This guide covers the installation and configuration of Novell® Identity Audit.
This guide is intended for Novell Identity Audit administrators and end users.
We want to hear your comments and suggestions about this manual and the other documentation included with this product. Please use the User Comments feature at the bottom of each page of the online documentation, or go to www.novell.com/documentation/feedback.html and enter your comments there.
For the most recent version of the Novell Identity Audit 1.0 Guide, visit the Identity Audit documentation Web site.
To download additional plug-ins (for example, reports), go to the Identity Audit Content Web page.
For more information about building your own plug-ins (for example, Jasper Reports*), go to the Sentinel™ SDK Web page. The build environment for Identity Audit report plug-ins is identical to what is documented for Novell Sentinel.
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and items in a cross-reference path.
A trademark symbol (®, ™, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party trademark.