfile"
ClassName = "erADGroup"
RdnAttribute = "erADGroupSamAccountName"
AccountAttribute = "erGroup">
<AttributeMap>
<Attribute Name = "erGroupId" Value="erADGroupDN" />
<Attribute Name = "erGroupName" Value="erADGroupSamAccountName"
/>
<Attribute Name = "erGroupDescription" Value="erADGroupDescription"
/>
</AttributeMap>
<BehaviorProperties>
<Property Name = "Managed" Value = "true"/>
</BehaviorProperties>
</GroupDefinition>
</ServiceGroups>
70
Expected modification
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Modifications
required in
CN
erADAccount.xml
<formElement direction="inherit"
label="$ergroup" name="data.ergroup">
<searchFilter multiple="true" type="select">
<filter>(objectclass=eradgroup)</filter>
<base>contextual</base>
<attribute>erADGroupSamAccountName</attribute>
<sourceAttribute>erADGroupCN</sourceAttribute>
<delimiter></delimiter>
<size></size>
<width>300</width>
<objectClass>erADGroup</objectClass>
<showQueryUI>false</showQueryUI>
<paginateResults>true</paginateResults>
</searchFilter>
</formElement>
erADGroup.xml
<formElement direction="inherit"
label=
"$eradgroupismemberof"
name="data.eradgroupismemberof">
<searchFilter multiple="true" type="select">
<filter>(objectclass=eradgroup)</filter>
<base>contextual</base>
<attribute>erADGroupSamAccountName</attribute>
<sourceAttribute>erADGroupCN</sourceAttribute>
<delimiter></delimiter>
<size></size>
<width>300</width>
<objectClass>erADGroup</objectClass>
<showQueryUI>false</showQueryUI>
<paginateResults>true</paginateResults>
</searchFilter>
</formElement>
resource.def
<ServiceGroups>
<GroupDefinition ProfileName="ADGroupProfile"
ClassName = "erADGroup"
RdnAttribute = "erADGroupSamAccountName"
AccountAttribute = "erGroup">
<AttributeMap>
<Attribute Name = "erGroupId" Value="erADGroupCN" />
<Attribute Name = "erGroupName" Value="erADGroupSamAccountName"
/>
<Attribute Name = "erGroupDescription" Value="erADGroupDescription"
/>
</AttributeMap>
<BehaviorProperties>
<Property Name = "Managed" Value = "true"/>
</BehaviorProperties>
</GroupDefinition>
</ServiceGroups>
Expected modification
71
Modifications
required in
GUID
erADAccount.xml
<formElement direction="inherit"
label="$ergroup" name="data.ergroup">
<searchFilter multiple="true" type="select">
<filter>(objectclass=eradgroup)</filter>
<base>contextual</base>
<attribute>erADGroupSamAccountName</attribute>
<sourceAttribute>erADGroupGUID</sourceAttribute>
<delimiter></delimiter>
<size></size>
<width>300</width>
<objectClass>erADGroup</objectClass>
<showQueryUI>false</showQueryUI>
<paginateResults>true</paginateResults>
</searchFilter>
</formElement>
erADGroup.xml
<formElement direction="inherit"
label="$eradgroupismemberof"
name="data.eradgroupismemberof">
<searchFilter multiple="true" type="select">
<filter>(objectclass=eradgroup)</filter>
<base>contextual</base>
<attribute>erADGroupSamAccountName</attribute>
<sourceAttribute>erADGroupGUID</sourceAttribute>
<delimiter></delimiter>
<size></size>
<width>300</width>
<objectClass>erADGroup</objectClass>
<showQueryUI>false</showQueryUI>
<paginateResults>true</paginateResults>
</searchFilter>
</formElement>
resource.def
<ServiceGroups>
<GroupDefinition ProfileName="ADGroupProfile"
ClassName = "erADGroup"
RdnAttribute = "erADGroupSamAccountName"
AccountAttribute = "erGroup">
<AttributeMap>
<Attribute Name = "erGroupId" Value="erADGroupGUID" />
<Attribute Name = "erGroupName" Value="erADGroupSamAccountName"
/>
<Attribute Name = "erGroupDescription" Value="erADGroupDescription"
/>
</AttributeMap>
<BehaviorProperties>
<Property Name = "Managed" Value = "true"/>
</BehaviorProperties>
</GroupDefinition>
</ServiceGroups>
Expected modification
72
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Copy the ADprofile.jar file to a temporary directory, for example, C:\Temp
directory.
2. Extract the contents of the ADprofile.jar file into the temporary directory by
running the following command:
cd C:\Temp
jar -xvf ADprofile.jar
The jar command creates the C:\Temp\ADprofile directory that has all the
profile files.
3. From the extracted ADprofile directory, open the resource.def file in a text
editor and search for this entry: <Parameter Name="erADEProxyAddresses"
Source="account" ReplaceMultiValue="true" />
4. Delete all the occurrences of the above entry from the resource.def file and
save the file.
5. Run the following command to create the new jar file:
cd C:\Temp
jar -cvf ADprofile.jar ADprofile
6. Import the new ADprofile.jar file on IBM Security Identity Manager. For more
information about importing the adapter profile, see Importing the adapter
profile into the IBM Security Identity Manager server on page 13.
7. After you import the adapter profile, restart IBM Security Identity Manager to
reflect the updates.
73
and that are not included in the modify request. You do not get the membership of
a user account to groups that are added to the user account by using the external
application when:
v You modify the user account membership on the Active Directory by using an
external application.
v The user accounts are not reconciled frequently.
When you modify the user account membership on the Active Directory, modify
the profile for sending the erGroup attribute in the modify request with an
attribute operation type of Add or Delete. To handle the erGroup attribute with
attribute operation type as Add or Delete, modify the profile for Active Directory.
The adapter profile (ADprofile.jar) is included in the JAR file for the adapter.
To modify the ADprofile.jar file for handling the erGroup attribute with an
attribute operation type of Add or Delete, perform the following steps:
Procedure
1. Copy the ADprofile.jar file to a temporary directory, for example, C:\Temp
directory.
2. Extract the contents of ADprofile.jar file into the temporary directory by
running the following command:
cd C:\Temp
jar -xvf ADprofile.jar
The jar command creates the C:\Temp\ADprofile directory that has all the
profile files.
3. From the extracted ADprofile directory, open the resource.def file in a text
editor and search for the entry <Parameter Name="erGroup" Source="account"
ReplaceMultiValue="true" />.
4. Delete all the occurrences of the above entry from the resource.def file and
save the file.
