For the details about the following steps, search for the following topics based on the CA product:
Follow these steps:
This HTML page lists every endpoint attribute that the connector works with. Use this information in the following steps.
Specifies the name of the new CA Top Secret endpoint. The endpoint name is the name that appears in the Provisioning Manager. Commas and semi-colons are not allowed.
Specifies the mainframe LDAP IP Address or machine name of the CA Top Secret.
Specifies the Listen Port for the Security Integrator running on the CA Top Secret.
When checked, specifies that the server's SSL is used.
Note: Ensure that you have imported the SSL certificate to Provisioning Server.
Specifies valid suffixes that are configured for the current CA LDAP Server operations in im naming mode. (See the chapter titled, "CATSS_DN Backend" in the CA LDAP Server for z/OS Administrator Guide for more information on naming mode.)
Allows you to specify an ID that is used to issue the password modifications that are requested through the workflow. This provides users with the ability to change or reset their passwords if their password has expired and they cannot be authenticated to the system.
The password to the Proxy Admin ID on the CA Top Secret endpoint.
When you complete the fields on the Endpoint tab, use the information in the Endpoint section of the attribute list. You can find the details on the Download page.
Important! If you plan to migrate data from the plug-in connector, explore but do not correlate. Correlation of the new endpoint can introduce new associations that conflict with the correlation rules of the old endpoint.
Note: If your explore-and-correlate definition does not include correlation, this step explores only.
| Copyright © 2013 CA. All rights reserved. |
|