IBM Security Verify Governance Adapter 10.0.2 for PeopleTools Adapter is available. Compatibility, installation, and other getting-started issues are addressed.
Copyright
International Business Machines Corporation 2003, 2023. All rights reserved.
US Government Users Restricted Rights -- Use, duplication or disclosure
restricted by GSA ADP Schedule Contract with IBM Corp.
These Release Notes contain information for the following products that was not available when the IBM Security Verify Governance Server manuals were printed:
The PeopleTools Adapter is designed to create and manage User Accounts on the PeopleSoft application. The adapter runs in "agentless" mode and communicates using JDBC and the PeopleTools Java API to the systems being managed.
IBM recommends the installation of this Adapter (and the prerequisite IBM Security Directory Integrator) on each node of an IBM Security Verify Governance Server WAS cluster. A single copy of the adapter can handle multiple IBM Security Verify Governance Server services. The deployment configuration is based, in part, on the topology of your network domain, but the primary factor is the planned structure of your IBM Security Verify Governance Server Provisioning Policies and Approval Workflow process. Please refer to the IBM Knowledge Centre for a discussion of these topics.
IBM Security Verify Governance Server Adapters are powerful tools that require Administrator Level authority. Adapters operate much like a human system administrator, creating accounts, permissions and home directories. Operations requested from IBM Security Verify Governance Server will fail if the Adapter is not given sufficient authority to perform the requested task. IBM recommends that this Adapter run with administrative (root) permissions.
Review and agree to the terms of the IBM Security Verify Governance Server Adapter License prior to using this product. The license can be viewed from the "license" folder included in the product package.
Adapter Version
Version |
|
Release Date |
2023 June 13 01.54.44 |
Adapter Version |
10.0.2 |
Component Versions |
Adapter build: 10.0.2.2 Profile: 10.0.2.2 Connector: 10.0.2.2 Dispatcher 7.1.39 and above (packaged separately) |
Documentation |
The following guides are available in the IBM Knowledge Centre · Installation and Configuration Guide for IBM Security Verify Governance Adapter for PeopleTools · User Guide for IBM Security Verify Governance Adapter for PeopleTools |
New Features
Internal# |
Enhancement # (RFE) |
Description |
|
|
Items included in current 10.0.2 release |
SVGAD-222 |
ADAPT-105 |
Recertify PeopleSoft adapter with 8.60 version |
|
|
Items included in 10.0.1 release |
186988 |
|
Recertify PeopleSoft adapter with 8.58 version |
|
|
Items included in 7.1.10 release |
|
|
None
|
|
|
Items included in 7.1.9 release |
|
|
None
|
|
|
Items included in 7.1.8 release |
|
|
None |
|
|
Items included in 7.1.7 release |
|
151782 |
Add Support for Identity Governance and Intelligence (IGI) v5.2.2
This adapter is now designed for use with IBM Security Identity Manager, Privileged Identity Manager, and Identity Governance and Intelligence
Note – PeopleTools adapter does not support adapter inside VA functionality. It can’t be installed inside VA.
|
|
|
Items included in 7.0.6 release |
|
41825 (84139) |
People Tools 7.0.2 for PeopleSoft 8.55 adapter
|
|
|
Items included in 7.0.5 release |
|
Bug 1934 (RTC 138246) |
Not able to reconcile role ‘PeopleSoft Administrator’. The adapter now reconciles ‘PeopleSoft Administrator’ role in support data recon.
|
|
|
Items included in 7.0.4 release |
|
30315 |
PeopleTools 8.53 ISIM Adapter Support Domain Password
Note: Refer to Installation and Configuration Notes section.
