groupwiseadapter forwindows operating systems installation … · 2016-06-30 · ibm security...

108
IBM Security Identity Manager Version 6.0 GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide SC27-4395-00

Upload: others

Post on 27-Apr-2020

6 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

IBM Security Identity ManagerVersion 6.0

GroupWise Adapter for WindowsOperating Systems Installation andConfiguration Guide

SC27-4395-00

���

Page 2: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation
Page 3: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

IBM Security Identity ManagerVersion 6.0

GroupWise Adapter for WindowsOperating Systems Installation andConfiguration Guide

SC27-4395-00

���

Page 4: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

NoteBefore using this information and the product it supports, read the information in “Notices” on page 87.

Edition notice

Note: This edition applies to version 6.0 of IBM Security Identity Manager (product number 5724-C34) and to allsubsequent releases and modifications until otherwise indicated in new editions.

© Copyright IBM Corporation 2012.US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contractwith IBM Corp.

Page 5: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Contents

Figures . . . . . . . . . . . . . . . v

Tables . . . . . . . . . . . . . . . vii

Preface . . . . . . . . . . . . . . . ixAbout this publication . . . . . . . . . . . ixAccess to publications and terminology . . . . . ixAccessibility . . . . . . . . . . . . . . xTechnical training. . . . . . . . . . . . . xSupport information . . . . . . . . . . . . xStatement of Good Security Practices . . . . . . x

Chapter 1. Overview of the GroupWiseAdapter for Windows . . . . . . . . . 1

Chapter 2. GroupWise Adapterinstallation planning . . . . . . . . . 3Preinstallation roadmap . . . . . . . . . . 3Installation roadmap. . . . . . . . . . . . 3Prerequisites . . . . . . . . . . . . . . 4Installation worksheet . . . . . . . . . . . 4Software downloads . . . . . . . . . . . . 6The GroupWise Adapter version 5.x and version 6.xrunning on the same server . . . . . . . . . 6

Chapter 3. Adapter installation . . . . . 7Installing the adapter . . . . . . . . . . . 7Adapter installation verification . . . . . . . . 9Importing the GroupWise adapter profile into theIBM Security Identity Manager server . . . . . . 9Verifying the GroupWise Adapter profile installation 10Creating an adapter service . . . . . . . . . 10Installing remotely with agentless configuration . . 13

Chapter 4. Silent mode installation andremoval . . . . . . . . . . . . . . 15Installing the adapter by using the silent mode . . 15Uninstalling the adapter by using the silent mode 16

Chapter 5. Configuring the adapter forIBM Security Identity Manager . . . . 17Starting the GroupWise Adapter configuration tool 17Viewing configuration settings . . . . . . . . 18Modifying protocol configuration settings . . . . 19Configuring event notification . . . . . . . . 23

Setting event notification triggers . . . . . . 26Configuring domain controllers for adapter-basedevent notification . . . . . . . . . . . 27Modifying an event notification context . . . . 28

Changing the configuration key . . . . . . . 31Changing activity logging settings . . . . . . . 31Modifying registry settings . . . . . . . . . 33Modifying non-encrypted registry settings . . . . 33

Modifying encrypted registry settings . . . . . 35Modifying advanced settings . . . . . . . . 35Viewing statistics . . . . . . . . . . . . 36Modifying code page settings . . . . . . . . 37Accessing help and additional options . . . . . 37

Chapter 6. SSL authenticationconfiguration for the adapter . . . . . 41Overview of SSL and digital certificates . . . . . 41

Private keys, public keys, and digital certificates 42Self-signed certificates . . . . . . . . . . 43Certificate and key formats . . . . . . . . 43

The use of SSL authentication . . . . . . . . 44Configuring certificates for SSL authentication . . . 44Configuring certificates for one-way SSLauthentication . . . . . . . . . . . . . 44Configuring certificates for two-way SSLauthentication . . . . . . . . . . . . . 45Configuring certificates when the adapter operatesas an SSL client . . . . . . . . . . . . . 46SSL certificate management with the CertTool . . . 47

Starting certTool . . . . . . . . . . . . 47Generating a private key and certificate request 49Installing the certificate for the GroupWiseadapter . . . . . . . . . . . . . . . 50Installing the certificate and key from a PKCS12file . . . . . . . . . . . . . . . . 51View the installed certificate . . . . . . . . 51Installing a CA certificate . . . . . . . . . 51Viewing CA certificates . . . . . . . . . 52Deleting a CA certificate . . . . . . . . . 52Viewing registered certificates . . . . . . . 52Registering a certificate . . . . . . . . . 52Unregistering a certificate . . . . . . . . 53Exporting a certificate and key to a PKCS12 file 53

Chapter 7. Customizing the GroupWiseAdapter for Windows . . . . . . . . 55Copying the GrpWiseProfile.jar file and extractingthe files. . . . . . . . . . . . . . . . 55Editing adapter profiles on the UNIX or Linuxoperating system . . . . . . . . . . . . 56Creating a JAR file and installing the new attributeson the IBM Security Identity Manager server . . . 56Managing passwords when restoring accounts. . . 57

Chapter 8. Taking the first steps afterinstallation . . . . . . . . . . . . . 59

Chapter 9. Troubleshooting . . . . . . 61Techniques for troubleshooting problems . . . . 61Warnings and error messages . . . . . . . . 63

© Copyright IBM Corp. 2012 iii

Page 6: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 10. GroupWise Adapterlanguage pack installation . . . . . . 65

Chapter 11. Update the GroupWiseAdapter or the Adapter DevelopmentKit (ADK). . . . . . . . . . . . . . 67Updating the GroupWise Adapter . . . . . . . 67Updating the ADK . . . . . . . . . . . . 68Location of the ADK log files . . . . . . . . 69

Chapter 12. Adapter uninstallation . . . 71Uninstalling the adapter from the target server . . 71Removal of the adapter profile from the IBMSecurity Identity Manager server . . . . . . . 71

Appendix A. Adapter attributes . . . . 73Attribute descriptions . . . . . . . . . . . 73GroupWise Adapter attributes by action . . . . . 75

System Login Add . . . . . . . . . . . 75System Login Change . . . . . . . . . . 76System Login Delete . . . . . . . . . . 77System Login Suspend . . . . . . . . . 77System Login Restore . . . . . . . . . . 77Ping . . . . . . . . . . . . . . . . 78

Reconciliation . . . . . . . . . . . . 78

Appendix B. Federal InformationProcessing Standards compliancemode . . . . . . . . . . . . . . . 79Configuring the adapter to run in FIPS mode . . . 79Operational differences when the adapter runs inFIPS mode. . . . . . . . . . . . . . . 79Security policy . . . . . . . . . . . . . 80

Authentication roles . . . . . . . . . . 80Rules of operation . . . . . . . . . . . 80

Appendix C. Support information . . . 81Searching knowledge bases . . . . . . . . . 81Obtaining a product fix . . . . . . . . . . 82Contacting IBM Support . . . . . . . . . . 82

Appendix D. Accessibility features forIBM Security Identity Manager . . . . 85

Notices . . . . . . . . . . . . . . 87

Index . . . . . . . . . . . . . . . 91

iv IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 7: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Figures

1. One-way SSL authentication (serverauthentication) . . . . . . . . . . . 45

2. Two-way SSL authentication (clientauthentication) . . . . . . . . . . . 46

3. Adapter operating as an SSL server and anSSL client . . . . . . . . . . . . . 47

© Copyright IBM Corp. 2012 v

Page 8: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

vi IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 9: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Tables

1. Preinstallation roadmap . . . . . . . . . 32. Installation roadmap . . . . . . . . . . 33. Prerequisites to install the adapter . . . . . 44. Required information to install the adapter 55. Field separator descriptions . . . . . . . 86. Default values . . . . . . . . . . . 157. Installation options . . . . . . . . . . 158. Options for the main configuration menu 189. Options for the DAML protocol menu . . . 20

10. Options for the event notification menu 2411. Registry keys and description . . . . . . 2812. Options for modify context . . . . . . . 2913. DN elements and definitions . . . . . . . 3014. Options for the activity logging menu 32

15. Attribute configuration option descriptions 3416. Options for advanced settings menu . . . . 3617. Arguments and descriptions for the agentCfg

help menu . . . . . . . . . . . . . 3818. Warning and error messages . . . . . . . 6319. Attributes, descriptions, and corresponding

data types . . . . . . . . . . . . . 7320. Add request attributes . . . . . . . . . 7621. Change request attributes . . . . . . . . 7622. Delete request attributes . . . . . . . . 7723. Suspend request attributes . . . . . . . 7724. Restore request attributes . . . . . . . . 7825. Restore request attributes . . . . . . . . 7826. Reconciliation attributes . . . . . . . . 78

© Copyright IBM Corp. 2012 vii

Page 10: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

viii IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 11: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Preface

About this publication

The GroupWise Adapter for Windows Operating Systems Installation and ConfigurationGuide provides the basic information that you need to install and configure theGroupWise Adapter for use with IBM® Security Identity Manager. IBM SecurityIdentity Manager was previously known as Tivoli® Identity Manager.

The GroupWise Adapter enables connectivity between the IBM Security IdentityManager server and a managed resource. The IBM Security Identity Managerserver is the server for your IBM Security Identity Manager product.

Access to publications and terminologyThis section provides:v A list of publications in the “IBM Security Identity Manager library.”v Links to “Online publications.”v A link to the “IBM Terminology website.”

IBM Security Identity Manager library

For a complete listing of the IBM Security Identity Manager and IBM SecurityIdentity Manager Adapter documentation, see the online library(http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=/com.ibm.isim.doc_6.0/ic-homepage.htm).

Online publications

IBM posts product publications when the product is released and when thepublications are updated at the following locations:

IBM Security Identity Manager libraryThe product documentation site (http://publib.boulder.ibm.com/infocenter/tivihelp/v2r1/index.jsp?topic=/com.ibm.isim.doc_6.0/ic-homepage.htm) displays the welcome page and navigation for the library.

IBM Security Systems Documentation CentralIBM Security Systems Documentation Central provides an alphabetical listof all IBM Security Systems product libraries and links to the onlinedocumentation for specific versions of each product.

IBM Publications CenterThe IBM Publications Center site ( http://www-05.ibm.com/e-business/linkweb/publications/servlet/pbi.wss) offers customized search functionsto help you find all the IBM publications you need.

IBM Terminology website

The IBM Terminology website consolidates terminology for product libraries in onelocation. You can access the Terminology website at http://www.ibm.com/software/globalization/terminology.

© Copyright IBM Corp. 2012 ix

Page 12: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

AccessibilityAccessibility features help users with a physical disability, such as restrictedmobility or limited vision, to use software products successfully. With this product,you can use assistive technologies to hear and navigate the interface. You can alsouse the keyboard instead of the mouse to operate all features of the graphical userinterface.

Technical trainingFor technical training information, see the following IBM Education website athttp://www.ibm.com/software/tivoli/education.

Support informationIBM Support provides assistance with code-related problems and routine, shortduration installation or usage questions. You can directly access the IBM SoftwareSupport site at http://www.ibm.com/software/support/probsub.html.

Appendix C, “Support information,” on page 81 provides details about:v What information to collect before contacting IBM Support.v The various methods for contacting IBM Support.v How to use IBM Support Assistant.v Instructions and problem-determination resources to isolate and fix the problem

yourself.

Note: The Community and Support tab on the product information center canprovide additional support resources.

Statement of Good Security PracticesIT system security involves protecting systems and information throughprevention, detection and response to improper access from within and outsideyour enterprise. Improper access can result in information being altered, destroyed,misappropriated or misused or can result in damage to or misuse of your systems,including for use in attacks on others. No IT system or product should beconsidered completely secure and no single product, service or security measurecan be completely effective in preventing improper use or access. IBM systems,products and services are designed to be part of a comprehensive securityapproach, which will necessarily involve additional operational procedures, andmay require other systems, products or services to be most effective. IBM DOESNOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES AREIMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THEMALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

x IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 13: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 1. Overview of the GroupWise Adapter for Windows

An adapter provides an interface between a managed resource and the IBMSecurity Identity Manager server.

Adapters might or might not reside on the managed resource. The IBM SecurityIdentity Manager server manages access to the resource by using your securitysystem. Adapters function as trusted virtual administrators on the target platform.They perform tasks such as creating, suspending, and restoring user accounts, andother administrative functions that are performed manually. The adapter runs as aservice, independent of whether you are logged on to the IBM Security IdentityManager server.

You can use the GroupWise Adapter to automate the following administrativetasks:v Creating a new user on the Novell GroupWise Server.v Modifying GroupWise user attributes.v Changing the GroupWise user account password.v Suspending, restoring, and deleting GroupWise user accounts.v Looking up user operations for GroupWise user accounts.v Reconciling GroupWise user accounts.v Creating non-eDirectory users on the GroupWise Server.v Creating users that have different names for their GroupWise user ID and

Novell Directory Server (NDS) account ID.v Reconciling Support Data like Groups, Post Offices, and NDS Contexts.

© Copyright IBM Corp. 2012 1

Page 14: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

2 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 15: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 2. GroupWise Adapter installation planning

Installing and configuring the adapter involves several steps that you mustcomplete in the appropriate sequence. Review the road maps before you begin theinstallation process.

Preinstallation roadmapTo install the adapter, complete the following tasks:

Table 1. Preinstallation roadmap

What to do Where to find more information

Obtain the installation software. Download the software from PassportAdvantage. See “Software downloads” onpage 6.

Verify that the software and hardwarerequirements are met for the adapter thatyou want to install.

See “Prerequisites” on page 4.

Collect the necessary information for theinstallation and configuration.

See “Installation worksheet” on page 4.

Installation roadmapThe roadmap provides guidance for the sequence of tasks that you must completeto install the adapter.

Table 2. Installation roadmap

What to do Where to find more information

Install the adapter. See Chapter 3, “Adapter installation,” on page 7.

Verify the installation. See “Adapter installation verification” on page 9.

Import the adapter profile. See “Importing the GroupWise adapter profile into the IBMSecurity Identity Manager server” on page 9.

Verify the profile. See “Verifying the GroupWise Adapter profile installation”on page 10.

Create a service. See “Creating an adapter service” on page 10.

Configure the adapter. See Chapter 5, “Configuring the adapter for IBM SecurityIdentity Manager,” on page 17.

Customize the adapter. See Chapter 7, “Customizing the GroupWise Adapter forWindows,” on page 55.

© Copyright IBM Corp. 2012 3

Page 16: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

PrerequisitesVerify that all hardware, software, and authorization prerequisites are met beforeinstalling the GroupWise Adapter.

Table 3 describes the prerequisites.

Table 3. Prerequisites to install the adapter

Prerequisite Description

System v A 32-bit x86-based microprocessor.

v A minimum of 256 MB of memory.

v At least 300 MB of free disk space.

Operating system Microsoft Windows Server 2003 EnterpriseEdition, Service Pack 2

Novell GroupWise Version 7.0.4 and version 8.0.2 running onMicrosoft Windows Server 2003 EnterpriseEdition, Service Pack 2, or Suse EnterpriseLinux 10, Service Pack 2

Client Software The adapter connects to GroupWise by usingthe following client software:

v GroupWise Client Version 7.0.4 or version8.0.2

v GroupWise Message Transfer AdapterVersion 7.0.4 or version 8.0.2

v GroupWise Post Office Adapter Version7.0.4 or version 8.0.2

GroupWise Domain Connectivity If the GroupWise Adapter is not installed onthe same workstation as the domain, map thenetwork−drive−to−domain folder on theworkstation where the adapter is installed.

Network connectivity v TCP/IP network

v For security purposes, the adapter must beinstalled on a Windows NT File System(NTFS).

System administrator authority The person who completes the GroupWiseAdapter installation procedure must havesystem administrator authority to completethese steps. This person must also have aNovell NetWare Administrator user ID andpassword before installing the GroupWiseAdapter software.

IBM Security Identity Manager server Version 6.0

Novell Client Version 4.91, Service Pack 5. This client mustbe installed on the machine where the adapteris installed.

Installation worksheetThe worksheet lists the information that you must have and the decisions that youmust make before you install the adapter. You are prompted for this informationduring the installation.

4 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 17: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 4 identifies the information you need to install the GroupWise Adapter.

Table 4. Required information to install the adapter

Required information Description and default value

Installation option The type of adapter installation, such as, fullinstallation or update installation. Thedefault value is Full Installation.

If the adapter is already installed on theworkstation, then select the UpdateInstallation option. For a first-timeinstallation of the adapter on theworkstation, select the Full Installationoption.

Admin field Separator Separate the administrator defined fieldnames from administrator field values. Forexample, if a separator is = on IBM SecurityIdentity Manager, the admin field valueneeds to be entered as: field_name=value

The default value is an equal sign (=).

Distribution List Field Separator The Distribution List (DL) member fieldformat on IBM Security Identity Manager is:

<Participation type><separator><DL name><separator> <DL PostOffice>

This separator can be configured byspecifying the value in this field. The defaultvalue is a colon (:).

Nickname Field Separator The DL member field format on IBMSecurity Identity Manager is:

<Nickname><separator><nickpostoffice><separator> <nick domain>

This separator can be configured using thispanel. The default value is a colon (:).

Resource Administrator Specify the account that the adapter uses asthe temporary resource owner. The defaultvalue is Admin.

Unique user ID in the Domain Specify whether the user ID must be uniqueto the domain. The default value is Yes.

Yes Select this option if you want theuser ID to be unique to the domain.

No Select this option if you want theuser ID to be unique to the postoffice in which the user wascreated.

Not reconciled attributes list Specify the attributes that you do not wantto reconcile. Separate the attributes with asemicolon, if you list more than oneattribute. For example,

GatewayAccess;DLMember;IsExternalUser

Chapter 2. GroupWise Adapter installation planning 5

Page 18: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Software downloadsAfter you purchase IBM Security Identity Manager, you can download the adaptersoftware from your account in IBM Passport Advantage Online.

Go to IBM Passport Advantage.

See the IBM Security Identity Manager Download Document for instructions.

