Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export or import deliverables. You agree not to export or re-export to entities
on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export
laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
See the Novell International Trade Services Web page (http://www.novell.com/info/exports/) for more information
on exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary export
approvals.
Novell, Inc. has intellectual property rights relating to technology embodied in the product that is described in this
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S.
patents listed on the Novell Legal Patents Web page (http://www.novell.com/company/legal/patents/) and one or
more additional patents or pending patent applications in the U.S. and in other countries.
Novell, Inc.
404 Wyman Street, Suite 500
Waltham, MA 02451
U.S.A.
www.novell.com
Online Documentation: To access the latest online documentation for this and other Novell products, see
the Novell Documentation Web page (http://www.novell.com/documentation).
Novell Trademarks
For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/
trademarks/tmlist.html).
Third-Party Materials
All third-party trademarks are the property of their respective owners.
This guide provides an overview of the Identity Assurance Solution. It includes instructions on how
to install, configure, and manage the solution.
Chapter 1, “Overview,” on page 9
Chapter 2, “Planning the Identity Assurance Solution Installation,” on page 17
Chapter 3, “Installing Identity Assurance Solution,” on page 21
Chapter 4, “Configuring Identity Assurance Solution,” on page 33
Chapter 5, “Troubleshooting the Identity Assurance Solution,” on page 47
Audience
This guide is written primarily for network administrators and system integrators.
novdocx (en) 24 April 2008
Feedback
We want to hear your comments and suggestions about this manual and the other documentation
included with this product. Please use the User Comments feature at the bottom of each page of the
online documentation, or go to www.novell.com/documentation/feedback.html and enter your
comments there.
Documentation Updates
For the most recent version of the Identity Assurance Solution 3.0.2 Installation Guide, visit the
Identity Assurance Solution Documentation Web site (http://www.novell.com/documentation/
ias301/index.html).
Documentation Conventions
®
In Novell
items in a cross-reference path.
A trademark symbol (
trademark.
When a single pathname can be written with a backslash for some platforms or a forward slash for
other platforms, the pathname is presented with a backslash. Users of platforms that require a
forward slash, such as Linux* or UNIX*, should use forward slashes as required by your software.
documentation, a greater-than symbol (>) is used to separate actions within a step and
®
, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
Novell® has partnered with third-party companies to build a solution that offers an integrated logical
and physical control system that complies with Homeland Security Presidential Directive 12
(HSPD-12). HSPD-12 directs the implementation of a new standardized badging process, which is
designed to enhance security, reduce identity fraud, and protect the personal privacy of those issued
government identification.
Identity Assurance Solution (IAS) provides a complete system for managing the enrollment,
issuance, access control, and retirement of Personal Identification Verification (PIV) cards. This
solution is in compliance with the Federal Information Processing Standards Publication 201 (FIPS
201) and provides components such as an Identity Management System (IDMS), a User Enrollment/
Biometric Capture system, a Card Management System (CMS), and Logical and Physical Access
Control Systems (LACS/PACS).
Figure 1-1 shows the different components of the solution and shows how the workflow is designed.
The components and workflow are discussed in the following sections:
Section 1.1, “Identity Assurance Solution Components,” on page 10
Section 1.2, “Driver Overviews,” on page 10
Section 1.3, “Identity Assurance Solution Workflow,” on page 15
Section 1.4, “What’s Next,” on page 16
1.1 Identity Assurance Solution Components
Table 1-1 describes the basic components and the specific products in this solution.
Table 1-1 Identity Assurance Solution Components and Products
ComponentProduct
novdocx (en) 24 April 2008
Identity Management System / Identity VaultNovell eDirectory
Novell Identity Manager
Novell iManager
Workflow SystemUser Application for Provisioning
User Enrollment/Biometric Capture systemEnrollment Driver for the Honeywell* SmartPlus*
System
Card Management System (CMS)CMS Driver for ActivIdentity* ActivID*
Logical Access Control System (LACS)Novell Enhanced Smart Card Method (NESCM)
Physical Access Control System (PACS)PACS Integration Driver for the Honeywell
SmartPlus System
TM
A more detailed list of components and products is provided in Chapter 2, “Planning the Identity
Assurance Solution Installation,” on page 17.
1.2 Driver Overviews
The IAS drivers provide a means for the different solution components to communicate and work
together. The drivers are a vital part of the IAS solution.
The following sections provide information about each driver:
Section 1.2.1, “PIV Life Cycle Driver,” on page 11
Section 1.2.2, “PIV Workflow Driver,” on page 11
Section 1.2.3, “Enrollment Driver,” on page 11
Section 1.2.4, “CMS Driver,” on page 12
Section 1.2.5, “PACS Integration Driver,” on page 14
The PIV Life Cycle driver acts as a traffic director for the solution. It verifies that all expected
attributes are included in each step of the process and either allows the process to continue if all
requirements are met, or halts the process if requirements are not met.
1.2.2 PIV Workflow Driver
The PIV Workflow driver provides a means for the various roles to perform tasks related to
requesting and provisioning PIV cards for users.
1.2.3 Enrollment Driver
The Enrollment driver for the Honeywell SmartPlus system does the following tasks in the PIV
provisioning scenario:
Creates application user accounts in the Honeywell SmartPlus Enrollment system.
Provisions sponsor-approved appellation information from the Identity Manager system to the
Honeywell SmartPlus Enrollment system.
Publishes biometric data and vetting confirmation from the Honeywell SmartPlus Enrollment
system to the Identity Manager system.
novdocx (en) 24 April 2008
Deletes cardholder biometric data from the Honeywell SmartPlus Enrollment system upon
termination of the user.
The driver contains policies to detect events that indicate when data should be provisioned to or
deprovisioned from the Honeywell SmartPlus Enrollment system. It also contains an event
“listener” capability that allows it to receive data transmissions from the Honeywell SmartPlus
Enrollment system.
In order to maintain a simple interface with Identity Manager, the driver is configured to only
respond to state changes in the fipsBioStatus attribute.
The value of this attribute is modified only by the Enrollment driver or PIV Life Cycle driver. After
the initial provisioning information is added by the sponsor to the user through the PIV Workflow,
the PIV Life Cycle driver sets the fipsBioStatus attribute to a value of Biometric Enrollment Ready.
This modification event triggers the driver to send the account creation and sponsor enrollment data
to the Biometric Enrollment server. If the information is sent and provisioned successfully, the
fipsBioStatus attribute is set to Biometric Enrollment in Progress. If the information fails to be sent
to the server, fipsBioStatus is set to Biometric Enrollment Failure and the fipsBioStatusReason and
fipsBioStatusExplanation attributes contain the reason for the failure.
The PIV Life Cycle driver receives the modify event for the fipsBioStatus attribute and updates the
PIV provisioning state attributes. If the information is submitted successfully to the Honeywell
SmartPlus Enrollment server, the registrar notifies the applicant to report to the biometric enrollment
station, as indicated in Figure 1-2.
Overview11
Figure 1-2 Enrollment Driver
novdocx (en) 24 April 2008
After the information is entered into the Honeywell SmartPlus Enrollment server, the registrar sends
the completed biometric data package to the driver for storage in the Identity Vault. The driver
stores the biometric data and updates the fipsBioStatus attribute with a value of either Biometric
Enrollment Complete or Biometric Enrollment Failure. The fipsBioStatusReason and
fipsBioStatusExplanation attributes can be updated with relevant success or failure information.
The role of the Enrollment driver is finished at this point in the Identity Assurance Solution.
1.2.4 CMS Driver
The CMS driver for ActivIdentity Active ID is used for the following tasks in the PIV provisioning
scenario:
Creates applicant user accounts in the Card Management System.
Sends a Card Production Request (CPR) containing all required data to the Card Management
Notifies Identity Manager of a Card Issued or a Credential Issued event from the Card
Management System.
Sends card information (card serial number, FIPS 201 required certificate, CHUID) back to
Identity Manager.
Sends a Card Termination Request to the Card Management System.
The driver contains policies to detect events that indicate when data should be provisioned to or
deprovisioned from the Card Management System.
In order to maintain a simple interface with Identity Manager, the driver is configured to only
respond to state changes in the fipsCMSStatus attribute.