|
|
|
Items included in 7.0.3 release |
|
|
Initial release. |
Closed Issues
Internal# |
APAR# |
Case# / Description |
|
|
Items closed in current 10.0.2 release |
SVGAD-158 Bug 3671 TS007612140 |
APAR IJ36435 |
People Tools Error when trying to modify PeopleToolsAdapterALs.xml using SDI config editor |
|
|
Items closed in 10.0.1 release |
|
|
None |
|
|
Items closed in 7.1.10 release |
RTC 182520 |
|
As a PS adapter developer, I must ensure that the mapping for dn is correct in attributemapping.def file
|
|
|
Items closed in 7.1.9 version |
Bug 2363 |
PMR 40717,122,000 |
ConGetUsers fails during recon if "Database Table Owner Name" is specified
|
Bug 2466 |
PMR 50562,300,838 |
Recon fails when attempting to use 'database table owner'
|
|
|
Items closed in 7.1.8 version |
Bug 2231 (RTC 154718) |
PMR 40717,122,000 |
PeopleSoft password change fail with PSTools 8.55 |
Bug 2190/2252 (RTC 152471) |
PMR 50562,300,838 |
PeopleSoft adapter always performs a full reconciliation. |
|
|
Items closed in 7.1.7 version |
|
|
None
|
|
|
Items closed in 7.0.6 version |
|
|
None
|
|
|
Items closed in 7.0.5 version |
|
|
None
|
|
|
Items closed in 7.0.4 version |
|
|
None
|
|
|
Items closed in 7.0.3 version |
|
|
Initial release
|
Known Limitations
Internal# |
APAR# |
Case# / Description |
N/A |
N/A |
Uninstalling the Adapter Do not use the "-awt" option with the adapter uninstaller in console mode. Uninstaller can be run with "-console" and "-silent" options.
|
N/A |
N/A |
Setting Custom ID Type If a custom ID Type defined as "Custom" with 2 attribute say MyCustAttr1 and MyCustAttr2 with MyCustAttr1 as a required attribute and MyCustAttr2 as an optional attribute then two cases arises:
a) When an invalid value is provided for the optional attribute, the user is added on the resource. The value format which goes to the adapter is: Custom#MyCustAttr1$Myvalue1|MyCustAttr2$Myvalue2 Where Myvalue1 and Myvalue2 are values you want to set and Myvalue2 is an invalid value. The resource sets this ID Type with the following structure. PSOPRALIAS - OPRALIASTYPE Custom - PSOPRALIASFIELD [1] -PSOPRALIASNAME MyCustAttr1 -PSOPRALIASVALUE Myvalue1 -PSOPRALIASDESCR - PSOPRALIASFIELD [2] -PSOPRALIASNAME MyCustAttr2 -PSOPRALIASVALUE -PSOPRALIASDESCR
b) When an invalid attribute name is provided in place of the optional attribute, the user is added on the resource. The format which goes to the adapter is: Custom#MyCustAttr1$Myvalue1|MyCust$Myvalue2 Where instead of providing MyCustAttr2 an invalid attribute name is sent The resource sets this ID Type with the following structure. PSOPRALIAS - OPRALIASTYPE Custom - PSOPRALIASFIELD [1] -PSOPRALIASNAME MyCustAttr1 -PSOPRALIASVALUE Myvalue1 -PSOPRALIASDESCR
Note: This issue is applicable to all the PeopleTools versions. This is working as designed. The value sent to adapter is constructed value and there is no provision to inform IBM Security Identity Manager that part of value is failed. After reconciliation or lookup the invalid attribute for an ID type will get cleared.
In case ‘a’: after reconciliation the IBM Security Identity Manager will show the following in the values field of the ID Type subform. MyCustAttr1$Myvalue1|MyCustAttr2$ Instead of MyCustAttr1$Myvalue1|MyCustAttr2$Myvalue2
In case ‘b’: after reconciliation the IBM Security Identity Manager will show the following in the values field of the ID Type subform MyCustAttr1$Myvalue1|MyCustAttr2$ Instead of MyCustAttr1$Myvalue1|MyCust2$Myvalue2
Possible workaround: No workaround is available. This is a PeopleTools resource API behavior.
|
N/A |
N/A |
Reconciliation of Disabled ID Type If a user with a set ID Type is reconciled and that ID Type is disabled on the resource then the subform displays the ID Type instead of the ID Type Description.
For example : If the ID Type Emp which has the description as Employee is disabled on the resource then the subform will show Emp instead of Employee in the ID Type column of the sub form.
Possible workaround: this is expected behavior.
|
See the Installation and Configuration guide for IBM Security Verify Governance Adapter for PeopleTools for detailed instructions.
The PeopleSoft Adapter Installation and Configuration Guide can be obtained from the IBM Knowledge Center.