Note:

You can also obtain additional adapter information from IBM Support.

The GroupWise Adapter version 5.x and version 6.x running on thesame server

The GroupWise Adapter version 6.x has capabilities that are not compatible withthe adapter version 5.x. You must upgrade all the adapters that are hosted on anindividual server at the same time.

The adapters that are installed on the same server might share commoncomponents or runtime environments. The adapter version 5.x might not becompatible with the adapter version 6.x component and therefore, the adapters donot operate as expected after the installation of the adapter version 6.x. OnWindows servers, all the adapters must be upgraded simultaneously because ofDynamic Link Library (DLL) sharing.

6 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 19: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 3. Adapter installation

You must perform several tasks to install the GroupWise Adapter.

Installing the adapterAdministrators can install the GroupWise Adapter software to provide an interfacebetween a managed resource and the IBM Security Identity Manager server.

Before you begin

Take these steps:v Verify that your site meets all the prerequisite requirements. See “Prerequisites”

on page 4.v Obtain a copy of the installation software. See “Software downloads” on page 6.v Obtain system administrator authority.v If you are updating a previous installation, the adapter you want to update must

exist. If it does not exist, the software generates the following message:Adapter is not found at specified location.Can not perform Update Installation. Please correctthe path of installed adapter or select Full Installation.

About this task

To install the adapter, complete these steps.

Procedure1. If you downloaded the installation software from Passport Advantage,

perform the following steps:a. Create a temporary directory on the computer on which you want to

install the software.b. Extract the contents of the compressed file into the temporary directory.

2. Start the installation program with the setup.exe file in the temporarydirectory.

3. Click Next on the Welcome window.4. Select either Full installation or Update installation and click Next to display

the Select Destination Directory window. Remember that the adapter mustexist if you want to perform an updated installation.

5. Specify where you want to install the adapter in the Directory Name field.Take one of these steps:a. Click Next to accept the default location.b. Click Browse and navigate to a different directory and click Next.

6. Specify the field separators in the Field Separators Settings window. Take oneof these steps:v Click Next to accept the default settings.v Enter alternate field separators and click Next.The following table describes each separator field:

© Copyright IBM Corp. 2012 7

Page 20: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 5. Field separator descriptions

Field Name Description

Admin Field Separator Used to separate administrator defined fieldnames from administrator field values. Forexample, if a separator is the equal sign (=)on IBM Security Identity Manager, enter theadmin field value as: <field name>=<value>.

Distribution List Field Separator The Distribution List (DL) member fieldformat on IBM Security Identity Manager is:

<Participation type><separator><DL name><separator><DL PostOffice>

This separator can be configured byspecifying the value in this field.

Nickname Field Separator The DL member field format on IBMSecurity Identity Manager is:

<Nickname><separator><nick postoffice><separator> <nick domain>

This separator can be configured by usingthis panel.

7. Specify the account that the adapter uses as the temporary resource owner.Take one of these steps:v Click Next to accept the default value.v Enter a different account name in the Resource Administrator window, and

click Next.

Note: The same account name must be present in each post office.8. Specify whether the user ID is unique to the domain. Take one of these steps:

v Click Yes in the Unique Userid window, if you want the user ID to beunique to the domain, and click Next.

v Click No in the Unique Userid window, if you want the user ID to beunique to the post office in which the user was created. Click Next.

9. Specify the attributes you do not want to be reconciled in the Not ReconciledAttributes window, and click Next.

Note: Separate the attributes with a semicolon, if you list more than oneattribute. For example, GatewayAccess;DLMember;IsExternalUser.

10. Review the installation settings in the Install Summary window and take oneof these steps:a. Click Back and return to a previous window to change any of these

settings.b. Click Next when you are ready to begin the installation.

11. Click Finish when the software displays the Install Completed window.

What to do next

After you finish the installation, you must import the adapter profile. See“Importing the GroupWise adapter profile into the IBM Security Identity Managerserver” on page 9.

8 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 21: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Adapter installation verificationTo ensure that the adapter is installed correctly, verify that the followingcomponents exist in the specified directories:

The following components exist in the bin directory such as C:\IBM\ISIM\Agents\GroupWiseAgent\bin:v GroupWiseAgent.exe

v agentCfg.exe

v CertTool.exe

v regis.exe

v Isamtool.exe

v fipsEnable.exe

The following components exist in the C\WINDOWS\system32 directory:v AdkApi.dll

v ErmApi.dll

v ErmApiDaml.dll

v icudt36.dll

v icuuc36.dll

v ssleay32.dll

v libeay32.dll

Review the installer log files for any errors, such as GroupwiseAgent_setup.log inthe C:\IBM\ISIM\Agents\GroupWiseAgent\ directory for any errors

If this installation is to upgrade an adapter, send a request from IBM SecurityIdentity Manager. Then verify that the version number in the GroupWiseAgent.logmatches the version of the adapter.

Note: The GroupWise Adapter does not use an xforms.xml file. Ignore the errorsin the adapter log that are related to xforms.

Importing the GroupWise adapter profile into the IBM Security IdentityManager server

You must import the adapter profile into the IBM Security Identity Manager serverbefore you use the adapter.

About this task

An adapter profile defines the types of resources that the IBM Security IdentityManager server can manage. The profile is used to create a service on the IBMSecurity Identity Manager server and to communicate with the adapter.

Before you import the adapter profile, verify that the following conditions are met:v The IBM Security Identity Manager server must be installed and running.v You must have root or Administrator authority on the IBM Security Identity

Manager server.

The adapter profile is included in the JAR file for the adapter:

Chapter 3. Adapter installation 9

Page 22: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

adapternameProfile.jar

Procedure1. Log in to the IBM Security Identity Manager server with an account that has

the authority to do administrative tasks.2. Import the adapter profile (or service type) by using the import service type

feature for your IBM Security Identity Manager product. Refer to the onlinehelp or the product documentation for specific instructions about importingservice types.

What to do next

If you receive an error that is related to the schema when you import the adapterprofile, refer to the trace.log file for information about the error. The trace.logfile location is specified with the handler.file.fileDir property that is defined inthe IBM Security Identity Manager enRoleLogging.properties file. TheenRoleLogging.properties file is installed in the IBM Security Identity Manager\data directory.

Verifying the GroupWise Adapter profile installationAfter you install the adapter profile, verify that the adapter profile wassuccessfully installed.

About this task

If the adapter profile is not installed correctly, the adapter might not function as itis intended to function. If the GroupWise Adapter profile is not already installedon your system, you must import the adapter profile. See “Importing theGroupWise adapter profile into the IBM Security Identity Manager server” on page9 for information about importing the adapter profile.

To verify that the adapter profile was successfully installed, complete these steps.

Procedure1. Create a service using the GroupWise Adapter profile. See “Creating an adapter

service” for information about this task.2. Create a user account by using the service.

What to do next

If you are unable to create a service by using the GroupWise Adapter profile oryou are unable to create a user account, the adapter profile is not installedcorrectly. You might need to import the adapter profile again.

Creating an adapter serviceYou must create a service for the adapter before the IBM Security Identity Managerserver can use the adapter to communicate with the adapter.

Procedure1. Log on to the IBM Security Identity Manager server with an account that has

the authority to perform administrative tasks.2. In the My Work pane, click Manage Services and click Create.

10 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 23: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

3. On the Select the Type of Service page, select GroupWise Profile.4. Click Next to display the adapter service form.5. Complete the following fields on the service form:

On the General Information tab:

Service NameSpecify a name that defines this adapter service on the IBMSecurity Identity Manager server.

DescriptionOptional: Specify a description for this service.

URL Specify the location and port number of the adapter. The portnumber is defined in the protocol configuration by using theagentCfg program. For more information, see “Modifyingprotocol configuration settings” on page 19.

If https is specified as part of the URL, the adapter must beconfigured to use SSL authentication. If the adapter is notconfigured to use SSL authentication, specify http for the URL.For more information, see Chapter 6, “SSL authenticationconfiguration for the adapter,” on page 41.

User IdSpecify the DAML protocol user name. The user name isdefined in the protocol configuration by using the agentCfgprogram. For more information, see “Modifying protocolconfiguration settings” on page 19.

PasswordSpecify the password for the DAML protocol user name. Thispassword is defined in the protocol configuration by using theagentCfg program. For more information, see “Modifyingprotocol configuration settings” on page 19.

OwnerOptional: Specify the service owner, if any.

Service PrerequisiteOptional: Specify an existing IBM Security Identity Managerservice that is a prerequisite for the adapter service.

Domain PathSpecify the path of the GroupWise domain directory.

Groupwise Admin PasswordSpecify the password for the GroupWise administrative user.

Groupwise Admin IDSpecify the user name of the administrative user on theGroupWise server that has read/write permissions on thedomain directory. This ID is needed when setting up anagentless configuration and the domain page is in UNC format.For example, \\myhost.myorg.com\gw8dom

NDS ServerSpecify the name of the NDS server that the GroupWise serveris using.

NDS TreeSpecify the name of the NDS tree for the specified NDS Server.

Chapter 3. Adapter installation 11

Page 24: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

NDS ContextSpecify the name of the NDS container that is under thespecified NDS Tree.

NDS UsernameSpecify the name of the NDS user ID that the adapter uses toconnect to the NDS server

NDS PasswordSpecify the password for the NDS user ID.

On the Status and information tabThis page contains read only information about the adapter andmanaged resource. These fields are examples. The actual fields varydepending on the type of adapter and how the service form isconfigured. The adapter must be running to obtain the information.Click Test Connection to populate the fields.

Last status update: DateSpecifies the most recent date when the Status and informationtab was updated.

Last status update: TimeSpecifies the most recent time of the date when the Status andinformation tab was updated.

Managed resource statusSpecifies the status of the managed resource that the adapter isconnected to.

Adapter versionSpecifies the version of the adapter that the IBM SecurityIdentity Manager service uses to provision request to themanaged resource.

Profile versionSpecifies the version of the profile that is installed in the IBMSecurity Identity Manager server.

ADK versionSpecifies the version of the ADK that the adapter uses.

Installation platformSpecifies summary information about the operating systemwhere the adapter is installed.

Adapter accountSpecifies the account that running the adapter binary file.

Adapter up time: DateSpecifies the date when the adapter started.

Adapter up time: TimeSpecifies the time of the date when the adapter started.

Adapter memory usageSpecifies the memory usage for running the adapter.

If the connection fails, follow the instructions in the error message. Alsov Verify the adapter log to ensure that the IBM Security Identity

Manager test request was successfully sent to the adapter.v Verify the adapter configuration information.

12 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 25: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

v Verify IBM Security Identity Manager service parameters for theadapter profile. For example, verify the work station name or the IPaddress of the managed resource and the port.

6. Click Finish.

Installing remotely with agentless configurationYou must do some additional configuration if you install the GroupWise serverand the adapter on different computers.

Before you begin

You must install the GroupWise Adapter. Restart the computer where you installedthe adapter.

About this task

Remote installation, that is, installing the adapter and the GroupWise server ondifferent computers requires agentless configuration.

Procedure1. Log on to the computer where you installed the adapter.2. Click Control Panel > Administrative Tools > Services.3. Stop the ISIM Groupwise Adapter service.4. Right click the service and click Properties.5. Click Log On.6. Click the This account radio button

a. Type the user name of the local administrator.b. Type the password of the local administrator.c. Confirm the password.

7. Click OK.8. Start the ISIM Groupwise Adapter service9. Log on to the computer where you installed the GroupWise Server.

10. Share the Groupwise Domain directory. Make sure to grant the administrativeuser read/write permissions.

11. Log on to IBM Security Identity Manager.12. Import the GroupWise profile.13. Use the GroupWise profile to create a service. Ensure that the two new

attributes Groupwise Admin ID and Groupwise Admin Password are specified.14. Specify the domain path. This path is the GroupWise domain directory shared

from the GroupWise server host. The path is specified in UNC format. Forexample \\myhost.myorg.com\gw8dom.

Note: Use the fully qualified distinguished name of the host in the UNC path.Do not use the host name.

15. Perform a support data reconciliation.

Chapter 3. Adapter installation 13

Page 26: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

14 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 27: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 4. Silent mode installation and removal

You can install and uninstall the GroupWise Adapter without requiring userinteraction by using the silent mode.

Silent installation suppresses the wizard and the Launcher User Interfaces (UIs)that do not display any information or require interaction. You can use the –silentoption to install or uninstall the adapter in silent mode.

Installing the adapter by using the silent modeYou can use the silent command option to install the adapter without requiringuser interaction.

Procedure1. Run the following command from command line to install the GroupWise

Adapter.setup.exe –silent

The adapter is installed with these values.

Table 6. Default values

Adapter installation directory C:\Program Files\IBM\ISIM\Agents\GroupWiseAgent

Adapter configuration option Full installation

Resource administrator Admin

Unique user ID in the domain YES

Distribution list field separator :

Nickname field separator :

Admin field separator =

2. Optional: You can specify the listed installation options from the command linewhen you install the adapter by using the silent mode. For example, to performfull installation of the adapter with default options run the followingcommand:setup.exe -silent–W FullInstallUpgradeBean.FullInstallUpgrade="1"-W GWInfoBean.AdminFieldSeparator="="-W GWInfoBean.DLFieldSeparator=":" -W GWInfoBean.NicknameFieldSeparator=":"-W GWAdminUserBean.ResourceAdministrator="Admin"-W UniqueUserBean.UserIDUniqueinDomain=YES-W ReconBean.AttributesnotRECONCILED=DLMember;IsExternalUser

The table lists the options that are available.

Table 7. Installation options

Option Description

-WFullInstallUpgradeBean.FullInstallUpgrade =Value

value = 1Performs full adapter installation.

value = 2Updates the adapter installation.

© Copyright IBM Corp. 2012 15

Page 28: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 7. Installation options (continued)

Option Description

-W UniqueUserBean.UserIDUniqueinDomain= value value = TRUE

The user ID is unique to thedomain.

value = FALSEThe user ID is unique to the postoffice in which the user wascreated.

-W GWInfoBean.AdminFieldSeparator = value Separate the administrator defined fieldnames from administrator field values. If aseparator is = on IBM Security IdentityManager, the admin field value must beentered as:

field_name = value

The default value is the equals sign (=).

-W GWInfoBean.DLFieldSeparator = value The Distribution List (DL) member fieldformat on IBM Security Identity Manager is

<Participation type><separator><DL name><separator> <DL PostOffice>

This separator can be configured byspecifying the value in this field. The defaultvalue is a colon (:).

-W GWInfoBean.NicknameFieldSeparator =value

The Distribution List (DL) member fieldformat on IBM Security Identity Manager is

<Nickname><separator><nickpostoffice><separator> <nick domain>

This separator can be configured by usingthis panel. The default value is a colon (:).

-WGWAdminUserBean.ResourceAdministrator= value

Specify the account that the adapter uses asthe temporary resource owner. The defaultvalue is Admin.

-W ReconBean.AttributesnotRECONCILED =value

Specify the attributes that you do not wantto reconcile. Separate the attributes with asemi-colon, if you list more than 1 attribute.

GatewayAccess;DLMember;IsExternalUser

Uninstalling the adapter by using the silent modeYou can use the silent command option to uninstall the adapter without requiringuser interaction.

Procedure

Run the following command from the command line to uninstall the GroupWiseAdapter.uninstaller.exe –silent

16 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 29: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 5. Configuring the adapter for IBM Security IdentityManager

After you install the adapter, you must configure the adapter to function correctly.Configuration is accomplished by selecting various options for the availablefunctions you want the adapter to use.

About this task

Note: The screens displayed in these tasks are examples, the actual screensdisplayed might differ.

To configure the adapter, perform the following steps:

Procedure1. Start the adapter service. Use the Windows Services tool.2. Configure the Directory Access Markup Language (DAML) protocol for the

adapter to establish communication with the IBM Security Identity Managerserver. See “Modifying protocol configuration settings” on page 19.

3. Configure the adapter for event notification. See “Configuring eventnotification” on page 23.

4. Install a certificate on the workstation where the adapter is installed and alsoon the IBM Security Identity Manager server to establish secure communicationbetween them. See Chapter 6, “SSL authentication configuration for theadapter,” on page 41.

5. Install the adapter profile on the IBM Security Identity Manager server. See“Importing the GroupWise adapter profile into the IBM Security IdentityManager server” on page 9.

6. Configure the adapter service form. See “Creating an adapter service” on page10.

7. Use the adapter configuration program, agentCfg, to view or modify theadapter parameters. See “Starting the GroupWise Adapter configuration tool.”

8. Configure the adapter account form. See the Information Center.9. Restart the adapter service after you modify the adapter configuration settings.

Starting the GroupWise Adapter configuration toolUse the adapter configuration program, agentCfg, to view or modify the adapterparameters.

About this task

All the changes that you make to the parameters with agentCfg take effectimmediately. You can also use agentCfg to view or modify configuration settingsfrom a remote workstation.

Procedure1. Browse to the Windows command prompt.2. In the command prompt, change to the bin subdirectory of the adapter. Run

the following command if the adapter is in the default location:

© Copyright IBM Corp. 2012 17

Page 30: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

cd C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin\

3. Run the following command:agentCfg -agent adapter_nameAgent

4. At the Enter configuration key for Agent 'adapter_nameAgent' prompt, typethe configuration key for the adapter.The default configuration key is agent. To prevent unauthorized access to theconfiguration of the adapter, you must modify the configuration key after theadapter installation completes.The Agent Main Configuration menu is displayed.

adapter_nameAgent 6.0.4.1200 Agent Main Configuration Menu-------------------------------------------A. Configuration Settings.B. Protocol Configuration.C. Event Notification.D. Change Configuration Key.E. Activity Logging.F. Registry Settings.G. Advanced Settings.H. Statistics.I. Codepage Support.

X. Done.

Select menu option:

Results

From the Main Configuration menu screen, you can configure the protocol, viewstatistics, and modify settings, including configuration, registry, and advancedsettings.

