Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation, and
specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.
Further, Novell, Inc. reserves the right to revise this publication and to make changes to its content, at any time,
without obligation to notify any person or entity of such revisions or changes.
Further, Novell, Inc. makes no representations or warranties with respect to any software, and specifically disclaims
any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc.
reserves the right to make changes to any and all parts of Novell software, at any time, without any obligation to
notify any person or entity of such changes.
Any products or technical information provided under this Agreement may be subject to U.S. export controls and the
trade laws of other countries. You agree to comply with all export control regulations and to obtain any required
licenses or classification to export, re-export, or import deliverables. You agree not to export or re-export to entities
on the current U.S. export exclusion lists or to any embargoed or terrorist countries as specified in the U.S. export
laws. You agree to not use deliverables for prohibited nuclear, missile, or chemical biological weaponry end uses.
Please refer to the International Trade Services (http://www.novell.com/company/policies/trade_services) for more
information on exporting Novell software. Novell assumes no responsibility for your failure to obtain any necessary
export approvals.
Novell, Inc. has intellectual property rights relating to technology embodied in the product that is described in this
document. In particular, and without limitation, these intellectual property rights may include one or more of the U.S.
patents listed on the Novell Legal Patents Web page (http://www.novell.com/company/legal/patents/) and one or
more additional patents or pending patent applications in the U.S. and in other countries.
Novell, Inc.
404 Wyman Street, Suite 500
Waltham, MA 02451
U.S.A.
www.novell.com
Online Documentation: To access the latest online documentation for this and other Novell products, see
the Novell Documentation Web page (http://www.novell.com/documentation).
Novell Trademarks
For Novell trademarks, see the Novell Trademark and Service Mark list (http://www.novell.com/company/legal/
trademarks/tmlist.html).
Third-Party Materials
All third-party trademarks are the property of their respective owners.
novdocx (en) 13 May 2009
novdocx (en) 13 May 2009
4Identity Manager 3.6.1 Overview
Contents
About This Guide7
1 Identity Manager and Business Process Automation9
This guide introduces you to the business issues that Novell® Identity Manager can help you solve
and provides a technical overview of the Identity Manager software components and tools you can
use in your solution. The guide is organized as follows:
Chapter 1, “Identity Manager and Business Process Automation,” on page 9
Chapter 2, “Identity Manager Architecture,” on page 19
Chapter 3, “Identity Manager Tools,” on page 29
Audience
This guide is intended for administrators, consultants, and network engineers who require a highlevel introduction to Identity Manager business solutions, technologies, and tools.
Documentation Updates
novdocx (en) 13 May 2009
For the most recent version of this document, see the Identity Manager Documentation Web site
In Novell documentation, a greater-than symbol (>) is used to separate actions within a step and
items in a cross-reference path.
A trademark symbol (
trademark.
When a single pathname can be written with a backslash for some platforms or a forward slash for
other platforms, the pathname is presented with a backslash. Users of platforms that require a
forward slash, such as Linux* or UNIX*, should use forward slashes as required by your software.
®
, TM, etc.) denotes a Novell trademark. An asterisk (*) denotes a third-party
About This Guide7
novdocx (en) 13 May 2009
8Identity Manager 3.6.1 Overview
1
Identity Manager and Business
novdocx (en) 13 May 2009
Process Automation
The following information identifies some of the business processes you can automate through the
implementation of a Novell
automation solutions provided by Identity Manager, you might want to skip to the technical
introduction provided in Chapter 2, “Identity Manager Architecture,” on page 19.
Managing identity needs is a core function of most businesses. For example, imagine that it’s early
Monday morning. You scroll down the list of requests in your queue:
Jim Taylor’s cell phone number has changed. You need to update it in the HR database and four
other independent systems.
Karen Hansen, just returning from an extended leave of absence, has forgotten her e-mail
password. You need to help her retrieve or reset it.
Jose Altimira just hired a new employee. You need to give the employee network access and an
e-mail account.
Ida McNamee wants access to the Oracle* financial database, which requires you to get
approval from three different managers.
John Harris just moved from the Accounts Payable department to the Legal department. You
need to give him access to the same resources as the other members of the Legal team and
remove his access to Accounts Payable resources.
Karl Jones, your own boss, saw a copy of Ida McNamee’s request for access to the Oracle
financial database and is concerned about the number of people with access. You need to
generate a report for him that shows everyone who has access to the database.
®
Identity Manager system. If you are already aware of the business
1
You take a deep breath and start in on the first request, knowing that you’ll be hard-pressed to keep
up with all of the requests, let alone have time to finish the other projects assigned to you.
If this sounds like a common workday for you or someone in your organization, Identity Manager
can help. In fact, the core Identity Manager capabilities, introduced in the following illustration, can
help you automate all of these tasks and more. Centered on multi-system data synchronization
driven by your business policies, the capabilities—workflow, roles, attestation, self-service,
auditing, and reporting—combine to automate the processes involved in provisioning users and
managing passwords, two of the most difficult and time-consuming duties of an IT organization.
Identity Manager and Business Process Automation
9
Figure 1-1 Identity Manager Core Capabilities
WorkflowSelf-ServiceRoles & Attestation
AuditingReporting
Data Synchronization
The following sections introduce you to these Identity Manager capabilities and how they can help
you successfully meet the identity needs of your organization:
novdocx (en) 13 May 2009
Section 1.1, “Data Synchronization,” on page 10
Section 1.2, “Workflow,” on page 13
Section 1.3, “Roles and Attestation,” on page 14
Section 1.4, “Self-Service,” on page 15
Section 1.5, “Auditing and Reporting,” on page 16
1.1 Data Synchronization
If your organization is like most, you have identity data stored in multiple systems. Or, you have
identity data stored in one system that you could really use in another system. Either way, you need
to be able to easily share and synchronize data between systems.
Identity Manager lets you synchronize, transform, and distribute information across a wide range of
applications, databases, operating systems, and directories such as SAP*, PeopleSoft*, Lotus
Notes*, Microsoft* Exchange, Microsoft Active Directory*, Novell eDirectory
and LDAP directories.
TM
, Linux and UNIX,
10Identity Manager 3.6.1 Overview
Loading...
+ 22 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.