Release notes - IBM Security Verify Governance Adapter v10.0.2 for SCIMHR

IBM Security Verify Governance adapter v10.0.2 for SCIMHR is available. Compatibility, installation, and other getting-started issues are addressed.

Copyright International Business Machines Corporation 2021, 2023. All rights reserved.
US Government Users Restricted Rights -- Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp.

 Contents

 Preface

Welcome to the IBM Security Verify Governance adapter for SCIMHR.

This Release Notes contain information for the following products that was not available when the IBM Security Verify Governance manuals were printed:

 

 

Adapter Features and Purpose

 

The SDI-based IBM Security Verify Governance Adapter for SCIMHR is designed to reconcile users, groups and roles on SCIMHR supported applications. It also supports user management tasks such as account add, modify, suspend, restore and password change.

The adapter runs in "agentless" mode and communicates using HTTPS protocol.

The IBM Verify Adapters are powerful tools that require Administrator Level authority. Adapters operate much like a human system administrator, managing users, groups and permissions. Operations requested from the IBM Security verify Governance will fail if the Adapter is not given sufficient authority to perform the requested task. IBM recommends that this Adapter run with administrative permissions.

 

License Agreement

 

Review and agree to the terms of the IBM Security Verify Governance Adapter License prior to using this product.

The license can be viewed from the "license" folder included in the product package.

 

Contents of this Release

Adapter Version

Component

Version

Release Date

2023 March 17 01.38.23

Adapter Version

10.0.2

Component Versions

Adapter build: 10.0.2.1

Profile:  10.0.2.1

Connector:  10.0.2.1

Dispatcher 7.1.39 or higher (packaged separately)

SCIM connector version: 10.0.3

Documentation

The following guides are available in the IBM Knowledge Center

 

IBM Security Verify Governance Adapter for SCIMHR Installation and Configuration Guide

New Features

Internal#

Enhancement# (RFE / Idea)

Description

Items included in current release (10.0.2)

RTC 191179

ISIM-103/ADAPT-124

Add support for IBM Security Verify Governance Identity Manager (ISVGIM) starting v10.0.1 FP4 release onwards

RTC 191411

Build with SCIM connector version 10.0.3

 

 

Items included in release (10.0.1)

RTC 189950

Initial release.Added Extended Schema Attribute Support,Aquera Support.

Closed Issues

Internal#

APAR# / Case#

Description

 

 

Items included in current release (10.0.2)

 

None

 

 

Items included in release (10.0.1)

 

Initial release.

Known Limitations

Internal#

APAR#

Case # / Description

 

 

 

Installation and Configuration Notes

See the Installation Guide for IBM Security Verify Governance SCIMHR adapter for detailed instructions.

Corrections to Installation guide:

 Chapter 1: Overview

             No updates for the current release

 

Chapter 2: Planning

             Prerequisites:

                          Please consult the release notes for the currently supported versions of the below products

                          Directory Integrator:

                          Remove Version 7.2 + FP6 + 7.2.0-ISS-SDI-LA0019 from the description

 

                          Identity server Verify Governance Server:

                          Update description as below:

                                       The following servers are supported:

                                       - IBM Security Verify Governance Identity Manager

                                       - IBM Security Verify Governance

                          

                         

Chapter 3: Installing

             Installing the adapter binaries or connector

                          Procedure

1.      Copy tdi/connectors/*.jar ScimConnector.jar from the adapter package to the ITDI_HOME/jars/connectors directory.

2.      Copy tdi/functions/*.jar from the adapter package to the ITDI_HOME/jars/functions directory

 

             Installing 3rd party client libraries

Third party client libraries are libraries and/or configuration files that are provided by the target vendor. These 3rd party client libraries must be installed with the adapter. This is not required for all adapters.This topic is not applicable for this adapter. The adapter requires access to the following jars at runtime.

                          About this task Before you begin:

Download Jars listed below (Refer release notes for the supported library version details) and copy them to the Security Directory Integrator environment:

-         httpclient-<version>.jar

-         httpcore-<version>.jar

-         json-simple-<version>.jar

 

                          Procedure:

1.      Download the above-mentioned JAR files. Copy the files into SDI_HOME\jars\3rdparty\others directory.

Note: If there are issues with NoClassDefFoundError, copy the files into SDI_HOME\jars\patches instead of SDI_HOME\jars\3rd party\others.