Table 8. Options for the main configuration menu

Option Configuration task

A Viewing configuration settings

B Changing protocol configuration settings

C Configuring event notification

D Changing the configuration key

E Changing activity logging settings

F Changing registry settings

G Changing advanced settings

H Viewing statistics

I Changing code page settings

Viewing configuration settingsView the adapter configuration settings for information about the adapter,including version, ADK version, and adapter log file name.

Procedure1. Access the Agent Main Configuration menu.2. Type A to display the configuration settings for the adapter.

18 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 31: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Configuration Settings-------------------------------------------Name : adapter_nameAgentVersion : 6.0.4.1200ADK Version : 6.0.1017ERM Version : 6.0.4.1200Adapter Events : FALSELicense : NONEAsynchronous ADD Requests : TRUE (Max.Threads:3)Asynchronous MOD Requests : TRUE(Max.Threads:3)Asynchronous DEL Requests : TRUE (Max.Threads:3)Asynchronous SEA Requests : TRUE (Max.Threads:3)Available Protocols : DAMLConfigured Protocols : DAMLLogging Enabled : TRUELogging Directory : C:\Program Files\IBM\ISIM\Agents\adapter_name\logLog File Name : adapter_name.logMax. log files : 3Max.log file size (Mbytes) : 1Debug Logging Enabled : TRUEDetail Logging Enabled : FALSEThread Logging Enabled : FALSE

Press any key to continue

3. Press any key to return to the Main menu.

Modifying protocol configuration settingsThe adapter uses the DAML protocol to communicate with the IBM SecurityIdentity Manager server.

About this task

By default, when the adapter is installed, the DAML protocol is configured for anonsecure environment. To configure a secure environment, use Secure SocketLayer (SSL) and install a certificate.

The DAML protocol is the only supported protocol that you can use. Do not addor remove a protocol.

Procedure1. Access the Agent Main Configuration menu.2. Type B. The DAML protocol is configured and available by default for the

adapter.

Agent Protocol Configuration Menu-----------------------------------Available Protocols: DAMLConfigured Protocols: DAMLA. Add Protocol.B. Remove Protocol.C. Configure Protocol.

X. Done

Select menu option

3. At the Agent Protocol Configuration menu, type C to display the ConfigureProtocol Menu.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 19

Page 32: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Configure Protocol Menu-----------------------------------A. DAML

X. Done

Select menu option:

4. Type a letter to display the Protocol Properties menu for the configuredprotocol with protocol properties.The following screen is an example of the DAML protocol properties.

DAML Protocol Properties--------------------------------------------------------

A. USERNAME ****** ;Authorized user name.B. PASSWORD ****** ;Authorized user password.C. MAX_CONNECTIONS 100 ;Max Connections.D. PORTNUMBER 45580 ;Protocol Server port number.E. USE_SSL FALSE ;Use SSL secure connection.F. SRV_NODENAME ––––– ;Event Notif. Server name.G. SRV_PORTNUMBER 9443 ;Event Notif. Server port number.H. HOSTADDR ANY ;Listen on address < or "ANY" >I. VALIDATE_CLIENT_CE FALSE ;Require client certificate.J. REQUIRE_CERT_REG FALSE ;Require registered certificate.K. READ_TIMEOUT 0 ;Socked read timeout (seconds)X. DoneSelect menu option:

5. Follow these steps to change a protocol value:v Type the letter of the menu option for the protocol property to configure. The

following table describes each property.v Take one of the following actions:

– Change the property value and press Enter to display the ProtocolProperties menu with the new value.

– If you do not want to change the value, press Enter.

Table 9. Options for the DAML protocol menu

Option Configuration task

A Displays the following prompt:

Modify Property ’USERNAME’:

Type a user ID, for example, agent. The IBM Security Identity Managerserver uses this value to connect to the adapter. The default user ID isagent.

B Displays the following prompt:

Modify Property ’PASSWORD’:

Type a password, for example, agent. The IBM Security IdentityManager server uses this value to connect to the adapter. The defaultpassword is agent.

C Displays the following prompt:

Modify Property ’MAX_CONNECTIONS’:

Enter the maximum number of concurrent open connections that theadapter supports. The default number is 100.

20 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 33: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 9. Options for the DAML protocol menu (continued)

Option Configuration task

D Displays the following prompt:

Modify Property ’PORTNUMBER’:

Type a different port number.

This value is the port number that the IBM Security Identity Managerserver uses to connect to the adapter. The default port number is 45580.

E Displays the following prompt:

Modify Property ’USE_SSL’:

TRUE specifies to use a secure SSL connection to connect the adapter. Ifyou set USE_SSL to TRUE, you must install a certificate. FALSE, thedefault value, specifies not to use a secure SSL connection.Note: By default event notification requires USE_SSL set to TRUE. Touse event notification, you must set USE_SSL to TRUE and add acertificate and key from the PKCS12 file in the adapter.

F Displays the following prompt:

Modify Property ’SRV_NODENAME’:

Type a server name or an IP address of the workstation where youinstalled the IBM Security Identity Manager server.

This value is the DNS name or the IP address of the IBM SecurityIdentity Manager server that is used for event notification andasynchronous request processing.Note: If your operating system supports Internet Protocol version 6(IPv6) connections, you can specify an IPv6 server.

G Displays the following prompt:

Modify Property ’SRV_PORTNUMBER’:

Type a different port number to access the IBM Security IdentityManager server.

The adapter uses this port number to connect to the IBM SecurityIdentity Manager server. The default port number is 9443.

H The HOSTADDR option is useful when the system where the adapter isrunning has more than one network adapter. You can select which IPaddress the adapter must listen to.

The default value is ANY.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 21

Page 34: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 9. Options for the DAML protocol menu (continued)

Option Configuration task

I Displays the following prompt:

Modify Property ’VALIDATE_CLIENT_CE’:

Specify TRUE for the IBM Security Identity Manager server to send acertificate when it communicates with the adapter. When you set thisoption to TRUE, you must configure options D through I.

Specify FALSE, the default value to enable the IBM Security IdentityManager server to communicate with the adapter without a certificate.Note:

v The property name is VALIDATE_CLIENT_CERT; however, it istruncated by the agentCfg to fit in the screen.

v You must use certTool to install the appropriate CA certificates andoptionally register the IBM Security Identity Manager servercertificate.

J Displays the following prompt:

Modify Property ’REQUIRE_CERT_REG’:

This value applies when option I is set to TRUE.

Type TRUE to register the adapter with the client certificate from the IBMSecurity Identity Manager server before it accepts an SSL connection.

Type FALSE to verify the client certificate against the list of CAcertificates. The default value is FALSE.

K Displays the following prompt:

Modify Property ’READ_TIMEOUT’:

Type the timeout value in seconds for IBM Security Identity Managerand the adapter connection.

This option applies to setups that have a firewall between IBM SecurityIdentity Manager and the adapter. This firewall has a timeout value thatis less than the maximum connection age DAML property on IBMSecurity Identity Manager. When your transactions run longer than thefirewall timeout, the firewall terminates the connection. The suddentermination of connections might leave the adapter with incorrectconnection threads causing the adapter to crash.

When the adapter halts randomly because of the specified setup, changethe value for the READ_TIMEOUT. The value must be in seconds andless than the timeout value of the firewall.

6. Follow these steps at the prompt:v Change the property value and press Enter to display the Protocol Properties

menu with the new value.v If you do not want to change the value, press Enter.

7. Repeat step 5 to configure the other protocol properties.8. At the Protocol Properties menu, type X to exit.

22 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 35: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Configuring event notificationWhen you enable event notification, the workstation on which the adapter isinstalled maintains a database of the reconciliation data.

About this task

The adapter updates the database with the changes that are requested by the IBMSecurity Identity Manager server and remains synchronized with the server. Youcan specify an interval for the event notification process to compare the database tothe data that currently exists on the managed resource. When the interval elapses,the adapter forwards the differences between the managed resource and thedatabase to IBM Security Identity Manager and updates the local snapshotdatabase.

To enable event notification, ensure that the adapter is deployed on the managedhost and is communicating successfully with IBM Security Identity Manager. Youmust also configure the host name, port number, and login information for theserver and SSL authentication.

Procedurev To identify the server that uses the DAML protocol and to configure SSL

authentication, perform the following steps:1. Access the Agent Main Configuration Menu. See “Starting the GroupWise

Adapter configuration tool” on page 17.2. At the Agent Protocol Configuration Menu, select Configure Protocol. See

“Modifying protocol configuration settings” on page 19.3. Change the USE_SSL property to TRUE.4. Install a certificate using the certTool. See “SSL certificate management with

the CertTool” on page 47.5. Type the letter of the menu option for the SRV_NODENAME property.6. Specify the IP address or server name that identifies the server and press

Enter to display the Protocol Properties Menu with new settings.7. Type the letter of the menu option for the SRV_PORTNUMBER property.8. Specify the port number that the adapter uses to connect to the server for

event notification.9. Press Enter to display the Protocol Properties Menu with new settings.The example menu describes all the options that are displayed when you enableevent notification. If you disable event notification, none of the options aredisplayed.

Note: The GroupWise Adapter does not support adapter-based eventnotification.

v To set event notification for the IBM Security Identity Manager server, performthe following steps:1. Access the Agent Main Configuration Menu. See “Starting the GroupWise

Adapter configuration tool” on page 17.2. At the Agent Main Configuration Menu, type C to display the Event

Notification Menu.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 23

Page 36: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Event Notification Menu--------------------------------------------------------------* Password attributes : eradapterPassword* Reconciliation interval : 1 hour(s)* Next Reconciliation time : 57 min(s). 36 sec(s).* Configured Contexts : subtest, outtest, tradewindsA. Enabled - ADKB. Time interval between reconciliations.C. Set Processing cache size. (currently: 50 Mbytes)D. Start event notification now.E. Set attributes to be reconciled.F. Reconciliation process priority. (current: 1)G. Add Event Notification Context.H. Modify Event Notification Context.I. Remove Event Notification Context.J. List Event Notification Contexts.K. Set password attribute names.

X. Done

Select menu option:

3. At the Agent Main Configuration Menu, type the letter of the menu optionthat you want to change.

Note:

– Enable option A for the values of the other options to take effect. Eachtime you select this option, the state of the option changes.

– Press Enter to return to the Agent Event Notification Menu withoutchanging the value.

Table 10. Options for the event notification menu

Option Configuration task

A If you select this option, the adapter updates the IBM Security IdentityManager server with changes to the adapter at regular intervals. IfEnabled - Adapter is selected, the adapter code processes eventnotification by monitoring a change log on the managed resource.

When the option is set to:

v Disabled, all options except Start event notification now and Setattributes to be reconciled are available. Pressing the A key changesthe setting to Enabled - ADK.

v Enabled - ADK, all options are available. Pressing the A key changesthe setting to Disabled or if your adapter supports event notification,changes to Enabled - Adapter.

v Enabled - Adapter, all options except Time interval betweenreconciliations, Set processing cache size, Start event notification now,Reconciliation process priority, and Set attributes to be reconciled areavailable. Pressing the A key changes the setting to Disabled.

Type A to toggle between the options.

24 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 37: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 10. Options for the event notification menu (continued)

Option Configuration task

B Displays the following prompt:

Enter new interval ([ww:dd:hh:mm:ss])

Type a different reconciliation interval. For example,

[00:01:00:00:00]

This value is the interval to wait after the event notification completesbefore it is run again. The event notification process is resource intense,therefore, this value must not be set to run frequently. This option is notavailable if you select Enabled - Adapter.

C Displays the following prompt:

Enter new cache size[50]:

Type a different value to change the processing cache size. This option isnot available if you select Enabled - Adapter.

D If you select this option, event notification starts. This option is notavailable if you select Disabled or Enabled - Adapter.

E Displays the Event Notification Entry Types Menu. This option is notavailable if you select Disabled or Enabled - Adapter. For moreinformation, see “Setting event notification triggers” on page 26.

F Displays the following prompt:

Enter new thread priority [1-10]:

Type a different thread value to change the event notification processpriority.

Setting the thread priority to a lower value reduces the impact that theevent notification process has on the performance of the adapter. Alower value might also cause event notification to take longer.

G Displays the following prompt:

Enter new context name:

Type the new context name and press Enter. The new context is added.

H Displays a menu listing the available contexts. See “Modifying an eventnotification context” on page 28 for more information.

I Displays the Remove Context Menu. This option displays the followingprompt:

Delete context context1? [no]:

Press Enter to exit without deleting the context or type Yes and pressEnter to delete the context.

J Displays the Event Notification Contexts in the following format:

Context Name : Context1Target DN : erservicename=context1,o=IBM,ou=IBM,dc=com--- Attributes for search request ---{search attributes listed} ---

Chapter 5. Configuring the adapter for IBM Security Identity Manager 25

Page 38: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 10. Options for the event notification menu (continued)

Option Configuration task

K When you select the Set password attribute names, you can set thenames of the attributes that contain passwords. These values are notstored in the state database and changes are not sent as events. Thisoption avoids the risk of sending a delete request for the old passwordin clear text when IBM Security Identity Manager changes a password.Changes from IBM Security Identity Manager are recorded in the localdatabase for event notification. A subsequent event notification does notretrieve the password, It sends a delete request for the old password inclear text that is listed in the IBM Security Identity Manager logs.

4. If you have changed the value for options B, C, E, or F, press Enter. Theother options are automatically changed when you type the correspondingletter of the menu option.The Event Notification Menu is displayed with your new settings.

Setting event notification triggersBy default, all the attributes are queried for value changes. You can excludefrequently changed attributes from generating event notification.

About this task

Attributes must be omitted that change frequently. For example, Password age orLast successful logon, must be omitted. Take these steps:

Note: Attributes for your adapter might be different than the attributes used inthese examples.

Procedure1. Access the Agent Main Configuration Menu. See “Starting the GroupWise

Adapter configuration tool” on page 17.2. At the Event Notification Menu, type E to display the Event Notification Entry

Types Menu.

Event Notification Entry Types-------------------------------------------A. erGrpWiseAccountB. erGrpWiseDistListC. erGrpWisePostOfficeD. erGrpWiseContextX. DoneSelect menu option:

Your adapter types might be different than this example. The types are notdisplayed in the menu until the following conditions are met:a. Enable event notificationb. Create and configure a contextc. Perform a full reconciliation operation

3. Type A for a list of the attributes returned during a user reconciliation. Type Bfor attributes returned during a group reconciliation. Type C for a list of theattributes returned during post office reconciliation. Type D for a list of theattributes returned during contexts reconciliation.

26 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 39: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

The Event Notification Attribute Listing for the selected type is displayed. Thedefault setting lists all attributes that the adapter supports. The following list isan example of attributes that might be different for other adapters.

Event Notification Attribute Listing-------------------------------------(a) **erUid (b) **erGwiseAccountID (c) **erGwiseAdminFields(d) **erGwiseContext (e) **erGwiseDepartment (f) **erGwiseDescription(g) **erGwiseDLMember (h) **erGwiseDomainPath (i) **erGwiseFaxNumber(j) **erGwiseGatewayAccess (k) **erGwiseGivenName (l) **description(m) **erGwiseGroupType (n) **erGwiseExternalEntity (o) **erGwiseExternalUser(p) **erGwiseLastName (q) **erGwiseLastModifiedBy (r) **erGwiseMailboxExpDate

(p)rev page 1 of 3 (n)ext-----------------------------

X. DoneSelect menu option:

4. To exclude an attribute from an event notification, type the letter of the menuoption.

Note: Attributes that are marked with two asterisks (**) are returned duringthe event notification. Attributes that are not marked with ** are not returnedduring the event notification.

Configuring domain controllers for adapter-based eventnotification

The adapter-based event notification requires configuration on all domaincontrollers in the managed domain.

About this task

When a user is added to a group on the Active Directory, the group object isupdated, not the user object. The adapter uses the event log entries on eachdomain controller to determine whether to add or remove a user from a group. Toenable the log for the group membership modification of users in the event log,take the following steps.

Procedure1. On Windows operating systems, click Start > Programs > Administrative Tools

> Domain Security Policy to display the Default Domain Security Settingspage.

2. Expand Local Policy and then select Audit Policy.3. Double-click the Audit account management policy to display the Audit

account management Properties page.4. Select the Define these policy settings check box and then select Success and

Failure check boxes.5. Click OK.

Setting the event viewYou can set the size of the Security log file, which must be at least 2 MB. Settingthe log size to more than 2 MB allows the log file to collect more event data.

Procedure1. On a Windows operating system, click Start > Programs > Administrative

Tools > Event Viewer to display the Event Viewer (Local) page.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 27

Page 40: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

2. Right-click Security and then select Properties to display the SecurityProperties page.

3. On the General tab, set the log size to at least 2048 KB in the Maximum logsize field.

4. Click OK.

Results

The adapter creates these registry keys under \\HKEY_LOCAL_MACHINE\SOFTWARE\Access360\adapter_nameAgent\CTXT_Context_Name.

Table 11. Registry keys and description

Registry key Description

LastChanged_Context_Name The highest changed number for the objectclass User.

LastChanged_Context_Name_CNT The highest changed number for the objectclass Container.

LastChanged_Context_Name_ GRP The highest changed number for the objectclass Group.

LastChanged_Context_Name_EMB The highest changed number for the objectclass Exchange Mailbox.

LastChanged_Context_Name_GRPCNT The highest changed number for the objectclass Group Container.

Modifying an event notification contextSome adapters support multiple services.

About this task

An event notification context corresponds to a service on the IBM Security IdentityManager server. If you want to enable event notification for a service, then youmust create a context for the service. You can have multiple event notificationcontexts.

To modify an event notification context, do the following steps. In the followingexample screen, Context1, Context2, and Context3 are different contexts that have adifferent base point.

Procedure1. Access the Agent Main Configuration menu.2. From Event Notification, type the Event Notification menu option.3. From the Event Notification menu, type the Modify Event Notification

Context option to display a list of available contexts. For example:

Modify Context Menu------------------------------A. Context1B. Context2C. Context3X. DoneSelect menu option:

4. Type the option of the context that you want to modify.

28 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 41: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

A. Set attributes for searchB. Target DN:C. Delete Baseline DatabaseX. DoneSelect menu option:

Options:

Table 12. Options for modify context

Option Configuration task

A Adding search attributes for event notification

B Configuring the target DN for event notification contexts

C Removing the baseline database for event notification contexts

Adding search attributes for event notificationFor some adapters, you might need to specify an attribute-value pair for one ormore contexts.

