This section details your connector's specific management features, such as how to acquire and explore your endpoint. Also included are account, provisioning roles, account template, and group information specifically for your connector.
You must acquire the OS/400 machine before you can administer it with CA Identity Manager.
To acquire an OS/400 machine using the User Console
Use the Create OS400 Endpoint page to register an OS/400 machine. During the registration process, CA Identity Manager identifies the OS/400 machine you want to administer and gathers information about it.
You are now ready to explore and Correlate the endpoint.
The Exploration process finds all OS/400 accounts and groups. You can correlate the accounts with global users at this time or you can correlate them later.
Click Select Container/Endpoint/Explore Method to click an OS/400 endpoint to explore.
You may prefer to schedule the task to execute overnight to interfere less with routine access of the system.
Note: This operation requires the client browser to be in the same time zone as the server. For example, if the client time is 10:00 PM on Tuesday when the server time is 7:00 AM, the Explore and Correlate definition will not work.
To use an explore and correlate definition
The user accounts that exist on the endpoint are created or updated in CA Identity Manager based on the explore and correlate definition you created.
You must acquire the OS/400 machine before you can administer it with CA Identity Manager.
From the OS/400 Endpoint Property Sheet
Provide the OS/400 server machine name, the user ID and password when acquiring an OS/400 system.
Note: Before acquiring the endpoint, make sure that it is registered to use the Java connector. To do this:
During the registration process, CA Identity Manager identifies the OS/400 machine you want to administer and gathers information about it.
After registering the machine in CA Identity Manager, you can explore its contents. Use the Explore and Correlate Endpoint dialog. The Exploration process finds all OS/400 objects. You can correlate the accounts with global users at this time, or you can wait to correlate them.
Choose this option when there are no global users and you want to populate CA Identity Manager from the OS/400 accounts.
When you correlate accounts, CA Identity Manager creates or links the accounts on an endpoint with global users, as follows:
Note: More information on enabling Secure Socket Layer (SSL) communications between the Provisioning Server and the OS/400 system exists in the Provisioning Manager Help.
Streaming Search Results
During the explore operation, the connector returns accounts to the Provisioning server as soon as possible instead of waiting until all accounts have been reviewed. This reduces memory usage resulting in a more efficient explore process.
User ID Limitation
When creating User profiles in an Os/400 system, avoid using User ID numbers larger than 2147483647. A User ID larger than this cannot be mapped to global user UID.
Non-Latin Characters are not Supported
When creating an OS/400 endpoint, non-latin character encodings are not supported.
The OS/400 Default Policy, provided with the OS/400 Connector, gives a user the minimum security level needed to access an endpoint. You can use it as a model to create new account templates.
Policy Default Values
The new account templates are created with default values for most attributes. The new account templates are valid as soon as they are created and the attributes can be customized as necessary.
In previous versions, if an OS400 account owned objects, the account could not be deleted from CA Identity Manager. In this version, a flag called “cascadingDelete” in the OS400 connector.xml in CA IAM Connector Server can be used to change this behavior. When the flag is set to true, the account and all objects owned by the account will be deleted. The default value is set to true.
If you want to override the default value, you must:
cd cs-home\conf\override\as400\ copy SAMPLE.connector.xml connector.xml
Note: See Customize the Configuration for a Connector for more information on override connector.xml files.
OS/400 Security Requirements
The OS/400 Connector issues remote commands to the endpoint system to manage accounts. The managing user profile must have permission to issue remote commands for creating, reading, modifying, and deleting accounts. Areas of security to consider include, special authorities of the managing account (*SECADM is mandatory), exit programs implementing security, and authorization to user profiles.
You can create and maintain OS/400 groups using the Endpoint type task view. Use the OS/400 Group property sheet when managing your groups.
When a new group is defined, you should perform another exploration on the endpoint so CA Identity Manager has an updated group list.
Deleting Account Members from Groups
Account members cannot be deleted from a group if that group is designated as the primary group. You must remove the group from the account member . For example, ProvisioningGroup has two account members, Prov1 and Prov2, and ProvisioningGroup is the primary group of Prov1. Prov2 has a primary group FinancialGroup and a supplement group called ProvisioningGroup. If you try to delete Prov1 and Prov2 from ProvisioningGroup, only Prov2 is removed successfully. Prov1 remains as an account member of ProvisioningGroup.
When an account or group is created, a directory entry is created to store personal information about the user. Previously, the directory entry name was assumed to be the same as the user profile name. The attributes can now be set independently. If the Directory Entry Name is not specified, then a directory entry is not created for that user and many attributes cannot be set. Directory entry names must be unique across accounts and groups.
The connection settings associated with each endpoint cannot be changed using the Endpoint property sheet. To change incorrect connection settings, follow these steps:
The context sensitive menu appears.
The Change Password Dialog appears.
The dialog closes.
After the connection settings are changed, they are verified by attempting a connection to the OS/400 machine. The new settings are only saved if the connection is successful.
Use the following OS/400 conventions in your etautil commands:
The Java OS/400 Connector supports Native Program Exits in the same way as the eTrust Admin 8.1 SP2 OS/400 Connector did with the following limitations:
Note: CA IAM Connector Server provides a Scripting Style Processor interface for connectors. You can write code in the JavaScript scripting language to add extra logic to, or change the behavior of the OS/400 connector's operations. This approach is much more powerful than the C++ OS/400 Connector's Native Program Exits approach because you can access the full operation's details and write whatever you want to achieve for both account and group objects.
An example of this approach follows:
To change the description for each new account to the value of 'To demo scripting program exit concept works', use the conf/as4script_opbindings.xml file within the OS/400 Connector's archive file: <jcs-home>/lib/jcs-connector-as400.jar. Uncomment the "staticMethodScriptStyleMetaDataFile" in <jcs-home>/conf/override/as400/connector.xml and restart the im_jcs to turn on this behaviour.
See the Connector Programming Guide for more information on scripting-style programming.
|
Copyright © 2014 CA.
All rights reserved.
|
|