2.      Restart the Dispatcher service once all JAR files are placed under SDI_HOME\jars\3rdparty\others directory.

For information about starting and stopping the service, see the Dispatcher Installation and Configuration Guide.

 

Verifying the adapter installation

Table 1. Adapter components

Directory

Adapter component

ITSDI_HOME/jars/connectors

SapNWUserConnector.jar, SapNWSupport.jar

ScimConnector

ITDI_HOME/jars/functions

SapNWRfc.jar

ITSDI_HOME/jars/3rdparty/other

sapjco3.jar

httpclient-<version>.jar

httpcore-<version>.jar

json-simple-<version>.jar

ITDI_HOME/libs

sapjco3.dll

ITDI_HOME/solution/xsl

- sapnw_bapi_errors.properties

- sapnw_bapi_person_getdetail_precall.xsl

- sapnw_bapi_person_address_precall.xsl

- sapnw_bapi_person_email_precall.xsl

- sapnw_bapi_person_getdetail_postcall.xsl

 

 

Attribute Mapping (This is applicable only for IBM Security Verify Governance)

Remove existing content of this section and add below details:

Attribute mapping is required to define which target attributes correspond to the Verify Governance User or OU attributes.

 

About this task

This task involves either an user or OU attribute mapping definition file, which is included in the HR adapter package.

 

The file consists of Verify Governance User or OU attributes and their equivalent attributes in the managed HR target. The file is structured as <IGI_attribute> = <HR_target_attribute>.

 

The <IGI_attribute> is fixed and must not be modified. Edit only the <HR_target_attribute>. Some <IGI_attribute> already has a fixed equivalent <HR_target_attribute>. For example:

GIVEN_NAME=erscimhrgivenname

 

Some <IGI_attribute> do not have a defined <HR_target_attribute> and you can assign the mapping. For example:

USER_TYPE=USER_TYPE

ATTR1=ATTR1

 

Note:

 - The default mapping is already included out-of-the box. If there are no changes to the attribute mapping, there is no need to import the attribute mapping files.

 - It might take up to 10 minutes for the attribute mapping changes to take effect once the file is imported.

 

Procedure

1. Open the mapping definition file by using any text editor.

2. Edit the mapping.

3. If the target attribute has a list of predefined values, use the following syntax to convert its values to the corresponding Verify Governance attribute values.

[conversion].<HR_target_attribute>.<IGI_attribute>

=

[<HR_target_attribute_value1>=<IGI_attribute_value1>;...;<HR_target_attribute_valuen>=<IGI_attribute_valuen>]

 

For example:

[conversion].erscimhrgender.GENDER=[M=0;F=1]

 

4. For attributes that contains date and time, use the following syntax to convert its values.

For example:

[conversion.date].erscimhrdob.BIRTHDAY=[yyyyMMdd=dd/MM/yyyy HH:mm:ss]

[conversion.date].ACCOUNT_EXPIRY_DATE.ACCOUNT_EXPIRY_DATE=[dd/MM/yyyy HH:mm:ss=dd/MM/yyyy HH:mm:ss]

 

5. Import the updated mapping definition file through the Enterprise Connectors module. For more information, see Attribute-to-permission mapping service in the IBM Security Verify Governance product documentation.

 

Service/Target form

Adapter Details tab

SCIM Base URL (https://<domain.com>/v2.0)

Specify IBM Security Verify Adapter for SCIM Adapter URL of the IBM Security Verify Adapter for SCIM Adapter resource in this format: https://<Instance- name>. For example, https://cloud.com/v2.0.

Note: If the target system is integrated with Aquera, provide the SCIM Base URL generated by Aquera.

 

Authentication type

Specify the authentication type. Currently SCIM only supports OAuth. For example, OAuth.

 

Client ID

Specify the Client ID of API Client that is created with Administrator privileges. Obtain the Client ID from the Configuration > API Access -> from IBM Security Verify Adapter for SCIM Adapter.

 

Client Secret

Specify the client secret of the associated Client ID. Obtain the client secret from the Configuration > API Access tab from IBM Security Verify Adapter for SCIM Adapter.

 

Username

Specify the user name based on the authentication type and the target, if required.

 

Password

Specify the password based on the authentication type and the target, if required.

 

Bearer Token

Specify the bearer token based on the authentication type and the target, if required.

Note: If the target system is integrated with Aquera, provide the SCIM Base URL generated by Aquera.

 

SCIM Schema Extended File Path

Specify the SCIM Schema Extended File Path if target supports extended schema attributes. For example, {SDI_HOME}/timsol/MappingFile/AttributeMapping.txt.