About this task

These attribute-value pairs, which are defined by completing the following steps,serve multiple purposes:v When a single adapter supports multiple services, each service must specify one

or more attributes to differentiate the service from the other services.v The adapter passes the search attributes to the event notification process either

after the event notification interval occurs or the event notification startsmanually. For each context, a complete search request is sent to the adapter.Additionally, the attributes specified for that context are passed to the adapter.

v When the IBM Security Identity Manager server initiates a reconciliation process,the adapter replaces the local database that represents this service with the newdatabase.

To add search attributes, perform the following steps:

Procedure1. Access the Agent Main Configuration Menu. See “Starting the GroupWise

Adapter configuration tool” on page 17.2. At the Modify Context Menu for the context, type A to display the

Reconciliation Attribute Passed to Agent Menu.

Reconciliation Attributes Passed to Agent for Context: Context1----------------------------------------------------A. Add new attributeB. Modify attribute valueC. Remove attributeX. DoneSelect menu option:

Configuring the target DN for event notification contextsDuring event notification configuration, the adapter sends requests to a service thatruns on the IBM Security Identity Manager server.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 29

Page 42: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

About this task

You must configure target DN for event notification contexts for the adapter toknow which service the adapter must send the request to. Configuring the targetDN for event notification contexts involves specifying parameters, such as theadapter service name, organization (o), and organization name (ou).

Procedure1. Access the Agent Main Configuration menu.2. Type the option for Event Notification to display the Event Notification menu.3. Type the option for Modify Event Notification Context, then enter the option of

the context that you want to modify.4. At the Modify Context menu for the context, type B to display the following

prompt:Enter Target DN:

5. Type the target DN for the context and press Enter. The target DN for the eventnotification context must be in the following format:erservicename=erservicename,o=organizationname,ou=tenantname,rootsuffix

Table 13 describes each DN element.

Table 13. DN elements and definitions

Element Definition

erservicename Specifies the name of the target service.

o Specifies the name of the organization.

ou Specifies the name of the tenant under which theorganization is. If this installation is an enterprise, then ouis the name of the organization.

rootsuffix Specifies the root of the directory tree. This value is thesame as the value of Identity Manager DN Location thatis specified during the IBM Security Identity Managerserver installation.

Results

The Modify Context Menu displays the new target DN.

Removing the baseline database for event notification contextsYou can remove the baseline database for event notification contexts only after youcreate a context. You must also do a reconciliation operation on the context tocreate a Baseline Database file.

Procedure1. From the Agent Main Configuration menu, type the Event Notification

option.2. From Event Notification, type the Remove Event Notification Context option

to display the Modify Context menu.3. Select the context that you want to remove.4. Confirm that you want to remove a context and press Enter to remove the

baseline database for event notification contexts.

30 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 43: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Changing the configuration keyUse the configuration key as a password to access the configuration tool for theadapter.

Procedure1. Access the Agent Main Configuration Menu.2. At the Main Menu prompt, type D.3. Do one of the following actions:

v Change the value of the configuration key and press Enter. The defaultconfiguration key is agent. Ensure that your password is complex.

v Press Enter to return to the Main Configuration Menu without changing theconfiguration key.

Results

The following message is displayed:Configuration key is successfully changed.

The configuration program returns to the Main Menu prompt.

Changing activity logging settingsWhen you enable logging, the adapter maintains a log file of all transactions,adapter_nameAgent.log.

About this task

By default, the log file is in the \log directory.

To change the adapter activity logging settings, take the following steps:

Procedure1. Access the Agent Main Configuration menu.2. At the Main Menu prompt, type E to display the Agent Activity Logging

menu. The following screen displays the default activity logging settings.

Agent Activity Logging Menu-------------------------------------A. Activity Logging (Enabled).B. Logging Directory (current: C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\log).C. Activity Log File Name (current: adapter_nameAgent.log).D. Activity Logging Max. File Size ( 1 mbytes)E. Activity Logging Max. Files ( 3 )F. Debug Logging (Enabled).G. Detail Logging (Disabled).H. Base Logging (Disabled).I. Thread Logging (Disabled).X. DoneSelect menu option:

3. Perform one of the following steps:v Type the value for menu option B, C, D, or E and press Enter. The other

options are changed automatically when you type the corresponding letter ofthe menu option. The following table describes each option.

v Press Enter to return to the Agent Activity Logging menu without changingthe value.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 31

Page 44: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Note: Ensure that Option A is enabled for the values of other options to takeeffect.

Table 14. Options for the activity logging menu

Option Configuration task

A Set this option to enabled to have the adapter maintain a dated log fileof all transactions.

When the option is set to:

v Disabled, pressing the A to key changes to enabled.

v Enabled, pressing the A to key changes to disabled.

Type A to toggle between the options.

B Displays the following prompt:

Enter log file directory:

Type a different value for the logging directory, for example, C:\Log.When the logging option is enabled, details about each access requestare stored in the logging file that is in this directory.

C Displays the following prompt:

Enter log file name:

Type a different value for the log file name. When the logging option isenabled, details about each access request are stored in the logging file.

D Displays the following prompt:

Enter maximum size of log files (mbytes):

Type a new value such as 10. The oldest data is archived when the logfile reaches the maximum file size. File size is measured in megabytes. Itis possible for the activity log file size to exceed disk capacity.

E Displays the following prompt:

Enter maximum number of log files to retain:

Type a new value up to 99 such as 5. The adapter automatically deletesthe oldest activity logs beyond the specified limit.

F If this option is set to enabled, the adapter includes the debugstatements in the log file of all transactions.

When the option is set to:

v Disabled, pressing the F key changes the value to enabled.

v Enabled, pressing the F key changes the value to disabled.

Type F to toggle between the options.

G If this option is set to enabled, the adapter maintains a detailed log fileof all transactions. The detail logging option must be used fordiagnostic purposes only. Detailed logging enables more messages fromthe adapter and might increase the size of the logs.

When the option is set to:

v Disabled, pressing the G key changes the value to enabled.

v Enabled, pressing the G key changes the value to disabled.

Type G to toggle between the options.

32 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 45: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 14. Options for the activity logging menu (continued)

Option Configuration task

H If this option is set to enabled, the adapter maintains a log file of alltransactions in the Adapter Development Kit (ADK) and library files.Base logging substantially increases the size of the logs.

When the option is set to:

v Disabled, pressing the H key changes the value to enabled.

v Enabled, pressing the H key changes the value to disabled.

Type H to toggle between the options.

I If this option is enabled, the log file contains thread IDs, in addition to adate and timestamp on every line of the file.

When the option is set to:

v Disabled, pressing the I key changes the value to enabled.

v Enabled, pressing the I key changes the value to disabled.

Type I to toggle between the options.

Modifying registry settingsUse the Agent Registry Menu to change the adapter registry settings.

Procedure1. Type F (Registry Settings) at the main menu prompt to display the Registry

menu:

adapter_name and version Agent Registry Menu-------------------------------------------A. Modify Non-encrypted registry settings.B. Modify encrypted registry settings.C. Multi-instance settings.X. DoneSelect menu option:

2. See the following procedures for modifying registry settings.

Modifying non-encrypted registry settingsTo modify the non-encrypted registry settings, complete the following steps:

Procedure

To modify the non-encrypted registry settings, complete the following steps:1. At the Agent Registry Menu, type A to display the Non-encrypted Registry

Settings Menu:

Chapter 5. Configuring the adapter for IBM Security Identity Manager 33

Page 46: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Agent Registry Items---------------------------

01. Admin Field Separator ’=’02. Attributes not RECONCILED ’’03. DL Field Separator ’:’04. Nickname Field Separator ’:’05. Resource Administrator ’Admin’06. UserID Unique in Domain ’TRUE’

--------------------------------Page 1 of 1

A. Add new attributeB. Modify attribute valueC. Remove attribute

X. Done

Select menu option:

2. Type the menu letter for the action that you want to perform on an attribute.

Table 15. Attribute configuration option descriptions

Option Configuration task

A Add new attribute

B Modify attribute value

C Remove attribute

3. Type the registry item name, and press Enter.4. If you selected option A or B, type the registry item value and press Enter.

The non-encrypted registry settings menu reappears and displays your newsettings.

Key Description

Admin Field Separator Specifies the separator that is used toseparate field name and field value pairs inthe Admin field

Attributes not RECONCILED Specifies the name of the fields that are notreconciled

DL Field Separator Specifies the separator that is used toseparate participation, name, and post officein the Distribution List field

Nickname Field Separator Specifies the separator that is used toseparate name, post office, and domain inthe Nickname field

Resource Administrator Specifies the name of the resourceadministrator user who owns resourcestemporarily when ownership is removed fora particular user or when the user is deleted

UserID Unique in Domain Specifies whether a unique user ID isrequired within the domain. If this value isset to TRUE, the user ID is unique to thedomain. If set to FALSE, the user ID isunique only to the post office.

34 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 47: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Modifying encrypted registry settingsYou can access registry settings.

Procedure1. Type B (Modifying Encrypted Registry Settings) at the Registry menu prompt to

display the Encrypted Registry settings menu.

Encrypted Registry Items-------------------------------------------A. Add new attributeB. Modify attribute value.C. Remove attribute.X. DoneSelect menu option:

2. Type one of the following options:A) Add new attributeB) Modify attribute valueC) Remove attributeX) Done

3. Type the registry item name, and press Enter.4. Type the registry item value, if you selected option A or B, and press Enter.

The encrypted registry settings menu reappears and displays your newsettings.

Modifying advanced settingsYou can change the adapter thread count settings.

About this task

You can change the thread count settings for the following types of requests:v System Login Addv System Login Changev System Login Deletev Reconciliation

These settings determine the maximum number of requests that the adapterprocesses concurrently. To change these settings, take the following steps:

Procedure1. Access the Agent Main Configuration menu.2. At the Main Menu prompt, type G to display the Advanced Settings menu.

The following screen displays the default thread count settings.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 35

Page 48: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

adapter_name and version number Advanced settings menu— — — — — — — — — — — — — — — — — — — — — — — — — — — — — —

A. Single Thread Agent (current:FALSE)B. ADD max. thread count. (current:3)C. MODIFY max. thread count. (current:3)D. DELETE max. thread count. (current:3)E. SEARCH max. thread count. (current:3)F. Allow User EXEC procedures (current:FALSE)G. Archive Request Packets (current:FALSE)H. UTF8 Conversion support (current:TRUE)I. Pass search filter to agent (current:FALSE)J. Thread Priority Level (1-10) (current:4)X. DoneSelect menu option:

Table 16. Options for advanced settings menu

Option Description

A Forces the adapter to allow only 1 request at a time.

The default value is FALSE.

B Limits the number of ADD requests that can run simultaneously.

The default value is 3.

C Limits the number of MODIFY requests that can run simultaneously.

The default value is 3.

D Limits the number of DELETE requests that can run simultaneously.

The default value is 3.

E Limits the number of SEARCH requests that can run simultaneously.

The default value is 3.

F Determines whether the adapter can do the pre-exec and post-execfunctions. The default value is FALSE.Note: Enabling this option is a potential security risk.

G This option is no longer supported.

H This option is no longer supported.

I Currently, this adapter does not support processing filters directly. Thisoption must always be FALSE.

J Sets the thread priority level for the adapter.

The default value is 4.

3. Type the letter of the menu option that you want to change.4. Change the value and press Enter to display the Advanced Settings menu with

new settings.

Viewing statisticsYou can view an event log for the adapter.

Procedure1. Access the Agent Main Configuration Menu.2. At the Main Menu prompt, type H to display the activity history for the

adapter.

36 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 49: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Agent Request Statistics--------------------------------------------------------------------Date Add Mod Del Ssp Res Rec

-----------------------------------------------------------------

02/15/06 000001 000000 000000 000000 000000 000001

-----------------------------------------------------------------

X. Done

3. Type X to return to the Main Configuration Menu.

Modifying code page settingsYou can change the code page settings for the adapter.

About this task

To list the supported code page information for the adapter, the adapter must berunning. Run the following command to view the code page information:agentCfg -agent [adapter_name] -codepages

Procedure1. Access the Agent Main Configuration menu.2. At the Main Menu prompt, type I to display the Code Page Support menu.

adapter_name and version number Codepage Support Menu-------------------------------------------* Configured codepage: US-ASCII-------------------------------------------********************************************* Restart Agent After Configuring Codepages*******************************************A. Codepage Configure.X. DoneSelect menu option:

3. Type A to configure a code page.

Note: The code page uses Unicode, therefore this option is not applicable.4. Type X to return to the Main Configuration menu.

Accessing help and additional optionsUse the agentCfg help menu to display the help arguments that you can use tofind information about the adapter.

Procedure1. At the Main Menu prompt, type X to display the DOS command prompt.2. Type agentCfg -help at the prompt to display the help menu and list of

commands.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 37

Page 50: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

-version ;Show version-hostname < value> ;Target nodename to connect to (Default:Local host IP address)-findall ;Find all agents on target node-list ;List available agents on target node-agent < value> ;Name of agent-tail ;Display agent’s activity log-portnumber < value> ;Specified agent’s TCP/IP port number-netsearch < value> ;Lookup agents hosted on specified subnet-codepages ;Display list of available codepages-help ;Display this help screen

Table 17. Arguments and descriptions for the agentCfg help menu

Argument Description

-version Use this argument to display the version of theagentCfg tool.

-hostname value Use the -hostname argument with one of the followingarguments to specify a different host:

v -findall

v -list

v -tail

v -agent

Enter a host name or IP address as the value.

-findall Use this argument to search and display all portaddresses 44970 - 44994 and their assigned adapternames. This option times out the unused port numbers,therefore, it might take several minutes to complete.

Add the -hostname argument to search a remote host.

-list Use this argument to display the adapters that areinstalled on the local host of the adapter. By default, thefirst time you install an adapter, it is either assigned toport address 44970 or to the next available port number.You can then assign all the later installed adapters tothe next available port address. After the software findsan unused port, the listing stops.

Use the -hostname argument to search a remote host.

-agent value Use this argument to specify the adapter that you wantto configure. Enter the adapter name as the value. Usethis argument with the -hostname argument to modifythe configuration setting from a remote host. You canalso use this argument with the -tail argument.

-tail Use this argument with the -agent argument to displaythe activity log for an adapter. Add the -hostnameargument to display the log file for an adapter on adifferent host.

-portnumber value Use this argument with the -agent argument to specifythe port number that is used for connections for theagentCfg tool.

-netsearch value Use this argument with the -findall argument todisplay all active adapters on the managed resource.You must specify a subnet address as the value.

-codepages Use this argument to display a list of available codepages.

38 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 51: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 17. Arguments and descriptions for the agentCfg help menu (continued)

Argument Description

-help Use this argument to display the Help information forthe agentCfg command.

3. Type agentCfg before each argument you want to run, as shown in thefollowing examples.

agentCfg -listDisplays:v A list of all the adapters on the local hostv The host IP address, the IP address of the local hostv The node on which the adapter is installed.

The default node for the server must be 44970. The output is like thefollowing example:Agents installed on node ’127.0.0.1’-----------------------agentnameAgent (44970)

agentCfg -agent agentnameAgentDisplays the Main menu of the agentCfg tool, which you can use toview or modify the adapter parameters.

agentCfg -list -hostname 192.9.200.7Displays a list of the adapters on a host with the IP address 192.9.200.7.Ensure that the default node for the adapter is 44970. The output is likethe following example:Agents installed on node ’192.9.200.7’------------------agentnameAgent (44970)

agentCfg -agent agentnameAgent -hostname 192.9.200.7Displays the agentCfg tool Main menu for a host with the IP address192.9.200.7. Use the menu options to view or modify the adapterparameters.

Chapter 5. Configuring the adapter for IBM Security Identity Manager 39

Page 52: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

40 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 53: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 6. SSL authentication configuration for the adapter

You can provide SSL authentication, certificates, and enable SSL authenticationwith the certTool utility.

For secure connection between the adapter and the server, configure the adapterand the server to use the Secure Sockets Layer (SSL) authentication with theDAML default communication protocol. Typically, SSL is used to establish a secureconnection that encrypts the data that is being exchanged. While it can assist inauthentication, you must enable registered certificates in DAML to use SSL forauthentication. By configuring the adapter for SSL, the server can verify theidentity of the adapter before the server makes a secure connection.

You can configure SSL authentication for connections that originate from the IBMSecurity Identity Manager server or from the adapter. The IBM Security IdentityManager server initiates a connection to the adapter to set or retrieve the value ofa managed attribute on the adapter. Depending on the security requirements ofyour environment, you might configure SSL authentication for connections thatoriginate from the adapter. For example, adapter events can notify the IBMSecurity Identity Manager server of changes to attributes on the adapter. In thiscase, configure SSL authentication for web connections that originate from theadapter to the web server used by the IBM Security Identity Manager server.

In a production environment, you must enable SSL security. If an externalapplication communicates with the adapter (for example, the IBM Security IdentityManager server) and uses server authentication, enable SSL on the adapter.Enabling SSL verifies the certificate that the application presents.

Overview of SSL and digital certificatesIn an enterprise network deployment, you must provide secure communicationbetween the IBM Security Identity Manager server and the software products andcomponents with which the server communicates.

SSL protocol uses signed digital certificates from a certificate authority (CA) forauthentication. SSL secures communication in a configuration. SSL providesencryption of the data that is exchanged between the applications. Encryptionmakes data that is transmitted over the network intelligible only to the intendedrecipient.

Signed digital certificates enable two applications that connect in a network toauthenticate their identity. An application that acts as an SSL server presents itscredentials to verify to an SSL client. The SSL client then verifies that theapplication is the entity it claims to be. You can configure an application that actsas an SSL server so that it requires the application that acts as an SSL client topresent its credentials in a certificate. In this way, the two-way exchange ofcertificates is completed. A third-party certificate authority issues signed certificatesfor a fee. Some utilities, such as those provided by OpenSSL, can also providesigned certificates.

