Acquire the CA Top Secret system before you can administer it with CA Identity Manager.
Follow these steps:
Specifies the name of the new CA Top Secret endpoint. The endpoint name is the name that appears in the Provisioning Manager. Commas and semi-colons are not allowed.
Specifies the mainframe LDAP IP Address or machine name of the CA Top Secret.
Specifies the Listen Port for the Security Integrator running on the CA Top Secret.
Specifies valid suffixes that are configured for the current CA LDAP Server operations in im naming mode. (See the chapter titled, "CATSS_DN Backend" in the CA LDAP Server for z/OS Administrator Guide for more information on naming mode.)
Allows you to specify an ID that is used to issue the password modifications that are requested through the Workflow. This provides users with the ability to change or reset their passwords if their password has expired and they cannot be authenticated to the system.
The password to the Proxy Admin ID on the CA Top Secret endpoint.
You are ready to explore and Correlate the endpoint.
The Exploration process finds all CA Top Secret accounts and groups. You can correlate the accounts with global users now or you can correlate them later.
Click Select Container/Endpoint/Explore Method to click a CA-Top Secret endpoint to explore.
Identifies the objects that are stored on the endpoint and not in the provisioning directory.
Correlates the objects that were found in the explore function with users in the provisioning directory. If the user is found, the object is correlated with the user. However, you can instead select that you want to assign the account to the existing user (the default user) or create the user.
If a mapping exists between the object fields and the user fields, the user fields are updated with data from the objects fields.
You may prefer to schedule the task to execute overnight to interfere less with routine access of the system.
Note: This operation requires the client browser to be in the same time zone as the server. For example, if the client time is 10:00 PM on Tuesday and the server time is 7:00 AM, the Explore and Correlate definition does not work.
To use an explore and correlate definition:
Based on the created explore and correlate definition, the user accounts that exist on the endpoint are created or updated in CA Identity Manager.
|
Copyright © 2013 CA.
All rights reserved.
|
|