60
IBM Security Identity Manager Version 6.0 Sybase Adapter Installation and Configuration Guide SC22-5495-00

SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

  • Upload
    others

  • View
    21

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

IBM Security Identity ManagerVersion 6.0

Sybase Adapter Installation andConfiguration Guide

SC22-5495-00

���

Page 2: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00
Page 3: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

IBM Security Identity ManagerVersion 6.0

Sybase Adapter Installation andConfiguration Guide

SC22-5495-00

���

Page 4: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

NoteBefore using this information and the product it supports, read the information in “Notices” on page 41.

Edition notice

Note: This edition applies to version 6.0 of IBM Security Identity Manager (product number 5724-C34) and to allsubsequent releases and modifications until otherwise indicated in new editions.

© Copyright IBM Corporation 2012.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

Page 5: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Contents

Figures . . . . . . . . . . . . . . . v

Tables . . . . . . . . . . . . . . . vii

Preface . . . . . . . . . . . . . . . ixAbout this publication . . . . . . . . . . . ixAccess to publications and terminology . . . . . ixAccessibility . . . . . . . . . . . . . . xTechnical training. . . . . . . . . . . . . xSupport information . . . . . . . . . . . . xStatement of Good Security Practices . . . . . . x

Chapter 1. Overview of the adapter . . . 1Features of the adapter . . . . . . . . . . . 1Architecture of the adapter . . . . . . . . . 1Supported configurations . . . . . . . . . . 2

Chapter 2. Installation planning for theadapter . . . . . . . . . . . . . . . 3Preinstallation roadmap . . . . . . . . . . 3Installation roadmap. . . . . . . . . . . . 3Prerequisites . . . . . . . . . . . . . . 4Installation worksheet for the adapter . . . . . . 5Software download . . . . . . . . . . . . 6

Chapter 3. Adapter installation . . . . . 7Dispatcher installation verification . . . . . . . 7Installing the adapter . . . . . . . . . . . 7Start, stop, and restart of the Sybase Adapter service 8Importing the adapter profile into the IBM SecurityIdentity Manager server . . . . . . . . . . 8Adapter profile installation verification . . . . . 9Adapter user account creation . . . . . . . . 9Creating an adapter service . . . . . . . . . 10

Chapter 4. First steps after installation 13Adapter configuration . . . . . . . . . . . 13

Customizing the adapter profile . . . . . . 13Password management for account restoration . . 15Verifying that the adapter is working correctly . . 15

Chapter 5. Troubleshooting the adaptererrors . . . . . . . . . . . . . . . 17Techniques for troubleshooting problems . . . . 17

Warning and error messages. . . . . . . . . 19

Chapter 6. Adapter upgrade. . . . . . 21Dispatcher upgrade. . . . . . . . . . . . 21Upgrade of the existing adapter profile . . . . . 21

Chapter 7. Adapter uninstallation . . . 23Uninstalling the adapter from the Tivoli DirectoryIntegrator server. . . . . . . . . . . . . 23Adapter profile removal from the IBM SecurityIdentity Manager server . . . . . . . . . . 23

Chapter 8. Adapter reinstallation . . . 25

Appendix A. Adapter attributes . . . . 27Attribute descriptions . . . . . . . . . . . 27Sybase adapter attributes by action . . . . . . 28

Database Login Add . . . . . . . . . . 28Database Login Change . . . . . . . . . 28Database Login Delete . . . . . . . . . . 29Database Login Restore . . . . . . . . . 29Database Login Suspend . . . . . . . . . 29Ping . . . . . . . . . . . . . . . . 29Reconciliation . . . . . . . . . . . . 30

Appendix B. Adapter installation on az/OS operating system . . . . . . . . 31

Appendix C. Definitions for ITDI_HOMEand ISIM_HOME directories . . . . . . 33

Appendix D. Support information . . . 35Searching knowledge bases . . . . . . . . . 35Obtaining a product fix . . . . . . . . . . 36Contacting IBM Support . . . . . . . . . . 36

Appendix E. Accessibility features forIBM Security Identity Manager . . . . 39

Notices . . . . . . . . . . . . . . 41

Index . . . . . . . . . . . . . . . 45

© Copyright IBM Corp. 2012 iii

Page 6: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

iv IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 7: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Figures

1. The architecture of the Sybase Adapter . . . . 12. Example of a single server configuration . . . 2

3. Example of a multiple server configuration 2

© Copyright IBM Corp. 2012 v

Page 8: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

vi IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 9: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Tables

1. Preinstallation roadmap . . . . . . . . . 32. Installation roadmap . . . . . . . . . . 33. Prerequisites to install the adapter . . . . . 44. Required information to install the adapter 55. Required roles and their descriptions . . . . 96. Warning and error messages . . . . . . . 197. Attributes, descriptions, and corresponding

data types . . . . . . . . . . . . . 27

8. Add request attributes . . . . . . . . . 289. Change request attributes . . . . . . . . 28

10. Delete request attributes . . . . . . . . 2911. Restore request attributes . . . . . . . . 2912. Suspend request attributes . . . . . . . 2913. Restore request attributes . . . . . . . . 3014. Reconciliation function attributes . . . . . 30

© Copyright IBM Corp. 2012 vii

Page 10: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

viii IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 11: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Preface

About this publication

The Sybase Adapter Installation and Configuration Guide provides the basicinformation that you use to install and configure the IBM® Security IdentityManager Sybase Adapter. The adapter enables connectivity between the IBMSecurity Identity Manager server and the managed resource. IBM Security IdentityManager was previously known as Tivoli® Identity Manager.

Access to publications and terminologyThis section provides:v A list of publications in the “IBM Security Identity Manager library.”v Links to “Online publications.”v A link to the “IBM Terminology website.”

IBM Security Identity Manager library

For a complete listing of the IBM Security Identity Manager and IBM SecurityIdentity Manager Adapter documentation, see the online library(http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=/com.ibm.isim.doc_6.0/ic-homepage.htm).

Online publications

IBM posts product publications when the product is released and when thepublications are updated at the following locations:

IBM Security Identity Manager libraryThe product documentation site (http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=/com.ibm.isim.doc_6.0/ic-homepage.htm) displays the welcome page and navigation for the library.

IBM Security Systems Documentation CentralIBM Security Systems Documentation Central provides an alphabetical listof all IBM Security Systems product libraries and links to the onlinedocumentation for specific versions of each product.

IBM Publications CenterThe IBM Publications Center site ( http://www-05.ibm.com/e-business/linkweb/publications/servlet/pbi.wss) offers customized search functionsto help you find all the IBM publications you need.

IBM Terminology website

The IBM Terminology website consolidates terminology for product libraries in onelocation. You can access the Terminology website at http://www.ibm.com/software/globalization/terminology.

© Copyright IBM Corp. 2012 ix

Page 12: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

AccessibilityAccessibility features help users with a physical disability, such as restrictedmobility or limited vision, to use software products successfully. With this product,you can use assistive technologies to hear and navigate the interface. You can alsouse the keyboard instead of the mouse to operate all features of the graphical userinterface.

Technical trainingFor technical training information, see the following IBM Education website athttp://www.ibm.com/software/tivoli/education.

Support informationIBM Support provides assistance with code-related problems and routine, shortduration installation or usage questions. You can directly access the IBM SoftwareSupport site at http://www.ibm.com/software/support/probsub.html.

Appendix D, “Support information,” on page 35 provides details about:v What information to collect before contacting IBM Support.v The various methods for contacting IBM Support.v How to use IBM Support Assistant.v Instructions and problem-determination resources to isolate and fix the problem

yourself.

Note: The Community and Support tab on the product information center canprovide additional support resources.

