Novell Identity Manager contains components that can be installed within your environment on multiple systems and platforms. Depending on your system configuration, you might need to run the Identity Manager installation program several times to install Identity Manager components on the appropriate systems.
The following table lists the installation components of Identity Manager and requirements for each.
Table 1-3 Identity Manager System Components and Requirements
System Component |
System Requirements |
Notes |
---|---|---|
Metadirectory System
|
One of the following operating systems:
One of the following versions of eDirectory.:
We recommend upgrading eDirectory 8.8 to 8.8.1. |
Using VMWare in your implementation is supported if you use a Metadirectory system platform. Unless specified otherwise, OES, NetWare, Windows, and Linux platforms (Red Hat and SUSE) support all of the following processors in 32-bit mode:
eDirectory 8.8 and later supports these advanced features:
Non-root installations of eDirectory are not currently supported with Identity Manager. eDirectory 8.8.1 supports 64-bit Red Hat Linux AS and ES 4.0. However, eDirectory 8.8.x does not support Solaris 8. Be sure to completely back up the eDirectory database before installing eDirectory 8.8.1. eDirectory 8.8.1 upgrades portions of the database structure and won’t allow it to be rolled-back after the upgrade process. Xen virtualization is now supported on SUSE Linux Enterprise Server 10 when the Xen Virtual Machine (VM) is running SLES 10 as the guest operating system in paravirtualized mode. An Xen patch for SLES 10 is needed (see TID #3915180). Novell expects to drop support for SLES 8 and Solaris 8 after Identity Manager 3.0.1. |
Web-based Administration Server
|
One of the following operating systems:
Operating systems supported via iManager Workstation:
The following software.
|
Unless stated otherwise, OES, NetWare, Windows, and Linux platforms (Red Hat and SUSE) support all of the following processors in 32-bit mode:
|
Secure Logging Service
|
For the Secure Logging Server, one of the following operating systems:
For the Platform Agent, one of the following operating systems:
|
OES, NetWare, Windows, and Linux platforms (Red Hat and SUSE) support all of the following processors in 32-bit mode:
Minimum Secure Server requirements include:
The eDirectory Instrumentation, which allows eDirectory events to be logged, supports the following versions of eDirectory:
The NetWare Instrumentation, which allows NetWare events to be logged, supports the following versions of NetWare:
|
User Application and Workflow System Service
|
SUSE Linux Enterprise Server 9 and 10 Windows Server 2000 SP4 Windows Server 2003 SP1 |
Unless otherwise stated, SUSE Linux Enterprise Server supports all of the following processors in 32-bit mode:
The User Application requires credentials to log in to the Identity Vault. The credentials used to access the Identity Vault must:
You are prompted for these credentials during installation. This user is referred to as the User Application Administrator. The computer where you install the User Application must have 320 MB of storage available. Xen virtualization is now supported on SUSE Linux Enterprise Server 10 when the Xen Virtual Machine (VM) is running SLES 10 as the guest operating system in paravirtualized mode. An Xen patch for SLES 10 is needed (see TID #3915180). For Linux:
|
Database Server and Service
|
Local access means that the database is running on the same box as the application server. Remote access means the product accesses the database across the wire. Included in the User Application product:
Included in the User Application product and works in both local and remote access:
The following databases are not included, but can be used in remote access only:
|
NOTE:If you want to implement clustering, you must download and install JBoss 4.0.3 SP1. You can use the JBoss Application server to host the User Application and MySQL, or you can use another supported database. The User Application uses a database for various tasks, such as storing User Application configuration data and storing data for any in-progress workflow activities. Both the secure logging service and the User Application and workflow provisioning require a database. You can set up one database to serve both applications, or you can set up independent databases for each one. The secure logging service does not include a specific database. For JBoss:
For MySQL:
|
Workstations
|
Designer has been tested on the following platforms: Windows:
Linux:
|
Designer uses Eclipse as its development platform. Refer to the Eclipse Web site for platform-specific information. Designer minimum and recommended hardware requirements:
Prerequisite software:
|
Connected System Server (host on a separate server running Remote Loader)
|
Each driver requires that the connected system be available and the relevant APIs are provided. Refer to the Identity Manager Driver documentation for operating system and connected system requirements that are specific to each system. |
Each connected application requires individuals with application-specific knowledge and responsibility. Remote Loader System:
Java Remote Loader System:
|