The value of this attribute is modified only by the CMS driver or by the PIV Life Cycle driver. After
the enrollment process is completed successfully, the PIV Life Cycle driver sets the fipsCMSStatus
attribute to a value of PIV Card Production Request Ready and then to CMS User Provisioning
Ready. See Figure 1-3.
Figure 1-3 Card Management System Driver
novdocx (en) 24 April 2008
Overview13
If the sponsor approves the PIV issuance, the CMS driver sends a User Add request to the Card
Management System. If the User Add request is successful, the fipsCMSStatus attribute is set to
CMS User Provisioning Complete. If the Add request fails, the fipsCMSStatus attribute is set to
CMS User Provisioning Failed and the fipsCMSStatusReason attribute and
fipsCMSStatusExplanation attribute explain why the process failed.
When the CMS User Provisioning is complete, the PIV Life Cycle driver sets the fipsPIVStatus
attribute to CMS User Provisioning Complete and ensures that all attributes for a Card Provisioning
Request (CPR) are present for the user. If so, the PIV Life Cycle driver sets the fipsCMSStatus
attribute and the fipsPIVStatus attribute to PIV Card Production Request Ready.
The CMS driver gathers all available attributes, builds the Card Production Request, and submits it
to the Card Management System. If the sponsor approves the Card Production Request, the PIV Life
Cycle driver sets the fipsCMSStatus attribute and the fipsPIVStatus attribute to PIV Card
Production Approved. The Card Management System driver then sends a production request to the
Card Management System and sets the fipsCMSStatus attribute to PIV Card Issuance Ready.
The CMS driver forwards the results of the card issuance procedure. It sets the fipsCMSStatus
attribute to PIV Card Issued and the fipsCMSPhysicalCardSN attribute to the card’s serial number
value. It also retrieves and stores the card’s certificates from the Card Management System in
Identity Manager.
novdocx (en) 24 April 2008
1.2.5 PACS Integration Driver
The PACS Integration driver for the Honeywell SmartPlus system is used for the following tasks in
the PIV provisioning scenario:
Creates applicant user accounts in the Physical Access Control system (PACS).
Sends information to the Honeywell SmartPlus PACS system, stating what locations the user
has access to.
Deletes the user from the Honeywell SmartPlus PACS system upon termination.
The driver contains policies to detect events that indicate when data should be provisioned to or
deprovisioned from the Honeywell SmartPlus PAC system.
In order to maintain a simple interface with Identity Manager, the driver is configured to only
respond to state changes in the fipsPACSStatus attribute.
The value of this attribute is modified only by the PACS Integration driver or by the PIV Life Cycle
driver. After the PIV card is issued to the applicant, the PIV Life Cycle driver sets the
fipsPACSStatus attribute to a value of PACS Activation Ready. See Figure 1-4.
This modification event triggers the driver to send the applicant’s PIV card information to the
Honeywell SmartPlus PACS system. If the information is sent and provisioned successfully, the
fipsPACSStatus attributes is set to PACS Activation Ready. If the information fails to be sent to the
system, the fipsPACSStatus is set to PACS Activation Failed and the fipsPACSStatusReason and
fipsPACSStatusExplanation attributes contain the reason for the failure.
The Honeywell SmartPlus PAC system receives the applicant’s information and allows the applicant
physical access to the place of employment.
1.3 Identity Assurance Solution Workflow
Figure 1-1 on page 9 describes the basic workflow of this solution.
1. From a workstation, the sponsor accesses the user application associated with the PIV
Workflow Driver and submits a request for a PIV card for the applicant.
2. The PIV Workflow Driver sends the request to the PIV Life Cycle driver.
3. The PIV Life Cycle driver checks to make sure the request is valid and complete. If it is a valid
request, it routes the request to the Enrollment/Biometric Capture driver.
4. The Enrollment/Biometric Capture driver routes the request to the biometric engine, accessible
by the registrar’s workstation.
5. The applicant meets with the registrar and provides whatever information is required by the
company. The following are examples of information that could be included on the PIV card:
Signature
Photo
Fingerprint
I9 Form
Overview15
A background check is also conducted on the applicant.
6. After the enrollment data is captured, the registrar submits it again to the Enrollment/Biometric
Capture driver.
7. The Enrollment/Biometric Capture driver sends the enrollment data to the PIV Life Cycle
driver.
8. The PIV Life Cycle driver checks to make sure the data is valid and complete. If the data is
valid and complete, it routes the request to the Card Management System driver.
9. The Card Management System driver sends a Card Production Request (CPR) to the Card
Management System.
10. The activator creates the PIV card for the applicant.
The applicant meets with the activator to receive the PIV card. The applicant provides a
fingerprint scan to confirm his or her identity and to finalize the PIV card creation and
issuance. When this is successfully completed, the activator hands over the card.
11. After the card is physically issued, the activator sends a Card Issue Event back to the Card
Management System driver. The Card Issue Event contains all the card data.
12. The Card Management System driver notifies the PIV Life Cycle driver of the Card Issue
Event.
13. The PIV Life Cycle driver stores the card data and verifies that everything is in order. If so, the
applicant can now use his or her card for logical access to the network. The PIV Life Cycle
driver notifies the Physical Access Control driver of the card issuance.
14. The Physical Access Control driver sends the information to the Physical Access Control
System. The card is activated for physical access based on the sponsor’s chosen settings.
novdocx (en) 24 April 2008
1.4 What’s Next
To prepare for the installation, see Chapter 2, “Planning the Identity Assurance Solution
Installation,” on page 17.
To begin the installation, see Chapter 3, “Installing Identity Assurance Solution,” on page 21.
This section describes the minimum requirements that must be met for each machine before starting
the Identity Assurance Solution (IAS) installation. It also describes the contents of each CD
distributed with this solution.
Section 2.1, “Minimum Requirements,” on page 17
Section 2.2, “Preparing the Software,” on page 19
Section 2.3, “Contents of Each Identity Assurance Solution CD,” on page 20
Section 2.4, “What's Next,” on page 20
2.1 Minimum Requirements
The following minimum requirements apply to this release:
Section 2.1.1, “Novell Identity Manager Support,” on page 17
Section 2.1.2, “Identity Vault Server,” on page 18
Section 2.1.3, “User Enrollment/Biometric Capture Station,” on page 18
Section 2.1.4, “Card Management System,” on page 18
Section 2.1.5, “Physical Access Control System,” on page 18
2
Section 2.1.6, “User Application Server,” on page 18
Section 2.1.7, “Workstations,” on page 18
Section 2.1.8, “Web Browser,” on page 19
2.1.1 Novell Identity Manager Support
IAS 3.0.2 supports the following versions of Novell® Identity Manager User Application (a
browser-based Web application that gives the user the ability to perform a variety of identity selfservice tasks):
Identity Manager 3.5.0 with User Application 3.5.0 (http://www.novell.com/documentation/
idm35/pdfdoc/idm350.zip)
Identity Manager 3.5.1 with User Application 3.6.0 (http://www.novell.com/documentation/
idm35/index.html)
WARNING: IAS 3.0.2 does not support Identity Manager User Application 3.5.1. You must
either upgrade or install Identity Manager User Application 3.6.0. Follow the procedures
outlined in the IDM Migration Guide (http://www.novell.com/documentation/idmrbpm36/
migration/data/seafang_antelope.html).
Planning the Identity Assurance Solution Installation
17
2.1.2 Identity Vault Server
The Identity Vault server must be running Windows* 2003 Server SP1 or later.
2.1.3 User Enrollment/Biometric Capture Station
The software being utilized for the User Enrollment Biometric Capture station for this release is
Honeywell SmartPlus Enrollment software. Make sure this software is installed on the machine you
are designating for this function.
For information on the minimum requirements for the Honeywell SmartPlus Enrollment software,
see the installation documentation provided by Honeywell.
2.1.4 Card Management System
The software being utilized for the Card Management System for this release is the ActivIdentity
CMS 4.0.3 software. Make sure this software is installed on the machine you are designating for this
function.
novdocx (en) 24 April 2008
IMPORTANT: Patch # FISX0709018 is required and must be applied to ActivIdentity CMS 4.0.3.
For information on the minimum requirements for the ActivIdentity CMS software, see the
installation documentation provided by ActivIdentity.
