IBM Security Verify Governance Adapter 10.0.2 for PeopleTools - Release notes

IBM Security Verify Governance Adapter 10.0.2 for PeopleTools Adapter is available. Compatibility, installation, and other getting-started issues are addressed.

 

Copyright International Business Machines Corporation 2003, 2023. All rights reserved.
US Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

 

 

Contents

 

Preface

These Release Notes contain information for the following products that was not available when the IBM Security Verify Governance Server manuals were printed:

 

Adapter Features and Purpose

 

The PeopleTools Adapter is designed to create and manage User Accounts on the PeopleSoft application. The adapter runs in "agentless" mode and communicates using JDBC and the PeopleTools Java API to the systems being managed.

 

IBM recommends the installation of this Adapter (and the prerequisite IBM Security Directory Integrator) on each node of an IBM Security Verify Governance Server WAS cluster. A single copy of the adapter can handle multiple IBM Security Verify Governance Server services. The deployment configuration is based, in part, on the topology of your network domain, but the primary factor is the planned structure of your IBM Security Verify Governance Server Provisioning Policies and Approval Workflow process. Please refer to the IBM Knowledge Centre for a discussion of these topics.

 

IBM Security Verify Governance Server Adapters are powerful tools that require Administrator Level authority. Adapters operate much like a human system administrator, creating accounts, permissions and home directories. Operations requested from IBM Security Verify Governance Server will fail if the Adapter is not given sufficient authority to perform the requested task. IBM recommends that this Adapter run with administrative (root) permissions.

 

 

License Agreement

 

Review and agree to the terms of the IBM Security Verify Governance Server Adapter License prior to using this product. The license can be viewed from the "license" folder included in the product package.

 

 

 

Contents of this Release

Adapter Version

Component

Version

Release Date

2023 June 13 01.54.44

Adapter Version

10.0.2

Component Versions

Adapter build: 10.0.2.2

Profile:  10.0.2.2

Connector:  10.0.2.2

Dispatcher 7.1.39 and above (packaged separately)

Documentation

The following guides are available in the IBM Knowledge Centre

·  Installation and Configuration Guide for IBM Security Verify Governance Adapter for PeopleTools

·  User Guide for IBM Security Verify Governance Adapter for PeopleTools

 

New Features

  Internal#

Enhancement # (RFE)

Description              

 

 

Items included in current 10.0.2 release 

  SVGAD-222

ADAPT-105

Recertify PeopleSoft adapter with 8.60 version

 

 

Items included in 10.0.1 release 

 

  186988

 

 

Recertify PeopleSoft adapter with 8.58 version

 

 

 

Items included in 7.1.10 release 

 

 

 

None

 

 

 

 

Items included in 7.1.9 release

 

 

 

None

 

 

 

 

Items included in 7.1.8 release

 

 

None

 

 

 

Items included in 7.1.7 release

 

 

 

 

 151782

 

Add Support for Identity Governance and Intelligence (IGI) v5.2.2

 

This adapter is now designed for use with IBM Security Identity Manager, Privileged Identity Manager, and Identity Governance and Intelligence 

 

Note – PeopleTools adapter does not support adapter inside VA functionality. It can’t be installed inside VA.

 

 

 

 

Items included in 7.0.6 release

 

 

41825 (84139)

 

People Tools 7.0.2 for PeopleSoft 8.55 adapter

 

 

 

 

Items included in 7.0.5 release

 

 

 Bug 1934 (RTC 138246)

 

Not able to reconcile role ‘PeopleSoft Administrator’.

The adapter now reconciles ‘PeopleSoft Administrator’ role in support data recon.

 

 

 

 

Items included in 7.0.4 release

 

 

  30315

 

PeopleTools 8.53 ISIM Adapter Support Domain Password

 

Note: Refer to Installation and Configuration Notes section.

 

 

 

 

Items included in 7.0.3 release

 

 

 

Initial release. 