© Copyright IBM Corp. 2012 41

Page 54: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

You must install a certificate authority certificate (CA certificate) to verify theorigin of a signed digital certificate. When an application receives a signedcertificate from another application, it uses a CA certificate to verify the certificateoriginator. A certificate authority can be:v Well-known and widely used by other organizations.v Local to a specific region or a company.

Many applications, such as web browsers, use the CA certificates of well-knowncertificate authorities. Using a well-known CA eliminates or reduces the task ofdistributing CA certificates throughout the security zones in a network.

Private keys, public keys, and digital certificatesKeys, digital certificates, and trusted certificate authorities establish and verify theidentities of applications.

SSL uses public key encryption technology for authentication. In public keyencryption, a public key and a private key are generated for an application. Thedata encrypted with the public key can be decrypted only with correspondingprivate key. Similarly, the data encrypted with the private key can be decryptedonly by using the corresponding public key. The private key is password-protectedin a key database file. Only the owner can access the private key to decryptmessages that are encrypted with the corresponding public key.

A signed digital certificate is an industry-standard method of verifying theauthenticity of an entity, such as a server, a client, or an application. To ensuremaximum security, a third-party certificate authority provides a certificate. Acertificate contains the following information to verify the identity of an entity:

Organizational informationThis certificate section contains information that uniquely identifies theowner of the certificate, such as organizational name and address. Yousupply this information when you generate a certificate with a certificatemanagement utility.

Public keyThe receiver of the certificate uses the public key to decipher encryptedtext that is sent by the certificate owner to verify its identity. A public keyhas a corresponding private key that encrypts the text.

Certificate authority's distinguished nameThe issuer of the certificate identifies itself with this information.

Digital signatureThe issuer of the certificate signs it with a digital signature to verify itsauthenticity. The corresponding CA certificate compares the signature toverify that the certificate is originated from a trusted certificate authority.

Web browsers, servers, and other SSL-enabled applications accept as genuine anydigital certificate that is signed by a trusted certificate authority and is otherwisevalid. For example, a digital certificate can be invalidated for the following reasons:v The digital certificate expired.v The CA certificate that is used to verify that it is expired.v The distinguished name in the digital certificate of the server does not match

with the distinguished name specified by the client.

42 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 55: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Self-signed certificatesYou can use self-signed certificates to test an SSL configuration before you createand install a signed certificate that is provided by a certificate authority.

A self-signed certificate contains a public key, information about the certificateowner, and the owner signature. It has an associated private key; however, it doesnot verify the origin of the certificate through a third-party certificate authority.After you generate a self-signed certificate on an SSL server application, you must:1. Extract it.2. Add it to the certificate registry of the SSL client application.

This procedure is equivalent to installing a CA certificate that corresponds to aserver certificate. However, you do not include the private key in the file whenyou extract a self-signed certificate to use as the equivalent of a CA certificate.

Use a key management utility to:v Generate a self-signed certificate.v Generate a private key.v Extract a self-signed certificate.v Add a self-signed certificate.

Usage of self-signed certificates depends on your security requirements. To obtainthe highest level of authentication between critical software components, do notuse self-signed certificates or use them selectively. You can authenticateapplications that protect server data with signed digital certificates. You can useself-signed certificates to authenticate web browsers or adapters.

If you are using self-signed certificates, you can substitute a self-signed certificatefor a certificate and CA certificate pair.

Certificate and key formatsCertificates and keys are stored in the files with various formats.

.pem formatA privacy-enhanced mail (.pem) format file begins and ends with thefollowing lines:-----BEGIN CERTIFICATE----------END CERTIFICATE-----

A .pem file format supports multiple digital certificates, including acertificate chain. If your organization uses certificate chaining, use thisformat to create CA certificates.

.arm formatAn .arm file contains a base-64 encoded ASCII representation of acertificate, including its public key, not a private key. The .arm file formatis generated and used by the IBM Key Management utility.

.der formatA .der file contains binary data. You can use a.der file for a singlecertificate, unlike a .pem file, which can contain multiple certificates.

.pfx format (PKCS12)A PKCS12 file is a portable file that contains a certificate and acorresponding private key. Use this format to convert from one type of SSL

Chapter 6. SSL authentication configuration for the adapter 43

Page 56: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

implementation to another. For example, you can create and export aPKCS12 file with the IBM Key Management utility. You can then importthe file to another workstation with the certTool utility.

The use of SSL authenticationWhen you start the adapter, it loads the available connection protocols.

The DAML protocol is the only available protocol that supports SSL authentication.You can specify DAML SSL implementation.

The DAML SSL implementation uses a certificate registry to store private keys andcertificates. The certTool key and certificate management tool manages the locationof the certificate registry. You do not have to specify the location of the registrywhen you do certificate management tasks.

Configuring certificates for SSL authenticationYou can configure the adapter for one-way or two-way SSL authentication withsigned certificates.

About this task

Use the certTool utility for these tasks:v “Configuring certificates for one-way SSL authentication”v “Configuring certificates for two-way SSL authentication” on page 45v “Configuring certificates when the adapter operates as an SSL client” on page 46

Configuring certificates for one-way SSL authenticationIn this configuration, the IBM Security Identity Manager server and the IBMSecurity Identity Manager adapter use SSL.

About this task

Client authentication is not set on either application. The IBM Security IdentityManager server operates as the SSL client and initiates the connection. The adapteroperates as the SSL server and responds by sending its signed certificate to theIBM Security Identity Manager server. The IBM Security Identity Manager serveruses the installed CA certificate to validate the certificate that is sent by theadapter.

In Figure 1 on page 45, Application A operates as the IBM Security IdentityManager server, and Application B operates as the IBM Security Identity Manageradapter.

44 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 57: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

To configure one-way SSL, do the following tasks for each application:

Procedure1. On the adapter, complete these steps:

a. Start the certTool utility.b. To configure the SSL-server application with a signed certificate issued by a

certificate authority:1) Create a certificate signing request (CSR) and private key. This step

creates the certificate with an embedded public key and a separateprivate key and places the private key in the PENDING_KEY registryvalue.

2) Submit the CSR to the certificate authority by using the instructions thatare supplied by the CA. When you submit the CSR, specify that youwant the root CA certificate to be returned with the server certificate.

2. On the IBM Security Identity Manager server, do one of these steps:v If you used a signed certificate that is issued by a well-known CA:

a. Ensure that the IBM Security Identity Manager server stored the rootcertificate of the CA (CA certificate) in its truststore.

b. If the truststore does not contain the CA certificate, extract the CAcertificate from the adapter and add it to the truststore of the server.

v If you generated the self-signed certificate on the IBM Security IdentityManager server, the certificate is installed and requires no additional steps.

v If you generated the self-signed certificate with the key management utilityof another application:a. Extract the certificate from the keystore of that application.b. Add it to the truststore of the IBM Security Identity Manager server.

Configuring certificates for two-way SSL authenticationIn this configuration, the IBM Security Identity Manager server and adapter useSSL.

About this task

The adapter uses client authentication. After the adapter sends its certificate to theserver, the adapter requests identity verification from the IBM Security IdentityManager server. The server sends its signed certificate to the adapter. Bothapplications are configured with signed certificates and corresponding CAcertificates.

CACertificate

A

CertificateA

IBM Security ManagerServer (SSL client)

IBM Security Manageradapter (SSL client)

Truststore

Verify

Hello

Send Certificate A

Figure 1. One-way SSL authentication (server authentication)

Chapter 6. SSL authentication configuration for the adapter 45

Page 58: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

In the following figure, the IBM Security Identity Manager server operates asApplication A and the adapter operates as Application B.

Before you do the following procedure, configure the adapter and IBM SecurityIdentity Manager server for one-way SSL authentication. If you use signedcertificates from a CA:v The CA provides a configured adapter with a private key and a signed

certificate.v The signed certificate of the adapter provides the CA certification for the IBM

Security Identity Manager server.

To complete the certificate configuration for two-way SSL, do the following tasks:

Procedure1. On the IBM Security Identity Manager server, create a CSR and private key.

Next, obtain a certificate from a CA, install the CA certificate, install the newlysigned certificate, and extract the CA certificate to a temporary file.

2. On the adapter, add the CA certificate that was extracted from the keystore ofthe IBM Security Identity Manager server to the adapter.

Results

After you configure the two-way certificate, each application has its own certificateand private key. Each application also has the certificate of the CA that issued thecertificates.

Configuring certificates when the adapter operates as an SSL clientIn this configuration, the adapter operates as both an SSL client and as an SSLserver.

About this task

This configuration applies if the adapter initiates a connection to the web server(used by the IBM Security Identity Manager server) to send an event notification.For example, the adapter initiates the connection and the web server responds bypresenting its certificate to the adapter.

Figure 3 on page 47 describes how the adapter operates as an SSL server and anSSL client. To communicate with the IBM Security Identity Manager server, theadapter sends its certificate for authentication. To communicate with the web

C

Verify

CACertificate

A

CertificateB

Send Certificate AVerify

HelloKeystore

CertificateA

CACertificate

B

Security Identity Manageradapter (SSL server)

Security Identity ManagerServer (SSL client)

Truststore

Keystore

Figure 2. Two-way SSL authentication (client authentication)

46 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 59: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

server, the adapter receives the certificate of the web server.

If the web server is configured for two-way SSL authentication, it verifies theidentity of the adapter. The adapter sends its signed certificate to the web server(not shown in the illustration). To enable two-way SSL authentication between theadapter and web server, take these steps:

Procedure1. Configure the web server to use client authentication.2. Follow the procedure for creating and installing a signed certificate on the web

server.3. Install the CA certificate on the adapter with the certTool utility.4. Add the CA certificate corresponding to the signed certificate of the adapter to

the web server.

What to do next

You can have the software send an event notification when the adapter initiates aconnection to the web server (used by the IBM Security Identity Manager server).See the IBM Security Identity Manager product documentation.

SSL certificate management with the CertToolUse the certTool utility to manage private keys and certificates.

Starting certToolTo start the certificate configuration tool named certTool for the adapter, completethese steps:

Procedure1. Click Start > Programs > Accessories > Command Prompt.2. At a DOS command prompt, change to the bin directory for the adapter. If the

directory is in the default location, type the following command:cd C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin\

3. Type CertTool -agent agent_name at the prompt.For example, to display the main menu, type: CertTool -agent NotesAgent

IBM SecurityIdentityManagerAdapter

IBM SecurityIdentityManagerServer

CA Certificate ACertificate ACA Certificate C

Certificate C

Web server

A B

C

Hello

Certificate A

Hello

Certificate C

Figure 3. Adapter operating as an SSL server and an SSL client

Chapter 6. SSL authentication configuration for the adapter 47

Page 60: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Main menu - Configuring agent: agentnameAgent------------------------------A. Generate private key and certificate requestB. Install certificate from fileC. Install certificate and key from PKCS12 fileD. View current installed certificate

E. List CA certificatesF. Install a CA certificateG. Delete a CA certificate

H. List registered certificatesI. Register certificateJ. Unregister a certificate

K. Export certificate and key to PKCS12 file

X. Quit

Choice:

Results

From the Main menu, you can generate a private key and certificate request, installand delete certificates, register and unregister certificates, and list certificates. Thefollowing sections summarize the purpose of each group of options.

By using the first set of options (A through D), you can generate a CSR and installthe returned signed certificate on the adapter.

A. Generate private key and certificate requestGenerate a CSR and the associated private key that is sent to the certificateauthority.

B. Install certificate from fileInstall a certificate from a file. This file must be the signed certificate that isreturned by the CA in response to the CSR that is generated by option A.

C. Install certificate and key from a PKCS12 fileInstall a certificate from a PKCS12 format file that includes both the publiccertificate and a private key. If options A and B are not used to obtain acertificate, the certificate that you use must be in PKCS12 format.

D. View current installed certificateView the certificate that is installed on the workstation where the adapteris installed.

With the second set of options, you can install root CA certificates on the adapter.A CA certificate validates the corresponding certificate that is presented by a client,such as the IBM Security Identity Manager server.

E. List CA certificatesShow the installed CA certificates. The adapter communicates only withIBM Security Identity Manager servers whose certificates are validated byone of the installed CA certificates.

F. Install a CA certificateInstall a new CA certificate so that certificates generated by this CA can bevalidated. The CA certificate file can either be in X.509 or PEM encodedformats.

G. Delete a CA certificateRemove one of the installed CA certificates.

48 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 61: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Options H through K apply to adapters that must authenticate the application towhich the adapter is sending information. An example of an application is the IBMSecurity Identity Manager server or the web server. Use these options to registercertificates on the adapter. For IBM Security Identity Manager version 4.5 or earlier,register the signed certificate of the IBM Security Identity Manager server with anadapter to enable client authentication on the adapter. If you do not upgrade anexisting adapter to use CA certificates, you must register the signed certificate thatis presented by the IBM Security Identity Manager server with the adapter.

If you configure the adapter for event notification or enable client authentication inDAML, you must install the CA certificate. The CA certificate must correspond tothe signed certificate of the IBM Security Identity Manager server. Use option F,Install a CA certificate.

H. List registered certificatesList all registered certificates that are accepted for communication.

I. Register a certificateRegister a new certificate. The certificate for registration must be in Base 64encoded X.509 format or PEM.

J. Unregister a certificateUnregister (remove) a certificate from the registered list.

K. Export certificate and key to PKCS12 fileExport a previously installed certificate and private key. You are promptedfor the file name and a password for encryption.

Generating a private key and certificate requestA certificate signing request (CSR) is an unsigned certificate that is a text file.

About this task

When you submit an unsigned certificate to a certificate authority, the CA signs thecertificate with the private digital signature. The signature is included in theircorresponding CA certificate. When the CSR is signed, it becomes a validcertificate. A CSR contains information about your organization, such as theorganization name, country, and the public key for your web server.

Procedure1. At the Main Menu of the certTool, type A. The following message and prompt

are displayed:Enter values for certificate request (press enter to skip value)-------------------------------------------------------------------------

2. At Organization, type your organization name and press Enter.3. At Organizational Unit, type the organizational unit and press Enter.4. At Agent Name, type the name of the adapter for which you are requesting a

certificate and press Enter.5. At email, type the email address of the contact person for this request and

press Enter.6. At State, type the state that the adapter is in and press Enter. For example,

type TX if the adapter is in Texas. Some certificate authorities do not accepttwo letter abbreviations for states; type the full name of the state.

7. At Country, type the country that the adapter is in and press Enter.8. At Locality, type the name of the city that the adapter is in and press Enter.

Chapter 6. SSL authentication configuration for the adapter 49

Page 62: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

9. At Accept these values, take one of the following actions and press Enter:v Type Y to accept the displayed values.v Type N and specify different values.The private key and certificate request are generated after the values areaccepted.

10. At Enter name of file to store PEM cert request, type the name of the file andpress Enter. Specify the file that you want to use to store the values youspecified in the previous steps.

11. Press Enter to continue. The certificate request and input values are written tothe file that you specified. The file is copied to the adapter bin directory andthe Main menu is displayed again.

Results

You can now request a certificate from a trusted CA by sending the .pem file thatyou generated to a certificate authority vendor.

Example of certificate signing requestHere is an example certificate signing request (CSR) file.-----BEGIN CERTIFICATE REQUEST-----MIIB1jCCAT8CAQAwgZUxEjAQBgNVBAoTCWFjY2VzczM2MDEUMBIGA1UECxMLZW5naW5lZXJpbmcxEDAOBgNVBAMTB250YWdlbnQxJDAiBgkqhkiG9w0BCQEWFW50YWdlbnRAYWNjZXNzMzYwLmNvbTELMAkGA1UEBhMCVVMxEzARBgNVBAgTCkNhbGlmb3JuaWExDzANBgNVBAcTBklydmluZTCBnzANBgkqhkiG9w0BAQEFAAOBjQAwgYkCgYEAmR6AcPnwf6hLLc72BmUkAwaXcebtxCoCnnTH9uc8VuMHPbIMAgjuC4s91hPrilG7UtlbOfy6X3R3kbeR8apRR9uLYrPIvQ1b4NK0whsytij6syCySaFQIB6V7RPBatFr6XQ9hpsARdkGytZmGTgGTJ1hSS/jA6mbxpgmttz9HPECAwEAAaAAMA0GCSqGSIb3DQEBAgUAA4GBADxA1cDkvXhgZntHkwT9tCTqUNV9sim8N/U15HgMRh177jVaHJqbN1Er46vQSsOOOk4z2i/XwOmFkNNTXRVl9TLZZ/D+9mGZcDobcO+lbAKlePwyufxKXqdpu3d433H7xfJJSNYLYBFkrQJesITqKft0Q45gIjywIrbctVUCepL2-----END CERTIFICATE REQUEST-----

Installing the certificate for the GroupWise adapterAfter you receive your certificate from your trusted CA, install it in the registry ofthe adapter.

Procedure1. If you received the certificate as part of an email message, do the following

actions.a. Copy the text of the certificate to a text file.b. Copy that file to the bin directory of the adapter.For Windows operating systems:C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin

2. At the Main Menu prompt of the certTool, type B. The following prompt isdisplayed:Enter name of certificate file:-------------------------------------------------------------------------

3. At Enter name of certificate file, type the full path to the certificate file andpress Enter.The certificate is installed in the registry for the adapter, and Main Menu isdisplayed again.

50 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 63: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Installing the certificate and key from a PKCS12 fileIf the certTool utility did not generate a CSR to obtain a certificate, you mustinstall both the certificate and private key.

About this task

Store the certificate and private key in a PKCS12 file. The CA sends a PKCS12 filethat has a .pfx extension. The file might be a password-protected file and itincludes both the certificate and private key.

Procedure1. Copy the PKCS12 file to the bin directory of the adapter.