5. Run the following command to create a new jar file:
cd C:\Temp
jar -cvf ADprofile.jar ADprofile
6. Import the new ADprofile.jar file on IBM Security Identity Manager. For more
information about importing the adapter profile, see Importing the adapter
profile into the IBM Security Identity Manager server on page 13.
7. After you import the adapter profile, restart IBM Security Identity Manager to
reflect the updates.
74
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Add the erADFullName attribute to the user account form by customizing the
Active Directory account form. For more information about customizing the
user account form, see the IBM Security Identity Manager product
documentation.
2. Set the registry key UseITIMCNAttribute to FALSE by using the agentCfg utility.
75
76
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Test the connection for the service that you have created on IBM Security
Identity Manager.
2. Perform a full reconciliation from the IBM Security Identity Manager server.
3. Perform all supported operations (add, change and delete) on one account and
examine the WinADAgent.log file after each operation to ensure that no errors
were reported.
77
78
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
79
80
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Known behaviors
The following behaviors and limitations are known to exist in the operation of the
Active Directory Adapter.
Expiration date
The Active Directory Users and Computers Microsoft Management Console (MMC)
snap-in displays the account expiration date as one day earlier than the date
contained in the accountExpires attribute. The IBM Security Identity Manager
server displays the value that is contained in the account expires attribute.
Password properties
The password properties are specific to the account. However, these properties can
be overridden by the security policies of the managed resource.
For example:
v Domain controller security policies
v Domain security policies
v Local security policies
81
This behavior is caused by replication delay. Exchange might not find the user
account on a domain controller, if the account is created on another domain
The solution here is to target both the following operations to the same Domain
Controller:
v Create user account operation.
v The Exchange operation, to either mailbox enable or mail-enable the user
account.
To specify a target server use the Users Base Point DN on IBM Security Identity
Manager Active Directory profile service form. The Base Point must contain the
name of the domain controller. For more information about how to specify Users
Base Point DN, see Users Base Point configuration for the adapter on page 66
Example
Users Base Point DN: DC01/ou=Test,dc=MyDomain,dc=com.
82
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Corrective action
Ensure that:
v The Users Base Point is correctly specified on the adapter service
form.
v The target servers are up and reachable when they are specified in
the base point.
v The user ID is correctly specified on the adapter service form.
v The password is correctly specified on the adapter service form.
v The Active Directory Server is reachable from the workstation
where the adapter is installed.
Ensure that:
v The Groups Base Point is correctly specified on the adapter service
form.
v The user ID is correctly specified on the adapter service form.
v The password is correctly specified on the adapter service form.
v The target servers are up and reachable when they are specified in
the base point.
v The Active Directory Server is reachable from the workstation
where the adapter is installed.
This error occurs when the Active Directory Adapter fails to:
v Bind to root DSE
v Get the default naming context
Ensure that:
v The Users Base Point is correctly specified on the adapter service
form.
v The user ID is correctly specified on the adapter service form.
v The password is correctly specified on the adapter service form.
v The Active Directory Server is reachable from the workstation
where the adapter is installed.
This error occurs when the Active Directory Adapter fails to bind to a
user object of the Active Directory Server for processing.
Ensure that the user processed in the Active Directory Server is not
deleted by any other process simultaneously.
83
Corrective action
The Active Directory Adapter does not support the data type used for
the extended attribute. Use one of the following data types:
v Boolean
v Integer
v Case-sensitive string
v Not case-sensitive string
v Numerical string
v Unicode string
v Distinguished name
v UTC coded time
For more information about customizing the adapter to use the
extended attributes, see Chapter 8, Customizing the Active Directory
Adapter, on page 61.
Error binding to schema container error code. These errors occur when the Active Directory Adapter fails to extract
Loading of extended schema attribute
the schema of the extended attributes.
attribute name failed.
v Ensure that the Active Directory Server is reachable from the
workstation where the adapter is installed.
Error getting parent of schema error code.
Loading of extended schema attribute
v Verify that the extended attribute is correctly defined and added to
attribute name failed.
the user class.
Error binding to DN of schema error code.
Loading of extended schema attribute
attribute name failed.
Unable to connect to default domain.
Loading of extended schema attribute
attribute name failed.
This error occurs when the Active Directory Adapter fails to connect
to a user object in the Active Directory Server for processing.
Ensure that the user user name exists on the Active Directory Server.
84
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Corrective action
This error occurs when the Active Directory Adapter fails to get the
domain name from the specified base point or from the default
domain.
Ensure that a base point is specified with a correct domain name.
Ensure that the user exists on the Active Directory Server and is not
directly deleted or modified on the Active Directory Server.
Ensure that the group exists on the Active Directory Server and is not
directly deleted or modified on the Active Directory Server.
Specify a valid country code and submit the request again. For
information about valid country codes, see the country and region
codes section in the Active Directory Adapter User Guide.
Ensure that:
v The user or group exists on the Active Directory Server.
v The user or group is a member of the group group name.
v The group specified exists on the Active Directory Server.
Error adding membership to group group
name
This error occurs when the Active Directory Adapter fails to retrieve
share information from the home directory of the user.
Ensure that:
v The user account under which the adapter is running has access to
the home directory.
v The share name exists on the workstation where the home directory
is created.
Chapter 10. Troubleshooting
85
Corrective action
The Active Directory Adapter is not able to delete the specified home
directory. If the adapter is unable to delete the UNC home directory,
ensure that:
v The value of the registry key DeleteUNCHomeDirectories is TRUE.
v The user account under which the adapter is running has
permissions to delete the directory.
Ensure that:
v A directory with the same name does not exist.
v The user account has permissions to create home directory.
v Intermediate directories exist. The adapter creates only the final
directory in the specified path.
The Active Directory Adapter is not able to delete the share when you
clear the value of the share-related attributes from the Active
Directory Server account form.
Ensure that:
v The user account has access to the specified share.
v The specified share name exists.
v The user account under which the adapter is running has
permissions to create home directory.
86
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Corrective action
The Active Directory Adapter retrieves data from the Active Directory
Server in a paged manner. The adapter reconciles users, groups, and
containers and attempts to retrieve data in a maximum of three
attempts. If all three attempts fail, the adapter abandons the search.
errorMessage="Unsupported filter"
The adapter does not support the attribute specified in the filter. For
the list of supported attributes, see supported attributes in the Active
Directory Adapter User Guide.
Ensure that:
v The user is a member of the specified group.
v The specified group is either a universal security group or a global
security group.
These errors occur when the specified value for the attribute violates
ADSI Result code: 0x80072014 - The
any constraint associated with that attribute. For example, a constraint
requested operation did not satisfy one or
might be:
more constraints associated with the class of
v Minimum or maximum length of characters the attribute can store.
the object.
v Minimum or maximum value the attribute can accept.