Closed Issues

Internal#

APAR#

Case# / Description

 

 

Items closed in current 10.0.2 release

SVGAD-158

Bug 3671

TS007612140

APAR IJ36435

People Tools Error when trying to modify PeopleToolsAdapterALs.xml using SDI config editor

 

 

Items closed in 10.0.1 release

 

 

 

None

 

 

Items closed in 7.1.10 release

 

RTC 182520

 

 

As a PS adapter developer, I must ensure that the mapping for dn is correct in attributemapping.def file

 

 

 

Items closed in 7.1.9 version

Bug 2363

PMR

40717,122,000

 

ConGetUsers fails during recon if "Database Table Owner Name" is specified

 

Bug 2466

PMR

50562,300,838

 

Recon fails when attempting to use 'database table owner' 

 

 

 

 

Items closed in 7.1.8 version

Bug 2231

(RTC 154718)

PMR

40717,122,000

PeopleSoft password change fail with PSTools 8.55 

Bug 2190/2252

(RTC 152471)

PMR

50562,300,838

PeopleSoft adapter always performs a full reconciliation.

 

 

 

Items closed in 7.1.7 version

 

 

 

None

 

 

 

 

Items closed in 7.0.6 version

 

 

 

None

 

 

 

 

Items closed in 7.0.5 version

 

 

 

None

 

 

 

 

Items closed in 7.0.4 version

 

 

 

None

 

 

 

 

Items closed in 7.0.3 version 

 

 

 

Initial release

 

 

Known Limitations

Internal#

APAR#

Case# / Description

 

N/A

 

N/A

 

Uninstalling the Adapter

Do not use the "-awt" option with the adapter uninstaller in console mode. Uninstaller can be run with "-console" and "-silent" options.

 

 

N/A

 

N/A

 

Setting Custom ID Type

If a custom ID Type defined as "Custom" with 2 attribute say MyCustAttr1 and MyCustAttr2 with MyCustAttr1 as a required attribute and MyCustAttr2 as an optional attribute then two cases arises:

 

a)             When an invalid value is provided for the optional attribute, the user is added on the resource. The value format which goes to the adapter is:

Custom#MyCustAttr1$Myvalue1|MyCustAttr2$Myvalue2

Where Myvalue1 and Myvalue2 are values you want to set and Myvalue2 is an invalid value.

            The resource sets this ID Type with the following structure.

                        PSOPRALIAS

            - OPRALIASTYPE                                   Custom

                  - PSOPRALIASFIELD [1]

                                    -PSOPRALIASNAME     MyCustAttr1

                                    -PSOPRALIASVALUE    Myvalue1

                              -PSOPRALIASDESCR

             - PSOPRALIASFIELD [2]

                         -PSOPRALIASNAME      MyCustAttr2

                         -PSOPRALIASVALUE

                         -PSOPRALIASDESCR

 

b)            When an invalid attribute name is provided in place of the optional attribute, the user is added on the resource. The format which goes to the adapter is:

Custom#MyCustAttr1$Myvalue1|MyCust$Myvalue2

Where instead of providing MyCustAttr2 an invalid attribute name is sent

The resource sets this ID Type with the following structure.

                        PSOPRALIAS

                        - OPRALIASTYPE                                   Custom

                        - PSOPRALIASFIELD [1]

                                    -PSOPRALIASNAME     MyCustAttr1

                                    -PSOPRALIASVALUE    Myvalue1

                                    -PSOPRALIASDESCR

 

Note: This issue is applicable to all the PeopleTools versions. This is working as designed. The value sent to adapter is constructed value and there is no provision to inform IBM Security Identity Manager that part of value is failed. After reconciliation or lookup the invalid attribute for an ID type will get cleared.

 

In case ‘a’:  after reconciliation the IBM Security Identity Manager will show the following in the values field of the ID Type subform.