For Windows operating systems:C:\Program Files\IBM\ISIM\Agents\adapter_nameAgent\bin

2. At the Main Menu prompt for the certTool, type C to display the followingprompt:Enter name of PKCS12 file:-------------------------------------------------------------------------

3. At Enter name of PKCS12 file, type the name of the PKCS12 file that has thecertificate and private key information and press Enter. For example,DamlSrvr.pfx.

4. At Enter password, type the password to access the file and press Enter.

Results

After you install the certificate and private key in the adapter registry, the certTooldisplays Main Menu.

View the installed certificateTo list the certificate on your workstation, type D at the Main menu of certTool.

The utility displays the installed certificate and the Main menu. The followingexample shows an installed certificate:The following certificate is currently installed.Subject: c=US,st=California,l=Irvine,o=DAML,cn=DAML Server

Installing a CA certificateIf you use client authentication, you must install a CA certificate that is providedby a certificate authority vendor. You can install a CA certificate that was extractedin a temporary file.

Procedure1. At the Main Menu prompt, type F (Install a CA certificate).

The following prompt is displayed:Enter name of certificate file:

2. At Enter name of certificate file, type the name of the certificate file, such asDamlCACerts.pem and press Enter.The certificate file opens and the following prompt is displayed:[email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=EngInstall the CA? (Y/N)

3. At Install the CA, type Y to install the certificate and press Enter.

Chapter 6. SSL authentication configuration for the adapter 51

Page 64: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

The certificate file is installed in the CACerts.pem file.

Viewing CA certificatesUse the certTool utility to view a private key and certificate that are installed theadapter.

About this task

The certTool utility installs only one certificate and one private key.

Procedure

Type E at the Main Menu prompt.

Results

The certTool utility displays the installed CA certificates and the Main menu. Thefollowing example shows an installed CA certificate:Subject: o=IBM,ou=SampleCACert,cn=TestCAValid To: Wed Jul 26 23:59:59 2006

Deleting a CA certificateYou can delete a CA certificate from the adapter directories.

Procedure1. At the Main Menu prompt, type G to display a list of all CA certificates that

are installed on the adapter.0 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng1 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Support,cn=SupportEnter number of CA certificate to remove:

2. At Enter number of CA certificate to remove, type the number of the CAcertificate that you want to remove and press Enter.

Results

After the CA certificate is deleted from the CACerts.pem file, the certTool displaysthe Main menu.

Viewing registered certificatesThe adapter accepts only the requests that present a registered certificate whenclient validation is enabled.

Procedure

To view a list of all registered certificates, type H on the Main Menu prompt.The utility displays the registered certificates and the Main menu. The followingexample shows a list of the registered certificates:0 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng1 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Support,cn=Support

Registering a certificateYou can register a certificate for the adapter.

52 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 65: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Procedure1. At the Main Menu prompt, type I to display the following prompt:

Enter name of certificate file:

2. At Enter name of certificate file, type the name of the certificate file that youwant to register and press Enter.The subject of the certificate is displayed, and a prompt is displayed, forexample:[email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=EngRegister this CA? (Y/N)

3. At Register this CA, type Y to register the certificate, and press Enter.

Results

After you register the certificate to the adapter, the certTool displays the Mainmenu.

Unregistering a certificateYou can unregister a certificate for the adapter.

Procedure1. At the Main Menuprompt, type J to display the registered certificates. The

following example shows a list of lists registered certificates:0 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=Eng1 - [email protected],c=US,st=California,l=Irvine,o=IBM,ou=Support,cn=Support

2. Type the number of the certificate file that you want to unregister and pressEnter. For example:[email protected],c=US,st=California,l=Irvine,o=IBM,ou=Engineering,cn=EngUnregister this CA? (Y/N)

3. At Unregister this CA, type Y to unregister the certificate and press Enter.

Results

After you remove the certificate from the list of registered certificate for theadapter, the certTool displays the Main Menu.

Exporting a certificate and key to a PKCS12 fileYou can export a certificate and key to a PKCS12 file.

Procedure1. At the Main Menu prompt, type K to display the following prompt:

Enter name of PKCS12 file:

2. At the Enter name of PKCS12 file prompt, type the name of the PKCS12 filefor the installed certificate or private key and press Enter.

3. At the Enter Password prompt, type the password for the PKCS12 file andpress Enter.

4. At the Confirm Password prompt, type the password again and press Enter.

Results

After the certificate or private key is exported to the PKCS12 file, the certTooldisplays the Main menu.

Chapter 6. SSL authentication configuration for the adapter 53

Page 66: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

54 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 67: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 7. Customizing the GroupWise Adapter for Windows

You can update the GroupWise Adapter JAR file, GrpWiseProfile.jar, to changethe adapter schema, account form, service form, and profile properties.

About this task

To make updates, extract the files from the JAR file, change the necessary files, andrepackage the JAR file with the updated files.

Complete these steps to customize the GroupWise Adapter profile:1. Copy the JAR file to a temporary directory and extract the files. For more

information, see “Copying the GrpWiseProfile.jar file and extracting the files.”2. Make the appropriate file changes.3. Install the new attributes on the IBM Security Identity Manager server. For

more information, see “Creating a JAR file and installing the new attributes onthe IBM Security Identity Manager server” on page 56.

Copying the GrpWiseProfile.jar file and extracting the filesThe profile JAR file, GrpWiseProfile.jar, is included in the GroupWise Adaptercompressed file that you downloaded from the IBM website.

About this task

The GrpWiseProfile.jar file contains the following files:v CustomLabels.properties

v erGrpWiseAccount.xml

v erGrpWiseDAMLService.xml

v resource.def

v schema.dsml

You can modify these files to customize your environment.

Procedure

Perform the following steps to modify the GrpWiseProfile.jar file:1. Log in to the system where the GroupWise Adapter is installed.2. On the Start menu, click Programs > Accessories > Command Prompt.3. Copy the GrpWiseProfile.jar file into a temporary directory.4. Extract the contents of` the GrpWiseProfile.jar file into the temporary

directory by running the following command:cd c:\tempjar -xvf GrpWiseProfile.jar

The jar command creates the c:\temp\GrpWiseProfile directory.5. Edit the appropriate file.

© Copyright IBM Corp. 2012 55

Page 68: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

What to do next

When you finish updating the profile JAR file, install it on the IBM SecurityIdentity Manager server. For more information, see “Importing the GroupWiseadapter profile into the IBM Security Identity Manager server” on page 9.

Editing adapter profiles on the UNIX or Linux operating systemThe adapter profile .JAR file might contain ASCII files that are created by using theMS-DOS ASCII format (For example, schema.dsml, CustomLabels.properties, andservice.def).

About this task

If you edit an MS-DOS ASCII file on the UNIX operating system, you see character^M at the end of each line. This character is the extra character 0x0d that is used toindicate a new line of text in MS-DOS. Tools, such as, dos2unix are used to removethe ^M character.

You might also want to use a text editor, such as the vi editor, that ignores the ^Mcharacter. Enter the ^M (or Ctrl-M) in the command by pressing ^v^M (or Ctrl VCtrl M) in sequence.

Example

For example, if you are using the vi editor, you can remove the ^M character byperforming the following steps:1. From the vi editor command mode, run the following command:

:%s/^M//g

Enter the ^M (or Ctrl-M) by pressing ^v^M (or Ctrl V Ctrl M) in sequence. The^v preface indicates to the vi editor to use the next keystroke instead ofconsidering the entry as a command.

2. Press Enter.

Creating a JAR file and installing the new attributes on the IBMSecurity Identity Manager server

After you modify the schema.dsml and CustomLabels.properties files, put thechanges into effect by importing these files and any other files in the profile thatwere modified for the adapter, into the IBM Security Identity Manager server.

About this task

To install the new attributes, complete the following steps:

Procedure1. Create a JAR file using the files in the \TEMP directory by running the following

commands:cd C:\TEMPjar -cvf GrpWiseProfile.jar GrpWiseProfile

2. Import the GrpWiseProfile.jar file into the IBM Security Identity Managerserver. For more information, see “Importing the GroupWise adapter profileinto the IBM Security Identity Manager server” on page 9.

3. Stop and start the IBM Security Identity Manager server.

56 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 69: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Note: If you are updating an existing adapter profile, the new adapter profileschema is not immediately used. Stop and start the IBM Security IdentityManager server to refresh the cache and the adapter schema. For moreinformation, see “Updating the GroupWise Adapter” on page 67.

Managing passwords when restoring accountsWhen accounts for a person are restored after a previous suspension, you are notprompted to supply a new password for the reinstated accounts. However, thereare circumstances when you might want to circumvent this behavior.

About this task

The password requirement to restore an account on GroupWise Server falls intotwo categories: allowed and required. How each restore action interacts with itscorresponding managed resource depends on either the managed resource, or thebusiness processes that you implement. Certain resources will reject a passwordwhen a request is made to restore an account. In this case, you can configure IBMSecurity Identity Manager to forego the new password requirement. If yourcompany has a business process in place that dictates that the account restorationprocess must be accompanied by resetting the password, you can set theGroupWise Adapter to require a new password when the account is restored.

In the resource.def file, you can define whether a password is required as a newprotocol option. When you import the adapter profile, if an option is not specified,the adapter profile importer determines the correct restoration password behavior.Adapter profile components also enable remote services to find out if you discarda password that is entered by the user in a situation where multiple accounts ondisparate resources are being restored. In this scenario, only some of the accountsbeing restored might require a password. Remote services will discard thepassword from the restore action for those managed resources that do not requirethem.

Note:

v If you are upgrading an existing adapter profile, the new adapter profile schemawill not be reflected immediately. You need to stop and start the IBM SecurityIdentity Manager in order to refresh the cache and therefore the adapter schema.For more information on upgrading an existing adapter, see “Updating theGroupWise Adapter” on page 67.

v The Restore and Suspend operations are not supported for user accountswithout a profile.

To configure the GroupWise Adapter to prompt for a new password whenrestoring accounts:

Procedure1. Stop the IBM Security Identity Manager.2. Extract the files from the GrpWiseProfile.jar file. For more information on

customizing the adapter profile file, see “Copying the GrpWiseProfile.jar fileand extracting the files” on page 55.

3. Change to the \GrpWiseProfile directory, where the resource.def file has beencreated.

4. Edit the resource.def file to add the new protocol options, for example:

Chapter 7. Customizing the GroupWise Adapter for Windows 57

Page 70: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

<Property Name = "com.ibm.itim.remoteservices.ResourceProperties.PASSWORD_NOT_REQUIRED_ON_RESTORE" Value = "FALSE"/><Property Name = "com.ibm.itim.remoteservices.ResourceProperties.PASSWORD_NOT_ALLOWED_ON_RESTORE" Value = "FALSE"/>

Adding the two options in the example above ensures that you are prompted fora password when an account is restored.

5. Create a new GrpWiseProfile.jar file using the resource.def file and importthe adapter profile file into the IBM Security Identity Manager server. For moreinformation, see “Creating a JAR file and installing the new attributes on theIBM Security Identity Manager server” on page 56.

6. Start the IBM Security Identity Manager again.

58 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 71: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 8. Taking the first steps after installation

After installing and configuring the adapter, ensure that the adapter is workingcorrectly.

Procedure1. Test the connection for the service that you created on IBM Security Identity

Manager.2. Perform a full reconciliation from the IBM Security Identity Manager server.3. Perform all supported operations (add, change, and delete) on one account and

examine the GroupwiseAgent.log file after each operation to ensure that noerrors were reported.

© Copyright IBM Corp. 2012 59

Page 72: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

60 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 73: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 9. Troubleshooting

These topics provide information and techniques to identify and resolve problemsrelated to the adapter. They also provide information about troubleshooting errorsthat might occur during installation.

Techniques for troubleshooting problemsTroubleshooting is a systematic approach to solving a problem. The goal oftroubleshooting is to determine why something does not work as expected andhow to resolve the problem. Certain common techniques can help with the task oftroubleshooting.

The first step in the troubleshooting process is to describe the problem completely.Problem descriptions help you and the IBM technical-support representative knowwhere to start to find the cause of the problem. This step includes asking yourselfbasic questions:v What are the symptoms of the problem?v Where does the problem occur?v When does the problem occur?v Under which conditions does the problem occur?v Can the problem be reproduced?

The answers to these questions typically lead to a good description of the problem,which can then lead you to a problem resolution.

What are the symptoms of the problem?

When starting to describe a problem, the most obvious question is “What is theproblem?” This question might seem straightforward; however, you can break itdown into several more-focused questions that create a more descriptive picture ofthe problem. These questions can include:v Who, or what, is reporting the problem?v What are the error codes and messages?v How does the system fail? For example, is it a loop, hang, crash, performance

degradation, or incorrect result?

Where does the problem occur?

Determining where the problem originates is not always easy, but it is one of themost important steps in resolving a problem. Many layers of technology can existbetween the reporting and failing components. Networks, disks, and drivers areonly a few of the components to consider when you are investigating problems.

The following questions help you to focus on where the problem occurs to isolatethe problem layer:v Is the problem specific to one platform or operating system, or is it common

across multiple platforms or operating systems?v Is the current environment and configuration supported?v Do all users have the problem?

© Copyright IBM Corp. 2012 61

Page 74: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

v (For multi-site installations.) Do all sites have the problem?

If one layer reports the problem, the problem does not necessarily originate in thatlayer. Part of identifying where a problem originates is understanding theenvironment in which it exists. Take some time to completely describe the problemenvironment, including the operating system and version, all correspondingsoftware and versions, and hardware information. Confirm that you are runningwithin an environment that is a supported configuration; many problems can betraced back to incompatible levels of software that are not intended to run togetheror have not been fully tested together.

When does the problem occur?

Develop a detailed timeline of events leading up to a failure, especially for thosecases that are one-time occurrences. You can most easily develop a timeline byworking backward: Start at the time an error was reported (as precisely as possible,even down to the millisecond), and work backward through the available logs andinformation. Typically, you need to look only as far as the first suspicious eventthat you find in a diagnostic log.

To develop a detailed timeline of events, answer these questions:v Does the problem happen only at a certain time of day or night?v How often does the problem happen?v What sequence of events leads up to the time that the problem is reported?v Does the problem happen after an environment change, such as upgrading or

installing software or hardware?

Responding to these types of questions can give you a frame of reference in whichto investigate the problem.

Under which conditions does the problem occur?

Knowing which systems and applications are running at the time that a problemoccurs is an important part of troubleshooting. These questions about yourenvironment can help you to identify the root cause of the problem:v Does the problem always occur when the same task is being performed?v Does a certain sequence of events need to happen for the problem to occur?v Do any other applications fail at the same time?

Answering these types of questions can help you explain the environment inwhich the problem occurs and correlate any dependencies. Remember that justbecause multiple problems might have occurred around the same time, theproblems are not necessarily related.

Can the problem be reproduced?

From a troubleshooting standpoint, the ideal problem is one that can bereproduced. Typically, when a problem can be reproduced you have a larger set oftools or procedures at your disposal to help you investigate. Consequently,problems that you can reproduce are often easier to debug and solve.

However, problems that you can reproduce can have a disadvantage: If theproblem is of significant business impact, you do not want it to recur. If possible,

62 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 75: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

re-create the problem in a test or development environment, which typically offersyou more flexibility and control during your investigation.v Can the problem be re-created on a test system?v Are multiple users or applications encountering the same type of problem?v Can the problem be re-created by running a single command, a set of

commands, or a particular application?

For information about obtaining support, see Appendix C, “Support information,”on page 81.

Warnings and error messagesA warning or error might be displayed in the user interface to provide informationabout the adapter or when an error occurs.

These errors might be displayed in the user interface when the adapter is installedon your system.

A warning or error might be displayed in the adapter logs to provide informationthat the user needs to know. Table 18 contains warnings or errors that might bedisplayed in the GrpWiseAgent.log file if the GroupWise Adapter is installed onyour system.

Table 18. Warning and error messages

Warning or errormessage Possible cause Corrective action

AddUser failed due toexception: Cannot createuser. NDS user alreadyhas a GroupWiseaccount.

This error occurs whenthe specified user existson the managed resource.

Create user with another user ID.

Attribute value exceedsmaximum length limitfor attributeergwisefaxnumber.

This error occurs whenthe values of the specifiedPhone Number and FaxNumber attributesexceeded more than 32characters.

Provide values for the PhoneNumber and Fax Number attributeswith less than 33 characters.

Attribute value exceedsmaximum length limitfor attribute ergwisetitle.

This error occurs whenthe value of the specifiedTitle attribute exceededmore than 64 characters.

Provide a value for the Titleattribute with less than 65characters.

Attribute value exceedsmaximum length limitfor attributeergwisedepartment.

This error occurs whenthe value of the specifiedDepartment attributeexceeded more than 64characters.

Provide a value for the Departmentattribute with less than 65characters.

Attribute value exceedsmaximum length limitfor attributeergwiselastname.

This error occurs whenthe value of the specifiedLast Name attributeexceeded more than 64characters.

Provide a value for the Last Nameattribute with less than 65characters.

Chapter 9. Troubleshooting 63

Page 76: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 18. Warning and error messages (continued)

Warning or errormessage Possible cause Corrective action

Error deleting User_name.User not found onresource.

An attempt is made todelete a user account thatdoes not exist on themanaged resource.

If you believe that the user accountexists:

v Make sure the location specifiedfor the managed resource on theservice form is correct.

v The user account is created and itexists on the managed resource.Perform a reconciliationoperation.

If the user account does not exist onthe managed resource, no action isrequired.

64 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 77: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 10. GroupWise Adapter language pack installation

The adapters use the same language package as IBM Security Identity Manager.

See the IBM Security Identity Manager library and search for information aboutinstalling language packs.

© Copyright IBM Corp. 2012 65

Page 78: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

66 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 79: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 11. Update the GroupWise Adapter or the AdapterDevelopment Kit (ADK)

You can either update the GroupWise Adapter or the Adapter Development Kit(ADK).

The ADK is the base component of the adapter. While all adapters have the sameADK, the remaining adapter functionality is specific to the managed resource.

Note: If your existing adapter version is earlier than 6.x, you must uninstall theolder version of the adapter before you can install the 6.x adapter.