Corrections to Installation Guide:
Chapter 1: Overview
No updates for the current release
Chapter 2: Planning
Roadmap:
Remove all Roadmap sub-chapters
except for "Roadmap for IBM Security Directory Integrator based adapters,
for IBM Security Verify Governance Identity Manager 10.x"
Prerequisites:
Directory Integrator IBM Security Directory Integrator
Remove IBM Security Directory Integrator Version
7.1.1 + 7.1.1-TIV-TDI-FP0004 + 7.2.0-ISS-SDI-LA0008 from the description
Replace "IBM® Security Directory Integrator
Version 7.2" in the description with "Please consult the release
notes for the currently supported versions of the below products".
IBM Security Verify server IBM
Security Verify Governance Server
Remove existing description and update description
as below:
The following servers are supported:
- IBM Security Verify Governance
Identity Manager
- IBM Security Verify Governance
PeopleSoft Enterprise
Remove existing description and update description
as below:
Please consult the release notes for
the currently supported versions of the below products
PeopleTools Software
Remove existing description and update description
as below:
Please consult the release notes for
the currently supported versions of the below products
Chapter 3: Installing in the Verify Governance
virtual appliance
Remove this chapter
Chapter 3: Installing
Installing ILMT-Tags File
Before you begin:
The dispatcher must be installed
Procedure:
Copy the files from ILMT-Tags folder to the
specified location:
1. Windows: <SDI-HOME>\swidtag
2. Unix/Linux: <SDI-HOME>/swidtag
Installing 3rd party client libraries
About this task
Refer "JDBC type 4 driver JAR file" sub-chapter
for details
Procedure
Remove procedure section
Setting up the adapter environment
Remove this sub-chapter
Loading the PeopleTools Project
About this task
Update below lines in description
From:
The PeopleTools Adapter software
contains component interfaces in the ENROLE_AGENT subdirectory of these project
files:
- PT854_COMPONENT.zip for PeopleTools
8.54
- PT850_COMPONENT.zip for PeopleTools
8.50, PeopleTools 8.51, and PeopleTools 8.52, PeopleTools 8.53
To:
The PeopleTools Adapter software
contains component interfaces zip file (PTxxx_COMPONENT.zip) which contains
ENROLE_AGENT subdirectory with PeopleSoft project files.
Please refer release notes for details.
Loading the component interfaces
Procedure
Update step 1 as below:
1. From the PT850_COMPONENT.zip
PTxxx_COMPONENT.zip file, extract ENROLE_AGENT and its contents into a
temporary directory on your file system.
Setting the component interface
security
Procedure
Remove existing procedure and add new
procedure as below:
1. Log in to the
PeopleSoft web interface using PeopleSoft Administrator Account
2. Create new Permission
List
2.a. From
the PeopleSoft menu, go to PeopleTools > Security > Permissions &
Roles > Permission Lists
2.b. Click
on "Add a New Value"
2.c.
Provide any Permission List name. For instance, "ENROLE_AGENT_PL"
2.d. Click
on Add
2.e.
Provide any Description. For instance as "ENROLE_AGENT Permission
List"
2.f.
Click on "Component Interfaces" tab
2.g. Add
following Component Interfaces to the list:
ENROLE_CCODE
ENROLE_DELETE
ENROLE_LANGS
ENROLE_PERM
ENROLE_ROLES
ENROLE_USERS
ENROLE_OPRALIAS
2.h. Click
on Edit hyperlink against ENROLE_CCODE component interface and click on
"Full Access (All)" on the next screen and click on OK. (Repeat this 2.h
step for all remaining 6 component interfaces listed in step 2.g)
2.i. Click
on Save
3. Create
new Role
3.a. From
the PeopleSoft menu, go to PeopleTools > Security > Permissions &
Roles > Roles
3.b.
Click on "Add a New Value"
3.c.
Provide any Role name. For instance, "ENROLE_AGENT_ROLE"
3.d. Click
on Add
3.e.
Provide any Description. For instance, "ENROLE_AGENT Role"
3.f.
Click the "Permission Lists" tab
3.g. Add
ENROLE_AGENT_PL permission list created in step 2
3.h.
Click on Save
4. Assign
the new Role to User Profile
4.a. From
the PeopleSoft menu, go to PeopleTools > Security > User Profiles
4.b.
Search and select the user that would be configured in Adapter Service form
4.c.