ADSI Result code: 0x8007202f - A constraint
violation occurred.
Ensure that the specified value for the attribute does not violate these
constraints.
Note: If any one of the attribute specified in the request violates a
constraint, the adapter gives the same error for all the subsequent
attributes. This error is issued even though they do not violate any
constraint. For example, the Title attribute on the Active Directory
Server can store a description of maximum of 64 characters. If you
specify a description of more than 64 characters, the adapter gives
these errors for the Title attribute and for all the other attributes
specified in the request.
Verify that the request for proxy email types contains a primary SMTP
address.
The Active Directory Adapter does not use the xforms.xml file.
Therefore, you can safely ignore the xforms-related errors that are
recorded in the WinADAgent.log file.
This error occurs when the Active Directory Adapter fails to connect
to a group object in the Active Directory Server for processing.
Ensure that the group group name exists on the Active Directory
Server.
87
Corrective action
This error occurs when an attempt is made to create user request and
the user account exists in the Active Directory Server with the same
value for User Principal Name attribute.
Ensure that:
v The value specified for the User Principal Name attribute when you
create a user account is not already used by an existing user
account on the Active Directory Server.
v You set the registry key UPNSearchEnabled to FALSE when you do
not want the adapter to check the uniqueness of the User Principal
Name attribute. For more information about usage of the registry
key UPNSearchEnabled, see "User Principal Name of a user
account" in the Active Directory Adapter User Guide.
This error occurs when the Active Directory Adapter fails to bind to a
group object on the Active Directory Server for processing.
Ensure that the group processed in the Active Directory Server is not
deleted by any other process simultaneously.
This error occurs when the Active Directory Adapter binds to the
requested container when a user or group object is moved in the
Active Directory Server hierarchy.
Ensure that the container exists on the Active Directory Server.
88
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Corrective action
This error occurs when an attempt is made to run the certTool utility
by running the following command:
CertTool -agent ADAgent
Ensure that:
v The user who runs the certTool utility has administrator
permissions.
v You disabled the User Account Control (UAC) security feature
before you run the certTool utility on the workstation where the
adapter is installed.
Value given after 'B:' is not correct. Expected For extended attribute of type DNWithBinary, verify that value given
for the char count is the total number of Hexadecimal Digit count.
value is the total number of Hexadecimal
Ensure that it does not contain any alphabetical characters or any
Digit count
special characters.
Hexadecimal value does not contain the
number of characters specified in the
character count.
This error occurs when the specified value for the extended attribute
of type DNWithBinary violates any constraint associated with that
attribute. For example, some constraints might be:
v The object DN in the value must be a distinguished name of
existing user object.
v The maximum or minimum number of bits in the hexadecimal
value.
Ensure that the specified value for the attribute does not violate any
constraints.
89
Corrective action
Ensure that the request does not contain Unified Messaging attributes
with operation ADD or MODIFY when the MailBox of the user is
disabled for Unified Messaging.
90
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
91
92
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Stop the Active Directory Adapter service.
2. Install the new version of the adapter.
When the upgraded adapter starts for the first time, new log files are created,
replacing the old files.
The adapter installer allows an update installation of the adapter, for adapters
versions 6.0 or later.
93
Procedure
1. Downloaded the installation software from Passport Advantage.
a. Create a temporary directory on the computer on which you want to install
the software.
b. Extract the contents of the compressed file into the temporary directory.
2. Run the SetupAD64.exe file in the temporary directory to start the installation
program.
3. Select the language and click OK to display the Introduction window.
4. On the Introduction window click Next.
5. Select Update installation option and click Next.
Note: The adapter must exist, if you want to perform an update installation. If
it does not exist, the software generates the following message: Update not
supported when the adapter is not previously installed. Cannot perform
Update Installation. IBM Tivoli Windows Active Directory Adapter (64
Bit) is not installed on this machine. Please select Full Installation.
The adapter displays the path of the adapter installation that is to be updated.
6. Click OK to view the pre-Installation Summary window.
7. Review the installation settings on the pre-Installation Summary window and
click Install.
8. Click Done on the Install Complete window.
94
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
The installer refers to the adapter registry keys to detect if the adapter is installed
on the system where you are running the command. The installer updates the
adapter only if it successfully detects a prior installation of the adapter on the
system. If no prior installation is found on the system, the installation ends. A log
file IBM_Tivoli_Windows_Active_Directory_Adapter_(64_Bit)_InstallLog is
generated with this information in the Desktop.
Note: When performing an update installation the -DUSER_INSTALL_DIR parameter
must not be used.
Procedure
Issue one of the following commands on a single line:
v SetupAD64.exe -i silent -DLICENSE_ACCEPTED=TRUE
-DUSER_INPUT_INSTALL_TYPE_1= -DUSER_INPUT_INSTALL_TYPE_2=\"Update Installation\"
-DUSER_INPUT_INSTALL_TYPE_BOOLEAN_1=0
-DUSER_INPUT_INSTALL_TYPE_BOOLEAN_2=1
v SetupAD64.exe -i silent -DLICENSE_ACCEPTED=TRUE
-DUSER_INPUT_INSTALL_TYPE_BOOLEAN_1=0
-DUSER_INPUT_INSTALL_TYPE_BOOLEAN_2=1
Procedure
1. Use one of these actions to create a response file.
v Generate a response file by issuing the command:
SetupAD64.exe -r "Full path of response file"
This command runs the installer in interactive mode and installs the adapter.
After the installation completes, the file specified as "Full path of response file"
is created. The file contains the required parameters.
Note: If you are running this command to generate only the response file,
you must uninstall the adapter by using the uninstaller.
v Manually create a response file:
Use a text editor to create a text file. For example create a file
WinAD64InstallParameters.txt, with the following content:
#Has the license been accepted
#----------------------------LICENSE_ACCEPTED=TRUE
#Select Install Type
#------------------USER_INPUT_INSTALL_TYPE=\"\",\"Update Installation\"
USER_INPUT_INSTALL_TYPE_1=
USER_INPUT_INSTALL_TYPE_2=Update Installation
USER_INPUT_INSTALL_TYPE_BOOLEAN_1=0
USER_INPUT_INSTALL_TYPE_BOOLEAN_2=1
For example:
SetupAD64.exe -i silent -f "C:\WinAD64InstallParameters.txt"
Chapter 12. Updates for the Active Directory Adapter or the Adapter Development Kit (ADK)
95
Procedure
1. Download the ADK update program compressed file from the IBM website.
2. Extract the contents of the compressed file into a temporary directory.
3. Stop the Active Directory Adapter service.
4. Start the update program by using the adkinst_win64.exe file in the temporary
directory. For example, select Run from the Start menu, and type
C:\TEMP\adkinst_win64.exe in the Open field.