Updating the GroupWise AdapterInstead of installing a new version of the GroupWise Adapter, you might want toupdate the adapter to preserve existing settings.

About this task

For adapter versions 6 and later, use the adapter update option:v If you want to keep the adapter configuration (registry keys and certificates)

unchanged.v If the installed adapter is FIPS enabled. The Update Installation option keeps

FIPS configurations such as the CA certificates, fipsdata.txt (the key generatedby running fipsenable.exe), and the registry keys encrypted with fipsdata.txtunchanged.

Note: The upgrade option is applicable only for the adapter version 6.xmaintenance upgrades. The upgrade option is not designed for the adapterversions 5.x to version 6.x migrations.

If the update installation option is selected, the path of the existing installedadapter is required. The installer replaces the binary files and the DLLs of theadapter and the ADK. The installer does not prompt for any configurationinformation during an update installation.

Note: Adapter-related registry keys are not modified. The update installation doesnot create a service for the adapter.

To maintain your current configuration settings, the certificate, and private keyduring an update, do not uninstall the old version of the adapter. Install the newversion. During the installation, specify the same installation directory where theprevious adapter was installed. For more information, see Chapter 3, “Adapterinstallation,” on page 7.

To update an existing adapter, complete the following steps:

Procedure1. Stop the GroupWise Adapter service.2. Install the new version of the adapter.

© Copyright IBM Corp. 2012 67

Page 80: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

When the upgraded adapter starts for the first time, new log files are created,that replace the old files.The adapter installer allows an update installation of the adapter for versions6.0 or later.

Updating the ADKYou can use the ADK update program to update the ADK portion of the adaptersthat are currently installed on a workstation. The update program installs just theADK, and not the entire adapter.

About this task

The ADK consists of the runtime library, filtering, and event notificationfunctionality, protocol settings, and logging information. The remainder of theadapter is composed of the Add, Modify, Delete, and Search functions. While alladapters have the same ADK, the remaining functionality is specific to themanaged resource. As part of the ADK update, the ADK library and the DAMLprotocol library are updated. In addition, the agentCfg and certTool binary files areupdated.

Note: Upgrading the ADK from versions 4.5 or 4.6 to 6.0 or a later version is notsupported.

Before updating the ADK files, the update program checks the current version ofthe ADK. If the current level is higher than what you are attempting to install, awarning message is displayed.

Note: When you upgrade the ADK to a version later than 5.14, you must deletethe existing database for event notification. Then perform the reconciliationoperation to create a database. However, do not delete the existing database forevent notification if you are already using ADK version later than 5.14.

To update the GroupWise Adapter ADK on a Windows operating system, completethe following steps:

Procedure1. Download the ADK update program compressed file from the IBM website.2. Extract the contents of the compressed file into a temporary directory.3. Stop the GroupWise Adapter service.4. Start the update program by using the adkinst_win32.exe file in the temporary

directory. For example, select Run from the Start menu, and typeC:\TEMP\adkinst_win32.exe in the Open field.If no adapter is installed, you receive the following error message, and theprogram exits:No Agent Installed - Cannot Install ADK.

5. In the Welcome window, click Next.6. In the Software License Agreement window, review the license agreement and

decide whether to accept the terms of the license. If you do, click Accept.7. In the Installation Information window, click Next to begin the installation.8. In the Install Completed window, click Finish to exit the program.

68 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 81: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Location of the ADK log filesLogging entries are stored in the ADKVersionInstaller.log andADKVersionInstalleropt.log files, where ADKVersion is the version of the ADK.

For example, ADK50Installer.log and ADK50Installeropt.log files are created inthe folder where you run the installation program.

Chapter 11. Update the GroupWise Adapter or the Adapter Development Kit (ADK) 69

Page 82: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

70 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 83: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Chapter 12. Adapter uninstallation

Before you remove the adapter, inform your users that the adapter will beunavailable. If the server is taken offline, adapter requests that were completedmight not be recovered when the server is back online.

Perform these steps:1. “Uninstalling the adapter from the target server”2. “Removal of the adapter profile from the IBM Security Identity Manager

server”

Uninstalling the adapter from the target serverTo remove the adapter, complete these steps:

Procedure1. Stop the adapter service.2. Run the uninstaller.

a. Navigate to the adapter home directory. For example, C:\ProgramFiles\IBM\ISIM\Agents\adapternameAgent\_uninst

b. Double-click the uninstaller.exe file.c. In the Welcome window, click Next.d. In the uninstallation summary window, click Next.e. Click Finish.f. Inspect the directory tree for the adapter directories, subdirectories, and files

to verify that uninstall is complete.

Removal of the adapter profile from the IBM Security Identity Managerserver

Before removing the adapter profile, ensure that no objects exist on your IBMSecurity Identity Manager server that reference the adapter profile.

Examples of objects on the IBM Security Identity Manager server that can referencethe adapter profile are:v Adapter service instancesv Policies referencing an adapter instance or the profilev Accounts

For more information, see the online help or the IBM Security Identity Managerproduct documentation.

© Copyright IBM Corp. 2012 71

Page 84: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

72 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 85: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Appendix A. Adapter attributes

As part of the adapter implementation, a dedicated account for IBM SecurityIdentity Manager to access the GroupWise Server is created on the GroupWiseServer.

The adapter consists of files and directories that are owned by the IBM SecurityIdentity Manager account. These files establish communication with the IBMSecurity Identity Manager server.

Attribute descriptionsThe IBM Security Identity Manager server communicates with the adapter usingattributes in transmission packets that are sent over a network.

The combination of attributes depends on the type of action that the IBM SecurityIdentity Manager server requests from the adapter.

The next table lists the account form attributes that the adapter uses.

Table 19. Attributes, descriptions, and corresponding data types

Attribute Directory server attribute Description Data format

UserName erUid Specifies the loginname of the user

String

AccountID erGwiseAccountID Specifies the ID usedfor GroupWise

String

AdminFields erGwiseAdminFields Specifies the adminfields

String

Context erGwiseContext Specifies the eDirectorycontext

String

Department erGwiseDepartment Specifies thedepartment name

String

Description erGwiseDescription Specifies a descriptionfield

String

DL Member erGwiseDLMember Specifies the userparticipation indistribution lists

String

DomainPath erGwiseDomainPath Specifies the eDirectorydomain path

String

FaxNumber erGwiseFaxNumber Specifies the faxnumber

String

GatewayAccess erGwiseGatewayAccess Specifies the gatewayaccess

String

GivenName erGwiseGivenName Specifies the givenname of the user

String

GroupDesc description Specifies thedescription of thegroup

String

GroupType erGwiseGroupType Specifies the type ofsupporting data

String

© Copyright IBM Corp. 2012 73

Page 86: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 19. Attributes, descriptions, and corresponding data types (continued)

Attribute Directory server attribute Description Data format

Groupwise Admin ID erGwiseAdminID Specifies the user nameof the administrativeuser on the GroupWiseserver who hasread/write permissionson the domaindirectory

String

Groupwise Admin Password erGwiseAdminPwd Specifies the passwordfor the aAdministrativeuser

String

IsExternalEntity erGwiseExternalEntity Specifies whether auser is an eDirectoryuser or non-eDirectoryuser

String

IsExternalUser erGwiseExternalUser Specifies whether thisuser is an external user

String

LastName erGwiseLastName Specifies the last nameof the user

String

LastModifiedBy erGwiseLastModifiedBy Specifies who lastmodified the account

String

MailboxExpDate erGwiseMailboxExpDate Specifies the expirationdate for the email

String

MailFileID erGwiseUserMailFileID Specifies the mail ID ofthe user

String

NdsAccountID erGwiseNDSAccountID Specifies the NDSaccount ID for theGroupWise account

String

NdsContext erGwiseNdsContext Specifies the eDirectorycontext name

String

NdsPassword erGwiseNdsPassword Specifies the eDirectorypassword

String

NdsServer erGwiseNdsServer Specifies the eDirectoryserver name

String

NdsTree erGwiseNdsTree Specifies the eDirectorytree name

String

NdsUsername erGwiseNdsUsername Specifies the eDirectoryuser name

String

NetID erGwiseNetID Specifies the networkID for the user

String

Nickname erGwiseNickname Specifies the nicknameof the user

String

ObjectID erGwiseUserObjectID Specifies the eDirectoryobject ID

String

Owner erGwiseOwner Specifies the owner ofthe object

String

Password erPassword Specifies theGroupWise userpassword

String

74 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 87: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 19. Attributes, descriptions, and corresponding data types (continued)

Attribute Directory server attribute Description Data format

PhoneNumber erGwisePhoneNumber Specifies the phonenumber

String

PostOffice erGwisePostOffice Specifies theGroupWise post office

String

RASEXEC erGwiseRASEXEC Specifies the commandto execute

String

Title erGwiseTitle Specifies the title of theuser

String

UserDN erGwiseUserDN Specifies the userDN String

UserStatus erAccountStatus Specifies the accountstatus

String

Visibility erGwiseVisibility Specifies one of thefollowing values:

v PostOffice

v System

v Domain

v None

String

GroupWise Adapter attributes by actionThe following lists are typical adapter actions by their functional transaction group.The lists include more information about required and optional attributes sent tothe adapter to complete that action.

System Login AddA System Login Add is a request to create a user account with the specifiedattributes.

Appendix A. Adapter attributes 75

Page 88: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Table 20. Add request attributes

Required attribute Optional attribute

erUid

erPassword

erGwiseAdminID

erGwiseAdminPwd

erGwiseContext

erGwiseDomainPath

erGwiseExternalEntity

erGwiseLastName

erGwiseNdsContext

erGwiseNdsPassword

erGwiseNdsServer

erGwiseNdsTree

erGwiseNdsUsername

erGwisePostOffice

All other supported attributes

System Login ChangeA System Login Change is a request to change one or more attributes for thespecified users.

Table 21. Change request attributes

Required attribute Optional attribute

erUid

erGwiseAdminID

erGwiseAdminPwd

erGwiseDomainPath

erGwiseNdsContext

erGwiseNdsPassword

erGwiseNdsServer

erGwiseNdsTree

erGwiseNdsUsername

erGwisePostOffice

All supported attributes

76 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 89: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

System Login DeleteA System Login Delete is a request to remove the specified user from the directory.

Table 22. Delete request attributes

Required attribute Optional attribute

erUid

erGwiseAdminID

erGwiseAdminPwd

erGwiseDomainPath

erGwiseNdsContext

erGwiseNdsPassword

erGwiseNdsServer

erGwiseNdsTree

erGwiseNdsUsername

erGwisePostOffice

None

System Login SuspendA System Login Suspend is a request to disable a user account.

The user is not removed. User attributes are not modified.

Table 23. Suspend request attributes

Required attribute Optional attribute

erUid

erAccountStatus

erGwiseAdminID

erGwiseAdminPwd

erGwiseDomainPath

erGwiseNdsContext

erGwiseNdsPassword

erGwiseNdsServer

erGwiseNdsTree

erGwiseNdsUsername

erGwisePostOffice

None

System Login RestoreA System Login Restore is a request to activate a user account that was previouslysuspended.

Appendix A. Adapter attributes 77

Page 90: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

After an account is restored, the user can access the system using the sameattributes as the ones before the Suspend function was called.

Table 24. Restore request attributes

Required attribute Optional attribute

erUid

erAccountStatus

erGwiseAdminID

erGwiseAdminPwd

erGwiseDomainPath

erGwiseNdsContext

erGwiseNdsPassword

erGwiseNdsServer

erGwiseNdsTree

erGwiseNdsUsername

erGwisePostOffice

erPassword

PingUse Ping to verify connection between the GroupWise Adapter and the IBMSecurity Identity Manager server. Ping does not require any variables.

Table 25. Restore request attributes

Required attribute Optional attribute

None None

ReconciliationThe Reconciliation function synchronizes user account information between IBMSecurity Identity Manager and the adapter.

Table 26. Reconciliation attributes

Attributes returned during reconciliation

All supported attributes

78 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 91: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Appendix B. Federal Information Processing Standardscompliance mode

IBM Security Identity Manager can be operated with FIPS 140-2 certifiedcryptographic modules.

FIPS 140-2 is a standard from the US National Institute of Standards andTechnology (NIST) that applies to cryptographic modules.

Two FIPS 140-2 modules are used:v IBM Java™ Crytographic Extensionv Open SSL module

As a user of these modules, there is no certification implied for IBM SecurityIdentity Manager. However, for the correct use of these FIPS 14-2 modules IBMcustomers need to follow the instructions in this document.

The fipsEnable tool enables the adapter to be Federal Information ProcessingStandards (FIPS) compliant. The fipsEnable tool causes the adapter to use a FIPScertified encryption library so that all cryptographic keys that are used aregenerated by a FIPS compliant algorithm. Any communications with the adapterare also secured. The tool generates the FIPS master key, enables the FIPS modesetting, changes the USE_SSL parameter to TRUE and re-encrypts the existingencrypted values for:v agentCfg keyv DAML user name and passwordv Adapter specific encrypted registry items

Note: After FIPS mode is enable, it cannot be disabled. You must reinstall theadapter, if you want to disable FIPS mode.

Configuring the adapter to run in FIPS modeTo configure the adapter to run in FIPS mode, you must run the fipsEnable utility.

Procedure1. Install the adapter.2. Run the fipsEnable utility and issue the command:

fipsEnable -reg agentName

3. Restart the adapter.

Operational differences when the adapter runs in FIPS modeThe DAML protocol used to communicate between the adapter and IBM SecurityIdentity Manager must run in SSL mode.

The fipsEnable tool sets the DAML SSL mode to TRUE. In SSL mode, however,you must install a server certificate because the fipsEnable tool does not convert anexisting DAML certificate and key.

© Copyright IBM Corp. 2012 79

Page 92: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Note: You cannot import a PKCS12 file that contains a certificate and key. Youmust use certTool (option A) to create a Certificate Signing Request (CSR) and haveit signed by a certificate authority. You can then install the signed certificate withcertTool (option B).

The agentCfg tool automatically detects when the adapter is running in FIPS modeand initializes the encryption library in FIPS mode. In addition, the ADK acceptsonly agentCfg connections from localhost (127.0.0.1).

Security policyFor FIPS compliance, a security policy must be defined that outlines therequirements for the user to operate the application in a FIPS-compliant mode.

The software ensures that the correct algorithms and keys are used. Requirementsfor the environment are the responsibility of the security officer. The security policydefines two roles, security officer and user. It defines the extent to which each ofthese persons can physically access the workstation, file system, and configurationtools. The security of the workstation, of the file system, and of the configuration isthe responsibility of the security officer.

Authentication rolesThe FIPS security policy normally defines separate roles for a security officer and auser. For an adapter, the user role is actually the IBM Security Identity Managerserver. The installation and configuration of the adapter must be done by thesecurity officer.

The security officer must ensure that the correct physical and logical security is inplace to prevent access to the adapter by unauthorized personnel. The physicalworkstation must be in a secure location that is accessible only by persons with theauthority and access privileges of the security officer. In addition, the security onthe folder in which the adapter is installed must be configured to prevent accessby personnel other than security officers.

For Window installations, the system registry must be secured at the top-level keyfor the adapter to prevent access by personnel other than security officers.

Rules of operationYou must follow certain rules and restrictions to operate in FIPS mode.v The replacement or modification of the adapter by unauthorized intruders is

prohibited.v The operating system enforces authentication methods to prevent unauthorized

access to adapter services.v All critical security parameters are verified as correct and are securely generated,

stored, and destroyed.v All host system components that can contain sensitive cryptographic data, such

as main memory, system bus, and disk storage, must be in a secureenvironment.

v The operating system is responsible for multitasking operations so that otherprocesses cannot access the address space of the process that contains theadapter.

v Secret or private keys that are input to or output from an application must beencrypted by a FIPS approved algorithm.

80 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 93: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Appendix C. Support information

You have several options to obtain support for IBM products.v “Searching knowledge bases”v “Obtaining a product fix” on page 82v “Contacting IBM Support” on page 82

Searching knowledge basesYou can often find solutions to problems by searching IBM knowledge bases. Youcan optimize your results by using available resources, support tools, and searchmethods.

About this task

You can find useful information by searching the product documentation for IBMSecurity Identity Manager. However, sometimes you must look beyond the productdocumentation to answer your questions or resolve problems.

Procedure

To search knowledge bases for information that you need, use one or more of thefollowing approaches:1. Search for content by using the IBM Support Assistant (ISA).

ISA is a no-charge software serviceability workbench that helps you answerquestions and resolve problems with IBM software products. You can findinstructions for downloading and installing ISA on the ISA website.

2. Find the content that you need by using the IBM Support Portal.The IBM Support Portal is a unified, centralized view of all technical supporttools and information for all IBM systems, software, and services. The IBMSupport Portal lets you access the IBM electronic support portfolio from oneplace. You can tailor the pages to focus on the information and resources thatyou need for problem prevention and faster problem resolution. Familiarizeyourself with the IBM Support Portal by viewing the demo videos(https://www.ibm.com/blogs/SPNA/entry/the_ibm_support_portal_videos)about this tool. These videos introduce you to the IBM Support Portal, exploretroubleshooting and other resources, and demonstrate how you can tailor thepage by moving, adding, and deleting portlets.

3. Search for content about IBM Security Identity Manager by using one of thefollowing additional technical resources:v IBM Security Identity Manager version 6.0 technotes and APARs (problem

reports).v IBM Security Identity Manager Support website.v IBM Redbooks®.v IBM support communities (forums and newsgroups).

4. Search for content by using the IBM masthead search. You can use the IBMmasthead search by typing your search string into the Search field at the top ofany ibm.com® page.

5. Search for content by using any external search engine, such as Google, Yahoo,or Bing. If you use an external search engine, your results are more likely to

© Copyright IBM Corp. 2012 81

Page 94: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

include information that is outside the ibm.com domain. However, sometimesyou can find useful problem-solving information about IBM products innewsgroups, forums, and blogs that are not on ibm.com.

Tip: Include “IBM” and the name of the product in your search if you arelooking for information about an IBM product.