Click on the Roles tab
4.d. Add
ENROLE_AGENT_ROLE role created in step 3
4.e.
Click on Save
PeopleSoft resource-specific JAR
files
psft.jar
Remove everything under psft.jar section
including psft.jar header
psjoa.jar file
Replace "PEOPLESOFT_HOME\web\psjoa"
with "PEOPLESOFT_HOME\class"
JDBC type 4 driver
JAR file
Add below details to
the end of this sub-chapter
PeopleSoft
configured with the Oracle DB:
JDBC
Drivers:
ojdbc*.jar
Driver
Class:
oracle.jdbc.driver.OracleDriver
URL
jdbc:oracle:thin:@(DESCRIPTION=(ADDRESS=(PROTOCOL=TCP)(HOST=hostname)(PORT=port#))(CONNECT_DATA=(SERVICE_NAME=serviceName)))
Chapter 4: Upgrading
No updates for the current release
Chapter 5: Configuring
Enabling TLSv1.2 in Security
Directory Integrator
Procedure:
1. Apply recommended fix packs and
limited availability (LA) versions on the Security Directory Integrator. See
Recommended fixes for IBM Tivoli Directory Integrator (TDI) & IBM Security
Directory Integrator (SDI).
2. After applying the appropriate updates, modify
the /solution.properties file by appending the following text to the bottom of
the file:
#####################
# # Protocols to enforce SSL protocols in a SDI
Server
# # Optional values for com.ibm.di.SSL* property
(TLSv1, TLSv1.1, TLSv1.2). # # This can be a multi-valued comma separated
property
# # Optional values for
com.ibm.jsse2.overrideDefaultProtocol property (SSL_TLSv2, TLSv1,TLSv11,TLSv12).
# # This is a single value property.
#####################
-
com.ibm.di.SSLProtocols=TLSv1,TLSv1.1,TLSv1.2
com.ibm.di.SSLServerProtocols=TLSv1,TLSv1.1,TLSv1.2
com.ibm.jsse2.overrideDefaultProtocol=TLSv1
com.ibm.jsse2.overrideDefaultTLS=true
#####################
Customizing the adapter
The adapters can be customized or extended or both.
The type and method of this customization varies depending on the adapter.
Customizing and extending adapters requires a
number of skills. The developer must be familiar with the following concepts
and skills:
- IBM Security Verify Governance Identity Manager
administration
- IBM Security Verify Governance administration
- IBM Security Directory Integrator management
- Security Directory Integrator Assembly Line
development
- LDAP schema management
- Working knowledge of Java™ scripting language
- Working knowledge of LDAP object classes and
attributes
- Working knowledge of XML document structure
Note: If the customization requires a new
Security Directory Integrator connector, the developer must also be familiar
with Security Directory Integrator connector development and working knowledge
of Java programming language.
Support for custom adapters
The integration to IBM Security
Verify Governance servers "the adapter framework" is supported.
However, IBM does not support the customizations, scripts, or other
modifications. If you experience a problem with a customized adapter, IBM
Support may require the problem to be demonstrated on the GA version of the
adapter before a PMR is opened.
Chapter 6: Troubleshooting
Enabling DEBUG Logs on SDI Server
Procedure:
1. Stop the SDI Server process
Pre-7.2.0-ISS-SDI-FP0008
2. Edit the <SDI_Solution_Directory>/etc/log4j.properties
3. Modify the following line:
log4j.rootCategory=INFO, Default
to
log4j.rootCategory=DEBUG, Default
Post-7.2.0-ISS-SDI-FP0008
2. Edit the <SDI_Solution_Directory>/etc/log4j2.xml
3. Modify the following line:
<Root level="info">
to
<Root level="debug">
4. Start the SDI Server process
5. Re-create the problem and collect the
<SDI_Solution_Dir>/logs/ibmdi.log
Chapter 7: Uninstalling
No updates for the current release
Chapter 8: Reference
No updates for the current release
Corrections to User Guide:
Index/Introduction: PeopleTools Adapter User
Guide
This guide provides information that you need to
manage user accounts on the PeopleSoft server using the IBM® Security Identity
Manager Verify Governance products. This book describes user account
management tasks, such as reconciliation, add, modify, suspend, restore,
delete, and password change.