NOTE: For this release, ActivIdentity CMS is only supported on the Windows platform with
Microsoft* Active Directory.*
2.1.5 Physical Access Control System
The software being utilized for the Physical Access Control System for this release is the Honeywell
SmartPlus Integration software. Make sure this software is installed on the machine you are
designating for this function.
For information on the minimum requirements for the Honeywell SmartPlus Integration software,
see the installation documentation provided by Honeywell.
2.1.6 User Application Server
The Identity Vault server must be running Windows 2003 Server SP1 or later.
2.1.7 Workstations
Each workstation must meet the following minimum requirements:
Windows XP SP2 or later installed.
PIV card reader is connected and PIV card middleware is installed.
The administration of the Identity Management Solution is supported by using the following
browsers on Windows only:
Firefox* 1.5.x or later
Internet Explorer* 6.0 SP2 or later
2.2 Preparing the Software
Identity Assurance Solution is made up of several software components:
Section 2.2.1, “Novell Products that Need to be Downloaded and Installed,” on page 19
Section 2.2.2, “Third-Party Products that Need to be Installed,” on page 19
Section 2.2.3, “IAS CD Images,” on page 19
novdocx (en) 24 April 2008
2.2.1 Novell Products that Need to be Downloaded and
Installed
Novell eDirectoryTM
Novell Identity Manager
Novell Audit
2.2.2 Third-Party Products that Need to be Installed
Honeywell SmartPlus Enrollment
ActivIdentity CMS
Honeywell SmartPlus Integration
For more information on installing these products, see Section 3.1, “Installing the User Enrollment
Biometric Capture Station,” on page 21,Section 3.2, “Installing the Card Management System,” on
page 21, and Section 3.3, “Installing the Physical Access Control System,” on page 22.
2.2.3 IAS CD Images
Configuration files
Drivers
Workstation setup software
Download the IAS .iso files and verify the MD 5 values, then create a CD for each .iso file you
downloaded. Label each CD as outlined in the following table:
FilenameCD Label
iasmodules_302.isoCD 1-IAS Modules
Planning the Identity Assurance Solution Installation19
FilenameCD Label
iasclient_302.isoCD 2-IAS Client
The CDs are referenced according to these labels throughout the installation instructions.
2.3 Contents of Each Identity Assurance
Solution CD
The Identity Assurance Solution software is contained on two CDs. The following table can serve as
a reference as you install each component.
Table 2-1 IAS CD Contents
CD NameCD Contents
CD 1–IAS Modules iManager 2.6 (standard iManager structure,
plug-ins, custom utilities, and Web
applications)
Installs for Identity Manager drivers specific to
IAS:
CMS Driver for ActivIdentity ActivID
Enrollment Driver for the Honeywell
SmartPlus System
PACS Integration Driver for Honeywell
SmartPlus System
PIV Life Cycle Driver
IAS Digital Signature Applet
Pre-config files for all IAS Identity Manager
drivers
novdocx (en) 24 April 2008
CD 2–IAS Client
2.4 What's Next
To perform the installation, follow the instructions in Chapter 3, “Installing Identity Assurance
This section describes or points to information on how to install all software components for the
Identity Assurance Solution.
IMPORTANT: The steps outlined in this section and in Chapter 4, “Configuring Identity
Assurance Solution,” on page 33 must be performed in the order they are listed.
Section 3.1, “Installing the User Enrollment Biometric Capture Station,” on page 21
Section 3.2, “Installing the Card Management System,” on page 21
Section 3.3, “Installing the Physical Access Control System,” on page 22
Section 3.4, “Installing the Identity Vault Server,” on page 22
Section 3.5, “Installing Drivers,” on page 24
Section 3.6, “Post-Installation Tasks,” on page 29
Section 3.7, “Installing Workstations,” on page 30
Section 3.8, “What's Next,” on page 32
3.1 Installing the User Enrollment Biometric
3
Capture Station
The software being utilized for the User Enrollment Biometric Capture station for this release is
Honeywell SmartPlus Enrollment software. Make sure this software is installed on the machine you
are designating for this function.
For information on installing the Honeywell SmartPlus Enrollment software, see the installation
documentation provided by Honeywell.
3.2 Installing the Card Management System
The software being utilized for the Card Management System for this release is the ActivIdentity
CMS 4.0.3 software. Make sure this software is installed on the machine you are designating for this
function.
IMPORTANT: Patch # FISX0709018 is required and must be applied to ActivIdentity CMS 4.0.3.
For information on installing the ActivIdentity CMS software, see the installation documentation
provided by ActivIdentity.
Installing Identity Assurance Solution
21
3.3 Installing the Physical Access Control
System
The software being utilized for the Physical Access Control System for this release is the Honeywell
SmartPlus Integration software. Make sure this software is installed on the machine you are
designating for this function.
For information on installing the Honeywell SmartPlus Integration software, see the installation
documentation provided by Honeywell.
3.4 Installing the Identity Vault Server
Install the Identity Vault server components in the order they are presented in this section. Each
section lists the product to install and the CD the product is on.
Section 3.4.1, “Novell eDirectory 8.8.1,” on page 22
Section 3.4.2, “iManager 2.6,” on page 22
Section 3.4.3, “Novell Identity Manager 3.5.1,” on page 23
Section 3.4.4, “Novell Identity Manager 3.5.1 on Connected Systems,” on page 23
Section 3.4.5, “Novell Enhanced Smart Card Method (NESCM) Server Component,” on
page 23
novdocx (en) 24 April 2008
3.4.1 Novell eDirectory 8.8.1
Purchase, download, and install Novell® eDirectoryTM 8.8.1 from the Novell Download Web site
(http://download.novell.com/index.jsp).
For information on installing Novell eDirectory, see the Installing or Upgrading Novell eDirectory on Windows section of the Novell eDirectory 8.8 Installation Guide (http://www.novell.com/
documentation/edir88/edirin88/data/ahna7o7.html).
By installing Novell eDirectory 8.8.1, you will also install the following components:
NICI 2.7.0-1
Novell Certificate Server
NMAS
Consider the following as you install eDirectory:
Do not re-install the Novell Client
If the eDirectory server is being installed on a Windows 2000 AD Domain Controller, you must
change the ports to avoid a conflict with the AD LDAP server. We recommend changing the
ports to 390 for clear text and 637 for SSL/TLS.
Don’t install any NMAS login methods. The NESCM method is installed as a separate
NOTE: When logging in to iManager, use the fully distinguished Admin user DN (for example,
admin.ias). If the tree can’t be located, use the IP address or DNS name of the Identity Vault server.
3.4.3 Novell Identity Manager 3.5.1
Purchase, download, and install Novell Identity Manager 3.5.1 from the Novell Download Web site
(http://download.novell.com/index.jsp).
For information on installing Novell Identity Manager, see the Installation section of the Novell
Identity Manager 3.5 Documentation Web site (http://www.novell.com/documentation/idm35/
install/data/front.html).
3.4.4 Novell Identity Manager 3.5.1 on Connected Systems
Each of the three connected systems (User Enrollment/Biometric Capture Station, Card
Management System, and Physical Access Control System) needs to have Novell Identity Manager
3.5.1 Connected System installed on it.
For information on installing Novell Identity Manager on connected systems, see the “Installing the
Connected Systems Option” section of the Identity Manager 3.5.1 Installation Guide (http://
www.novell.com/documentation/idm35/admin/data/bs35odr.html).
3.4.5 Novell Enhanced Smart Card Method (NESCM) Server
Component
CD: CD 2 - IAS_Client
Location: \nmasmethods\novell\enhancedsmartcard.zip
The NESCM method’s server component is installed by using iManager.
Installing Identity Assurance Solution23
You must complete the procedures for installing and configuring the NESCM method on a server as
provided in the Novell Enhanced Smart Card Method Installation Guide (http://www.novell.com/
Identity Assurance Solution contains five separate drivers. The following table describes which
driver is installed on which system:
Table 3-1 Driver/System Installation
Driver TypeDriver Brand NameSystem to Install Driver On
PIV card control center driverPIV Life Cycle driverIdentity Vault server
PIV card user application driverPIV Workflow driverUser Application server
novdocx (en) 24 April 2008
Enrollment driverEnrollment Driver for the
Honeywell SmartPlus System
Card Management System driver CMS Driver for ActivIdentity
ActivID
Physical Access Control driverPACS Integration Driver for the
Honeywell SmartPlus System
User Enrollment/Biometric
Capture station
Card Management System
Physical Access Control System
NOTE: The driver installation programs shut down eDirectory if eDirectory is installed on the
system.