 

Person profile name (This is an additional attributes applicable only for IBM Security Verify Governance Identity Manager)

This is a read only field with "ScimHRPerson" value.

 

Use workflow (This is an additional attributes applicable only for IBM Security Verify Governance Identity Manager)

If this check box is checked, then an identity policy needs to be created for the IBM Security Governance Identity Manager account for the new person. By default, Use workflow check box is checked.

 

Evaluate separation of duty policy when workflow is used (This is an additional attributes applicable only for IBM Security Verify Governance Identity Manager)

This check box should be check if evaluation of separation of duty policy is required when the workflow is used.

 

Placement rule (This is an additional attributes applicable only for IBM Security Verify Governance Identity Manager)

Provide details for Placement rule. If you do not specify, the default org is used.

 

                          SAP Connection Details tab:

Target Client

The SAP instance client number. This field is mandatory.

Login ID

The SAP User account login ID that adapter uses to connect to the SAP instance. This field is mandatory.

Password

Password for SAP User account. This field is mandatory.

SAP System (DNS hostname or IP)

Host name of the SAP server host computer only if DNS is set up correctly. Otherwise, use the IP address. This field is mandatory.

SAP Systems Number

The SAP server system number. This field is mandatory.

SAP Logon Language

The language ISO identifier to be used by the adapter. This parameter is optional.

 

Reconciliation Advanced Mapping tab

Settings in this tab apply only during reconciliation and search operation requests.

The following attributes of this tab are all optional service attribute.

- Search Person Basic Iterate Request XSL Stylesheets

- Search Person Basic Iterate Response Stylesheet

 

Chapter 4: Upgrading

             No updates for the current release

 

Chapter 5: Configuring

Enabling TLSv1.2 in Security Directory Integrator

Procedure:   

1. Apply recommended fix packs and limited availability (LA) versions on the Security Directory Integrator. See Recommended fixes for IBM Tivoli Directory Integrator (TDI) & IBM Security Directory Integrator (SDI).

2. After applying the appropriate updates, modify the /solution.properties file by appending the following text to the bottom of the file:

 

#####################

# # Protocols to enforce SSL protocols in a SDI Server

# # Optional values for com.ibm.di.SSL* property (TLSv1, TLSv1.1, TLSv1.2). # # This can be a multi-valued comma separated property

# # Optional values for com.ibm.jsse2.overrideDefaultProtocol property (SSL_TLSv2, TLSv1,TLSv11,TLSv12).

# # This is a single value property.

#####################

-

com.ibm.di.SSLProtocols=TLSv1,TLSv1.1,TLSv1.2

com.ibm.di.SSLServerProtocols=TLSv1,TLSv1.1,TLSv1.2

com.ibm.jsse2.overrideDefaultProtocol=TLSv1

com.ibm.jsse2.overrideDefaultTLS=true

#####################

 

             Customizing the adapter

                          The adapters can be customized or extended or both. The type and method of this customization varies depending on the adapter.

                          Customizing and extending adapters requires a number of skills. The developer must be familiar with the following concepts and skills:

 

                          - IBM Security Verify Governance Identity Manager administration

                          - IBM Security Verify Governance administration

                          - IBM Security Directory Integrator management

                          - Security Directory Integrator Assembly Line development

                          - LDAP schema management

                          - Working knowledge of Java™ scripting language

                          - Working knowledge of LDAP object classes and attributes

                          - Working knowledge of XML document structure

 

                          Note: If the customization requires a new Security Directory Integrator connector, the developer must also be familiar with Security Directory Integrator connector development and working knowledge of Java programming language.

 

                          Support for custom adapters

                                         The integration to IBM Security Verify Governance servers "the adapter framework" is supported. However, IBM does not support the customizations, scripts, or other modifications. If you experience a problem with a customized adapter, IBM Support may require the problem to be demonstrated on the GA version of the adapter before a PMR is opened.