- Overview
An adapter is an interface between a managed resource and the IBM
Security Identity server Verify Governance products. The PeopleTools
Adapter provides connectivity between IBM Security Identity Manager Verify
Governance Identity Manager or IBM Security Verify Governance and the
PeopleSoft server.
- User account management
IBM Security Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance manages user accounts stored on the
PeopleSoft server using the PeopleTools Adapter.
- Troubleshooting
No changes
- Reference
No changes
Chapter 1: Overview
An adapter
is an interface between a managed resource and the IBM® Security Identity
server Verify Governance products. The PeopleTools Adapter provides
connectivity between IBM Security Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance and the PeopleSoft server.
The
adapter runs as a service, independent of whether you are logged on to IBM
Security Identity ManagerIBM Security Identity Governance and
IntelligenceIBM Security Privileged Verify Governance Identity Manager and
IBM Security Verify Governance.
Prerequisites:
. Replace "Table 1.
Prerequisites checklist" table with below one:
Task |
For more information, see |
Install the adapter |
See the adapter's Installation and Configuration Guide |
Import the adapter profile into the IBM® Security Verify Governance server |
See the adapter's Installation and Configuration Guide |
Create an adapter service |
See the adapter's Installation and Configuration Guide |
Configure the adapter |
See the adapter's Installation
and Configuration Guide |
Perform a reconciliation operation to retrieve user accounts and store them in the IBM Security Verify Governance server |
Managing reconciliation schedules in the IBM Security Verify Governance Identity Manager or IBM Security Verify Governance product documentation |
Adopt orphan accounts on IBM Security Verify Governance Identity Manager or IBM Security Verify Governance |
Assigning an orphan account to a user in the IBM Security Verify Governance Identity Manager or IBM Security Verify Governance product documentation |
Start the adapter |
Chapter 2: User Account Management
IBM® Security Identity Manager Verify Governance
Identity Manager or IBM Security Verify Governance manages user accounts stored
on the PeopleSoft server using the PeopleTools Adapter.
You can perform the following operations:
- Add, modify, or delete an account
- Suspend or restore an account
- Reconcile accounts
You can manage:
- Accounts for a specific person
- Accounts for a service instance
- Specific accounts by using the search function of IBM Security Identity
ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged
Identity Manager Verify Governance Identity Manager or IBM Security Verify
Governance
- Reconciling accounts
Reconciliation synchronizes the accounts and supporting data
between IBM Security Identity server Verify Governance Identity Manager
or IBM Security Verify Governance and the managed server. Reconciliation is
required so that data is consistent and up-to-date.
- Adding user accounts
You can add user accounts at any time for either an existing
person or a new person in the organization.
- Modifying user accounts
You can modify user account attributes at any time in IBM
Security Identity ManagerIBM Security Identity Governance and
IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance.
- Suspending user accounts
When you suspend a user account, the status of the user account
on IBM Security Identity ManagerIBM Security Identity Governance and
IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance becomes inactive and the user account
becomes unavailable for use.
- Restoring user accounts
The restore operation reinstates the suspended user accounts to
IBM Security Identity Manager Verify Governance Identity Manager or IBM
Security Verify Governance.
- Deleting user accounts
Use the IBM Security Identity ManagerIBM Security Identity
Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance
Identity Manager or IBM Security Verify Governance deprovision feature to
delete user accounts.
Reconciling accounts
Reconciliation synchronizes the accounts and supporting data
between IBM® Security Identity server Verify Governance Identity Manager
or IBM Security Verify Governance and the managed server. Reconciliation is
required so that data is consistent and up-to-date.
The reconciliation operation retrieves the user
account information from the PeopleSoft server and stores it in the directory
server of IBM Security Identity Manager Verify Governance Identity Manager
or IBM Security Verify Governance.
You can schedule reconciliation to run at specific
times and to return specific parameters. Running a reconciliation before its
schedule time does not cancel the scheduled reconciliation. For more
information about scheduling reconciliation and running a scheduled
reconciliation, see the IBM Security Identity ManagerIBM Security Identity
Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance
Identity Manager or IBM Security Verify Governance product documentation.