Statement of Good Security PracticesIT system security involves protecting systems and information throughprevention, detection and response to improper access from within and outsideyour enterprise. Improper access can result in information being altered, destroyed,misappropriated or misused or can result in damage to or misuse of your systems,including for use in attacks on others. No IT system or product should beconsidered completely secure and no single product, service or security measurecan be completely effective in preventing improper use or access. IBM systems,products and services are designed to be part of a comprehensive securityapproach, which will necessarily involve additional operational procedures, andmay require other systems, products or services to be most effective. IBM DOESNOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES AREIMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THEMALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

x IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 13: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 1. Overview of the adapter

The Sybase Adapter enables communication between the IBM Security IdentityManager server and the Sybase Adaptive Server Enterprise (ASE).

An adapter provides an interface between a managed resource and the IBMSecurity Identity Manager server. Adapters might reside on the managed resource.The IBM Security Identity Manager server manages access to the resource by usingyour security system. Adapters function as trusted virtual administrators on thetarget platform. They perform tasks, such as creating, suspending, and restoringuser accounts, and other administrative functions that are performed manually. Theadapter runs as a service, independently of whether you are logged on to the IBMSecurity Identity Manager server.

Features of the adapterThe adapter automates the following user account management tasks.v Reconciling user accounts and other support datav Adding user accountsv Modifying user account attributesv Modifying user account passwordsv Suspending, restoring, and deleting user accounts

Architecture of the adapterYou must install the following components for the adapter to function correctly:v Dispatcherv Tivoli Directory Integrator connectorv IBM Security Identity Manager adapter profile

You need to install the Dispatcher and the adapter profile; however, the TivoliDirectory Integrator connector might already be installed with the base TivoliDirectory Integrator product.

Figure 1 describes the components that work together to complete the user accountmanagement tasks in a Tivoli Directory Integrator environment.

For more information about Tivoli Directory Integrator, see the Quick Start Guide inthe IBM Security Identity Manager product documentation.

RMI callsIBM SecurityIdentityManagerServer

DispatcherService(an instanceof the IBMTivoliDirectoryIntegrator)

Adapterresource

Figure 1. The architecture of the Sybase Adapter

© Copyright IBM Corp. 2012 1

Page 14: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Supported configurationsThere are two ways to configure the Sybase Adapter. In a single serverconfiguration, the adapter is installed on only one server. In a multiple serverconfiguration, the adapter is installed on several different servers.

The fundamental components in each environment are:v The IBM Security Identity Manager serverv The IBM Tivoli Directory Integrator serverv The managed resourcev The adapter

The adapter must be installed directly on the server that runs the Tivoli DirectoryIntegrator server.

Single server configuration

In a single server configuration, the IBM Security Identity Manager server, theTivoli Directory Integrator server, and the Sybase Adapter are installed on oneserver to establish communication with the managed resource.

The managed resource is installed on a different server as described in Figure 2.

Multiple server configuration

In a multiple server configuration, the IBM Security Identity Manager server, theTivoli Directory Integrator server, and the Sybase Adaptive Server Enterprise areinstalled on different servers.

The Tivoli Directory Integrator server and the Sybase Adapter are installed on thesame server as described in Figure 3.

IBM SecurityIdentity Manager Server

Tivoli DirectoryIntegrator Server

Adapter

Managed

resource

Figure 2. Example of a single server configuration

IBM SecurityIdentity Managerserver

Tivoli DirectoryIntegrator server Managed

resource

Adapter

Figure 3. Example of a multiple server configuration

2 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 15: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 2. Installation planning for the adapter

Installing and configuring the adapter involves several steps that you mustcomplete in the appropriate sequence.

Review the roadmaps before you begin the installation process.

Preinstallation roadmapBefore you install the adapter, you must prepare the environment.

Prepare the environment by performing the tasks that are listed in Table 1.

Table 1. Preinstallation roadmap

Task For more information

Obtain the installation software. Download the software from PassportAdvantage® website. See “Softwaredownload” on page 6.

Verify that your environment meets thesoftware and hardware requirements for theadapter.

See “Prerequisites” on page 4.

Obtain and install the Dispatcher. Download the software from PassportAdvantage website. See “Softwaredownload” on page 6. Follow theinstallation instructions in the dispatcherdownload package.

Obtain the necessary information for theinstallation and configuration.

See “Installation worksheet for the adapter”on page 5.

Installation roadmapTo install the adapter, complete the tasks described in the roadmap.

Table 2. Installation roadmap

Task For more information

Verify the Dispatcher installation. See “Dispatcher installation verification” onpage 7.

Install the adapter. See “Installing the adapter” on page 7.

Import the adapter profile. See “Importing the adapter profile into theIBM Security Identity Manager server” onpage 8.

Verify the profile installation. See “Adapter profile installationverification” on page 9.

Create an adapter user account. See “Adapter user account creation” on page9.

Create a service. See “Creating an adapter service” on page10.

Configure the adapter. See “Adapter configuration” on page 13.

© Copyright IBM Corp. 2012 3

Page 16: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

PrerequisitesVerify that your environment meets all the prerequisites before installing theadapter.

Table 3 identifies the software and operating system prerequisites for the adapterinstallation.

Ensure that you install the adapter on the same workstation as the IBM TivoliDirectory Integrator server.

Table 3. Prerequisites to install the adapter

Prerequisite Description

Tivoli Directory Integrator server v Version 7.1 fix pack 5 or later

v Version 7.1.1

IBM Security Identity Manager server v Version 6.0

Sybase Adaptive Server Enterprise A system that runs the Sybase Adapter with oneof following versions:

v Sybase Adaptive Server Enterprise v12.5

v Sybase Adaptive Server Enterprise v15.0

v Sybase Adaptive Server Enterprise v15.5

v Sybase Adaptive Server Enterprise v15.7

Sybase JDBC Driver JDBC DriverNote: The driver file names are:

v jconn3.jar for IBM Tivoli DirectoryIntegrator 7.0

v jconn4.jar for IBM Tivoli DirectoryIntegrator 7.1

Network Connectivity Install the adapter on a workstation that cancommunicate with the IBM Security IdentityManager service through the TCP/IP network.

System Administrator Authority To complete the adapter installation procedure,you must have system administrator authority.

Tivoli Directory Integrator adapterssolution directory

A Tivoli Directory Integrator adapters solutiondirectory is a Tivoli Directory Integrator workdirectory for IBM Security Identity Manageradapters. See the Dispatcher Installation andConfiguration Guide.

Sybase Account You must provide a Sybase account andpassword for every Sybase instance that theadapter manages.

The Sybase account must have the followingSybase privileges and roles:

v SA_ROLE

v SSO_ROLE

v OPER_ROLE

Install the Sybase Adapter and the appropriate Sybase JDBC drivers on the sameworkstation as the Tivoli Directory Integrator.

4 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 17: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

For information about the prerequisites and supported operating systems for TivoliDirectory Integrator, see the IBM Tivoli Directory Integrator 7.0: Administrator Guide.

Installation worksheet for the adapterThe installation worksheet identifies the information that you need beforeinstalling the adapter.

Table 4. Required information to install the adapter

Required information Description Value

IBM Tivoli DirectoryIntegrator HomeDirectory

The ITDI_HOME directory containsthe jars/connectors subdirectory thatcontains adapter jars. For example,the jars/connectors subdirectorycontains the jar for the UNIXadapter.

If Tivoli DirectoryIntegrator is automaticallyinstalled with your IBMSecurity Identity Managerproduct, the defaultdirectory path for TivoliDirectory Integrator is asfollows:

Windows:

v for version 7.0:

drive\ProgramFiles\IBM\TDI\V7.0

v for version 7.1

drive\ProgramFiles\IBM\TDI\V7.1

UNIX:

v for version 7.0:

/opt/IBM/TDI/V7.0

v for version 7.1:

/opt/IBM/TDI/V7.1

Adapters solutiondirectory

When you install the dispatcher, theadapter prompts you to specify a filepath for the adapters solutiondirectory. For more informationabout the solution directory, see theDispatcher Installation andConfiguration Guide.