If no adapter is installed, you receive the following error message, and the
program exits:
No Agent Installed - Cannot Install ADK.
96
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
The earlier version of the adapter functions correctly on IBM Security Identity
Manager version 5.1 during the upgrade; however, group management is not
available. Support for the 5.0 or 4.6 versions of the adapter that run on IBM
Security Identity Manager version 5.1 is limited to the upgrade period only.
Perform the following steps to install the Active Directory Adapter version 6.0.
Procedure
1. Create a backup of your directory schema and objects.
2. Run the upgradeGroups tool without the update parameter to verify that the
environment is correct.
3. Run the upgradeGroups tool with the update parameter to update the Active
Directory Adapter group object class (erADGroup) to make it compatible with
the 6.0 adapter profile.
4. Import the version 5.0 or 5.1 adapter profile on IBM Security Identity Manager.
For specific information, see Importing the adapter profile into the IBM
Security Identity Manager server on page 13.
5. Install version 6.0 of the adapter. For specific procedures, see Installing the
adapter on page 11 and the adapter Release Notes.
Note: Ensure that you select the Full Installation option during the adapter
installation.
6. Perform Support data reconciliation or a full reconciliation operation.
Chapter 12. Updates for the Active Directory Adapter or the Adapter Development Kit (ADK)
97
v You run the upgradeGroups tool on the workstation where the IBM Security
Identity Manager server is installed.
v The CLASSPATH includes itim_common.jar, tim_server.jar, jlog.jar, and IBM
Security Identity Manager data directory. These jar files are located under the
IBM Security Identity Manager lib directory.
v You provide the IBM Security Identity Manager home directory and the key
value AD on the command line.
v You provide the update parameter only when the environment is correct.
Note: On a Windows operating system, run the command or the batch file from
a command prompt to obtain the output of the tool.
Perform these steps:
Procedure
1. Create a batch file or a script file to run the tool. The updateAD.bat file has the
following content:
set JAVA=C:\Program Files\IBM\WebSphere\AppServer\java\bin\java
set TIM_HOME=C:\Program Files\IBM\itim
set TIM_DATA=%TIM_HOME%\data "%JAVA%" cp "%TIM_HOME%\lib\itim_common.jar";
"%TIM_HOME%\lib\itim_server.jar"; "%TIM_HOME%\lib\jlog.jar";
upgradeGroups.jar; "%TIM_DATA%" upgradeGroups "%TIM_HOME%" AD
2. The following command in the batch file verifies that the CLASSPATH and the
IBM Security Identity Manager installation location are correct:
"%JAVA%" cp "%TIM_HOME%\lib\itim_common.jar";
"%TIM_HOME%\lib\itim_server.jar"; "%TIM_HOME%\lib\jlog.jar";
upgradeGroups.jar; "%TIM_DATA%" upgradeGroups "%TIM_HOME%" AD
AD is a required value for the Active Directory Adapter and provides the update
parameter to commit the LDAP changes.
You can modify the updateAD.bat file according to your IBM Security Identity
Manager installation location and operating system. If there are any issues, the
tool displays the appropriate error messages.
Note:
v The DOS batch file is supplied with the upgradeGroups tool.
v The upgradeGroups tool uses the value of the erADGroupCN attribute for
the erADGroupSamAccountName attribute to replace a group object on IBM
Security Identity Manager. When you perform support data reconciliation or
full reconciliation, the access on groups that do not have the same value for
erADGroupCN attribute and erADGroupSamAccountName attribute on the
Active Directory is deleted from IBM Security Identity Manager.
98
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
1. Stop the adapter service.
2. Run the uninstaller. To run the uninstaller:
a. Navigate to the adapter home directory. For example, Tivoli\agents\
adaptername\Uninstall_IBM Windows AD Adapter for ITIM (64 Bit)
b. Double click the Uninstall IBM Windows AD Adapter for ITIM (64 Bit).exe file.
c. On the Uninstall IBM Windows AD Adapter for ITIM (64 BIT) window,
click Uninstall.
d. On the Uninstall Complete window, click Done.
Adapter profile removal from the IBM Security Identity Manager server
Before you remove the adapter profile, ensure that no objects exist on your IBM
Security Identity Manager server that reference the adapter profile.
Examples of objects on the IBM Security Identity Manager server that can reference
the adapter profile are:
v Adapter service instances
v Policies referencing an adapter instance or the profile
v Accounts
For specific information on how to remove the adapter profile, see the online help
or the IBM Security Identity Manager product documentation.
99
100
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Appendix A. Files
You can configure several adapter-specific files.
This appendix includes information about the files that are associated with the
Active Directory Adapter:
v schema.dsml file
v CustomLabels.properties file on page 104
schema.dsml file
The schema.dsml file contains all of the attributes that are common to all adapters.
This common file also contains IBM Security Identity Manager server attributes
that can be used by any adapter. The schema.dsml file defines all of the classes
used by the adapter. The classes are used to declare accounts, services, and
supporting data.
The schema.dsml file defines the attributes and objects that the adapter supports
and uses to communicate with the IBM Security Identity Manager server. All
attributes must be unique; therefore, they are assigned an OID.
The OID is defined with the <object-identifier>...</object-identifier> tags.
The schema.dsml file has the following format:
SCHEMA.DSML File
<?xml version="1.0" encoding="UTF-8"?>
<!-- ******************************************************** -->
<!-- Schema supported by the Windows adapter.
-->
<!-- ******************************************************** -->
<directory-schema>
...