 

Chapter 6: Troubleshooting

             Enabling DEBUG Logs on SDI Server

                          Procedure:

                          1. Stop the SDI Server process

 

                          Pre-7.2.0-ISS-SDI-FP0008

                          2. Edit the <SDI_Solution_Directory>/etc/log4j.properties

                          3. Modify the following line:

                                      log4j.rootCategory=INFO, Default

                                      to

                                      log4j.rootCategory=DEBUG, Default

 

                          Post-7.2.0-ISS-SDI-FP0008

                          2. Edit the <SDI_Solution_Directory>/etc/log4j2.xml

                          3. Modify the following line:

                                      <Root level="info">

                                      to

                                      <Root level="debug">

 

                          4. Start the SDI Server process

                          5. Re-create the problem and collect the <SDI_Solution_Dir>/logs/ibmdi.log

  

 

Chapter 7: Reference

             No updates for the current release 

 

Supported Configurations

Installation Platform

The IBM Security Verify Governance Adapter for SCIMHR was built and tested on the following product versions.

Adapter Installation Platform: 

Due to continuous Java security updates that may be applied to your ISVG or ISVGIM servers, the following SDI releases are the officially supported versions:

Note: Earlier SDI supported version may function properly, however to resolve any communication errors, you must upgrade your SDI releases to the officially supported versions by the adapters

 

3rd Party Client Libraries:

·        httpclient-4.5.2.jar

Download the httpclient-4.5.2.jar from https://mvnrepository.com/artifact/org.apache.httpcomponents/httpclient/4.5.2

·        httpcore-4.4.4.jar

Download the httpcore-4.4.4.jar from https://mvnrepository.com/artifact/org.apache.httpcomponents/httpcore/4.4.4

·        json-simple-1.1.1.jar

Download the json-simple-1.1.1.jar from https://mvnrepository.com/artifact/com.googlecode.json-simple/json-simple/1.1.1

Managed Resource:

·        SCIM Supported Target

·        Aquera – Target registered with Aquera 

IBM Security Verify Governance Servers:

·        IBM Security Verify Governance Identity Manager (v10.0.1 FP4 release or later)

·        IBM Security Verify Governance v10.0

 

Notices

This information was developed for products and services offered in the U.S.A. IBM may not offer the products, services, or features discussed in this document in other countries. Consult your local IBM representative for information on the products and services currently available in your area. Any reference to an IBM product, program, or service is not intended to state or imply that only that IBM product, program, or service may be used. Any functionally equivalent product, program, or service that does not infringe any IBM intellectual property right may be used instead. However, it is the user's responsibility to evaluate and verify the operation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matter described in this document. The furnishing of this document does not give you any license to these patents. You can send license inquiries, in writing, to:

 

IBM Director of Licensing
IBM Corporation
North Castle Drive
Armonk, NY  10504-1785 U.S.A.

 

For license inquiries regarding double-byte (DBCS) information, contact the IBM Intellectual Property Department in your country or send inquiries, in writing, to:

 

Intellectual Property Licensing
Legal and Intellectual Property Law
IBM Japan, Ltd.
1623-14, Shimotsuruma, Yamato-shi
Kanagawa 242-8502 Japan

 

This information could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein; these changes will be incorporated in new editions of the publication. IBM may make improvements and/or changes in the product(s) and/or the program(s) described in this publication at any time without notice.

Any references in this information to non-IBM Web sites are provided for convenience only and do not in any manner serve as an endorsement of those Web sites. The materials at those Web sites are not part of the materials for this IBM product and use of those Web sites is at your own risk.

IBM may use or distribute any of the information you supply in any way it believes appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purpose of enabling: (i) the exchange of information between independently created programs and other programs (including this one) and (ii) the mutual use of the information which has been exchanged should contact:

IBM Corporation
2ZA4/101
11400 Burnet Road
Austin, TX 78758  U.S.A.

 

Such information may be available, subject to appropriate terms and conditions, including in some cases, payment of a fee.

The licensed program described in this information and all licensed material available for it are provided by IBM under terms of the IBM Customer Agreement, IBM International Program License Agreement, or any equivalent agreement between us.

Any performance data contained herein was determined in a controlled environment. Therefore, the results obtained in other operating environments may vary significantly. Some measurements may have been made on development-level systems and there is no guarantee that these measurements will be the same on generally available systems. Furthermore, some measurements may have been estimated through extrapolation. Actual results may vary. Users of this document should verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers of those products, their published announcements or other publicly available sources. IBM has not tested those products and cannot confirm the accuracy of performance, compatibility or any other claims related to non-IBM products. Questions on the capabilities of non-IBM products should be addressed to the suppliers of those products.

Trademarks

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at www.ibm.com/legal/copytrade.shtml.

Microsoft, Windows, and the Windows logo are trademarks of Microsoft Corporation in the United States, other countries, or both.

Java and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle and/or its affiliates.