The default solutiondirectory is located at:

Windows:

v for version 7.0:

drive\ProgramFiles\IBM\TDI\V7.0\isimsoln

v for version 7.1:

drive\ProgramFiles\IBM\TDI\V7.1\isimsoln

UNIX:

v for version 7.0:

/opt/IBM/TDI/V7.0/isimsoln

v for version 7.1:

/opt/IBM/TDI/V7.1/isimsoln

Chapter 2. Installation planning for the adapter 5

Page 18: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Software downloadDownload the software through your account at the IBM Passport Advantagewebsite.

Go to IBM Passport Advantage.

See the IBM Security Identity Manager Download Document for instructions.

Note:

You can also obtain additional adapter information from IBM Support.

6 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 19: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 3. Adapter installation

All the adapters that are based on the Tivoli Directory Integrator require theDispatcher for the adapters to function correctly.

If the Dispatcher is installed from a previous installation, do not reinstall it unlessthere is an upgrade to the Dispatcher. See “Dispatcher installation verification.”

After verifying the Dispatcher installation, you might need to install the TivoliDirectory Integrator connector. Depending on your adapter, the connector mightalready be installed as part of the Tivoli Directory Integrator product and nofurther action is required.

Dispatcher installation verificationIf this installation is for the first adapter that is based on the Tivoli DirectoryIntegrator, you must install the Dispatcher before you install the adapter.

You must install the dispatcher on the same Tivoli Directory Integrator serverwhere you want to install the adapter.

Obtain the dispatcher installer from the IBM Passport Advantage website,http://ww.ibm.com/software/howtobuy/passportadvantage/pao_customers.htm.For information about Dispatcher installation, see the Dispatcher Installation andConfiguration Guide.

Installing the adapterTake these steps to install the adapter.

Before you begin

Ensure that you do the following tasks:v Verify that your site meets all the prerequisite requirements. See “Prerequisites”

on page 4.v Obtain a copy of the installation software. See “Software download” on page 6.v Obtain system administrator authority. See “Prerequisites” on page 4.

About this task

The adapter uses the IBM Tivoli Directory Integrator JDBC connector. Thisconnector is available with the base Tivoli Directory Integrator product. Becausethe Tivoli Directory Integrator JDBC connector is already installed, you need toinstall only the Dispatcher. See “Dispatcher installation verification.”

To install the Dispatcher, see the IBM Security Dispatcher Installation andConfiguration Guide.

What to do next

After you finish the adapter installation, do the following tasks:

© Copyright IBM Corp. 2012 7

Page 20: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

1. Import the adapter profile. See “Importing the adapter profile into the IBMSecurity Identity Manager server.”

2. Create a user account for the adapter on IBM Security Identity Manager. See“Adapter user account creation” on page 9.

Start, stop, and restart of the Sybase Adapter serviceTo start, stop, or restart the adapter, you must start, stop, or restart the Dispatcher.

The adapter does not exist as an independent service or a process. The adapter isadded to the Dispatcher instance, which runs all the adapters that are installed onthe same Tivoli Directory Integrator instance.

See the topic about starting stopping, and restarting the dispatcher service in theDispatcher Installation and Configuration Guide.

Importing the adapter profile into the IBM Security Identity Managerserver

Use this task to create a service on the IBM Security Identity Manager server andestablish communication with the adapter.

Before you begin

Before you can create an adapter service, the IBM Security Identity Manager servermust have an adapter profile to recognize the adapter. The files that are packagedwith the adapter include the adapter profile JAR file. You can import the adapterprofile as a service profile on the server with the Import feature of IBM SecurityIdentity Manager.

The JAR file includes all the files that are required to define the adapter schema,account form, service form, and profile properties. You can extract the files fromthe JAR file to modify the necessary files and package the JAR file with theupdated files.

Before you begin to import the adapter profile, verify that the following conditionsare met:v The IBM Security Identity Manager server is installed and running.v You have root or Administrator authority on IBM Security Identity Manager.

About this task

An adapter profile defines the types of resources that the IBM Security IdentityManager server can manage. Use the profile to create an adapter service on IBMSecurity Identity Manager server and establish communication with the adapter.

To import the adapter profile, perform the following steps:

Procedure1. Log on to the IBM Security Identity Manager server by using an account that

has the authority to perform administrative tasks.2. In the My Work pane, expand Configure System and click Manage Service

Types.

8 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 21: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

3. On the Manage Service Types page, click Import to display the Import ServiceTypes page.

4. Specify the location of the JAR file in the Service Definition File field byperforming one of the following tasks:v Type the complete location of where the file is stored.v Use Browse to navigate to the file.

5. Click OK.

Note: If you import the adapter profile and receive an error that is related tothe schema, see the trace.log file for information about the error. Thetrace.log file location is specified by using the handler.file.fileDir propertythat is defined in the IBM Security Identity Manager enRoleLogging.propertiesfile. The enRoleLogging.properties file is installed in the ISIM_HOME\datadirectory.

6. Restart IBM Security Identity Manager for the change to take effect.

Adapter profile installation verificationAfter you install the adapter profile, verify that the installation was successful.

An unsuccessful installation:v Might cause the adapter to function incorrectly.v Prevents you from creating a service with the adapter profile.

To verify that the adapter profile is successfully installed, create a service with theadapter profile. For more information about creating a service, see “Creating anadapter service” on page 10.

If you are unable to create a service with the adapter profile or open an account onthe service, the adapter profile is not installed correctly. You must import theadapter profile again.

Adapter user account creationYou must create a user account for the adapter on the managed resource. Providethe account information when you create a service for the adapter on IBM SecurityIdentity Manager.

For more information about creating a service, see “Creating an adapter service”on page 10.

The accounts must be able to remotely connect to the Sybase Adaptive ServerEnterprise server and must have sufficient roles to administer Sybase users. Table 5lists the required roles that the user account must have to administer Sybase users.

Table 5. Required roles and their descriptions

Role Description

SA_ROLE System administrator role

SSO_ROLE System security officer role

OPER_ROLE Operator role

Chapter 3. Adapter installation 9

Page 22: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Creating an adapter serviceAfter the adapter profile is imported on IBM Security Identity Manager, you mustcreate a service so that IBM Security Identity Manager can communicate with theadapter.

About this task

To create or change a service, you must use the service form to provideinformation for the service. Service forms might vary depending on the adapter.

Note: If the following fields on the service form are changed for an existingservice, the IBM Security Identity Manager adapter service on the Tivoli DirectoryIntegrator server must be restarted.v Service Name

v Sybase Admin Password

v AL File System Path

v Max Connection Count

Procedure1. Log on to the IBM Security Identity Manager server with an account that has

the authority to perform administrative tasks.2. In the My Work pane, click Manage Services and click Create.3. On the Select the Type of Service page, select Sybase Adapter Service Profile.4. Click Next to display the adapter service form.5. Complete the following fields on the service form:

On the Sybase Connection tab:

Service nameSpecify a name that defines the adapter service on the IBMSecurity Identity Manager server.

Note: Do not use forward (/) or backward slashes (\) in theservice name.

DescriptionSpecify a description that identifies the service for yourenvironment. This field is optional.

Tivoli Directory Integrator locationSpecify the URL for the IBM Tivoli Directory Integratorinstance. The valid syntax for the URL is:rmi://ip-address:port/ITDIDispatcher

where:

ip-addressThe Tivoli Directory Integrator host.

port The port number for the Dispatcher.