If the eDirectory shutdown attempt fails, the installer stops and must be run again. In order to avoid
the inconvenience of re-running the installer, you can stop the eDirectory service before launching
each installer.
Use the following procedures to install each drivers:
Section 3.5.1, “PIV Life Cycle Driver,” on page 24
Section 3.5.2, “PIV Workflow Driver,” on page 25
Section 3.5.3, “Enrollment Driver for the Honeywell SmartPlus System,” on page 25
Section 3.5.4, “CMS Driver for ActivIdentity ActivID,” on page 27
Section 3.5.5, “PACS Integration Driver for the Honeywell SmartPlus System,” on page 28
3.5.1 PIV Life Cycle Driver
CD: CD 1 - IAS_Modules
Location: \idmdriver
The PIV Life Cycle driver must be installed on the Identity Vault server.
After the PIV Life Cycle driver is installed, you need to restart the application server (typically
JBoss) where the User Application is running. Failure to do so might result in denied access to the
User Application and an error occurs.
To install the PIV Life Cycle driver on the Identity Vault server:
1 Double-click IASModules_302:IDMDriver\PIV Life Cycle Driver.exe to
install the driver.
2 Read the welcome page, then click Next.
3 Read the license agreement and select I accept the terms of the license agreement, then click
Next.
4 Specify the eDirectory server’s IP address.
This is the IP address of the Identity Vault server.
5 Specify the name of an eDirectory user who has sufficient administrative rights to the root of
the tree to extend the schema, then click Next.
The username must be entered in LDAP (comma-delimited) notation.
6 Click Install to begin the installation.
7 Click Finish to exit the installation wizard.
To configure the driver, see Section 4.1.1, “Configuring the PIV Life Cycle Driver,” on
page 33.
novdocx (en) 24 April 2008
3.5.2 PIV Workflow Driver
CD: CD 1 - IAS_Modules
Location: \idmdriver
For this solution, the PIV Workflow driver is installed by using iManager, and it works with the
User Application for Provisioning.
For more information on importing and configuring the PIV Workflow driver, see Section 4.1.2,
“Configuring the PIV Workflow Driver,” on page 36.
3.5.3 Enrollment Driver for the Honeywell SmartPlus System
CD: CD 1 - IAS_Modules
Location: \idmdriver
To install the Enrollment driver, you need to complete the following three tasks:
“Installing Identity Manager 3.5.1 for Connected Systems on the Enrollment Biometric
Capture System” on page 25
“Installing the Driver” on page 26
“Configuring the Connected System (Remote Loader)” on page 26
Installing Identity Manager 3.5.1 for Connected Systems on the Enrollment Biometric
Capture System
For information on installing Novell Identity Manager on connected systems, see the “Installing the
Connected Systems Option” section of the Identity Manager 3.5.1 Installation Guide (http://
www.novell.com/documentation/idm35/admin/data/bs35odr.html).
Installing Identity Assurance Solution25
Installing the Driver
The driver is installed on the same machine where the Honeywell SmartPlus Enrollment system is
installed. Make sure that the Identity Manager Connected System is installed before proceeding with
the installation of the driver.
3 Read the license agreement and select I accept the terms of the license agreement, then click
Next.
4 Browse to and select the location where you have the Remote Loader installed on the
Honeywell SmartPlus Enrollment system, then click Next.
5 Click Install to begin the installation.
6 Click Finish to exit the installation wizard.
To configure the driver, see Section 4.1.3, “Configuring the Enrollment Driver,” on page 37.
novdocx (en) 24 April 2008
Configuring the Connected System (Remote Loader)
1 Launch the Remote Loader Console by clicking the Remote Loader Console icon on your
desktop.
2 Click Add to add a remote driver.
3 Specify a description for the remote driver.
4 Select com.novell.nds.dirxml.hwbio.HWBioEnrollmentDriver in the driver drop-down list.
This is the Biometric Enrollment driver. If the driver is not listed, it means the driver has not
been installed. You must first install the driver. See “Installing the Driver” on page 26.
5 Specify a filename and location for the Remote Loader configuration file.
6 Select All for the Remote Loader service to listen for communication on all IP addresses for the
ActivIdentity server.
6a Leave the connection port at the default of 8090.
6b Leave the command port at the default of 8000.
7 Specify the Remote Loader password.
8 Specify the driver object password.
9 Select Use an SSL Connection.
9a Browse to and select a trusted root file.
See Providing for Secure Data Transfer (http://www.novell.com/documentation/idm35/
admin/data/bs35pi6.html#bs35pi6) for information on how to create a trusted root file.
10 Set the trace level to zero.
Increase this only during troubleshooting of the driver.
11 Select Establish a Remote Loader service for this driver instance.
12 Click OK to save the information.
To configure the driver, see
Section 4.1.4, “Configuring the Honeywell SmartPlus Enrollment
To install the CMS driver, you need to complete the following three tasks:
“Installing Identity Manager 3.5.1 for Connected Systems on the Card Management System”
on page 27
“Installing the Driver” on page 27
“Configuring the Connected System (Remote Loader)” on page 27
Installing Identity Manager 3.5.1 for Connected Systems on the Card Management
System
For information on installing Novell Identity Manager on connected systems, see the “Installing the
Connected Systems Option” section of the Identity Manager 3.5.1 Installation Guide (http://
www.novell.com/documentation/idm35/admin/data/bs35odr.html).
novdocx (en) 24 April 2008
Installing the Driver
The driver is installed on the same machine where the Card Management System for ActivIdentity is
installed.
1 Double-click IASModules_302:IDMDriver\CMS Driver for ActivIdentity
ActivID.exe to install the driver.
2 Read the welcome page, then click Next.
3 Read the license agreement and select I accept the terms of the license agreement, then click
Next.
4 Browse to and select the location where you have the Remote Loader installed on the
ActivIdentity Card Management system, then click Next.
5 Specify the path to your CMS portal deployment, then click Next.
6 Click Install to begin the installation.
7 Click Finish to exit the installation wizard.
Configuring the Connected System (Remote Loader)
1 Launch the Remote Loader Console.
2 Click Add to add a remote driver.
3 Specify a description for the remote driver.
4 Select com.novell.nds.dirxml.driver.aicmsshim.AICMSDriverShim in the driver drop-down list.
If the driver is not listed, it means the driver has not been installed. You must first install the
driver. See “Installing the Driver” on page 27.
5 Specify a filename and location for the Remote Loader configuration file.
6 Select All for the Remote Loader service to listen for communication on all IP addresses for the
ActivIdentity server.
6a Leave the connection port at the default of 8090.
Installing Identity Assurance Solution27
6b Leave the command port at the default of 8000.
7 Specify the Remote Loader password.
8 Specify the driver object password.
9 Select Use an SSL Connection.
9a See Providing for Secure Data Transfer (http://www.novell.com/documentation/idm35/
admin/data/bs35pi6.html#bs35pi6) for information on how to create a trusted root file.
10 Set the trace level to zero.
Increase this only during troubleshooting of the driver.
11 Select Establish a Remote Loader service for this driver instance.
12 Click OK to save the information.
To configure the driver, see Section 4.1.5, “Configuring the CMS Driver,” on page 39.
3.5.5 PACS Integration Driver for the Honeywell SmartPlus
System
novdocx (en) 24 April 2008
CD: CD 1 - IAS_Modules
Location: \idmdriver
To install the PACS driver, you need to do the following three tasks:
“Installing Identity Manager 3.5.1 for Connected Systems on the Physical Access Control
System” on page 28
“Installing the Driver” on page 28
“Configuring the Connected System (Remote Loader)” on page 29
Installing Identity Manager 3.5.1 for Connected Systems on the Physical Access
Control System
For information on installing Novell Identity Manager on connected systems, see the Installing the
Connected Systems Option section of the Identity Manager 3.5.1 Installation Guide (http://
www.novell.com/documentation/idm35/admin/data/bs35odr.html).
Installing the Driver
The driver is installed on the same machine where the Honeywell SmartPlus Integration system is
installed.
To configure the driver, see Section 4.1.6, “Configuring the PACS Integration Driver,” on page 41.
