IBM


IBM Professional Certification Program

Accelerate insight. Improve skills. Get certified now.

Test 000-006: IBM Tivoli Identity Manager V5.1 Implementation


Section 1-Planning


  1. Given the existing organization and reporting structure, gather the requirements and develop the solution so that an Organization Structure design is created.
    With emphasis on performing the following tasks:

    1. Gather organization structure requirements.

    2. Discuss alternatives.

    3. Formalize organization structure.

    4. Document organization structure.

  2. Given the desired services list and Organization Structure design, gather target platforms,business processes and develop the solution so that a Service design is created.
    With emphasis on performing the following tasks:

    1. Gather services target platforms.

    2. Define organization requirements.

    3. Gather platform business processes.

    4. Identify unsupported platforms.

    5. Document services requirements.

  3. Given the existing Human Resources data and the Services design, gather entity requirements and develop the solution so that an Entities design is created.
    With emphasis on performing the following tasks:

    1. Validate Human Resource data.

    2. Gather entity requirements.

    3. Design entities.

    4. Document entity design.

  4. Given the existing and projected business processes, gather the lifecycle management requirements and develop the solution so that a Lifecycle Management design is created.
    With emphasis on performing the following tasks:

    1. Gather lifecycle management requirements.

    2. Design lifecycle management strategy.

    3. Document lifecycle design.

  5. Given the existing and projected business processes, gather the E-mail management requirements and develop the solution so that an E-mail Management design is created.
    With emphasis on performing the following tasks:

    1. Determine E-mail volume and frequency.

    2. Determine aggregation policy.

    3. Determine format and content of the aggregated E-mail.

  6. Given the existing role information and Organization Structure design, gather the role requirements and develop the solution so that a Roles design is created.
    With emphasis on performing the following tasks:

    1. Gather role requirements.

    2. Define organization requirements.

    3. Design the high-level role structure.

    4. Document role design.

  7. Given the existing provisioning policies and Organization Structure design, gather requirements,discuss and formalize the design so that a Provisioning Policies design is created.
    With emphasis on performing the following tasks:

    1. Gather policy requirements.

    2. Define organization requirements.

    3. Gather entitlement requirements.

    4. Define membership.

    5. Design high-level policy structure.

    6. Define service selection policies.

    7. Document policy design.

  8. Given the existing workflows and services design, gather the requirements including workflow scope and approach and develop the solution so that the Workflow design is created.
    With emphasis on performing the following tasks:

    1. Gather workflow requirements.

    2. Define workflow scope.

    3. Design workflow approach.

    4. Document the workflow design.

  9. Given the existing Human Resources data and the entities design, analyze and map the data to the IBM Tivoli Identity Manager LDAP attributes and develop the solution so that the Person/BP Person entity design is created.
    With emphasis on performing the following tasks:

    1. Gather identity source requirements.

    2. Analyze identity source data.

    3. Map identity data to IBM Tivoli Identity Manager.

    4. Document identity requirements.

  10. Given the existing identity policies and guidelines, entities design and identity sources design, gather the Identity Policy and Organizational requirements and develop the solution so that the IBM Tivoli Identity Manager V5.1 Identity Policy design is created.
    With emphasis on performing the following tasks:

    1. Gather identity policy requirements.

    2. Define organizational requirements.

    3. Design high-level ID policy approach.

    4. Document ID policy design.

  11. Given the existing password policies and services design,gather the requirements and define the scope so that the IBM Tivoli Identity Manager V5.1 Password Policies design is created.
    With emphasis on performing the following tasks:

    1. Gather password policy requirements.

    2. Define password policy scope.

    3. Define password settings.

    4. Document password policy design.

  12. Given the existing application security policies, organization structure design, services design, and entity design, gather the IBM Tivoli Identity Manager V5.1 access requirements and design Groups and ACIs so that the IBM Tivoli Identity Manager V5.1 Security Model design is created.
    With emphasis on performing the following tasks:

    1. Gather IBM Tivoli Identity Manager access requirements.

    2. Design IBM Tivoli Identity Manager Groups.

    3. Design IBM Tivoli Identity Manager ACIs.

    4. Document IBM Tivoli Identity Manager security model.

  13. Given proper policies and documentation, gather the customization requirements and determine the feasibility and scope so that the Customization design is created.
    With emphasis on performing the following tasks:

    1. Gather customization requirements.

    2. Determine customization feasibility.

    3. Design high-level functionality.

    4. Determine customization scope.

    5. Document server customization design.

  14. Given proper documentation, gather the adapter requirements and develop the solution so that a custom adapter design is created.
    With emphasis on performing the following tasks:

    1. Gather agent requirements including account and group access requirements.

    2. Determine customization feasibility.

    3. Design high-level functionality.

    4. Determine customization scope.

    5. Document agent customization design.

  15. Given the hardware assets list, existing network configuration, and the Services design, gather the system architecture requirements and design the solution so that a System Architecture document is created.
    With emphasis on performing the following tasks:

    1. Gather system architecture requirements.

    2. Design system architecture.

    3. Document system architecture.

  16. Given the Services design and existing project plans, prioritize the platforms and determine the adapter phases so that an Adapter Project Plan is created.
    With emphasis on performing the following tasks:

    1. Prioritize platforms.

    2. Group adapters into phases.

    3. Determine timeline for phases.

    4. Document adapter rollout plan.

  17. Given the proper documentation, gather the initial timeline requirements and determine the initial solution rollout timeline so that an Initial Solution Rollout Project Plan is created.
    With emphasis on performing the following tasks:

    1. Gather timeline requirements.

    2. Determine timeline for production rollout.

    3. Document timeline/plan.

  18. Given the System Architecture design and existing backup processes, gather the backup requirements and develop the solution so that a Backup and Recovery Strategy design is created.
    With emphasis on performing the following tasks:

    1. Gather backup requirements.

    2. Design backup strategy.

    3. Document backup strategy.

  19. Given proper documentation, analyze the current system and upgrade requirements so that an Upgrade Planning document is created.
    With emphasis on performing the following tasks:

    1. Analyze current system.

    2. Determine system changes from upgrade.

    3. Analyze customizations.

    4. Design the customization upgrade plan.

    5. Develop overall upgrade plan.

    6. Document upgrade plan.

  20. Given the proper documentation, analyze the given business processes and requirements so that a custom reporting requirements document is created.
    With emphasis on performing the following tasks:

    1. Gather business requirements.

    2. Define reporting data.

    3. Define report form.

    4. Document requirements.

  21. Given the existing account recertification process, gather the account recertification requirements and develop the solution so that a Recertification design document is created.
    With emphasis on performing the following tasks:

    1. Gather recertification management requirements.

    2. Design recertification management strategy.

    3. Document recertification design.

  22. Given the IT infrastructure definition,the projected user population to be managed, and the business continuity requirements, gathers the availability and scalability requirements so that an availability and scalability requirements document is created.
    With emphasis on performing the following tasks:

    1. Gather IT infrastructure information.

    2. Gather network topology information.

    3. Gather enterprise data and application information.

    4. Analyze the gathered information.

    5. Produce hardware recommendations.

    6. Produce middleware configuration recommendations.

    7. Document the Identity Management availability and scalability recommendations.

  23. Given the existing organization and IT environment,gather the user interface requirements and develop the solution so that a Self Service User Interface design is created.
    With emphasis on performing the following tasks:

    1. Gather user activity requirements.

    2. Gather interface customization requirements.

    3. Identify activities to be grouped together.

    4. Document interface design.

  24. Given the Component and Server layout within the various security zones, identify the transport channels and select their protection methodology, identify components and their security needs, and design a comprehensive security solution so that a plan to protect IBM Tivoli Identity Manager data as it is stored and transported in and between the various components is created.
    With emphasis on performing the following tasks:

    1. Identify transport channels.

    2. Select channel protection methodology.

    3. Select component protection methodology.

    4. Document security design.

  25. Given the architecture design document, create an IBM Tivoli Identity Manager acceptance test strategy so that the delivered result can be validated.
    With emphasis on performing the following tasks:

    1. Define test phases and scope.

    2. Gather requirements for testing the components.

    3. Define testing objectives and requirements.

    4. Analyze the risk assessment.

    5. Define the testing levels, types, and phases.

    6. Document the criteria and acceptance test steps.

  26. Given the security and compliance requirements and a deployed Identity Management solution, create and schedule a recertification policy so that a recertification policy is created.
    With emphasis on performing the following tasks:

    1. Define general parameters.

    2. Choose type and target.

    3. Set the schedule for execution.

    4. Define the policy actions.

    5. Select / customize the E-mail notifications.

    6. Define Customizations to the workflow.

  27. Given the business and compliance rules governing identity role management, identify mutually exclusive role relationships so that separations of duty policy rules can be defined as necessary.
    With emphasis on performing the following tasks:

    1. Identify business and compliance rules governing separation of duties.

    2. Identify roles and relationships.

    3. Determine whether Separation of duty Policy should be enabled or disabled.

    4. Define which roles are required to be logically separated.

    5. Define Separation of duty Policy exemptions.

    6. Set the schedule for reconciliation.


Section 2-Installation


  1. Given prerequisite and patch software, install and configure prerequisite software so that the system is ready for the IBM Tivoli Identity Manager installation.
    With emphasis on performing the following tasks:

    1. Gather hardware and platform specifications.

    2. Validate and update hardware to IBM Tivoli Identity Manger specifications.

    3. Determine the prerequisite software patch level required for IBM Tivoli Identity Manager.

    4. Install prerequisite software.

    5. Install prerequisite software patches.

    6. Configure prerequisite software for IBM Tivoli Identity Manager installation.

    7. Verify the installation and configuration are successful.

  2. Given the IBM Tivoli Identity Manager Server software and access to InfoCenter, review the installation guides and install the software so that the IBM Tivoli Identity Manager server passes a basic functionality test.
    With emphasis on performing the following tasks:

    1. Review installation documentation.

    2. Gather environment data.

    3. Install software including latest fixpack.

    4. Verify the installation is successful. Updated the following section to consider both adk based and agentless adapters.

  3. Given both the IBM Tivoli Identity Manager adk based adapters and agentless adapters software, install the adk based adapter on the managed resource, install the agentless adapter on the server where IBM Tivoli Directory Integrator is located and the adapter profiles on the IBM Tivoli Identity Manager server so that the adapter is properly installed and functioning.
    With emphasis on performing the following tasks:

    1. Install adapter software.

    2. Install adapter profile on IBM Tivoli Identity Manager server.

    3. Configure the adapter.

    4. Verify the installation and configuration are successful.

  4. Given the installed adapter, create a Certificate Signing Request and install the certificate so that the adapter functions properly with its certificate.
    With emphasis on performing the following tasks:

    1. Gather information required for certificate signing request.

    2. Create certificate signing request.

    3. Install certificate.

    4. Test communication.

  5. Given an installed IBM Tivoli Identity Manager application and a test plan, log in and utilize the system functions to validate IBM Tivoli Identity Manager is running properly.
    With emphasis on performing the following tasks:

    1. Start up IBM Tivoli Identity Manager environment

    2. Review logs to ensure clean startup.

    3. Execute the test plan and verify success.

    4. Document results.

  6. Given the IBM Tivoli Directory Integrator software, functioning IBM Tivoli Identity Manager server and the server which IBM Tivoli Directory Integrator will be installed on, install and configure IBM Tivoli Directory Integrator server so that the IBM Tivoli Directory Integrator server is running properly.
    With emphasis on performing the following tasks:

    1. Review installation documentation.

    2. Gather environment data.

    3. Install software including latest fixpack.

    4. Verify installation is successful.

  7. Given the appropriate Self Server User Interface design, configure the Self Service User Interface so that it meets customer requirements.
    With emphasis on performing the following tasks:

    1. Configure the main page layout by modifying the SelfServiceUI.properties file.

    2. Configure the screen text by modifying the SelfServiceScreenText_.properties file.

    3. Customize the web content by modifying the files in the itim_self_service.war/custom directory.

    4. Customize the help content by modifying the SelfServiceHelp.properties file.

    5. Configure the default home page properties by modifying the SelfServiceHomePage.properties file.

    6. Define Views from the Self Service UI Configuration page.

  8. Given the existing reporting requirements and the IBM Tivoli Identity Manager report pack,install the Tivoli Common Reporting Server so that reports are created.
    With emphasis on performing the following tasks:

    1. Install Tivoli Common Reporting Server.

    2. Deploy IBM Tivoli Identity Manager report pack.

    3. Customize IBM Tivoli Identity Manager reports as necessary.

    4. Run reports and verify accuracy.


Section 3-Implementation


  1. Given a newly installed IBM Tivoli Identity Manager Server, evaluate and configure the environment values so that the IBM Tivoli Identity Manager server settings are optimally configured.
    With emphasis on performing the following tasks:

    1. Document the initial settings for the IBM Tivoli Identity Manager Server Application, WebSphere. Application Server, IBM Tivoli Identity Manager HTTP Server, IBM Tivoli Identity Manager Database, and IBM Tivoli Identity Manager Directory Server.

    2. Refer to the IBM Tivoli Identity Manager Performance Tuning Guide for recommended initial configuration settings for each component.

