12.07.2015 Views

CA Identity Manager Implementation Guide - CA Technologies

CA Identity Manager Implementation Guide - CA Technologies

CA Identity Manager Implementation Guide - CA Technologies

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ContentsChapter 1: Managing Identities and Access 9User Management and Application Access ......................................................... 9Role-Based Entitlements ........................................................................ 10Admin Roles for User Account Management ...................................................... 11Profile Management at the Attribute Level.................................................... 12Workflow Approval of Admin Tasks .......................................................... 13Provisioning Roles for Additional Accounts ....................................................... 14Password Management .......................................................................... 15Self Service Options for Users ................................................................... 15<strong>Identity</strong> <strong>Manager</strong> Customization and Extensibility ................................................ 16<strong>CA</strong> RCM Integration ............................................................................. 17<strong>CA</strong> Enterprise Log <strong>Manager</strong> Integration .......................................................... 18<strong>CA</strong> Enterprise Log <strong>Manager</strong> Reports .......................................................... 19Chapter 2: Addressing Business Needs 21Processing Business Changes.................................................................... 21Complying with Business Policies ................................................................ 22Compliance Reports ......................................................................... 23Enforcing Segregation of Duties Requirements ................................................... 25Transforming Data in the User Store ............................................................. 26Logical Attribute Handlers ................................................................... 26Applying Custom Business Logic ................................................................. 27Business Logic Task Handler Considerations .................................................. 28Workflow Process Considerations ............................................................ 28Approving Business Changes .................................................................... 28Chapter 3: <strong>Identity</strong> <strong>Manager</strong> Architecture 31<strong>Identity</strong> <strong>Manager</strong> Components................................................................... 31Servers ..................................................................................... 31User Store and Provisioning Directory ........................................................ 32Databases .................................................................................. 34Connector Components ..................................................................... 35Additional Components ...................................................................... 38Sample <strong>CA</strong> <strong>Identity</strong> <strong>Manager</strong> Installations ........................................................ 40Installation with Provisioning Components ................................................... 40Installation with SiteMinder Policy Server .................................................... 41Contents 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!