MyCustAttr1$Myvalue1|MyCustAttr2$

Instead of

MyCustAttr1$Myvalue1|MyCustAttr2$Myvalue2

 

In case ‘b’: after reconciliation the IBM Security Identity Manager will show the following in the values field of the ID Type subform

MyCustAttr1$Myvalue1|MyCustAttr2$

Instead of

MyCustAttr1$Myvalue1|MyCust2$Myvalue2

 

Possible workaround: No workaround is available. This is a PeopleTools resource API behavior.

 

 

N/A

 

N/A

 

Reconciliation of Disabled ID Type

If a user with a set ID Type is reconciled and that ID Type is disabled on the resource then the subform displays the ID Type instead of the ID Type Description.

 

For example : If the ID Type Emp which has the description as Employee is disabled on the resource then the subform will show Emp instead of Employee in the ID Type column of the sub form.

 

Possible workaround: this is expected behavior.

 

 

 

Installation and Configuration Notes

  

See the Installation and Configuration guide for IBM Security Verify Governance Adapter for PeopleTools for detailed instructions.

The PeopleSoft Adapter Installation and Configuration Guide can be obtained from the IBM Knowledge Center.

Corrections to Installation Guide:

Chapter 1: Overview
              No updates for the current release

Chapter 2: Planning
              Roadmap:
                           
Remove all Roadmap sub-chapters except for "Roadmap for IBM Security Directory Integrator based adapters, for IBM Security Verify Governance Identity Manager 10.x"

              Prerequisites:
                            Directory Integrator IBM Security Directory Integrator

                            Remove IBM Security Directory Integrator Version 7.1.1 + 7.1.1-TIV-TDI-FP0004 + 7.2.0-ISS-SDI-LA0008 from the description
                            Replace "IBM® Security Directory Integrator Version 7.2" in the description with "Please consult the release notes for the currently supported versions of the below products".
                           

                            IBM Security Verify server IBM Security Verify Governance Server
                            Remove existing description and update description as below:
                                          The following servers are supported:
                                          - IBM Security Verify Governance Identity Manager
                                          - IBM Security Verify Governance

                            PeopleSoft Enterprise
                            Remove existing description and update description as below:
                                          Please consult the release notes for the currently supported versions of the below products

                            PeopleTools Software
                            Remove existing description and update description as below:
                                          Please consult the release notes for the currently supported versions of the below products

Chapter 3: Installing in the Verify Governance virtual appliance
              Remove this chapter

Chapter 3: Installing
              Installing ILMT-Tags File
                            Before you begin:
                            The dispatcher must be installed

                            Procedure:
                            Copy the files from ILMT-Tags folder to the specified location:
                            1. Windows: <SDI-HOME>\swidtag
                            2. Unix/Linux: <SDI-HOME>/swidtag

              Installing 3rd party client libraries
                            About this task

                            Refer "JDBC type 4 driver JAR file" sub-chapter for details

Procedure
              Remove procedure section

              Setting up the adapter environment
                           
Remove this sub-chapter

              Loading the PeopleTools Project
                            About this task
                            Update below lines in description
                            From:
                                          The PeopleTools Adapter software contains component interfaces in the ENROLE_AGENT subdirectory of these project files:
                                          - PT854_COMPONENT.zip for PeopleTools 8.54
                                          - PT850_COMPONENT.zip for PeopleTools 8.50, PeopleTools 8.51, and PeopleTools 8.52, PeopleTools 8.53
                            To:
                                          The PeopleTools Adapter software contains component interfaces zip file (PTxxx_COMPONENT.zip) which contains ENROLE_AGENT subdirectory with PeopleSoft project files.
                                          Please refer release notes for details.

                            Loading the component interfaces
                                          Procedure
                                          Update step 1 as below:
                                                        1. From the PT850_COMPONENT.zip PTxxx_COMPONENT.zip file, extract ENROLE_AGENT and its contents into a temporary directory on your file system.