The default URL isrmi://localhost:1099/ITDIDispatcher

For information about changing the port number, see IBMSecurity Dispatcher Installation and Configuration Guide.

10 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 23: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Sybase Server HostSpecify the host workstation on which the Sybase server isrunning. This field is required.

Sybase Server PortSpecify the TCP port on which the Sybase server is running.For example, 5000. This field is required.

Sybase Admin IDSpecify the name of the user who has access to the Sybaseresource and who can perform administrative operations. Thisfield is required.

Sybase Admin PasswordSpecify the password for the user. This field is required.

OwnerSpecify a IBM Security Identity Manager user as a serviceowner. This field is optional.

Service PrerequisiteSpecify a IBM Security Identity Manager service that isprerequisite to this service.

On the Dispatcher Attributes tab:

Disable AL CachingSelect the check box to disable the assembly line caching in thedispatcher for the service. The assembly lines for the add,modify, delete, and test operations are not cached.

AL File System PathSpecify the file path from where the dispatcher loads theassembly lines. If you do not specify a file path, the dispatcherloads the assembly lines received from IBM Security IdentityManager.

For example, you can specify the following file path to load theassembly lines from the profiles directory of the Windowsoperating system: c:\Files\IBM\TDI\V7.0\profiles or you canspecify the following file path to load the assembly lines fromthe profiles directory of the UNIX and Linux operating system:system: /opt/IBM/TDI/V7.0/profiles.

Max Connection CountSpecify the maximum number of assembly lines that thedispatcher can run simultaneously for the service. For example,enter 10 when you want the dispatcher to run a maximum of10 assembly lines simultaneously for the service. If you enter 0in the Max Connection Count field, the dispatcher does notlimit the number of assembly lines that are run simultaneouslyfor the service.

6. Click Finish.

Chapter 3. Adapter installation 11

Page 24: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

12 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 25: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 4. First steps after installation

After you install the adapter, you must do several other tasks. The tasks includeconfiguring the adapter, setting up SSL, installing the language pack, and verifyingthe adapter works correctly.

Adapter configurationUse the following options to configure the Sybase Adapter.v “Customizing the adapter profile”v “Editing adapter profiles on the UNIX or Linux operating system” on page 14

See the IBM Security Dispatcher Installation and Configuration Guide for additionalconfiguration options such as:v JVM propertiesv Dispatcher filteringv Dispatcher propertiesv Dispatcher port numberv Logging configurationsv Secure Sockets Layer (SSL) communication

Customizing the adapter profileTo customize the adapter profile, you must modify the Sybase Adapter JAR file.You can customize the adapter profile to change the account form or the serviceform.

About this task

You can also use the Form Designer or the CustomLabels.properties file to changethe labels on the forms. Each adapter has a CustomLabels.properties file for thatadapter.

The JAR file is included in the Sybase Adapter compressed file that youdownloaded from the IBM website. The JAR file and the files that are contained inthe JAR file vary depending on your operating system.

Note: You cannot modify the schema for this adapter. You cannot add or deleteattributes from the schema.

The adapter JAR file includes the following files:v CustomLabels.properties

v erSybaseAccount.xml

v erSybaseService.xml

v schema.dsml

v service.def

v SybaseAdapter.xml

© Copyright IBM Corp. 2012 13

Page 26: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Procedure1. Edit the JAR file.

a. Log on to the workstation where the Sybase Adapter is installed.b. On the Start menu, click Programs → Accessories → Command Prompt.c. Copy the JAR file into a temporary directory.d. Extract the contents of the JAR file into the temporary directory by running

the following command. The following example applies to the SybaseAdapter profile. Type the name of the JAR file for your operating system.cd c:\tempjar -xvf SybaseAdapterProfile.jar

The jar command extracts the files into the directory.e. Edit the file that you want to change.

2. Import the file.After you edit the file, you must import the file into the IBM Security IdentityManager server for the changes to take effect.a. Create a JAR file by using the files in the \temp directory. Run the following

commands:cd c:\tempjar -cvf SybaseAdapterProfile.jar SybaseAdapterProfile

b. Import the JAR file into the IBM Security Identity Manager applicationserver. For more information about importing the JAR file, see “Importingthe adapter profile into the IBM Security Identity Manager server” on page8.

c. Stop and start the IBM Security Identity Manager server.d. Stop and start the Sybase Adapter service. See “Start, stop, and restart of the

Sybase Adapter service” on page 8 for information about stopping andstarting the adapter service.

Editing adapter profiles on the UNIX or Linux operating systemThe adapter profile .jar file might contain ASCII files that are created by using theMS-DOS ASCII format.

About this task

If you edit an MS-DOS ASCII file on the UNIX operating system, you might see acharacter ^M at the end of each line. These characters indicate new lines of text inMS-DOS. The characters can interfere with the running of the file on UNIX orLinux systems. You can use tools, such as dos2unix, to remove the ^M characters.You can also use text editors, such as the vi editor, to remove the charactersmanually.

Example

You can use the vi editor to remove the ^M characters. From the vi commandmode, run the following command and press Enter::%s/^M//g

When you use this command, enter ^M or Ctrl-M by pressing ^v^M or Ctrl V CtrlM sequentially. The ^v instructs the vi editor to use the next keystroke instead ofissuing it as command.

14 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 27: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Password management for account restorationHow each restore action interacts with its corresponding managed resourcedepends on the managed resource or on the business processes that youimplement.

Certain resources reject a password when a request is made to restore an account.In this case, you can configure IBM Security Identity Manager to forego the newpassword requirement. You can configure the Sybase Adapter to require a newpassword when the account is restored. This feature is useful if your company'sbusiness processes require you to reset the password when an account is restored.

In the service.def file, you can define whether a password is required as a newprotocol option. When you import the adapter profile, if an option is not specified,the adapter profile importer determines the correct restoration password behaviorfrom the schema.dsml file. The adapter profile components enable remote servicesto know whether to discard a password that is entered by the user where multipleaccounts on disparate resources are being restored. In this situation, where onlysome of the accounts that are being restored might require a password. Remoteservices discard the password from the restore action for those managed resourcesthat do not require them.

Edit the service.def file to add the new protocol options, for example:<Property Name = "com.ibm.itim.remoteservices.ResourceProperties.

PASSWORD_NOT_REQUIRED_ON_RESTORE"<value>true</value></property><Property Name = "com.ibm.itim.remoteservices.ResourceProperties.

PASSWORD_NOT_ALLOWED_ON_RESTORE"<value>false</value></property>

By adding the two options in the preceding example, you can ensure that you arenot prompted for a password when an account is restored.

Verifying that the adapter is working correctlyAfter you install and configure the adapter, take steps to verify that the installationand configuration are correct.

Procedure1. Test the connection for the service that you created on IBM Security Identity

Manager.2. Run a full reconciliation from IBM Security Identity Manager.3. Run all supported operations such as add, modify, and delete on one user

account.4. Verify the ibmdi.log file after each operation to ensure that no errors are

reported.5. Verify the IBM Security Identity Manager log file trace.log to ensure that no

errors are reported when you run an adapter operation.

Chapter 4. First steps after installation 15

Page 28: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

16 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 29: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 5. Troubleshooting the adapter errors

Troubleshooting can help you determine why a product does not function properly.

These topics provide information and techniques for identifying and resolvingproblems with the adapter. They also provide information about troubleshootingerrors that might occur during the adapter installation.

Techniques for troubleshooting problemsTroubleshooting is a systematic approach to solving a problem. The goal oftroubleshooting is to determine why something does not work as expected andhow to resolve the problem. Certain common techniques can help with the task oftroubleshooting.

The first step in the troubleshooting process is to describe the problem completely.Problem descriptions help you and the IBM technical-support representative knowwhere to start to find the cause of the problem. This step includes asking yourselfbasic questions:v What are the symptoms of the problem?v Where does the problem occur?v When does the problem occur?v Under which conditions does the problem occur?v Can the problem be reproduced?