Configuring the Connected System (Remote Loader)
1 Launch the Remote Loader Console.
2 Click Add to add a remote driver.
3 Specify a description for the remote driver.
4 Select com.novell.nds.dirxml.driver.hwpacs.HWPACSDriver in the driver drop-down list.
This is the Physical Access Control System (PACS) driver. If the driver is not listed, it means
the driver has not been installed. You must first install the driver. See “Installing the Driver” on
page 28.
5 Specify a filename and location for the Remote Loader configuration file.
6 Select All for the Remote Loader service to listen for communication on all IP address for the
ActivIdentity server.
6a Leave the connection port at the default of 8090.
6b Leave the command port at the default of 8000.
novdocx (en) 24 April 2008
7 Specify the Remote Loader password.
8 Specify the driver object password.
9 Select Use an SSL Connection.
9a Browse to and select a trusted root certificate.
See Providing for Secure Data Transfer (http://www.novell.com/documentation/idm35/
admin/data/bs35pi6.html#bs35pi6) for information on how to create a trusted root file.
This trusted root certificate enables the remote loader to establish an SSL connection with
the Identity Vault server.
10 Set the trace level to zero.
Increase this only during troubleshooting of the driver.
11 Select Establish a Remote Loader service for this driver instance.
12 Click OK to save the information.
To configure the driver, see Section 4.1.6, “Configuring the PACS Integration Driver,” on page 41.
3.6 Post-Installation Tasks
After installation, you need to enable the iManager plug-ins:
1 Launch iManager.
2 Click the Configure icon .
3 Install the NESCM plug-ins:
3a Click Module to select all available modules.
3b Click Install.
4 Close iManager.
5 Restart Tomcat by either rebooting the server or doing the following:
5a Click Start > Settings > Control Panel.
Installing Identity Assurance Solution29
5b Double-click Administrative tool > Services.
5c Right-click Tomcat, then click Restart.
3.7 Installing Workstations
CD: CD 2 - IAS_Client
Location: Auto launch
Each applicant’s workstation should meet the minimum requirements. See Section 2.1.7,
“Workstations,” on page 18.
Each applicant’s workstation that will be authenticating by using a PIV card must be installed by
using the following procedure:
1 Insert the CD 2 - IAS Client into the workstation’s CD drive.
The client installation should auto launch.
If not, browse to the root of CD 2 - IAS Client and double-click setup.exe.
2 Read the welcome page, then click Next.
3 Read the license agreement and select I accept the terms of the license agreement, then click
Next.
novdocx (en) 24 April 2008
4 Select Novell Client and Enhanced Smart Card Method.
(Optional) If you also want to audit Workstation Only logins, select Novell Audit Platform Agent.
5 Click Next.
6 Click Install.
7 Read the Novell Enhanced Smart Card Method welcome page, then click Next.
8 Read the license agreement and select I accept the terms of the license agreement, then click
Next.
9 On the Disconnected Support page, select Yes, I Want Disconnected Support, then click Next.
This feature allows you to authenticate to the workstation only by using the Smart Card login
method.
10 On the ID Plugin Support page, select whether or not you want to use the ID plug-in support
feature.
This feature allows the ID plug-in to query the database for the smart card’s associated
username.
If you select Yes, you must also supply the IP addresses and port numbers for all LDAP servers
you want to query.
11 Click Next.
12 Choose whether or not to customize the password field description on the login screen, then
click Next.
If you choose to customize the login screen's password field, you must type in the new text for
the field.
If you use Alt+P to access the password field when logging in, you lose this functionality when
you customize the password field description. To keep this functionality, you must include an
ampersand (&) in front of a letter P in the new text you enter in the password field.
For example, if your new text reads Password, you should enter it as &Password so that Alt+P
continues to function as usual.
13 Select either PC/SC or PKCS#11, then click Next.
PC/SC and PKCS#11 are technical standards used to communicate between a server and PKIenabled applications. PC/SC is a standard used for integrating smart cards and smart card
readers. PKCS#11 is a standard for public key message exchanges.
Select the standard that best supports your hardware. For more information, see the
manufacturer's specifications.
If you select PKCS#11, you must also select a provider that best suits your needs.
14 Review the page, then click Install.
15 (Conditional) If you decided to install the Novell Audit Platform Agent in Step 4, click Next on
the Novell Audit Platform Agent page. If not, skip to Step 21.
16 Accept the License Agreement, then click Next.
17 Fill in the customer information, then click Next.
18 Type the IP address or DNS name of the Secure Logging Server, then click Next.
novdocx (en) 24 April 2008
This is the IP address or DNS name of the Novell Audit server (the Identity Vault server that
was set up previously).
19 Select Complete, click Next > Install.
20 Click Finish.
21 Click Finish.
22 Restart the workstation.
23 Complete the instructions for installing and configuring the NESCM method on a workstation
as provided in the Novell Enhanced Smart Card Installation Guide (http://www.novell.com/
This section describes how to use iManager to configure the drivers and how to install the User
Application server.
For overview information about each driver, see Section 1.2, “Driver Overviews,” on page 10.
Section 4.1, “Configuring the Drivers,” on page 33
Section 4.2, “Installing the User Application Server,” on page 43
Section 4.3, “Configuring E-Mail Notifications,” on page 44
Section 4.4, “What’s Next,” on page 45
4.1 Configuring the Drivers
Use iManager to configure the drivers by completing the following tasks:
Section 4.1.1, “Configuring the PIV Life Cycle Driver,” on page 33
Section 4.1.2, “Configuring the PIV Workflow Driver,” on page 36
Section 4.1.3, “Configuring the Enrollment Driver,” on page 37
Section 4.1.4, “Configuring the Honeywell SmartPlus Enrollment System,” on page 39
Section 4.1.5, “Configuring the CMS Driver,” on page 39
Section 4.1.6, “Configuring the PACS Integration Driver,” on page 41
4
Section 4.1.7, “(Optional) Using Designer to Customize Your Implementation,” on page 43
4.1.1 Configuring the PIV Life Cycle Driver
After the driver is installed, it is configured through iManager (See Section 3.5.1, “PIV Life Cycle
Driver,” on page 24 for instructions on how to install the driver). The PIV Life Cycle driver
configuration file creates the policies that govern how the information is synchronized.
1 In iManager, select Identity Manager Utilities > New Driver.
2 Select In a new driver set.
For the PIV Life Cycle driver, you place the driver in a new driver set. For the remaining four
drivers, you place the drivers in the driver set you create for the PIV Life Cycle driver.
Configuring Identity Assurance Solution
33
3 Click Next.
4 Define the properties of the new driver set.
4a Specify the name of the driver set.
4b Browse to and select the context where the driver set will be created.
4c Browse to and select the server you want the driver set associated with.
4d Leave the Create a new partition on this driver set option selected.
We recommend that you create a partition for the driver object. For Identity Manager to
function, the server that is associated with the driver set must hold a real replica of the
Identity Manager objects. If the server holds a Master or Read/Write replica of the context
where the objects are to be created, then the partition is not required.
4e Click Next.
5 Select Import a configuration from the server, browse to and select the
IAS_PIVLifeCycle-IDM3_5_0-V1.xml driver configuration file, then click Next.
6 If the driver configuration file is not listed, select Import a configuration from the client, then
click Browse.
6a Browse to and select the driver configuration file from
IASMODULES_302:\IDMDriver\configs\IAS_PIVLifeCycle-IDM3_5_0V2.xml from the IAS modules ISO, then click Open.
novdocx (en) 24 April 2008
6b Click Next.
7 Configure the driver by filling in the configuration parameters:
ParameterDescription
Driver nameSpecify the name of the driver.
IAS Root Container NameThe name of the root container for IAS. All IAS objects will be
created in this container. The installation program will create this
container.
IMPORTANT: Don't enter the name of an existing container.
Agency Short NameSpecify the unique name of the agency (16 characters or less).
Unique Agency CodeSpecify the unique agency code (4 digits).
Role PasswordSpecify a password that applies to all roles.
8 Click Next.
9 Select Define Security Equivalences.
9a Click Add, then browse to and select a user object that has the rights the driver needs to
have on the server.
Many administrators use the Administrator User object in the Identity Vault for this task.