You can perform the following reconciliation tasks
at any time from IBM Security Identity ManagerIBM Security Identity
Governance and IntelligenceIBM Security Privileged Identity Manager Verify Governance
Identity Manager or IBM Security Verify Governance:
- Reconciling support data
- Reconciling a single user account
Adding user accounts
You can add user accounts at any time for either an existing
person or a new person in the organization.
Adapter attributes define the accounts on the
account form. For specific procedures, see the IBM® Security Identity
ManagerIBM Security Identity Governance and IntelligenceIBM Security Privileged
Identity Manager Verify Governance Identity Manager or IBM Security Verify
Governance product documentation.
- Attributes for adding user accounts
No change
- Alternate user ID
No change
- User supervisor
No change
- Specification of email addresses
No change
- ID Type specification
No change
- Permission
No change
- Role names
No change
Attributes for
adding user accounts
No change
Alternate user ID
No change
User supervisor
No change
Specification of email addresses
No change
ID Type
specification
No change
Permission
No change
Role names
No change
Modifying user accounts
(Update only first line in the beginning of the page and then
last section Password change of user accounts on the page)
You can modify user account attributes at any time in IBM®
Security Identity ManagerIBM Security Identity Governance and
IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance.
Password change of user accounts
You can change the password of any of the PeopleTools
accounts that exist on IBM Security Identity Manager. For information about
changing passwords, see the IBM Security Identity Manager Verify Governance Identity Manager or IBM Security Verify
Governance product documentation.
Suspending user accounts
When you suspend a user account, the status of the user
account on IBM® Security Identity ManagerIBM Security Identity Governance
and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance becomes inactive and the user account
becomes unavailable for use.
Suspending a user account does not remove the user
account from IBM Security Identity ManagerIBM Security Identity Governance
and IntelligenceIBM Security Privileged Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance. For more information about
suspending user accounts, see the IBM Security Identity Manager Verify Governance
Identity Manager or IBM Security Verify Governance product documentation.
When you suspend a user account from IBM Security Identity
Manager Verify Governance Identity Manager or IBM Security Verify Governance,
the PeopleTools Adapter sets the value of the Account Locked Out
attribute on the PeopleSoft server to TRUE.
Restoring user accounts
The restore operation reinstates the suspended user accounts
to IBM® Security Identity Manager Verify Governance Identity Manager or
IBM Security Verify Governance.
When you restore a user account from IBM Security Identity
Manager Verify Governance Identity Manager or IBM Security Verify Governance,
the PeopleTools Adapter sets the value of the Account Locked Out
attribute on the PeopleSoft server to FALSE.
After restoring a user account, the status of the
user account on IBM Security Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance becomes active. For more information
about restoring user accounts, see the IBM Security Identity Manager Verify
Governance Identity Manager or IBM Security Verify Governance product
documentation
Deleting user accounts
Use the IBM® Security Identity ManagerIBM Security
Identity Governance and IntelligenceIBM Security Privileged Identity Manager
Verify Governance Identity Manager or IBM Security Verify Governance deprovision
feature to delete user accounts.
For more information about deleting user accounts, see the IBM
Security Identity Manager Verify Governance Identity Manager or IBM Security
Verify Governance product documentation.
Chapter 3: Troubleshooting
Error logs
When an operation fails, the corresponding error
messages and warnings are logged in the ibmdi.log file. This file is in the
adapters solution/logs directory. The adapters solution directory is a Security
Directory Integrator work directory for IBM® Security Identity ManagerIBM
Security Identity Governance and IntelligenceIBM Security Privileged Identity
Manager Verify Governance Identity Manager or IBM Security Verify Governance
adapters.
You can display the error logs in the user interface by running the Dispatcher from the command prompt. You can also configure logging information for the adapter. For more information about displaying logs in the user interface and configuring logging information, see the adapter's Installation and Configuration Guide.
Error messages and warnings
No change
Chapter 4: Reference
Reference information is organized to help you
locate particular facts quickly such as adapter attributes, application
programming interfaces, files and commands, where applicable.
- Adapter attributes
The IBM Security Identity server Verify Governance Identity
Manager or IBM Security Verify Governance communicates with the adapter by using
attributes, which are included in transmission packets that are sent over a
network.
- Adapter customization for collection attributes
PeopleSoft has a constraint of setting the values of a collection
attribute in a specific sequence. Security Directory Integrator does not
necessarily pass the values on to the connector in the sequence they are
received.