The answers to these questions typically lead to a good description of the problem,which can then lead you to a problem resolution.

What are the symptoms of the problem?

When starting to describe a problem, the most obvious question is “What is theproblem?” This question might seem straightforward; however, you can break itdown into several more-focused questions that create a more descriptive picture ofthe problem. These questions can include:v Who, or what, is reporting the problem?v What are the error codes and messages?v How does the system fail? For example, is it a loop, hang, crash, performance

degradation, or incorrect result?

Where does the problem occur?

Determining where the problem originates is not always easy, but it is one of themost important steps in resolving a problem. Many layers of technology can existbetween the reporting and failing components. Networks, disks, and drivers areonly a few of the components to consider when you are investigating problems.

The following questions help you to focus on where the problem occurs to isolatethe problem layer:v Is the problem specific to one platform or operating system, or is it common

across multiple platforms or operating systems?v Is the current environment and configuration supported?

© Copyright IBM Corp. 2012 17

Page 30: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

v Do all users have the problem?v (For multi-site installations.) Do all sites have the problem?

If one layer reports the problem, the problem does not necessarily originate in thatlayer. Part of identifying where a problem originates is understanding theenvironment in which it exists. Take some time to completely describe the problemenvironment, including the operating system and version, all correspondingsoftware and versions, and hardware information. Confirm that you are runningwithin an environment that is a supported configuration; many problems can betraced back to incompatible levels of software that are not intended to run togetheror have not been fully tested together.

When does the problem occur?

Develop a detailed timeline of events leading up to a failure, especially for thosecases that are one-time occurrences. You can most easily develop a timeline byworking backward: Start at the time an error was reported (as precisely as possible,even down to the millisecond), and work backward through the available logs andinformation. Typically, you need to look only as far as the first suspicious eventthat you find in a diagnostic log.

To develop a detailed timeline of events, answer these questions:v Does the problem happen only at a certain time of day or night?v How often does the problem happen?v What sequence of events leads up to the time that the problem is reported?v Does the problem happen after an environment change, such as upgrading or

installing software or hardware?

Responding to these types of questions can give you a frame of reference in whichto investigate the problem.

Under which conditions does the problem occur?

Knowing which systems and applications are running at the time that a problemoccurs is an important part of troubleshooting. These questions about yourenvironment can help you to identify the root cause of the problem:v Does the problem always occur when the same task is being performed?v Does a certain sequence of events need to happen for the problem to occur?v Do any other applications fail at the same time?

Answering these types of questions can help you explain the environment inwhich the problem occurs and correlate any dependencies. Remember that justbecause multiple problems might have occurred around the same time, theproblems are not necessarily related.

Can the problem be reproduced?

From a troubleshooting standpoint, the ideal problem is one that can bereproduced. Typically, when a problem can be reproduced you have a larger set oftools or procedures at your disposal to help you investigate. Consequently,problems that you can reproduce are often easier to debug and solve.

However, problems that you can reproduce can have a disadvantage: If theproblem is of significant business impact, you do not want it to recur. If possible,

18 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 31: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

re-create the problem in a test or development environment, which typically offersyou more flexibility and control during your investigation.v Can the problem be re-created on a test system?v Are multiple users or applications encountering the same type of problem?v Can the problem be re-created by running a single command, a set of

commands, or a particular application?

For information about obtaining support, see Appendix D, “Support information,”on page 35.

Warning and error messagesA warning or error message might be displayed in the user interface to provideinformation about the adapter or when an error occurs.

A warning or error might be displayed in the user interface to provide informationthat you need to know about the adapter or about an error. Table 6 containswarnings or errors which might be displayed in the user interface if the SybaseAdapter is installed on your system.

Table 6. Warning and error messages

Message code Warning or error message Remedial action

CTGIMT001E The following error occurred. Error:Either the Sybase service name isincorrect or the service is not up.

Ensure that the Sybase service name given on IBMSecurity Identity Manager service form is running.

CTGIMT001E The following error occurred. Error:Either the Sybase host or port isincorrect.

Verify that the host workstation name or the port forthe Sybase service is correctly specified.

CTGIMT002E The login credential is missing orincorrect.

Verify that you provided correct login credential onservice form.

CTGIMT001E The following error occurred. Error:No suitable JDBC driver found.

Ensure that the correct version of the JDBC driver iscopied onto the workstation where the adapter isinstalled. Ensure that the path for the driver isincluded in the system CLASSPATH variable.

CTGIMT600E An error occurred while establishingcommunication with the IBM TivoliDirectory Integrator server.

IBM Security Identity Manager cannot establish aconnection with IBM Tivoli Directory Integrator. To fixthis problem, ensure that:

v IBM Tivoli Directory Integrator is running.

v The URL specified on the service form for the IBMTivoli Directory Integrator is correct.

CTGIMT004E The adapter does not have permissionto add an account: Account_Name.

The administrator user that is provided on the IBMTivoli Directory Integrator service form does not havethe required privileges to add a user account. Ensurethat an administrator user with the requiredprivileges is specified on service form. Theseprivileges are the minimum that are required for theadministrator user:

v SA_ROLE

v SSO_ROLE

v OPER_ROLE

CTGIMT003E The account already exists. Use different name for the user to be added.

Chapter 5. Troubleshooting the adapter errors 19

Page 32: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Table 6. Warning and error messages (continued)

Message code Warning or error message Remedial action

CTGIMT015E An error occurred while deleting theAccount_Name account because theaccount does not exist.

The user you trying to delete does not exist. Ensurethat you are deleting only an existing account.

20 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 33: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 6. Adapter upgrade

You can upgrade the adapter by installing the new version of the adapter.

Upgrading the adapter might also involve additional tasks, such as upgrading theconnector, the dispatcher, and the existing adapter profile. To verify the requiredversion of these adapter components, see the adapter release notes. For theinstallation steps, see Chapter 3, “Adapter installation,” on page 7.

Dispatcher upgradeBefore you upgrade the dispatcher, verify the version of the dispatcher.v If the dispatcher version mentioned in the release notes is later than the existing

version on your workstation, install the dispatcher.v If the dispatcher version mentioned in the release notes is the same or earlier

than the existing version, do not install the dispatcher.

Note: Stop the dispatcher service before the upgrading the dispatcher and start itagain after the upgrade is complete.

Upgrade of the existing adapter profileRead the adapter Release Notes for any specific instructions before you import anew adapter profile into IBM Security Identity Manager.

See “Importing the adapter profile into the IBM Security Identity Manager server”on page 8.

Note: Restart the dispatcher service after importing the profile. Restarting thedispatcher clears the assembly lines cache and ensures that the dispatcher runs theassembly lines from the updated adapter profile.

© Copyright IBM Corp. 2012 21

Page 34: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

22 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 35: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 7. Adapter uninstallation

To completely uninstall the Sybase Adapter, you must do these procedures:1. Uninstall the adapter from Tivoli Directory Integrator server.2. Remove the adapter profile from the IBM Security Identity Manager server.

Uninstalling the adapter from the Tivoli Directory Integrator serverYou can remove the Sybase Adapter.

About this task

The Sybase Adapter installation installs the Dispatcher only on the Tivoli DirectoryIntegrator server. Therefore, you only need to uninstall from the Dispatcher. Thereis no uninstall for the Sybase Adapter.

The JAR file needed to uninstall the Dispatcher was created in theITDI_HOME\DispatcherUninstall directory when the Dispatcher was installed.

Note: The Dispatcher is required for all Tivoli Directory Integrator-based adapters.If you uninstall the Dispatcher, none of the other installed adapters function.