However, you might want to create another object, such as a DriversUser, and assign
sufficient rights to that user for the driver to function. Whatever rights the driver needs to
have on the server, the DriversUser object must have the same rights.
10a Click Add, browse to and select all objects that represent administrative roles, then
exclude them from replication with the driver.
Exclude the User object in the Identity Vault (for example, DriversUser) that you
specified in Step 9. If you delete the User object, you have removed the rights from the
driver. Therefore, the driver can’t make changes to Identity Manager.
If there are objects that are currently excluded, they do not appear in the Excluded users
list unless you select Retrieve Current Exclusions.
10b Click OK twice.
11 Click Next.
12 View the summary, then click Finish with Overview.
13 Select the PIV Life Cycle Driver and edit its properties:
13a Select Named Passwords.
novdocx (en) 24 April 2008
13b Add piv-workflow-user and passwords > Save.
Configuring Identity Assurance Solution35
The password value for the Named Password is the password for the PIV Workflow User. This is the
admin user who is specified in the User Application Admin DN field during the configuration of the
User Application driver object. For information on the User Application Admin DN field, see “User
Application Admin DN” on page 36. It is also the same user who is indicated in the Global Settings
of the Driver Set under the name PIV Workflow: User ID.
IMPORTANT: At this point, make sure you start the PIV Life Cycle driver in Identity Manager
before proceeding. The remaining driver configurations rely on policies in the PIV Life Cycle
driver.
4.1.2 Configuring the PIV Workflow Driver
After the driver is installed, it is configured through iManager. (See Section 3.5.2, “PIV Workflow
Driver,” on page 25 for instructions on how to install the driver.) The PIV Life Cycle driver
configuration file creates the policies that govern how the information is synchronized.
1 In iManager, select Identity Manager Utilities > New Driver.
novdocx (en) 24 April 2008
2 Select In an existing driver set.
3 Browse to and select the driver set you set up in Step 4 on page 34, then click Next.
4 Browse to and select the server the driver is associated with, then click Next.
5 Select Import a configuration from the server, browse to and select the IAS_PIVWorkflow-
IDM3_5_0-V2.xml driver configuration file, then click Next.
6 If the driver configuration file is not listed, select Import a configuration from the client, then
click Browse.
6a Browse to and select the driver configuration file from
IASMODULES_302:\IDMDriver\configs\IAS_PIVWorkflow-IDM3_5_0V2.xml from the IAS modules ISO, then click Open.
6b Click Next.
7 Configure the driver by filling in the configuration parameters:
ParameterDescription
Driver nameSpecify the name of the driver.
User Application Admin DNSpecify the User Application Administrator's DN. The User
Application Administrator is specified when you install the User
Application. See Section 4.2.1, “Installing User Application for
Provisioning,” on page 43.
User App Server ProtocolSpecify your User Application Server protocol. (Example: https).
User App Server AddressSpecify your User Application Server address and port number.
(Example: 137.65.159.42:8080).
User App Server ContextSpecify your User Application Server context. (Example: IDM).
8 Click Next.
9 Select Define Security Equivalences.
9a Click Add, then browse to and select a user object that has the rights the driver needs to
have on the server.
Many administrators use the Administrator User object in the Identity Vault for this task.
However, you might want to create another object, such as a DriversUser, and assign
sufficient rights to that user for the driver to function. Whatever rights the driver needs to
have on the server, the DriversUser object must have the same rights.
9b Click OK twice.
10 Select Exclude Administrative Roles.
10a Click Add, browse to and select all objects that represent administrative roles, then
exclude them from replication with the driver.
Exclude the User object in the Identity Vault (for example, DriversUser) that you
specified in Step 9. If you delete the User object, you have removed the rights from the
driver. Therefore, the driver can’t make changes to Identity Manager.
If there are objects that are currently excluded, they do not appear in the Excluded users
list unless you select Retrieve Current Exclusions.
novdocx (en) 24 April 2008
10b Click OK twice.
11 Click Next.
12 View the summary, then click Finish with Overview.
4.1.3 Configuring the Enrollment Driver
After the driver is installed, it is configured through iManager. (See Section 3.5.3, “Enrollment
Driver for the Honeywell SmartPlus System,” on page 25 for instructions on how to install the
driver.) The Enrollment driver configuration file creates the policies that govern how the
information is synchronized.
1 In iManager, select Identity Manager > New Driver.
2 Select In an existing driver set.
3 Browse to and select the driver set you set up in Step 4 on page 34, then click Next.
Configuring Identity Assurance Solution37
4 Browse to and select the server the driver is associated with, then click Next.
5 Select Import a configuration from the server, browse to and select the
IAS_IWBioEnrollment-IDM3_5_0-V1.xml driver configuration file, then click Next.
6 If the driver configuration file is not listed, select Import a configuration from the client, then
click Browse.
6a Browse to and select the driver configuration file from
IASMODULES_302:\IDMDriver\configs\IAS_IWBioEnrollmentIDM3_5_0-V1.xml from the IAS modules ISO, then click Open.
6b Click Next.
7 Configure the driver by filling in the configuration parameters:
ParameterDescription
Driver nameSpecify the name of the driver.
Remote host name and portSpecify the hostname or IP address and port number where the
Remote Loader Service has been installed for this driver. The
default port is 8090.
novdocx (en) 24 April 2008
Driver passwordSpecify the driver object password. It is the same password as
specified in Step 8 on page 26.
Authentication passwordSpecify the Remote Loader password. It is the same password as
specified in Step 7 on page 26.
KMO NameSpecify the name of the KMO object. See “Providing for Secure
Data Transfer” (http://www.novell.com/documentation/idm/
index.html?page=/documentation/idm/admin/data/
bs35pi6.html#bs35pi6) for steps on how to create a KMO.
URL of the Biometric
Enrollment Server
Listening Hostname and PortSpecify the local host address and port that will listen to receive
Specify the URL of the Honeywell SmartPlus Enrollment server.
events from the Honeywell SmartPlus Enrollment server. See
“Installing Identity Manager 3.5.1 for Connected Systems on the
Enrollment Biometric Capture System” on page 25 for more
information.
8 Click Next.
9 Select Define Security Equivalences.
9a Click Add, then browse to and select a user object that has the rights the driver needs to
have on the server.
Many administrators use the Administrator User object in the Identity Vault for this task.
However, you might want to create another object, such as a DriversUser, and assign
sufficient rights to that user for the driver to function. Whatever rights the driver needs to
have on the server, the DriversUser object must have the same rights.
9b Click OK twice.
10 Select Exclude Administrative Roles.
10a Click Add, browse to and select all objects that represent administrative roles, then
Exclude the User object in the Identity Vault (for example, DriversUser) that you
specified in Step 9. If you delete the User object, you have removed the rights from the
driver. Therefore, the driver can’t make changes to Identity Manager.
If there are objects that are currently excluded, they do not appear in the Excluded users
list unless you select Retrieve Current Exclusions.
10b Click OK twice.
11 Click Next.
12 View the summary, then click Finish with Overview.
4.1.4 Configuring the Honeywell SmartPlus Enrollment System
The Enrollment/Biometric Capture driver runs on the Honeywell SmartPlus Enrollment system.
(For installation instructions, see Section 3.1, “Installing the User Enrollment Biometric Capture
Station,” on page 21.) Use the following instructions in this section to modify the iws.cfg file to
communicate with the Identity Manager server.
1 Locate the Tomcat directory where the Honeywell SmartPlus Enrollment Web service is
running.
novdocx (en) 24 April 2008
2 Open the tomcat_directory/webapps/PIV/WEB-INF/iws.cfg file in a text editor.
3 Add the following two lines at the bottom of this file:
The Publisher port number is located in the properties of the Enrollment driver. It can be any
port that is not in use on the connected system.
3a In iManager, click Identity Manager > Identity Manager Overview, then click Search to
find the driver set objects in the Identity Vault.
3b Click the upper right corner of the driver, then select Edit properties.
The Publisher port number is listed under Driver Configuration > Driver Parameters Publisher Options > Listening IP address and port.
4 Restart Tomcat.
4.1.5 Configuring the CMS Driver
After the driver is installed, it is configured through iManager. (See Section 3.5.4, “CMS Driver for
ActivIdentity ActivID,” on page 27 for instructions on how to install the driver.) The CMS driver
configuration file creates the policies that govern how the information is synchronized.