                            Setting the component interface security
                                          Procedure
                                          Remove existing procedure and add new procedure as below:
                                                        1. Log in to the PeopleSoft web interface using PeopleSoft Administrator Account
                                                        2. Create new Permission List
                                                                      2.a. From the PeopleSoft menu, go to PeopleTools > Security > Permissions & Roles > Permission Lists
                                                                      2.b. Click on "Add a New Value"
                                                                      2.c. Provide any Permission List name. For instance, "ENROLE_AGENT_PL"
                                                                      2.d. Click on Add
                                                                      2.e. Provide any Description. For instance as "ENROLE_AGENT Permission List"
                                                                      2.f. Click on "Component Interfaces" tab
                                                                      2.g. Add following Component Interfaces to the list:
                                                                                    ENROLE_CCODE
                                                                                    ENROLE_DELETE
                                                                                    ENROLE_LANGS
                                                                                    ENROLE_PERM
                                                                                    ENROLE_ROLES
                                                                                    ENROLE_USERS
                                                                                    ENROLE_OPRALIAS
                                                                      2.h. Click on Edit hyperlink against ENROLE_CCODE component interface and click on "Full Access (All)" on the next screen and click on OK. (Repeat this 2.h step for all remaining 6 component interfaces listed in step 2.g)
                                                                      2.i. Click on Save

                                                        3. Create new Role
                                                                      3.a. From the PeopleSoft menu, go to PeopleTools > Security > Permissions & Roles > Roles
                                                                      3.b. Click on "Add a New Value"
                                                                      3.c. Provide any Role name. For instance, "ENROLE_AGENT_ROLE"
                                                                      3.d. Click on Add
                                                                      3.e. Provide any Description. For instance, "ENROLE_AGENT Role"
                                                                      3.f. Click the "Permission Lists" tab
                                                                      3.g. Add ENROLE_AGENT_PL permission list created in step 2
                                                                      3.h. Click on Save

                                                        4. Assign the new Role to User Profile
                                                                      4.a. From the PeopleSoft menu, go to PeopleTools > Security > User Profiles
                                                                      4.b. Search and select the user that would be configured in Adapter Service form
                                                                      4.c. Click on the Roles tab
                                                                      4.d. Add ENROLE_AGENT_ROLE role created in step 3
                                                                      4.e. Click on Save

                            PeopleSoft resource-specific JAR files
                                          psft.jar
                                          Remove everything under psft.jar section including psft.jar header

                                          psjoa.jar file
                                                        Replace "PEOPLESOFT_HOME\web\psjoa" with "PEOPLESOFT_HOME\class"

                                          JDBC type 4 driver JAR file
                                                        Add below details to the end of this sub-chapter
                                                        PeopleSoft configured with the Oracle DB:
                                                                      JDBC Drivers:
                                                                                    ojdbc*.jar
                                                                      Driver Class:
                                                                                    oracle.jdbc.driver.OracleDriver
                                                                      URL
                                                                                    jdbc:oracle:thin:@(DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=hostname)(PORT=port#))(CONNECT_DATA=(SERVICE_NAME=serviceName)))

Chapter 4: Upgrading
              No updates for the current release

Chapter 5: Configuring
              Enabling TLSv1.2 in Security Directory Integrator
                            Procedure:
                           
1. Apply recommended fix packs and limited availability (LA) versions on the Security Directory Integrator. See Recommended fixes for IBM Tivoli Directory Integrator (TDI) & IBM Security Directory Integrator (SDI).
                            2. After applying the appropriate updates, modify the /solution.properties file by appending the following text to the bottom of the file:

                            #####################
                            # # Protocols to enforce SSL protocols in a SDI Server
                            # # Optional values for com.ibm.di.SSL* property (TLSv1, TLSv1.1, TLSv1.2). # # This can be a multi-valued comma separated property
                            # # Optional values for com.ibm.jsse2.overrideDefaultProtocol property (SSL_TLSv2, TLSv1,TLSv11,TLSv12).
                            # # This is a single value property.
                            #####################
                            -
                            com.ibm.di.SSLProtocols=TLSv1,TLSv1.1,TLSv1.2
                            com.ibm.di.SSLServerProtocols=TLSv1,TLSv1.1,TLSv1.2
                            com.ibm.jsse2.overrideDefaultProtocol=TLSv1
                            com.ibm.jsse2.overrideDefaultTLS=true
                            #####################

              Customizing the adapter
                            The adapters can be customized or extended or both. The type and method of this customization varies depending on the adapter.
                            Customizing and extending adapters requires a number of skills. The developer must be familiar with the following concepts and skills:

                            - IBM Security Verify Governance Identity Manager administration
                            - IBM Security Verify Governance administration
                            - IBM Security Directory Integrator management
                            - Security Directory Integrator Assembly Line development
                            - LDAP schema management
                            - Working knowledge of Java™ scripting language
                            - Working knowledge of LDAP object classes and attributes
                            - Working knowledge of XML document structure

                            Note: If the customization requires a new Security Directory Integrator connector, the developer must also be familiar with Security Directory Integrator connector development and working knowledge of Java programming language.

                            Support for custom adapters
                                          The integration to IBM Security Verify Governance servers "the adapter framework" is supported. However, IBM does not support the customizations, scripts, or other modifications. If you experience a problem with a customized adapter, IBM Support may require the problem to be demonstrated on the GA version of the adapter before a PMR is opened.

Chapter 6: Troubleshooting
              Enabling DEBUG Logs on SDI Server
                            Procedure:
                            1. Stop the SDI Server process

Pre-7.2.0-ISS-SDI-FP0008
2. Edit the <SDI_Solution_Directory>/etc/log4j.properties
3. Modify the following line:
              log4j.rootCategory=INFO, Default
              to
              log4j.rootCategory=DEBUG, Default

Post-7.2.0-ISS-SDI-FP0008
2. Edit the <SDI_Solution_Directory>/etc/log4j2.xml
3. Modify the following line:
              <Root level="info">
              to
              <Root level="debug">

4. Start the SDI Server process
5. Re-create the problem and collect the <SDI_Solution_Dir>/logs/ibmdi.log

Chapter 7: Uninstalling
              No updates for the current release

Chapter 8: Reference
              No updates for the current release

 

Corrections to User Guide:

Index/Introduction: PeopleTools Adapter User Guide
              This guide provides information that you need to manage user accounts on the PeopleSoft server using the IBM® Security Identity Manager Verify Governance products. This book describes user account management tasks, such as reconciliation, add, modify, suspend, restore, delete, and password change.

              - Overview
              An adapter is an interface between a managed resource and the IBM Security Identity server Verify Governance products. The PeopleTools Adapter provides connectivity between IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance and the PeopleSoft server.

              - User account management
              IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance manages user accounts stored on the PeopleSoft server using the PeopleTools Adapter.

              - Troubleshooting
              No changes

              - Reference
              No changes

Chapter 1: Overview
              An adapter is an interface between a managed resource and the IBM® Security Identity server Verify Governance products. The PeopleTools Adapter provides connectivity between IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance and the PeopleSoft server.
              The adapter runs as a service, independent of whether you are logged on to IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Verify Governance Identity Manager and IBM Security Verify Governance.

              Prerequisites:
.                          Replace "Table 1. Prerequisites checklist" table with below one:

Task

For more information, see

Install the adapter

See the adapter's Installation and Configuration Guide

Import the adapter profile into the IBM® Security Verify Governance server

See the adapter's Installation and Configuration Guide

Create an adapter service

See the adapter's Installation and Configuration Guide

Note: After you create a PeopleTools Adapter service, the IBM Security Verify Governance server creates a default provisioning policy for the adapter service. You can customize a provisioning policy for the PeopleTools Adapter service according to the requirements of your organization. For more information, see the section about Customizing a provisioning policy in the IBM Security Verify Governance Identity Manager or IBM Security Verify Governance product documentation.