Obtaining a product fixA product fix might be available to resolve your problem.

About this task

You can get fixes by following these steps:

Procedure1. Obtain the tools that are required to get the fix. You can obtain product fixes

from the Fix Central Site. See http://www.ibm.com/support/fixcentral/.2. Determine which fix you need.3. Download the fix. Open the download document and follow the link in the

“Download package” section.4. Apply the fix. Follow the instructions in the “Installation Instructions” section

of the download document.

Contacting IBM SupportIBM Support assists you with product defects, answers FAQs, and helps usersresolve problems with the product.

Before you begin

After trying to find your answer or solution by using other self-help options suchas technotes, you can contact IBM Support. Before contacting IBM Support, yourcompany or organization must have an active IBM software subscription andsupport contract, and you must be authorized to submit problems to IBM. Forinformation about the types of available support, see the Support portfolio topic inthe “Software Support Handbook”.

Procedure

To contact IBM Support about a problem:1. Define the problem, gather background information, and determine the severity

of the problem. For more information, see the Getting IBM support topic in theSoftware Support Handbook.

2. Gather diagnostic information.3. Submit the problem to IBM Support in one of the following ways:

v Using IBM Support Assistant (ISA):Any data that has been collected can be attached to the service request.Using ISA in this way can expedite the analysis and reduce the time toresolution.a. Download and install the ISA tool from the ISA website. See

http://www.ibm.com/software/support/isa/.b. Open ISA.

82 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 95: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

c. Click Collection and Send Data.d. Click the Service Requests tab.e. Click Open a New Service Request.

v Online through the IBM Support Portal: You can open, update, and view allof your service requests from the Service Request portlet on the ServiceRequest page.

v By telephone for critical, system down, or severity 1 issues: For the telephonenumber to call in your region, see the Directory of worldwide contacts webpage.

Results

If the problem that you submit is for a software defect or for missing or inaccuratedocumentation, IBM Support creates an Authorized Program Analysis Report(APAR). The APAR describes the problem in detail. Whenever possible, IBMSupport provides a workaround that you can implement until the APAR isresolved and a fix is delivered. IBM publishes resolved APARs on the IBM Supportwebsite daily, so that other users who experience the same problem can benefitfrom the same resolution.

Appendix C. Support information 83

Page 96: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

84 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 97: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Appendix D. Accessibility features for IBM Security IdentityManager

Accessibility features help users who have a disability, such as restricted mobilityor limited vision, to use information technology products successfully.

Accessibility features

The following list includes the major accessibility features in IBM Security IdentityManager.v Support for the Freedom Scientific JAWS screen reader applicationv Keyboard-only operationv Interfaces that are commonly used by screen readersv Keys that are discernible by touch but do not activate just by touching themv Industry-standard devices for ports and connectorsv The attachment of alternative input and output devices

The IBM Security Identity Manager library, and its related publications, areaccessible.

Keyboard navigation

This product uses standard Microsoft Windows navigation keys.

Related accessibility information

The following keyboard navigation and accessibility features are available in theform designer:v You can use the tab keys and arrow keys to move between the user interface

controls.v You can use the Home, End, Page Up, and Page Down keys for more

navigation.v You can launch any applet, such as the form designer applet, in a separate

window to enable the Alt+Tab keystroke to toggle between that applet and theweb interface, and also to use more screen workspace. To launch the window,click Launch as a separate window.

v You can change the appearance of applets such as the form designer by usingthemes, which provide high contrast color schemes that help users with visionimpairments to differentiate between controls.

IBM and accessibility

See the IBM Human Ability and Accessibility Center For more information aboutthe commitment that IBM has to accessibility.

© Copyright IBM Corp. 2012 85

Page 98: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

86 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 99: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Notices

This information was developed for products and services offered in the U.S.A.

IBM may not offer the products, services, or features discussed in this document inother countries. Consult your local IBM representative for information on theproducts and services currently available in your area. Any reference to an IBMproduct, program, or service is not intended to state or imply that only that IBMproduct, program, or service may be used. Any functionally equivalent product,program, or service that does not infringe any IBM intellectual property right maybe used instead. However, it is the user's responsibility to evaluate and verify theoperation of any non-IBM product, program, or service.

IBM may have patents or pending patent applications covering subject matterdescribed in this document. The furnishing of this document does not give youany license to these patents. You can send license inquiries, in writing, to:

IBM Director of LicensingIBM CorporationNorth Castle DriveArmonk, NY 10504-1785 U.S.A.

For license inquiries regarding double-byte (DBCS) information, contact the IBMIntellectual Property Department in your country or send inquiries, in writing, to:

Intellectual Property LicensingLegal and Intellectual Property LawIBM Japan, Ltd.19-21, Nihonbashi-Hakozakicho, Chuo-kuTokyo 103-8510, Japan

The following paragraph does not apply to the United Kingdom or any othercountry where such provisions are inconsistent with local law :

INTERNATIONAL BUSINESS MACHINES CORPORATION PROVIDES THISPUBLICATION "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHEREXPRESS OR IMPLIED, INCLUDING, BUT NOT LIMITED TO, THE IMPLIEDWARRANTIES OF NON-INFRINGEMENT, MERCHANTABILITY OR FITNESSFOR A PARTICULAR PURPOSE.

Some states do not allow disclaimer of express or implied warranties in certaintransactions, therefore, this statement might not apply to you.

This information could include technical inaccuracies or typographical errors.Changes are periodically made to the information herein; these changes will beincorporated in new editions of the publication. IBM may make improvementsand/or changes in the product(s) and/or the program(s) described in thispublication at any time without notice.

Any references in this information to non-IBM Web sites are provided forconvenience only and do not in any manner serve as an endorsement of those Websites. The materials at those Web sites are not part of the materials for this IBMproduct and use of those Web sites is at your own risk.

© Copyright IBM Corp. 2012 87

Page 100: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

IBM may use or distribute any of the information you supply in any way itbelieves appropriate without incurring any obligation to you.

Licensees of this program who wish to have information about it for the purposeof enabling: (i) the exchange of information between independently createdprograms and other programs (including this one) and (ii) the mutual use of theinformation which has been exchanged, should contact:

IBM Corporation2Z4A/10111400 Burnet RoadAustin, TX 78758 U.S.A.

Such information may be available, subject to appropriate terms and conditions,including in some cases payment of a fee.

The licensed program described in this document and all licensed materialavailable for it are provided by IBM under terms of the IBM Customer Agreement,IBM International Program License Agreement or any equivalent agreementbetween us.

Any performance data contained herein was determined in a controlledenvironment. Therefore, the results obtained in other operating environments mayvary significantly. Some measurements may have been made on development-levelsystems and there is no guarantee that these measurements will be the same ongenerally available systems. Furthermore, some measurement may have beenestimated through extrapolation. Actual results may vary. Users of this documentshould verify the applicable data for their specific environment.

Information concerning non-IBM products was obtained from the suppliers ofthose products, their published announcements or other publicly available sources.IBM has not tested those products and cannot confirm the accuracy ofperformance, compatibility or any other claims related to non-IBM products.Questions on the capabilities of non-IBM products should be addressed to thesuppliers of those products.

All statements regarding IBM's future direction or intent are subject to change orwithdrawal without notice, and represent goals and objectives only.

This information contains examples of data and reports used in daily businessoperations. To illustrate them as completely as possible, the examples include thenames of individuals, companies, brands, and products. All of these names arefictitious and any similarity to the names and addresses used by an actual businessenterprise is entirely coincidental.

COPYRIGHT LICENSE:

This information contains sample application programs in source language, whichillustrate programming techniques on various operating platforms. You may copy,modify, and distribute these sample programs in any form without payment toIBM, for the purposes of developing, using, marketing or distributing applicationprograms conforming to the application programming interface for the operatingplatform for which the sample programs are written. These examples have notbeen thoroughly tested under all conditions. IBM, therefore, cannot guarantee orimply reliability, serviceability, or function of these programs. You may copy,modify, and distribute these sample programs in any form without payment to

88 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 101: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

IBM for the purposes of developing, using, marketing, or distributing applicationprograms conforming to IBM's application programming interfaces.

Each copy or any portion of these sample programs or any derivative work, mustinclude a copyright notice as follows:

If you are viewing this information softcopy, the photographs and colorillustrations might not appear.

© (your company name) (year). Portions of this code are derived from IBM Corp.Sample Programs. © Copyright IBM Corp. _enter the year or years_. All rightsreserved.

If you are viewing this information in softcopy form, the photographs and colorillustrations might not be displayed.

Trademarks

IBM, the IBM logo, and ibm.com are trademarks or registered trademarks ofInternational Business Machines Corp., registered in many jurisdictions worldwide.Other product and service names might be trademarks of IBM or other companies.A current list of IBM trademarks is available on the Web at "Copyright andtrademark information" at http://www.ibm.com/legal/copytrade.shtml.

Adobe, Acrobat, PostScript and all Adobe-based trademarks are either registeredtrademarks or trademarks of Adobe Systems Incorporated in the United States,other countries, or both.

IT Infrastructure Library is a registered trademark of the Central Computer andTelecommunications Agency which is now part of the Office of GovernmentCommerce.

Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks orregistered trademarks of Intel Corporation or its subsidiaries in the United Statesand other countries.

Linux is a trademark of Linus Torvalds in the United States, other countries, orboth.

Microsoft, Windows, Windows NT, and the Windows logo are trademarks ofMicrosoft Corporation in the United States, other countries, or both.

ITIL is a registered trademark, and a registered community trademark of the Officeof Government Commerce, and is registered in the U.S. Patent and TrademarkOffice.

UNIX is a registered trademark of The Open Group in the United States and othercountries.

Cell Broadband Engine and Cell/B.E. are trademarks of Sony ComputerEntertainment, Inc., in the United States, other countries, or both and is used underlicense therefrom.

Notices 89

Page 102: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Java and all Java-based trademarks and logos are trademarks or registeredtrademarks of Oracle and/or its affiliates.

Privacy Policy Considerations

IBM Software products, including software as a service solutions, ("SoftwareOfferings") may use cookies or other technologies to collect product usageinformation, to help improve the end user experience, and to tailor interactionswith the end user or for other purposes. In many cases, no personally identifiableinformation is collected by the Software Offerings. Some of our Software Offeringscan help enable you to collect personally identifiable information. If this SoftwareOffering uses cookies to collect personally identifiable information, specificinformation about this offering’s use of cookies is set forth below.

This Software Offering does not use cookies or other technologies to collectpersonally identifiable information.

If the configurations deployed for this Software Offering provide you as customerthe ability to collect personally identifiable information from end users via cookiesand other technologies, you should seek your own legal advice about any lawsapplicable to such data collection, including any requirements for notice andconsent.

For more information about the use of various technologies, including cookies, forthese purposes, see IBM's Privacy Policy at http://www.ibm.com/privacy andIBM’s Online Privacy Statement at http://www.ibm.com/privacy/details/us/ensections entitled "Cookies, Web Beacons and Other Technologies and SoftwareProducts and Software-as-a Service".

90 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 103: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Index

Aaccessibility x, 85adapter

ADK upgrade 68attributes 73attributes by action 75configuration 17

tool 17customization steps 55FIPS mode, configure 79help 37installation 7installation prerequisites 4parameters

accessing 47certTool 47options 47

registry settings, modifying 33removal 71silent installation 15silent uninstallation 16thread count 35uninstallation 71upgrade 67

adapter installation 7overview 1

adapter profilecreating 56importing 56removal 71verifying installation 10

adapter profilesediting 56

adaptersuninstalling from target servers 71updating 67

add request attributes 76ADK log files 69administrator authority prerequisites 4agentless configuration 13attributes

adapter action, byadding 76changing 76deleting 77modifying 76pinging 78restoring 78suspending 77

description 73descriptions 73reconciliation 78

attributes by action 75attributes for the adapter 73authentication

one-way SSL configuration 44roles 80two-way SSL configuration 45

CCA, see certificate authority 47certificate

certTool 53exporting to PKCS12 file 53registration 53viewing 52

certificate authorityadapter directories 52available functions 47definition 41deleting 52installing 51

from file 51sample 51

viewing 52viewing installed 51

certificate signing requestdefinition 49examples 50file, generating 49

certificatesdefinition 41examples of signing request (CSR) 50installing 50key formats 43management tools 44overview 41private keys and digital

certificates 42protocol configuration tool, see

certTool 42, 47registering 49, 53removing 53self-signed 43unregistering 53viewing 51viewing registered 52

certToolregistered certificates, viewing 52starting 47

change request attributes 76changing

adapter parameters 33configuration key 31registry settings 33

client authentication 45client software prerequisites 4code page

listing information 37modifying settings 37viewing information 37

configurationagentless 13key, changing 31one-way SSL authentication 44remote 13settings, viewing 18

configuringdomain controllers 27

configuring the adapter 17

contextbaseline database 30definition 23modifying 28target DN 30

copying JAR files 55creating

services 10CSR 49

DDAML protocol

properties, changing withagentCfg 19

username 19debug log

enable/disable with 31purpose 31

delete request attributes 77description of attributes 73detail log

enable/disable with 31purpose 31

disk space prerequisites 4domain

controllers, configuring 27event notification 27managed 27

download software 6

Eediting adapter profiles

on Linux operating systems 56on UNIX operating systems 56

education xencryption

SSL 41, 42error messages 63event notification

contextbaseline database 30modifying 28multiple 28related to service 28search attributes 29target DN 30

domain controllers 27triggers 26

event viewerlog file size 27setting 27

Exchange Mailbox prerequisites 4extracting JAR files 55

FFederal Information Processing Standards

140-2 standard 79

© Copyright IBM Corp. 2012 91

Page 104: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

Federal Information ProcessingStandards (continued)

cryptographic modules 79FIPS

adapter, configure 79application operation 80fipsEnable utility 79operational differences 79restrictions 80rules of operation 80security policy 80

first steps 59

GGrpWiseProfile.jar file 55

Hhelp

accessing 37agentCfg menu 37for adapter 37

IIBM

Software Support xSupport Assistant x

IBM Security Identity Manager server,importing adapter profile 9

IBM Support Assistant 82importing

adapter profile 9, 56installation

adapter 7adapter registry 50certificates 50language pack 65prerequisites 4profile 9verify 9

installation planning 3installation prerequisites

administrator authority 4client software 4network connectivity 4operating system 4Security Identity Manager server 4

installation roadmap 3installation worksheet 5installing silently 15installing the adapter 7ISA 82

Kkey

encrypted information 42exporting to PKCS12 file 53private 42public 42

knowledge bases 81

Llanguage pack

installation 65same for adapters and server 65

log filesADK 69

logsdebug 31detail 31directory, changing with 31, 32enable/disable, changing with 32settings, changing with

adapterCfg 31log file name 31max file size 31

settings, default values 31trace.log file 9viewing statistics 36

Mmemory prerequisites 4messages

error 63warning 63

Modifying registry settingsnon-encrypted 33

multiple versions of the adaptersame server 6

Nnetwork connectivity prerequisites 4non-encrypted registry settings

modifying 33notices 87

Oone-way SSL authentication

certificate validation 44configuration 44

onlinepublications ixterminology ix

operating system prerequisites 4operation

differences, FIPS mode 79restrictions, FIPS mode 80rules, FIPS mode 80

overview for installation 1

Ppassword requirements

restoring accounts 57passwords

protected file, see PKCS12 file 51ping request attributes 78PKCS12 file

certificate and key installation 51certificate and key, exporting 53exporting certificate and key 53importing 43

planningfor installation 3

preinstallation roadmap 3private key

definition 41generating 49viewing 52

problem determination 61problem-determination xprofile installation

verification 10profile.jar files

copying 55extracting 55

protocolDAML

nonsecure environment 19username, changing with

agentCfg 19SSL

overview 41two-way configuration 45, 46

public key 42publications

accessing online ixlist of ix

Rreconciliation attributes 78registration

certificate 53certTool 53

registrysettings

accessing 35modifying 33, 35procedures 33

registry settingsmodifying non-encrypted 33

remote configuration 13removing the adapter profile 71request attributes

add 76change 76delete 77ping 78restore 78suspend 77

restore request attributes 78restoring accounts

password requirements 57roadmaps

installation 3preinstallation 3

roles, authentication 80

SSecurity Identity Manager server

prerequisites 4self-signed certificates 43server

adaptercommunication with the

server 45

92 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 105: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

server (continued)adapter (continued)

SSL communication 45running multiple versions of the

adapter 6service

creating 10setting event notification triggers 26settings

adapter thread count 35advanced 35configuration 18

silent adapter installation 15silent adapter uninstallation 16silent installation 15

adapter 15silent uninstallation

adapter 16software downloads 6SSL

certificateinstallation 41self-signed 43signing request 49

encryption 41key formats 43overview 41private keys and digital

certificates 42two-way configuration 45, 46

SSL authenticationcertificates configuration 44implementations 44

statistics, viewing 36support contact information 82suspend request attributes 77system prerequisites 4

Ttarget servers

uninstalling the adapter 71terminology ixtesting the installation 59trace.log file 9training xtroubleshooting 61

contacting support 82error messages 63getting fixes 82identifying problems 61searching knowledge bases 81support website xtechniques for 61warning messages 63

troubleshooting and supporttroubleshooting techniques 61

two-way configurationcertificate and private key 45SSL

client 45client and server 46

Uuninstallation 71uninstalling the adapter 71unregistering certificates 53updating

adapter profile 9, 55authority required 9service creation 9

updating the adapter 67upgrade

adapter 67ADK 68

username, changing with agentCfg 19

Vverification

adapter profile install 10verifying

installation 9

Wwarning messages 63worksheet for installation 5

Index 93

Page 106: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

94 IBM Security Identity Manager: GroupWise Adapter for Windows Operating Systems Installation and Configuration Guide

Page 107: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation
Page 108: GroupWiseAdapter forWindows Operating Systems Installation … · 2016-06-30 · IBM Security Identity Manager Version 6.0 GroupWiseAdapter forWindows Operating Systems Installation

����

Printed in USA

SC27-4395-00