<!-- ******************************************************** -->
<!-- eraADString1-->
<!-- ******************************************************** -->
<attribute-type single-value="true">
<name>erADString1</name>
<description/>
<object-identifier>1.3.6.1.4.1.6054.3.125.2.100</object-identifier>
<syntax>1.3.6.1.4.1.1466.115.121.1.15</syntax>
</attribute-type>
<!-- ******************************************************** -->
<!-- erADInteger-->
<!-- ******************************************************** -->
<attribute-type single-value="true">
<name>erADInteger</name>
<description/>
<object-identifier>1.3.6.1.4.1.6054.3.125.2.101</object-identifier>
<syntax>1.3.6.1.4.1.1466.115.121.1.27</syntax>
</attribute-type>
<!-- ******************************************************** -->
<!-- erADDate-->
<!-- ******************************************************** -->
<attribute-type single-value="true">
<name>erADDate</name>
<description/>
<object-identifier>1.3.6.1.4.1.6054.3.125.2.102</object-identifier>
Copyright IBM Corp. 2012, 2013
101
<syntax>1.3.6.1.4.1.1466.115.121.1.24</syntax>
</attribute-type>
<!-- ******************************************************** -->
<!-- erADBoolean-->
<!-- ******************************************************** -->
<attribute-type
single-value="true">
<name>erADBoolean</name>
<description/>
<object-identifier>1.3.6.1.4.1.6054.3.125.2.103</object-identifier>
<syntax>1.3.6.1.4.1.1466.115.121.1.7</syntax>
</attribute-type>
<!-- ******************************************************** -->
<!-- erADMultiValueString-->
<!-- ******************************************************** -->
<attribute-type>
<name>erADMultiValueString</name>
<description>List of string values</description>
<object-identifier>1.3.6.1.4.1.6054.3.125.2.104</object-identifier>
<syntax>1.3.6.1.4.1.1466.115.121.1.15</syntax>
</attribute-type>
...
<!-- ******************************************************** -->
<!-- erADAccount Class
-->
<!-- ******************************************************** -->
<class superior="top">
<name>erADAccount</name>
<description>Windows account.</description>
<object-identifier>1.3.6.1.4.1.6054.3.125.1.1</object-identifier>
...
<attribute ref="erADBoolean" required="false"/>
<attribute ref="erADDate" required="false"/>
<attribute ref="erADInteger" required="false"/>
<attribute ref="erADMultiValueString" required="false"/>
<attribute ref="erADString1" required="false"/>
</class>
...
</directory-schema>
</dsml>
The sections of this schema file are described in the following sections.
Object identifier
The IBM Security Identity Manager server uses LDAP directory services to add,
delete, modify, and search IBM Security Identity Manager data.
Each data item in an LDAP directory server must have a unique OID. Each
attribute and class that is defined in the schema.dsml file in IBM Security Identity
Manager has an OID.
OIDs have the following syntax:
enterprise ID.product ID.adapter ID.object ID.instance ID
102
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Attribute definition
Before you define unique attributes for the adapter, ensure that the attribute does
not exist in the common schema.dsml file.
The following example defines an attribute:
<!-- *********************************************** -->
<!-- erSampleHome
-->
<!-- *********************************************** -->
<attribute-type single-value = "true" >
<name>erSampleHome</name>
<description>User home directory</description>
<object-identifier>1.3.6.1.4.1.6054.3.125.2.100</object-identifier>
<syntax>1.3.6.1.4.1.1466.115.121.1.15</syntax>
</attribute-type>
Value
Bit string
1.3.6.1.4.1.1466.115.121.1.6
Boolean
1.3.6.1.4.1.1466.115.121.1.7
Directory String
1.3.6.1.4.1.1466.115.121.1.15
1.3.6.1.4.1.1466.115.121.1.24
Integer
1.3.6.1.4.1.1466.115.121.1.27
Appendix A. Files
103
Classes
At least one account class and one service class must be defined in the schema.dsml
file.
Each class requires at least one attribute to identify the class: a name attribute.
Additional attributes might be required depending on the class defined.
The following syntax defines a class:
<class superior="top">
<name> ... </name>
<description> ... </description>
<object-identifier> ... </object-identifier>
<attribute ref = "..." required = "true" />
<attribute ref = "..." required = "true" />
</class>
In this example, the class name is erSampleAccount and the only required attribute
is eruid. However, note that erAccountStatus is a required attribute to suspend or
restore accounts.
CustomLabels.properties file
The CustomLabels.properties file is a text file that defines the labels on the form
for the adapter.
The syntax for the information in the file is:
attribute=text
where attribute is the same attribute defined in the schema.dsml file and text is the
label that appears on the form in the IBM Security Identity Manager user interface
for the account.
The attribute must be in lowercase. This requirement comes from the IBM Security
Identity Manager server.
104
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Attribute descriptions
The IBM Security Identity Manager server communicates with the adapter by
using attributes in transmission packets that are sent over a network.
The combination of attributes depends on the type of action that the IBM Security
Identity Manager server requests from the adapter.
The next table lists the account form attributes that the adapter uses.
Table 20. Attributes, descriptions, and corresponding data types
Directory server attribute
Description
Data type
cn
String
erADFullName
String
description
String
erADAllowEncryptedPassword
Boolean
erADBadLoginCount
Long
erADBasePoint
String
erADCallbackNumber
String
erADCannotBeDelegated
erADContainer
Integer
String
105
Description
Data type
erADContainerDN
String
erADContainerRDN
String
erADCountyCode
Integer
erADDialinCallback
Integer
1 - No Callback
2 - Fixed callback using erADCallbackNumber
3 - This option is not used
4 - User supplied callback
erADDisplayName
String
erADDistinguishedName
String
erADDomainPassword
String
erADDomainUser
String
erADEActiveSyncEnabled
Boolean
erADEAlias
String
erADEAllowAddressList
Specifies a list of email IDs that the user accepts mail from.
String
erADEAssociatedExtAcc
Integer
erADEAutoGenEmailAddrs
Boolean
erADEChgPermissions
Integer
erADEDaysBeforeGarbage
Integer
erADEDelegates
String
erADEDelMailboxStorage
Integer
erADEEnableRetentionHold
Boolean
106
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
Data type
erADEEnableStoreDeflts
Boolean
erADEEndRetentionHold
Date
erADEExtension1
String
erADEExtension2
String
erADEExtension3
String
erADEExtension4
String
erADEExtension5
String
erADEExtension6
String
erADEExtension7
String
erADEExtension8
String
erADEExtension9
String
erADEExtension10
String
erADEExtension11
String
erADEExtension12
String
erADEExtension13
String
erADEExtension14
String
erADEExtension15
String
erADEForwardingStyle
String
erADEForwardTo
String
erADEFullMailboxAccess
Integer
erADEGarbageAfterBckp
Boolean
erADEHardLimit
Integer
107
Description
Data type
erADEHideFromAddrsBk
Boolean
erADEHomeMDB
String
erADEIncomingLimit
Integer
erADELanguages
String
erADEMailboxStore
Specifies the name of the mail store that holds the user
Mailbox.
Binary
erADEMailStoreCN
String
erADEMailStoreDN
Binary
erADEMailStoreGN
String
erADEMailStoreRDN
Binary
erADEMAPIEnabled
Boolean
erADEmployeeID
String
erADEOutgoingLimit
Integer
erADEOutlookWebAccessEnabled
Boolean
erADEOverQuotaLimit
Integer
erADEOverrideGarbage
Boolean
erADEProxyAddresses
String
erADEReadPermissions
Integer
erADERecipientLimit
Integer
erADERstrctAdrsLs
String
erADEServerName
String
erADEShowInAddrBook
Specifies the list of address books that the user is a member String
of.