Configure the adapter

See the adapter's Installation and Configuration Guide

Perform a reconciliation operation to retrieve user accounts and store them in the IBM Security Verify Governance server

Managing reconciliation schedules in the IBM Security Verify Governance Identity Manager or IBM Security Verify Governance product documentation

Adopt orphan accounts on IBM Security Verify Governance Identity Manager or IBM Security Verify Governance

Assigning an orphan account to a user in the IBM Security Verify Governance Identity Manager or IBM Security Verify Governance product documentation

Start the adapter

Starting the adapter

 

Chapter 2: User Account Management
              IBM® Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance manages user accounts stored on the PeopleSoft server using the PeopleTools Adapter.

              You can perform the following operations:
              - Add, modify, or delete an account
              - Suspend or restore an account
              - Reconcile accounts

              You can manage:
              - Accounts for a specific person
              - Accounts for a service instance
              - Specific accounts by using the search function of IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance

              - Reconciling accounts
              Reconciliation synchronizes the accounts and supporting data between IBM Security Identity server Verify Governance Identity Manager or IBM Security Verify Governance and the managed server. Reconciliation is required so that data is consistent and up-to-date.

              - Adding user accounts
              You can add user accounts at any time for either an existing person or a new person in the organization.

              - Modifying user accounts
              You can modify user account attributes at any time in IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance.

              - Suspending user accounts
              When you suspend a user account, the status of the user account on IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance becomes inactive and the user account becomes unavailable for use.

              - Restoring user accounts
              The restore operation reinstates the suspended user accounts to IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance.

              - Deleting user accounts
              Use the IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance deprovision feature to delete user accounts.

              Reconciling accounts
              Reconciliation synchronizes the accounts and supporting data between IBM® Security Identity server Verify Governance Identity Manager or IBM Security Verify Governance and the managed server. Reconciliation is required so that data is consistent and up-to-date.

              The reconciliation operation retrieves the user account information from the PeopleSoft server and stores it in the directory server of IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance.

              You can schedule reconciliation to run at specific times and to return specific parameters. Running a reconciliation before its schedule time does not cancel the scheduled reconciliation. For more information about scheduling reconciliation and running a scheduled reconciliation, see the IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance product documentation.

              You can perform the following reconciliation tasks at any time from IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance:
              - Reconciling support data
              - Reconciling a single user account

              Adding user accounts
              You can add user accounts at any time for either an existing person or a new person in the organization.

              Adapter attributes define the accounts on the account form. For specific procedures, see the IBM® Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance product documentation.

              - Attributes for adding user accounts
              No change

              - Alternate user ID
              No change

              - User supervisor
              No change

              - Specification of email addresses
              No change

              - ID Type specification
              No change

              - Permission
              No change

              - Role names
              No change

                            Attributes for adding user accounts
                            No change

                            Alternate user ID
                            No change

                            User supervisor
                            No change

                            Specification of email addresses
                            No change

                            ID Type specification
                            No change

                            Permission
                            No change

                            Role names
                            No change

              Modifying user accounts
              (Update only first line in the beginning of the page and then last section Password change of user accounts on the page)
              You can modify user account attributes at any time in IBM® Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance.

                            Password change of user accounts
                            You can change the password of any of the PeopleTools accounts that exist on IBM Security Identity Manager. For information about changing passwords, see the IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance product documentation.

              Suspending user accounts
              When you suspend a user account, the status of the user account on IBM® Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance becomes inactive and the user account becomes unavailable for use.

              Suspending a user account does not remove the user account from IBM Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance. For more information about suspending user accounts, see the IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance product documentation.

              When you suspend a user account from IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance, the PeopleTools Adapter sets the value of the Account Locked Out attribute on the PeopleSoft server to TRUE.