To remove the Sybase Adapter, complete these steps:

Procedure1. Stop the adapter service.2. Run the DispatcherUninstall.jar file. To run the JAR file, double click on the

executable file or enter the following command at the command prompt:TDI_HOME/jvm/jre/bin/java –jar DispatcherUninstall.jar

Adapter profile removal from the IBM Security Identity Manager serverBefore you remove the adapter profile, ensure that no objects exist on your IBMSecurity Identity Manager server that reference the adapter profile.

Examples of objects on the IBM Security Identity Manager server that can referencethe adapter profile are:v Adapter service instancesv Policies referencing an adapter instance or the profilev Accounts

Note: The Dispatcher component must be installed on your system for adapters tofunction correctly in a Tivoli Directory Integrator environment. When you deletethe adapter profile for the Sybase Adapter, do not uninstall the Dispatcher.

For specific information about how to remove the adapter profile, see the onlinehelp or IBM Security Identity Manager product documentation.

© Copyright IBM Corp. 2012 23

Page 36: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

24 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 37: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Chapter 8. Adapter reinstallation

There are no special considerations for reinstalling the adapter. You are notrequired to remove the adapter before reinstalling.

For more information, see Chapter 6, “Adapter upgrade,” on page 21.

© Copyright IBM Corp. 2012 25

Page 38: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

26 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 39: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Appendix A. Adapter attributes

As part of the adapter implementation, a dedicated account that allows IBMSecurity Identity Manager to access the Sybase Adaptive Server Enterprise iscreated on the Sybase Adaptive Server Enterprise.

The adapter consists of files and directories that are owned by the IBM SecurityIdentity Manager account. These files establish communication with the IBMSecurity Identity Manager server.

Attribute descriptionsThe IBM Security Identity Manager server communicates with the adapter byusing attributes in transmission packets that are sent over a network.

The combination of attributes depends on the type of action that the IBM SecurityIdentity Manager server requests from the adapter.

Table 7 lists the account form attributes that the adapter uses.

Table 7. Attributes, descriptions, and corresponding data types

Attribute Directory serverattribute

Description Data format

Database Access erSybAccess Specifies the database and alias access for the user.

For database access:

databasename:user:group:username

v The databasename must be a valid database on the managedresource.

v The user is a keyword.

v The group is a valid group that exists on the databasedatabasename.

v User name is the new name for the user in the databasedatabase name.

For alias access:

databasename:alias:databaseuser_name

v The databasename must be a valid database on the managedresource.

v The alias is a keyword.

v databaseuser_name must exist in master.dbo.syslogins andin the sysusers table of the database databasename.

String

Default Database erSybDefaultDatabase Specifies the default database for the user. If not supplied, thedefault database that is created is tempdb with public grouppermissions.

String

Default Language erSybDefaultLanguage Specifies the default language for the user. If not supplied, theform default is English, us_english.

String

Password erPassword Specifies the password for the Sybase database. Only a singlepassword attribute is passed to the IBM Security IdentityManager server.

String

Roles Assigned erSybRole Specifies the name of the Sybase role that is assigned to theuser. Multiple Role attributes can be passed to the IBM SecurityIdentity Manager server.

String

Sybase Server Name erSybServerName Specifies the name of the Sybase server. String

© Copyright IBM Corp. 2012 27

Page 40: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Table 7. Attributes, descriptions, and corresponding data types (continued)

Attribute Directory serverattribute

Description Data format

Sybase Admin ID erSybAdminId Specifies the Sybase account that is created for the SybaseAdapter.

String

Sybase AdminPassword

erServicePwd1 Specifies the password for the user account that is specified asthe Sybase Admin ID.

String

User's Full Name erSybFullName Specifies the full name of the user. String

User Name erUid Specifies the Sybase login ID. String

User Status erAccountStatus Specifies whether the user account is suspended. String

UserAccountDisabled AccountStatus Specifies whether the user account is enabled. String

Sybase adapter attributes by actionThe following lists describe typical adapter actions that are organized by theirfunctional transaction group. The lists include more information about requiredand optional attributes that are sent to the adapter to complete that action.

Database Login AddA Database Login Add is a request to create a user account with the specifiedattributes.

Table 8. Add request attributes

Required attribute Optional attribute

erUid

erPassword

erServicePwd1

erSybServerName

erSybAdminId

None

Database Login ChangeA Database Login Change is a request to change one or more attributes for thespecified users.

Table 9. Change request attributes

Required attribute Optional attribute

erUid

erServicePwd1

erSybServerName

erSybAdminId

erSybAccess

erSybDefaultDatabase

erSybDefaultLanguage

erSybFullName

erPassword

erSybRole

28 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 41: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Database Login DeleteA Database Login Delete is a request to remove the specified user from thedirectory.

Table 10. Delete request attributes

Required attribute Optional attribute

erUid

erServicePwd1

erSybServerName

erSybAdminId

None

Database Login RestoreA Database Login Restore is a request to activate a user account that waspreviously suspended.

After an account is restored, the user can access the system by using the sameattributes as the ones before the Suspend function was called.

Table 11. Restore request attributes

Required attribute Optional attribute

erUid

erServicePwd1

erSybServerName

erSybAdminId

None

Database Login SuspendA Database Login Suspend is a request to disable a user account.

The user is not removed. User attributes are not modified.

Table 12. Suspend request attributes

Required attribute Optional attribute

erUid

erServicePwd1

erSybServerName

erSybAdminId

None

PingUse Ping to verify the connection between the adapter and the IBM SecurityIdentity Manager server. Ping does not require any variables.

Appendix A. Adapter attributes 29

Page 42: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Table 13. Restore request attributes

Required attribute Optional attribute

None None

ReconciliationThe Reconciliation function synchronizes user account information between IBMSecurity Identity Manager and the adapter.

Table 14. Reconciliation function attributes

Required attribute Optional attribute

erServicePwd1

erSybServerName

erSybAdminId

None

30 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 43: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Appendix B. Adapter installation on a z/OS operating system

To install the adapters on the z/OS UNIX file system, you must install theDispatcher. The adapter uses the Tivoli Directory Integrator JDBC connector that isavailable with the base Tivoli Directory Integrator product.

For information about installing the Dispatcher, see the Tivoli Directory IntegratorDispatcher Installation and Configuration Guide.

After the installation of the adapter is complete, verify the startup and shutdownof the adapter. For more detailed instructions, see“Start, stop, and restart of theSybase Adapter service” on page 8.

© Copyright IBM Corp. 2012 31

Page 44: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

32 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 45: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Appendix C. Definitions for ITDI_HOME and ISIM_HOMEdirectories

ITDI_HOME is the directory where Tivoli Directory Integrator is installed.ISIM_HOME is the directory where IBM Security Identity Manager is installed.

ITDI_HOMEThis directory contains the jars/connectors subdirectory that contains filesfor the adapters.

Windowsdrive\Program Files\IBM\TDI\ITDI_VERSION

For example the path for version 7.1:C:\Program Files\IBM\TDI\V7.1

UNIX/opt/IBM/TDI/ITDI_VERSION

For example the path for version 7.1:/opt/IBM/TDI/V7.1

ISIM_HOMEThis directory is the base directory that contains the IBM Security IdentityManager code, configuration, and documentation.

Windowspath\IBM\isim

UNIXpath/IBM/isim

© Copyright IBM Corp. 2012 33

Page 46: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

34 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 47: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Appendix D. Support information

You have several options to obtain support for IBM products.v “Searching knowledge bases”v “Obtaining a product fix” on page 36v “Contacting IBM Support” on page 36

Searching knowledge basesYou can often find solutions to problems by searching IBM knowledge bases. Youcan optimize your results by using available resources, support tools, and searchmethods.

About this task

You can find useful information by searching the product documentation for IBMSecurity Identity Manager. However, sometimes you must look beyond the productdocumentation to answer your questions or resolve problems.