1 In iManager, select Identity Manager > New Driver.
Configuring Identity Assurance Solution39
2 Select In an existing driver set.
3 Browse to and select the driver set you set up in Step 4 on page 34, then click Next.
4 Browse to and select the server the driver is associated with, then click Next.
5 Select Import a configuration from the server, browse to and select the IAS_AICMSDriver-
IDM3_5_0-V1.xml driver configuration file, then click Next.
6 If the driver configuration file is not listed, select Import a configuration from the client, then
click Browse.
6a Browse to and select the driver configuration file from
IASMODULES_302:\IDMDriver\configs\IAS_AICMSDriver-IDM3_5_0V1.xml from the IAS modules ISO, then click Open.
6b Click Next.
7 Configure the driver by filling in the configuration parameters:
ParameterDescription
Driver nameSpecify the name of the driver.
novdocx (en) 24 April 2008
Remote host name and portSpecify the hostname or IP address and port
number where the Remote Loader Service has
been installed for this driver. The default port is
8090.
Driver PasswordSpecify the driver password. It is the same
password as specified in Step 8 on page 28.
Remote PasswordSpecify the remote password. It is the same
password as specified in Step 7 on page 28.
KMO nameSpecify the KMO name. See “Providing for
Secure Data Transfer” (http://www.novell.com/
documentation/idm/index.html?page=/
documentation/idm/admin/data/
bs35pi6.html#bs35pi6) for steps on how to
create a KMO.
Client certificateSpecify the path to a client certificate that can be
used to initiate an SSL connection with CMS.
This is a client certificate signed by the CMS
Certificate Authority (CA)
Client certificate passwordSpecify the password to unwrap the client
certificate.
Trusted root certificateSpecify the path to a trusted root certificate. This
is a trusted root certificate from the CMS
Certificate Authority (CA).
Card PolicySpecify the name of the CMS policy that will be
“No Fingerprints” Card PolicySpecify the name of the CMS policy that will be
CMS users parent AD contextSpecify the name of the container in Active
9a Click Add, then browse to and select a user object that has the rights the driver needs to
have on the server.
Many administrators use the Administrator User object in the Identity Vault for this task.
However, you might want to create another object, such as a DriversUser, and assign
sufficient rights to that user for the driver to function. Whatever rights the driver needs to
have on the server, the DriversUser object must have the same rights.
9b Click OK twice.
10 Select Exclude Administrative Roles.
10a Click Add, browse to and select all objects that represent administrative roles, then
exclude them from replication with the driver.
Exclude the User object in the Identity Vault (for example, DriversUser) that you
specified in Step 9. If you delete the User object, you have removed the rights from the
driver. Therefore, the driver can’t make changes to Identity Manager.
If there are objects that are currently excluded, they do not appear in the Excluded users
list unless you select Retrieve Current Exclusions.
10b Click OK twice.
novdocx (en) 24 April 2008
11 Click Next.
12 View the summary, then click Finish with Overview.
4.1.6 Configuring the PACS Integration Driver
After the driver is installed, it is configured through iManager. (See Section 3.5.5, “PACS
Integration Driver for the Honeywell SmartPlus System,” on page 28 for instructions on how to
install the driver.) The PACS Integration driver configuration file creates the policies that govern
how the information is synchronized.
1 In iManager, select Identity Manager > New Driver.
2 Select In an existing driver set.
3 Browse to and select the driver set you set up in Step 4 on page 34, then click Next.
4 Browse to and select the server the driver is associated with, then click Next.
5 Select Import a configuration from the server, browse to and select the
IAS_HoneywellPACS-IDM3_5_0-V1.xml driver configuration file, then click Next.
6 If the driver configuration file is not listed, select Import a configuration from the client, then
click Browse.
Configuring Identity Assurance Solution41
6a Browse to and select the driver configuration file from
IASMODULES_302:\IDMDriver\configs\IAS_HoneywellPACSIDM3_5_0-V1.xml from the IAS modules ISO, then click Open.
6b Click Next.
7 Configure the driver by filling in the configuration parameters:.
ParameterDescription
Driver nameSpecify the name of the driver.
Remote host name and portSpecify the hostname or IP address and port number where the
Remote Loader Service has been installed for this driver. The
default port is 8090.
Driver passwordSpecify the driver object password. It is the same password as
specified in Step 8 on page 29.
Remote passwordSpecify the Remote Loader password. It is the same password as
specified in Step 7 on page 29.
KMO NameSpecify the name of the KMO object. See “Providing for Secure
Data Transfer” (http://www.novell.com/documentation/idm/
index.html?page=/documentation/idm/admin/data/
bs35pi6.html#bs35pi6) for steps on how to create a KMO.
novdocx (en) 24 April 2008
URL of the Honeywell
SmartPlus PAC Server
Listening Hostname and PortSpecify the local host address and port that will listen to receive
Specify the URL of the Honeywell SmartPlus PACS Integration
server.
events from the Honeywell SmartPlus Enrollment server. See
“Installing Identity Manager 3.5.1 for Connected Systems on the
Physical Access Control System” on page 28 for more information.
8 Click Next.
9 Select Define Security Equivalences.
9a Click Add, then browse to and select a user object that has the rights the driver needs to
have on the server.
Many administrators use the Administrator User object in the Identity Vault for this task.
However, you might want to create another object, such as a DriversUser, and assign
sufficient rights to that user for the driver to function. Whatever rights the driver needs to
have on the server, the DriversUser object must have the same rights.
9b Click OK twice.
10 Select Exclude Administrative Roles.
10a Click Add, browse to and select all objects that represent administrative roles, then
exclude them from replication with the driver.
Exclude the User object in the Identity Vault (for example, DriversUser) that you
specified in Step 9. If you delete the User object, you have removed the rights from the
driver. Therefore, the driver can’t make changes to Identity Manager.
If there are objects that are currently excluded, they do not appear in the Excluded users
list unless you select Retrieve Current Exclusions.
12 View the summary, then click Finish with Overview.
4.1.7 (Optional) Using Designer to Customize Your
Implementation
Designer is a powerful graphical toolset that you can use to customize, test, and document the
drivers after you have configured them in iManager. You can import the driver set or drivers from
the Identity Vault to create a project in Designer. After you customize, test, and document the
drivers in Designer, you can deploy the changes using Designer.
NOTE: Using Designer to directly import the IAS drivers has not been tested and is not officially
supported for this release.
Designer can be downloaded from the Novell Download Web site (http://download.novell.com/
index.jsp).
For more information on using Designer, see the Designer 1.2 for Identity Manager Documentation
Web site (http://www.novell.com/documentation/designer12/index.html).
novdocx (en) 24 April 2008
4.2 Installing the User Application Server
With the IAS drivers configured, you can complete the installation by completing the following
steps:
Section 4.2.1, “Installing User Application for Provisioning,” on page 43
Section 4.2.2, “Installing the IAS Digital Signature Applet,” on page 44
Section 4.2.3, “Restarting the PIV Life Cycle Driver,” on page 44
4.2.1 Installing User Application for Provisioning
If you are using Identity Manager 3.5.0, you can use the User Application for Provisioning version
3.5.0 that is included in the Novell Identity Manager 3.5.0 build. If you are using Identity Manager
3.5.1, use User Application for Provisioning version 3.6.0 (http://www.novell.com/documentation/
idmrbpm36/index.html), which can be found on the Novell download site.
For installation instructions, see the “Installing User Application” section of the Identity Manager
3.5 Installation Guide (http://www.novell.com/documentation/idm/install/data/i1064071.html) and
the Identity Manager 3.5.1 Installation Guide (http://www.novell.com/documentation/idm35/install/
data/front.html) product.
For this release, we recommend installing the User Application for Provisioning on a separate
Windows 2003 server on the network because of the large number of workflow requests this system
will be handling. Alternatively, you can install the User Application for Provisioning on the Identity
Vault server.
During the User Application configuration, you need to enter the PIV Workflow driver’s
distinguished name in the field next to Provisioning Driver DN.
Also, when prompted for the search root, user root, and group root containers, select the IAS Root
container you specified during the PIV Life Cycle driver configuration (See Section 4.1.1,
Configuring Identity Assurance Solution43
“Configuring the PIV Life Cycle Driver,” on page 33). For the user root, select the IAS Root/Users
container. For the group root, select IAS Root/Groups container.