- Customizing the PeopleTools account form
You can add attributes of different Component Interfaces to the
PeopleTools account form. These Component Interfaces can be supported or not
supported by IBM Security Identity Manager Verify Governance Identity
Manager or IBM Security Verify Governance.
Adapter attributes
(Only first line needs to be updated, rest everything needs to be
left as is)
The IBM® Security Identity server Verify Governance Identity
Manager or IBM Security Verify Governance communicates with the adapter by
using attributes, which are included in transmission packets that are sent over
a network.
Adapter customization for collection attributes
No Change
Customizing the PeopleTools
account form
About this task
The Project file PT850_Component.zip for PeopleTools 8.50,
8.51, and 8.52 PTxxx_Component.zip for PeopleTools, which contains
Component Interfaces, is provided with the IBM Security Identity Manager
Verify Governance PeopleTools Adapter software. These interfaces are in the
ENROLE_AGENT subdirectory. This subdirectory is imported into the PeopleTools
Application Designer as a PeopleTools Project.
Installation Platform
The IBM Security Verify Governance Adapter for PeopleTools was built
and tested on the following product versions.
Adapter
Installation Platform
Due to continuous Java security updates that may be applied to
your IBM Security Verify Governance servers, the following SDI releases are the
officially supported versions:
· Security Directory Integrator 7.2 + FP9
Earlier versions of SDI that are still supported may function properly, however to resolve any communication errors, you must upgrade your SDI releases to the officially supported versions by the adapters. Please refer to the adapters installation and configuration guides for the latest update on IBM Security Directory Integrator versions and fix packs.
Managed Resource
· PeopleSoft PeopleTools v8.60
PTxxx_COMPONENTS.zip resource
·
PT860_COMPONENT.zip for PeopleTools 8.60
IBM Security Verify Governance and Intelligence:
· IBM Security Verify Governance Identity Manager v10.0
· IBM Security Verify Governance v10.0
This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not
intended to state or imply that only that IBM product,
program, or service may be used. Any functionally equivalent product, program,
or service that does not infringe any IBM intellectual property right may be
used instead. However, it is the user's responsibility to evaluate and verify
the operation of any non-IBM product, program, or service.
IBM may have patents or
pending patent applications covering subject matter described in this document.
The furnishing of this document does not give you any license to these patents.
You can send license inquiries, in writing, to:
IBM
Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY 10504-1785 U.S.A.
For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:
Intellectual
Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan
This
information could include technical inaccuracies or typographical errors.
Changes are periodically made to the information herein; these changes will be
incorporated in new editions of the publication. IBM may make improvements
and/or changes in the product(s) and/or the program(s) described in this
publication at any time without notice.
Any references in this
information to non-IBM Web sites are provided for convenience only and do not
in any manner serve as an endorsement of those Web sites. The materials at
those Web sites are not part of the materials for this IBM product and use of
those Web sites is at your own risk.
IBM may use or distribute any of the information you supply in any way it
believes appropriate without incurring any obligation to you.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged should contact:
IBM
Corporation
2ZA4/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
Such
information may be available, subject to appropriate terms and conditions, including
in some cases, payment of a fee.
The licensed program described in this information and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement, or any equivalent agreement
between us.
Any performance data contained herein was determined in a controlled
environment. Therefore, the results obtained in other operating environments
may vary significantly. Some measurements may have been made on development-level
systems and there is no guarantee that these measurements will be the same on
generally available systems. Furthermore, some measurements may have been
estimated through extrapolation. Actual results may vary. Users of this
document should verify the applicable data for their specific environment.
Information concerning non-IBM products was obtained from the suppliers
of those products, their published announcements or other publicly available
sources. IBM has not tested those products and cannot confirm the accuracy of
performance, compatibility or any other claims related to non-IBM products.
Questions on the capabilities of non-IBM products should be addressed to the
suppliers of those products.
Trademarks
IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions
worldwide. Other product and service names might be trademarks of IBM or other
companies. A current list of IBM trademarks is available on the Web at "Copyright
and trademark information" at www.ibm.com/legal/copytrade.shtml.
Microsoft, Windows, and the Windows logo are trademarks of Microsoft
Corporation in the United States, other countries, or both.
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates
End of Release Notes