              Restoring user accounts
              The restore operation reinstates the suspended user accounts to IBM® Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance.

              When you restore a user account from IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance, the PeopleTools Adapter sets the value of the Account Locked Out attribute on the PeopleSoft server to FALSE.

              After restoring a user account, the status of the user account on IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance becomes active. For more information about restoring user accounts, see the IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance product documentation

              Deleting user accounts
              Use the IBM® Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance deprovision feature to delete user accounts.

For more information about deleting user accounts, see the IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance product documentation.

Chapter 3: Troubleshooting
              Error logs
              When an operation fails, the corresponding error messages and warnings are logged in the ibmdi.log file. This file is in the adapters solution/logs directory. The adapters solution directory is a Security Directory Integrator work directory for IBM® Security Identity ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance adapters.

              You can display the error logs in the user interface by running the Dispatcher from the command prompt. You can also configure logging information for the adapter. For more information about displaying logs in the user interface and configuring logging information, see the adapter's Installation and Configuration Guide.

              Error messages and warnings
              No change

Chapter 4: Reference
              Reference information is organized to help you locate particular facts quickly such as adapter attributes, application programming interfaces, files and commands, where applicable.

              - Adapter attributes
              The IBM Security Identity server Verify Governance Identity Manager or IBM Security Verify Governance communicates with the adapter by using attributes, which are included in transmission packets that are sent over a network.

              - Adapter customization for collection attributes
              PeopleSoft has a constraint of setting the values of a collection attribute in a specific sequence. Security Directory Integrator does not necessarily pass the values on to the connector in the sequence they are received.

              - Customizing the PeopleTools account form
              You can add attributes of different Component Interfaces to the PeopleTools account form. These Component Interfaces can be supported or not supported by IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify Governance.

              Adapter attributes
              (Only first line needs to be updated, rest everything needs to be left as is)
              The IBM® Security Identity server Verify Governance Identity Manager or IBM Security Verify Governance communicates with the adapter by using attributes, which are included in transmission packets that are sent over a network.

              Adapter customization for collection attributes
              No Change

              Customizing the PeopleTools account form
              About this task
              The Project file PT850_Component.zip for PeopleTools 8.50, 8.51, and 8.52 PTxxx_Component.zip for PeopleTools, which contains Component Interfaces, is provided with the IBM Security Identity Manager Verify Governance PeopleTools Adapter software. These interfaces are in the ENROLE_AGENT subdirectory. This subdirectory is imported into the PeopleTools Application Designer as a PeopleTools Project.                           

Supported Configurations

Installation Platform
The IBM Security Verify Governance Adapter for PeopleTools was built and tested on the following product versions.

Adapter Installation Platform
Due to continuous Java security updates that may be applied to your IBM Security Verify Governance servers, the following SDI releases are the officially supported versions:

·       Security Directory Integrator 7.2 + FP9 

 

Earlier versions of SDI that are still supported may function properly, however to resolve any communication errors, you must upgrade your SDI releases to the officially supported versions by the adapters. Please refer to the adapters installation and configuration guides for the latest update on IBM Security Directory Integrator versions and fix packs.

 

Managed Resource

·        PeopleSoft PeopleTools v8.60

 

PTxxx_COMPONENTS.zip resource

·        PT860_COMPONENT.zip for PeopleTools 8.60

IBM Security Verify Governance and Intelligence:

·        IBM Security Verify Governance Identity Manager v10.0

·        IBM Security Verify Governance v10.0

 

 

Notices

This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not

intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:

 

IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY  10504-1785  U.S.A.

 

For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:

 

Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan

 

This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged should contact:

IBM Corporation
2ZA4/101
11400 Burnet Road
Austin, TX 78758  U.S.A.

 

Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.

The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us.

Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

Trademarks

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at
www.ibm.com/legal/copytrade.shtml.

Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates

 

 

End of Release Notes