IMPORTANT: After you install the IDM User Application for Provisioning product, you should
configure JBoss* to only allow mutual authenticated SSL connections. For more information, see
this JBoss Wiki page (http://wiki.jboss.org/wiki/Wiki.jsp?page=SSLSetup).
4.2.2 Installing the IAS Digital Signature Applet
CD: CD 1 - IAS_Modules
Location: \idmdriver
The IAS Digital Signature Applet must be installed on the same server as the User Application for
Provisioning.
Before you begin the installation, make sure that JBoss is not running on the server.
1 Double-click IASModules_302:IDMDriver\IASSignerApplet.exe to install the
driver.
2 Read the welcome page, then click Next.
novdocx (en) 24 April 2008
3 Read the license agreement and select I accept the terms of the license agreement, then click
Next.
4 Select the folder that is the root of your User Application deployment, then click Next.
5 Click Install to begin the installation.
6 Read the post-install instructions on the last installation page.
These instructions need to be completed after you click Finish.
7 Click Finish to exit the installation wizard.
Complete the post-install instructions:
1 Start JBoss and wait until User Application is fully deployed.
2 Open an Internet browser and go to the following URL, substituting your system-specific
This redirects you to the Digital Signature Service configuration page.
3 Log in as Administrator.
4 Make sure the Enable Digital Signature Support check box is checked.
4.2.3 Restarting the PIV Life Cycle Driver
To complete your installation and configuration of Identity Assurance Solution, restart the PIV Life
Cycle driver.
4.3 Configuring E-Mail Notifications
You can configure an SMTP e-mail server on your network to send e-mail notifications when tasks
have been completed or when a task is requested. The PIV Life Cycle driver installs IAS-specific e-
mail templates into the Identity Vault’s Default Notification Collection. These templates are
associated with the IAS workflow tasks, and notifications are sent automatically to specific
workflow roles based on IAS policy.
To enable e-mail notifications, you must configure the e-mail server.
1 Start iManager.
2 From the Roles and Tasks menu, select Passwords > E-mail Server Options.
3 In the Host Server field, type the name or IP address of the SMTP e-mail server.
4 In the From field, type the e-mail address for the sender.
When the recipient opens the e-mail, this text is displayed in the From field of the e-mail
header.
5 If your server requires authentication before sending e-mail, select the Authenticate to server
using credentials check box and specify the username and password.
6 Click OK.
For more information on setting up e-mail notifications, see Configuring E-mail Notification (http://
www.novell.com/documentation/idm35/admin/data/bnpdcy4.html) in the Novell Identity Manager
3.5.1 Administration Guide.
novdocx (en) 24 April 2008
4.4 What’s Next
The Identity Assurance Solution is ready to use.
For information on managing the Identity Assurance Solution, see the Identity Assurance
This section provides troubleshooting information for the Identity Assurance Solution installation.
5.1 Known Issues
COULD_NOT_FIND_USER: Error while retrieving userAIMS_NO_SUCH_WALLET
If you receive the above message in the Remote Loader trace when attempting to suspend a
card in the CMS system and the card is not being suspended in the other systems, you must
properly configure the card binding. This is an ActivIdentity CMS setting. For more
information, see the “Customizing” chapter of the CMS Operator Guide under the section on
configuring the Directory setting User Attribute for Card Binding.
The following LDAP special characters are not permitted in User Distinguished Names or
contexts:
, + ” \ < > ;
Using these characters causes forms to not be auto-populated with default values, and fail to be
submitted.
An error similar to the following will be displayed if any of the above characters are used:
Sponsor: Script error in idvault.globalQuery(): Service returned
error. Return code=500, Message=Error encountered while executing
the service globalquery: {1}., Throwable=Ldap error querying for
results. Error: javax.naming.InvalidNameException: O=IasTest:
[LDAP: error code 34 - NDS error: illegal ds name (-610)];
remaining name 'O=IasTest'
This section provides information on securely installing and configuring the products included in the
Identity Assurance Solution (IAS).
Some products have specific security considerations called out in the documentation. Other products
have security information dispersed throughout the documentation.
Section A.1, “Identity Assurance Solution,” on page 49
Section A.2, “Novell Products,” on page 49
Section A.3, “Third-Party Products,” on page 50
A.1 Identity Assurance Solution
The following issues relate to the Identity Assurance Solution:
novdocx (en) 24 April 2008
A
Section A.1.1, “Using SSL Connections with Remote Loaders,” on page 49
Section A.1.2, “Using SSL Connections with JBoss,” on page 49
A.1.1 Using SSL Connections with Remote Loaders
The IAS installation instructions describe how to set up the Remote Loaders on the connected
systems so they use a secure SSL connection. See the following references:
Step 9 of “Configuring the Connected System (Remote Loader)” on page 26.
Step 9 of “Configuring the Connected System (Remote Loader)” on page 27.
Step 9 of “Configuring the Connected System (Remote Loader)” on page 29.
A.1.2 Using SSL Connections with JBoss
The IAS installation instructions provide information on setting up JBoss to allow only mutually
authenticated SSL connections. See Section 4.2.1, “Installing User Application for Provisioning,”
on page 43.
A.2 Novell Products
For additional information on securely installing the Novell® products in this solution, see the
following resources:
This section describes how to manually configure the ActivIdentity Card Management System.
The Identity Assurance Solution automatically does this configuration when the CMS driver is
installed on the Card Management System. However, if you make changes to the Card Management
System that overwrite the Novell Event Handler settings, you might need to manually perform this
procedure.
For this deployment scenario, ActivIdentity Card Management System is being used for the card
management system. The CMS driver runs on the ActivIdentity Card Management System. The
installation of the Card Management System was done previously. See Section 3.2, “Installing the
Card Management System,” on page 21.
You must complete the following steps:
1 Stop IIS.
2 Locate the /cmsevent directory inside the Remote Loader directory created by the CMS
Driver install.
3 Copy the following files from the /cmsevent directory to the CMS Directory/
cms_portal/WEB-INF/lib directory:
novellplugin.jar
B
aims-spi.jar
4 Copy the following file from the /cmsevent directory to the CMS Directory/
cms_portal/WEB-INF/conf directory:
novellplugin.properties
This file contains a path to c:\novell\remoteloader\cmsevent\event. This path
must match the event files directory that is configured for the CMS driver. If you accepted all
of the default settings during the CMS driver installation, the paths will match.
5 Edit the CMS Directory/cms_portal/WEB-INF/conf/
eventnotificationplugins.properties file:
5a Locate the plugins = line near the top of the file. Add, novell_plugin at the end
of this line.
For example, plugins = piv_notify,novell_plugin
5b Add the following two lines at the end of the file:
In order for CMS notification events, such as Suspend/Resume, to be properly propagated to the
Identity Manager system, the CMS system needs to have card binding properly configured. For
example, where the CMS directory is Microsoft* Active Directory* in the CMS Portal, the setting
for Card Binding under the Configuration/Customization/Directories section should be set to
distinguishedName.
Make sure PIV Life Cycle Driver is up and running before adding the new User Application
driver.
Upgrading the Identity Assurance Solution from 3.0.1 to 3.0.257
14 Add the driver by selecting Add Driver, then select IAS PIVWorkflow-IDM3_5_0-
V2.xml.
Enter the values saved in Step 12 in the required fields.
15 Verify that the PIV Life Cycle driver is running by ensuring that the circle in the upper-right
corner of the driver icon is green.
16 Select the PIV Life Cycle driver and edit its properties:
16a Select Named Passwords.
novdocx (en) 24 April 2008
16b Add piv-workflow-user and passwords > Save.
The password value for the Named Password is the password for the PIV Workflow user.
This is the admin user who is specified in the User Application Admin DN field during the
configuration of the User Application Driver object. For information on the User Application Admin DN field, see “User Application Admin DN” on page 36. It is also the
same user who is indicated in the Global Settings of the Driver Set under the name PIV Workflow: User ID.
For more help about updating to Designer 2.1.1, refer to the Identity Manager Roles Based
Provisioning Module 3.6 Migration Guide (http://www.novell.com/documentation/
idmrbpm36/migration/data/seafang_antelope.html).
18 Follow the migration steps outlined in the Migration Guide (http://www.novell.com/