Procedure

To search knowledge bases for information that you need, use one or more of thefollowing approaches:1. Search for content by using the IBM Support Assistant (ISA).

ISA is a no-charge software serviceability workbench that helps you answerquestions and resolve problems with IBM software products. You can findinstructions for downloading and installing ISA on the ISA website.

2. Find the content that you need by using the IBM Support Portal.The IBM Support Portal is a unified, centralized view of all technical supporttools and information for all IBM systems, software, and services. The IBMSupport Portal lets you access the IBM electronic support portfolio from oneplace. You can tailor the pages to focus on the information and resources thatyou need for problem prevention and faster problem resolution. Familiarizeyourself with the IBM Support Portal by viewing the demo videos(https://www.ibm.com/blogs/SPNA/entry/the_ibm_support_portal_videos)about this tool. These videos introduce you to the IBM Support Portal, exploretroubleshooting and other resources, and demonstrate how you can tailor thepage by moving, adding, and deleting portlets.

3. Search for content about IBM Security Identity Manager by using one of thefollowing additional technical resources:v IBM Security Identity Manager version 6.0 technotes and APARs (problem

reports).v IBM Security Identity Manager Support website.v IBM Redbooks®.v IBM support communities (forums and newsgroups).

4. Search for content by using the IBM masthead search. You can use the IBMmasthead search by typing your search string into the Search field at the top ofany ibm.com® page.

5. Search for content by using any external search engine, such as Google, Yahoo,or Bing. If you use an external search engine, your results are more likely to

© Copyright IBM Corp. 2012 35

Page 48: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

include information that is outside the ibm.com domain. However, sometimesyou can find useful problem-solving information about IBM products innewsgroups, forums, and blogs that are not on ibm.com.

Tip: Include “IBM” and the name of the product in your search if you arelooking for information about an IBM product.

Obtaining a product fixA product fix might be available to resolve your problem.

About this task

You can get fixes by following these steps:

Procedure1. Obtain the tools that are required to get the fix. You can obtain product fixes

from the Fix Central Site. See http://www.ibm.com/support/fixcentral/.2. Determine which fix you need.3. Download the fix. Open the download document and follow the link in the

“Download package” section.4. Apply the fix. Follow the instructions in the “Installation Instructions” section

of the download document.

Contacting IBM SupportIBM Support assists you with product defects, answers FAQs, and helps usersresolve problems with the product.

Before you begin

After trying to find your answer or solution by using other self-help options suchas technotes, you can contact IBM Support. Before contacting IBM Support, yourcompany or organization must have an active IBM software subscription andsupport contract, and you must be authorized to submit problems to IBM. Forinformation about the types of available support, see the Support portfolio topic inthe “Software Support Handbook”.

Procedure

To contact IBM Support about a problem:1. Define the problem, gather background information, and determine the severity

of the problem. For more information, see the Getting IBM support topic in theSoftware Support Handbook.

2. Gather diagnostic information.3. Submit the problem to IBM Support in one of the following ways:

v Using IBM Support Assistant (ISA):Any data that has been collected can be attached to the service request.Using ISA in this way can expedite the analysis and reduce the time toresolution.a. Download and install the ISA tool from the ISA website. See

http://www.ibm.com/software/support/isa/.b. Open ISA.

36 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 49: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

c. Click Collection and Send Data.d. Click the Service Requests tab.e. Click Open a New Service Request.

v Online through the IBM Support Portal: You can open, update, and view allof your service requests from the Service Request portlet on the ServiceRequest page.

v By telephone for critical, system down, or severity 1 issues: For the telephonenumber to call in your region, see the Directory of worldwide contacts webpage.

Results

If the problem that you submit is for a software defect or for missing or inaccuratedocumentation, IBM Support creates an Authorized Program Analysis Report(APAR). The APAR describes the problem in detail. Whenever possible, IBMSupport provides a workaround that you can implement until the APAR isresolved and a fix is delivered. IBM publishes resolved APARs on the IBM Supportwebsite daily, so that other users who experience the same problem can benefitfrom the same resolution.

Appendix D. Support information 37

Page 50: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

38 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 51: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Appendix E. Accessibility features for IBM Security IdentityManager

Accessibility features help users who have a disability, such as restricted mobilityor limited vision, to use information technology products successfully.

Accessibility features

The following list includes the major accessibility features in IBM Security IdentityManager.v Support for the Freedom Scientific JAWS screen reader applicationv Keyboard-only operationv Interfaces that are commonly used by screen readersv Keys that are discernible by touch but do not activate just by touching themv Industry-standard devices for ports and connectorsv The attachment of alternative input and output devices

The IBM Security Identity Manager library, and its related publications, areaccessible.

Keyboard navigation

This product uses standard Microsoft Windows navigation keys.

Related accessibility information

The following keyboard navigation and accessibility features are available in theform designer:v You can use the tab keys and arrow keys to move between the user interface

controls.v You can use the Home, End, Page Up, and Page Down keys for more

navigation.v You can launch any applet, such as the form designer applet, in a separate

window to enable the Alt+Tab keystroke to toggle between that applet and theweb interface, and also to use more screen workspace. To launch the window,click Launch as a separate window.

v You can change the appearance of applets such as the form designer by usingthemes, which provide high contrast color schemes that help users with visionimpairments to differentiate between controls.

IBM and accessibility

See the IBM Human Ability and Accessibility Center For more information aboutthe commitment that IBM has to accessibility.

© Copyright IBM Corp. 2012 39

Page 52: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

40 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 53: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Notices

This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document inother countries. Consult your local IBM representative for information on theproducts and services currently available in your area. Any reference to an IBMproduct, program, or service is not intended to state or imply that only that IBMproduct, program, or service may be used. Any functionally equivalent product,program, or service that does not infringe any IBM intellectual property right maybe used instead. However, it is the user's responsibility to evaluate and verify theoperation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matterdescribed in this document. The furnishing of this document does not give youany license to these patents. You can send license inquiries, in writing, to:

IBM Director of LicensingIBM CorporationNorth Castle DriveArmonk, NY 10504-1785 U.S.A.

For license inquiries regarding double-byte (DBCS) information, contact the IBMIntellectual Property Department in your country or send inquiries, in writing, to:

Intellectual Property LicensingLegal and Intellectual Property LawIBM Japan, Ltd.19-21, Nihonbashi-Hakozakicho, Chuo-kuTokyo 103-8510, Japan

The following paragraph does not apply to the United Kingdom or any othercountry where such provisions are inconsistent with local law :

INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THISPUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHEREXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE.

Some states do not allow disclaimer of express or implied warranties in certaintransactions, therefore, this statement might not apply to you.

This information could include technical inaccuracies or typographical errors.Changes are periodically made to the information herein; these changes will beincorporated in new editions of the publication. IBM may make improvementsand/or changes in the product(s) and/or the program(s) described in thispublication at any time without notice.

Any references in this information to non-IBM Web sites are provided forconvenience only and do not in any manner serve as an endorsement of those Websites. The materials at those Web sites are not part of the materials for this IBMproduct and use of those Web sites is at your own risk.

© Copyright IBM Corp. 2012 41

Page 54: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

IBM may use or distribute any of the information you supply in any way itbelieves appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purposeof enabling: (i) the exchange of information between independently createdprograms and other programs (including this one) and (ii) the mutual use of theinformation which has been exchanged, should contact:

IBM Corporation2Z4A/10111400 Burnet RoadAustin, TX 78758 U.S.A.

Such information may be available, subject to appropriate terms and conditions,including in some cases payment of a fee.

The licensed program described in this document and all licensed materialavailable for it are provided by IBM under terms of the IBM Customer Agreement,IBM International Program License Agreement or any equivalent agreementbetween us.