108
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
Data type
erADESMTPEmail
String
erADEStartRetentionHold
Date
erADEStoreQuota
Integer
erADETakeOwnership
Integer
erADETargetAddress
String
erADEX400Email
String
erADExpirationDate
Specifies the date and time after which the user cannot log
in.
Date
erADfax
String
erADGroupCN
String
erADGroupDN
String
erADHomeDir
String
String
erADHomeDirDrive
String
erADHomeDirNtfsAccess
String
erADHomeDirShare
Specifies the name of the share to create for home directory. String
Append a dollar sign ($) to create a hidden share.
erADHomePage
String
erADInitial
String
erADIsAccountLocked
Boolean
109
Description
Data type
erADLastFailedLogin
Specifies the date and time of the last failed network login.
Date
erADLastLogoff
Date
erADLastLogon
Date
erADLoginScript
String
erADLoginWorkstations
String
erADManager
String
erADNamePrefix
String
erADNameSuffix
Specifies the name suffix of the user, for example Jr., or III.
String
erADNoChangePassword
Boolean
erADOfficeLocations
String
erADOtherName
String
erADPasswordForceChange
erADPasswordLastChange
Date
erADPasswordMinimumLength
Long
erADPasswordNeverExpires
Boolean
erADPasswordRequired
Boolean
erADPrimaryGroup
String
erADPrimaryGrpTkn
String
erADRequireUniquePassword
Boolean
erADSmartCardRequired
Boolean
erADTrustedForDelegation
erADUPN
110
String
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
Data type
erADWTSAllowLogon
erADWTSBrokenTimeout
Boolean
erADWTSCallbackNumber
String
erADWTSCallbackSettings
Long
Integer
RDP 5.0 clients and Citrix ICA clients must specify whether
the client printer is the default printer.
Boolean
erADWTSClientDrives
Boolean
erADWTSClientPrinters
RDP 5.0 clients and Citrix ICA clients must specify whether
the terminal server automatically establishes client printer
mappings at login.
Boolean
erADWTSHomeDir
String
erADWTSHomeDirAccessShare
Integer
erADWTSHomeDirDrive
String
erADWTSHomeDirNtfsAccess
String
erADWTSHomeDirShare
111
Description
Data type
erADWTSInheritInitialProg
Specifies whether the client can specify the initial program. Boolean
If not set, WtsInitialProgram is the only program the user
can run. The terminal server logs off the user when the user
exits that program.
erADWTSInitialProgram
String
erADWTSProfilePath
String
erADWTSReconnectSettings
Integer
erADWTSShadowSettings
RDP 5.0 clients and Citrix ICA clients must specify a value
Integer
that indicates whether the user session can be shadowed.
Shadowing allows a user to remotely monitor the on-screen
operations of another user.
erADWTSTimeoutConnections
erADWTSTimeoutDisconnections
112
String
Integer
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
Data type
erADWTSTimeoutIdle
erADWTSWorkingDir
String
erCompany
Specifies the name of the company that the user works for.
String
erDepartment
String
erDivision
String
erGroup
String
erLogonTimes
Specifies the time periods for each day of the week during
which logins are permitted for the user. Represented as a
table of Boolean values for the week, each indicating
whether that time slot is a valid login time.
Byte array
erMaxStorage
Long
erPassword
String
erProfile
String
eruid
String
givenName
String
homePhone
String
String
String
mobile
String
pager
String
postalCode
String
postOfficeBox
String
sn
String
113
Description
Data type
st
String
street
String
telephoneNumber
String
title
String
erADExDialin
String
erADLastLogonTimeStamp
Date
erADRadiusFramedIPv4Addr
String
erADGroupBasePoint
String
erADGrpContainerCN
erADGrpContainerDN
erADGrpContainerRDN
erADGrpContainerDescription
String
String
String
String
erADGroupSamAccountName
erADGroupGUID
erADGroupDlEmail
erADGroupDescription
erADGroupType
Integer
erADGroupScope
Integer
erADGroupIsMemberOf
String
String
String
String
String
Description
Data type
erADLyncSipAdr
String
erADLyncenable
Boolean
114
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Description
Data type
erADLyncRegpool
String
erADLyncTelephony
Integer
1. PC to PC only
2. Audio/video disabled
3. Enterprise voice
4. Remote call control
5. Remote call control only
erADLyncLineUri
String
erADLyncLineSerUri
String
erADLyncConfPolicy
String
erADLyncCvPolicy
String
erADLyncPnPolicy
String
Using this policy, the administrator can control PIN
(Personal Identification Number) which can be used instead
of user name and password when PIN authentication is
enabled.
erADLyncExacPolicy
erADLyncArchpolicy
erADLyncLocPolicy
String
erADLyncClntPolicy
String
erADLyncDialpPolicy
String
erADLyncVoicePolicy
String
String
Optional attribute
erUid
115
Optional attribute
erUid
Optional attribute
erUid
erEntProfileType
erEntUserState
erEntUserDN
Optional attribute
erUid
None
erEntProfileType
Optional attribute
erUid
None
erEntProfileType
116
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Reconciliation
The Reconciliation function synchronizes user account information between IBM
Security Identity Manager and the adapter.
Table 27. Reconciliation attributes
Attributes returned during reconciliation
All supported attributes
117
118
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Procedure
To search knowledge bases for information that you need, use one or more of the
following approaches:
1. Search for content by using the IBM Support Assistant (ISA).
ISA is a no-charge software serviceability workbench that helps you answer
questions and resolve problems with IBM software products. You can find
instructions for downloading and installing ISA on the ISA website.
2. Find the content that you need by using the IBM Support Portal.
The IBM Support Portal is a unified, centralized view of all technical support
tools and information for all IBM systems, software, and services. The IBM
Support Portal lets you access the IBM electronic support portfolio from one
place. You can tailor the pages to focus on the information and resources that
you need for problem prevention and faster problem resolution. Familiarize
yourself with the IBM Support Portal by viewing the demo videos
(https://www.ibm.com/blogs/SPNA/entry/the_ibm_support_portal_videos)
about this tool. These videos introduce you to the IBM Support Portal, explore
troubleshooting and other resources, and demonstrate how you can tailor the
page by moving, adding, and deleting portlets.
3. Search for content about IBM Security Identity Manager by using one of the
following additional technical resources:
v IBM Security Identity Manager version 6.0 technotes and APARs (problem
reports).
v IBM Security Identity Manager Support website.
v IBM Redbooks.
v IBM support communities (forums and newsgroups).
4. Search for content by using the IBM masthead search. You can use the IBM
masthead search by typing your search string into the Search field at the top of
any ibm.com page.
5. Search for content by using any external search engine, such as Google, Yahoo,
or Bing. If you use an external search engine, your results are more likely to
Copyright IBM Corp. 2012, 2013
119
Procedure
1. Obtain the tools that are required to get the fix. You can obtain product fixes
from the Fix Central Site. See http://www.ibm.com/support/fixcentral/.
2. Determine which fix you need.
3. Download the fix. Open the download document and follow the link in the
Download package section.
4. Apply the fix. Follow the instructions in the Installation Instructions section
of the download document.
Procedure
To contact IBM Support about a problem:
1. Define the problem, gather background information, and determine the severity
of the problem. For more information, see the Getting IBM support topic in the
Software Support Handbook.
2. Gather diagnostic information.
3. Submit the problem to IBM Support in one of the following ways:
v Using IBM Support Assistant (ISA):
Any data that has been collected can be attached to the service request.
Using ISA in this way can expedite the analysis and reduce the time to
resolution.
a. Download and install the ISA tool from the ISA website. See
http://www.ibm.com/software/support/isa/.
b. Open ISA.
120
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Results
If the problem that you submit is for a software defect or for missing or inaccurate
documentation, IBM Support creates an Authorized Program Analysis Report
(APAR). The APAR describes the problem in detail. Whenever possible, IBM
Support provides a workaround that you can implement until the APAR is
resolved and a fix is delivered. IBM publishes resolved APARs on the IBM Support
website daily, so that other users who experience the same problem can benefit
from the same resolution.
121
122
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Accessibility features
The following list includes the major accessibility features in IBM Security Identity
Manager.
v Support for the Freedom Scientific JAWS screen reader application
v Keyboard-only operation
v Interfaces that are commonly used by screen readers
v Keys that are discernible by touch but do not activate just by touching them
v Industry-standard devices for ports and connectors
v The attachment of alternative input and output devices
The IBM Security Identity Manager library, and its related publications, are
accessible.
Keyboard navigation
This product uses standard Microsoft Windows navigation keys.
123
124
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
19-21, Nihonbashi-Hakozakicho, Chuo-ku
Tokyo 103-8510, Japan
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law :
INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THIS
PUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER
EXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS
FOR A PARTICULAR PURPOSE.
Some states do not allow disclaimer of express or implied warranties in certain
transactions, therefore, this statement might not apply to you.
This information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Copyright IBM Corp. 2012, 2013
125
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
Such information may be available, subject to appropriate terms and conditions,
including in some cases payment of a fee.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments may
vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurement may have been
estimated through extrapolation. Actual results may vary. Users of this document
should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers of
those products, their published announcements or other publicly available sources.
IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
This information contains sample application programs in source language, which
illustrate programming techniques on various operating platforms. You may copy,
modify, and distribute these sample programs in any form without payment to
IBM, for the purposes of developing, using, marketing or distributing application
programs conforming to the application programming interface for the operating
platform for which the sample programs are written. These examples have not
been thoroughly tested under all conditions. IBM, therefore, cannot guarantee or
imply reliability, serviceability, or function of these programs. You may copy,
modify, and distribute these sample programs in any form without payment to
126
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at http://www.ibm.com/legal/copytrade.shtml.
Adobe, Acrobat, PostScript and all Adobe-based trademarks are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
other countries, or both.
IT Infrastructure Library is a registered trademark of the Central Computer and
Telecommunications Agency which is now part of the Office of Government
Commerce.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,
Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
Linux is a trademark of Linus Torvalds in the United States, other countries, or
both.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
ITIL is a registered trademark, and a registered community trademark of the Office
of Government Commerce, and is registered in the U.S. Patent and Trademark
Office.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Cell Broadband Engine and Cell/B.E. are trademarks of Sony Computer
Entertainment, Inc., in the United States, other countries, or both and is used under
license therefrom.
Notices
127
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
128
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Index
A
accessibility x, 123
account form
attributes 105
Lync 114
erADGroupIsMemberOf,
configuring 68
erGroup, configuring 68
accounts
password requirements, when
restoring 65
user account, creating 13
action, adapter attributes 115
adapter ix
ADK upgrade 96
automating administration tasks 1
base point configuration 66
common attributes in schema.dsml
file 101
communication
adapter to server 5
with Security Identity Manager
Server 5
configurable files 101
configuration
tool 19
configuration, required conditions 19
customization
ADprofile.jar file 62
CustomLabels.properties file 64
file import 64
schema extension 62
schema.dsml file 63
steps 61
domain boundaries 2
extend attributes 61
features 1
form, updating 65
help 45
installation 11, 13
preinstallation roadmap 9
prerequisites 10
roadmap 9
silent mode 17
interface, managed resource and
server 1
limitations 2
Lync 3
overview 1
parameters
accessing 54
certTool 54
options 54
PowerShell session with Exchange
server 2
profile
objects referencing 99
removal 99
verifying installation 14
registry settings, modifying 36
removal 99
Copyright IBM Corp. 2012, 2013
adapter (continued)
running in SSL mode 47
silent uninstallation 18
thread count 42
uninstalling 99
updating 93
upgrading 93, 96
user account
creation 13
end user administration
privileges 13
remote connection 13
Adapter Development Kit
adapter base component 93
upgrading 93
add request attributes 115
administrator authority prerequisites 10
ADprofile.jar file, customizing
environment 62
attributes
account form 105
Lync 114
adapter 105
adapter action, by
adding 115
changing 116
deleting 116
modifying 116
restoring 116
suspending 116
cn, configuring 74
custom 62
data types 105
definition in schema.dsml file 103
description 105
erADEProxyAddresses,
configuring 73
erADGroupIsMemberOf,
configuring 68
erGroup, configuring 68, 73
exschema.txt file 63
extension 62