Any performance data contained herein was determined in a controlledenvironment. Therefore, the results obtained in other operating environments mayvary significantly. Some measurements may have been made on development-levelsystems and there is no guarantee that these measurements will be the same ongenerally available systems. Furthermore, some measurement may have beenestimated through extrapolation. Actual results may vary. Users of this documentshould verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers ofthose products, their published announcements or other publicly available sources.IBM has not tested those products and cannot confirm the accuracy ofperformance, compatibility or any other claims related to non-IBM products.Questions on the capabilities of non-IBM products should be addressed to thesuppliers of those products.

All statements regarding IBM's future direction or intent are subject to change orwithdrawal without notice, and represent goals and objectives only.

This information contains examples of data and reports used in daily businessoperations. To illustrate them as completely as possible, the examples include thenames of individuals, companies, brands, and products. All of these names arefictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.

COPYRIGHT LICENSE:

This information contains sample application programs in source language, whichillustrate programming techniques on various operating platforms. You may copy,modify, and distribute these sample programs in any form without payment toIBM, for the purposes of developing, using, marketing or distributing applicationprograms conforming to the application programming interface for the operatingplatform for which the sample programs are written. These examples have notbeen thoroughly tested under all conditions. IBM, therefore, cannot guarantee orimply reliability, serviceability, or function of these programs. You may copy,modify, and distribute these sample programs in any form without payment to

42 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 55: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

IBM for the purposes of developing, using, marketing, or distributing applicationprograms conforming to IBM's application programming interfaces.

Each copy or any portion of these sample programs or any derivative work, mustinclude a copyright notice as follows:

If you are viewing this information softcopy, the photographs and colorillustrations might not appear.

© (your company name) (year). Portions of this code are derived from IBM Corp.Sample Programs. © Copyright IBM Corp. _enter the year or years_. All rightsreserved.

If you are viewing this information in softcopy form, the photographs and colorillustrations might not be displayed.

Trademarks

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks ofInternational Business Machines Corp., registered in many jurisdictions worldwide.Other product and service names might be trademarks of IBM or other companies.A current list of IBM trademarks is available on the Web at "Copyright andtrademark information" at http://www.ibm.com/legal/copytrade.shtml.

Adobe, Acrobat, PostScript and all Adobe-based trademarks are either registeredtrademarks or trademarks of Adobe Systems Incorporated in the United States,other countries, or both.

IT Infrastructure Library is a registered trademark of the Central Computer andTelecommunications Agency which is now part of the Office of GovernmentCommerce.

Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks orregistered trademarks of Intel Corporation or its subsidiaries in the United Statesand other countries.

Linux is a trademark of Linus Torvalds in the United States, other countries, orboth.

Microsoft, Windows, Windows NT, and the Windows logo are trademarks ofMicrosoft Corporation in the United States, other countries, or both.

ITIL is a registered trademark, and a registered community trademark of the Officeof Government Commerce, and is registered in the U.S. Patent and TrademarkOffice.

UNIX is a registered trademark of The Open Group in the United States and othercountries.

Cell Broadband Engine and Cell/B.E. are trademarks of Sony ComputerEntertainment, Inc., in the United States, other countries, or both and is used underlicense therefrom.

Notices 43

Page 56: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Java™ and all Java-based trademarks and logos are trademarks or registeredtrademarks of Oracle and/or its affiliates.

Privacy Policy Considerations

IBM Software products, including software as a service solutions, ("SoftwareOfferings") may use cookies or other technologies to collect product usageinformation, to help improve the end user experience, and to tailor interactionswith the end user or for other purposes. In many cases, no personally identifiableinformation is collected by the Software Offerings. Some of our Software Offeringscan help enable you to collect personally identifiable information. If this SoftwareOffering uses cookies to collect personally identifiable information, specificinformation about this offering’s use of cookies is set forth below.

This Software Offering does not use cookies or other technologies to collectpersonally identifiable information.

If the configurations deployed for this Software Offering provide you as customerthe ability to collect personally identifiable information from end users via cookiesand other technologies, you should seek your own legal advice about any lawsapplicable to such data collection, including any requirements for notice andconsent.

For more information about the use of various technologies, including cookies, forthese purposes, see IBM's Privacy Policy at http://www.ibm.com/privacy andIBM’s Online Privacy Statement at http://www.ibm.com/privacy/details/us/ensections entitled "Cookies, Web Beacons and Other Technologies and SoftwareProducts and Software-as-a Service".

44 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 57: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

Index

Aaccessibility x, 39accounts

dedicated 27password requirements 15restoration 15

adapterarchitecture

directory integrator connector 1dispatcher 1profile 1

configurationoptional 13profile 13

customizationprofile, editing 13steps 13

dedicated account 27dispatcher 31features 1installation

dispatcher requirement 7planning 3roadmap 3tasks 7troubleshooting errors 17verifying 15warnings 17worksheet 5

overview 1post-installation steps 13profile

customization 13importing 8removing 23service creation 10upgrading 8, 21verifying 9

reinstallation 25service, creating 10supported configurations 2trusted virtual administrator 1uninstalling 23upgrading 21user account

creation 9management tasks 1

z/OS UNIX file system 31adapter installation

overview 1add request attributes 28attributes

adapter action, byadding 28changing 28deleting 29pinging 30reconciliation 30restoring 29suspending 29

description 27

attributes (continued)network transmission packets 27

Cchange request attributes 28configuration, adapter 13

Ddedicated account 27delete request attributes 29directory integrator

connector 1uninstalling the adapter 23

dispatcheradapter architecture 1installation, verifying 7requirement 7upgrading 21

download, software 6

Eeducation xerror messages 19

IIBM

Software Support xSupport Assistant x

IBM Support Assistant 36installation

adapterdispatcher requirement 7profile 8software 7

dispatcher, verifying 7planning 3post-installation steps 13roadmap 3troubleshooting errors 17uninstall 23verification

adapter 15warnings 17worksheet 5z/OS UNIX file system 31

ISA 36ISIM_HOME definition 33ITDI_HOME definition 33

Kknowledge bases 35

Llogs, trace.log file 8

Mmessages

error 19warning 19

MS-DOS ASCII characters 14

Nnotices 41

Oonline

publications ixterminology ix

operating system prerequisites 4overview 1

Pping connection 30post-installation steps 13preinstallation roadmap 3problem-determination xprofile

editing on UNIX or Linux 14importing 8

publicationsaccessing online ixlist of ix

Rremoving adapter profiles 23request

Database Login Add 28Database Login Change 28Database Login Delete 29Database Login Restore 29Database Login Suspend 29Ping 30Reconciliation 30

restore request attributes 29roadmaps

installation 3preinstallation 3

Sservice

restart 8start 8stop 8

service, creating 10

© Copyright IBM Corp. 2012 45

Page 58: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

softwaredownload 6requirements 4website 6

support contact information 36supported configurations

adapter 2overview 2

suspend request attributes 29

Tterminology ixtrace.log file 8training xtroubleshooting

contacting support 36error messages 19getting fixes 36identifying problems 17searching knowledge bases 35support website xtechniques 17warning messages 19

Uuninstallation 23updating

adapter profile 13upgrades

adapter 21adapter profiles 21dispatcher 21

user accountcreation 9management tasks 1

Vverification

installation 15operating system prerequisites 4operating system requirements 4software

prerequisites 4requirements 4

vi command 14

Wwarning messages 19

46 IBM Security Identity Manager: Sybase Adapter Installation and Configuration Guide

Page 59: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00
Page 60: SybaseAdapter Installation and Configuration Guide fileIBM Security Identity Manager Version 6.0 SybaseAdapter Installation and Configuration Guide SC22-5495-00

����

Printed in USA

SC22-5495-00