installing 11
Lync 114
reconciliation 117
authentication
one-way SSL configuration 50
two-way SSL configuration 52
B
behaviors, troubleshooting adapter
C
CA, see certificate authority 54
certificate
certTool 59
exporting to PKCS12 file 60
81
certificate (continued)
installation on workstation with
adapter 7
registration 59
viewing 58
certificate authority
adapter directories 59
available functions 54
definition 47
deleting 59
installing 58
from file 58
sample 58
viewing 58
viewing installed 58
certificate signing request
definition 56
examples 57
file, generating 56
certificates
definition 47
examples of signing request (CSR) 57
installing 57
key formats 49
management tools 50
overview 48
private keys and digital
certificates 48
protocol configuration tool, see
certTool 48, 54
registering 55, 59
removing 60
self-signed 49
unregistering 60
viewing 58
viewing registered 59
certTool
registered certificates, viewing 59
starting 54
change request attributes 116
changing
adapter parameters 36
configuration key 33
registry settings 36
classes
account 104
definition 104
schema.dsml file
classes 104
service 104
client authentication 52
cn attribute 74
code page
listing information 44
modifying settings 44
viewing information 44
communication
SSL
between adapter and Active
Directory 5, 6
server-to-adapter 5
129
communication (continued)
with IBM Security Identity Manager
Server 5
configuration
base point 66
cn attribute 74
erADEProxyAddresses attribute 73
erADGroupIsMemberOf attribute 68
erGroup attribute 68, 73
key, changing 33
one-way SSL authentication 50
required conditions for adapter 19
settings, viewing 21
configuring
domain controllers 29
connectivity between server, resource ix
context
baseline database 33
definition 25
modifying 30
reconciliation data 25
target DN 32
CSR 56
customization
ADprofile.jar file 62
schema extension 62
CustomLabels.properties file 104
updating 64
D
DAML protocol
properties, changing with
agentCfg 21
username 21
debug log
enable/disable with 34
purpose 34
delayed replication errors 82
delete request attributes 116
detail log
enable/disable with 34
purpose 34
Directory Access Markup Language
(DAML) protocol 5
directory NTFS, known behaviors 81
disk space prerequisites 10
domain
controllers, configuring 29
event notification 29
managed 29
domain boundaries, adapter 2
domain controller, installing Enterprise
CA 6
download
adapter software 10
E
education x
encryption
SSL 48
erADEProxyAddresses attribute 73
erADGroupIsMemberOf attribute 68
erGroup attribute 68, 73
error messages 83
130
10
F
files
adapter-specific 101
CustomLabels.properties file
updating 64
examples
schema.dsml file 101
exschema.txt file 63
schema.dsml file 101
classes 104
object identifier 102
updating 63
first steps after installation 77
importing
adapter profile 13
installation
adapter 11, 13
adapter registry 57
certificate, on workstation with
adapter 7
certificates 57
Enterprise CA on domain
controller 6
first steps after 77
language pack 91
planning 9
prerequisites 10
profile 13
roadmap 9
sequence 9
silent mode 17
troubleshooting 79
uninstall 99
verify 12
installation prerequisites
administrator authority 10
network connectivity 10
operating system 10
Security Identity Manager server
ISA 120
K
104
G
graphical user interface, updating the
adapter 94
H
help
accessing 45
agentCfg menu 45
for adapter 45
I
IBM
Software Support x
Support Assistant x
IBM Security Identity Manager server,
importing adapter profile 13
IBM Support Assistant 120
import
adapter profile 64
key
encrypted information 48
exporting to PKCS12 file 60
private 48
public 48
knowledge bases 119
known behaviors
directory NTFS 81
error more data message 81
expiration date 81
language preferences 81
password properties 81
share access 81
L
language pack
installation 91
same for adapters and server 91
language preference, known
behaviors 81
logs
debug 34
detail 34
directory, changing with 34, 35
enable/disable, changing with 35
settings, changing with
adapterCfg 34
log file name 34
max file size 34
settings, default values 34
trace.log file 13
viewing statistics 43
Lync
account limitations 3
attributes, account form 114
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
10
N
network connectivity prerequisites 10
non-encrypted registry settings 36
notices 125
O
object identifier, definition in
schema.dsml file 102
one-way SSL authentication
certificate validation 50
configuration 50
online
publications ix
terminology ix
operating system prerequisites
overview ix
10
P
password
account restoration requirements 65
properties, known behaviors 81
passwords
protected file, see PKCS12 file 57
PKCS12 file
certificate and key installation 57
certificate and key, exporting 60
exporting certificate and key 60
importing 50
planning
installation 9
roadmaps 9
preinstallation roadmap 9
private key
definition 47
generating 56
viewing 58
problem-determination x
profile
installation verification 14
removal 99
protocol
DAML
nonsecure environment 21
username, changing with
agentCfg 21
Directory Access Markup Language
(DAML) 5
SSL
overview 47
two-way configuration 52, 53
provisioning provider error 82
public key 48
publications
accessing online ix
list of ix
software
downloading 10
from IBM Passport Advantage
Online 10
SSL 47
certificate
installation 47
self-signed 49
signing request 56
communication
between adapter and Active
Directory 5, 6
server-to-adapter 5
encryption 48
key formats 49
overview 47, 48
private keys and digital
certificates 48
two-way configuration 52, 53
SSL authentication
certificates configuration 50
implementations 50
statistics, viewing 43
steps, first after installation 77
support contact information 120
suspend request attributes 116
System Login Add 115
System Login Change 116
System Login Delete 116
System Login Restore 116
System Login Suspend 116
system prerequisites 10
65
S
schema.dsml file
attribute definition 103
common adapter attributes 101
updating 63
Security Identity Manager server
communication with adapter 5
Security Identity Manager server
prerequisites 10
self-signed certificates 49
server
adapter
communication with the
server 52
SSL communication 52
service
communication with adapter 15
creating 15
SetMailboxPermissionDelay 82
settings
adapter thread count 42
advanced 42
configuration 21
modifying non-encrypted registry
share access, known behaviors 81
silent mode
installation 17
uninstallation 18
updating with command
parameters 94
updating with response files 95
silent mode installation 17
T
terminology ix
trace.log file 13
training x
troubleshooting
contacting support 120
error messages 83
getting fixes 120
identifying problems 79
installation 79
known behaviors 81
provisioning provider errors 82
searching knowledge bases 119
support website x
techniques 79
techniques for 79
warning messages 83
two-way configuration
certificate and private key 52
SSL
client 52
client and server 53
36
U
uninstallation
adapter 99
target server 99
verifying 99
unregistering certificates
updating
adapter 93
60
Index
131
updating (continued)
adapter form 65
adapter profile 13, 61
authority required 13
service creation 13
upgrade
ADK 96
graphical user interface 94
upgradeGroups
tool 97
upgradeGroups tool 97
upgrading
adapter 93, 96
Adapter Development Kit 93
upgradeGroups tool 97
upgrading the adapter
silent mode 94, 95
user account
adapter 13
creation 13
username, changing with agentCfg
21
V
verifiying
adapter profile installation
verifying
installation 12
14
W
warning messages 83
Windows Local Account Adapter
132
IBM Security Identity Manager: Active Directory Adapter with 64-bit Support Installation and Configuration Guide
Printed in USA
SC27-4384-02