    3. Set the initial configuration parameters for each component.

    4. Document the new configuration settings for each component.

  2. Given the appropriate organizational design documents, create the required organizational containers so that the organization structure is configured.
    With emphasis on performing the following tasks:

    1. Create any additional organizations.

    2. Create organizational units.

    3. Create locations.

    4. Create business partner organizations.

    5. Create admin domains.

  3. Given the appropriate IBM Tivoli Identity Manager Group and ACI design and access to the IBM Tivoli Identity Manager GUI, create the IBM Tivoli Identity Manager Groups, ACIs and relationship expressions so that the IBM Tivoli Identity Manager security model meets customer expectations.
    With emphasis on performing the following tasks:

    1. Create IBM Tivoli Identity Manager Groups.

    2. Create organizational ACIs.

    3. Create provisioning ACIs.

    4. Create report ACIs.

    5. Create category ACIs.

    6. Create required LDAP indices for attributes defined in relationship expressions.

  4. Given object classes, an appropriate list of attributes and access to the LDAP tool, create and configure custom attributes so that the schema is extended.
    With emphasis on performing the following tasks:

    1. Add attributes to LDAP.

    2. Create new custom class. TJC: specify custom Person objectclasses

    3. Create custom labels.

    4. Add attributes to the service schema.

    5. Add attributes to the adapter schema.

    6. Add indexes as needed.

  5. Given the Entities design document, create custom entities so that customer requirements are met.
    With emphasis on performing the following tasks:

    1. Add entity.

    2. Configure default search attribute.

    3. Configure name attribute.

    4. Configure mapped attributes.

    5. Create custom operation definitions.

    6. Save entity.

  6. Given the appropriate Forms design, configure the Forms so that all required Forms meet the design requirements.
    With emphasis on performing the following tasks:

    1. Select Form to be customized.

    2. Add or remove tabs.

    3. Add or remove attributes.

    4. Change control types.

    5. Populate attribute lists.

    6. Configure attributes' parameters.

    7. Save form template.

  7. Given the appropriate organizational Roles design, create the static and/or dynamic role so that the roles are configured.
    With emphasis on performing the following tasks:

    1. Create static roles.

    2. Create dynamic roles, including LDAP filter. TJC: create hierarchical roles, only use static rolesTJC: a use case should be created in another section where the hierarchy is validated static role membership can be obtained manually through the UI or programmatically through IBM Tivoli Directory Integrator

  8. Given the appropriate Services design and managed services data, create IBM Tivoli Identity Manager service objects so that the service is configured and functioning.
    With emphasis on performing the following tasks:

    1. Determine service type including manual services.

    2. Populate service form.

    3. Test service connectivity.

    4. Save service.

    5. Set policy enforcement type.

    6. Configure compliance alert method.

  9. Given the appropriate Workflow design and custom workflow extensions, create workflows so that the workflows satisfy customer requirements.
    With emphasis on performing the following tasks:

    1. Determine workflow type.

    2. Define workflow data.

    3. Add elements to workflow.

    4. Configure elements.

    5. Connect elements.

    6. Configure notification templates.

    7. Configure Action Text.

    8. Save workflow.

  10. Given the appropriate service selection policy design and the Javascript extensions, enter the definition for each service selection policy so that the service selection policies function as required.
    With emphasis on performing the following tasks:

    1. Populate general information.

    2. Determine service type.

    3. Enter Javascript definition.

    4. Save changes to policy.

  11. Given the appropriate Provisioning Policy design, add entitlements, memberships, and targets so that the provisioning policies are properly configured.
    With emphasis on performing the following tasks:

    1. Populate general information.

    2. Add memberships.

    3. Add entitlement.

    4. Set target type.

    5. Configure parameter lists.

    6. Associate workflow.

    7. Save changes to policy.

  12. Given the appropriate Join Directives design and custom Join Directive extension, set the join directives for each profile so that the join directives are set.
    With emphasis on performing the following tasks:

    1. Select service profile.

    2. Select attribute.

    3. Set join type.

    4. Save join directives.

  13. Given the Password Policy design and custom password policy extension, create the password policy so that it creates the appropriate passwords for the specified service type.
    With emphasis on performing the following tasks:

    1. Copy custom password policy extension files. TJC: copy custom password policy extension JAR files

    2. Edit password policies file. TJC: edit the password policies properties file

    3. Edit custom labels file.

    4. Restart IBM Tivoli Identity Manager server.

    5. Populate general information.

    6. Choose target service types/instances.

    7. Set password rules.

    8. Save changes to policy.

  14. Given the Identity Policy design,create identity policy so that it creates the appropriate IDs for the specified service type.
    With emphasis on performing the following tasks:

    1. Populate general information.

    2. Choose target service types/instances.

    3. Enter Javascript definition.

    4. Save policy changes.

  15. Given the Password Configuration design, configure password settings so that passwords are handled appropriately throughout IBM Tivoli Identity Manager.
    With emphasis on performing the following tasks:

    1. Configure lost password behavior.

    2. Configure challenge/response settings.

    3. Enable or disable password editing.

    4. Enable or disable password synchronization.

    5. Set password expiration period.

    6. Set password retrieval period.

    7. Set maximum number of invalid login attempts.

    8. Save password settings.

  16. Given the appropriate User Interface Parameters design and access to the ui.properties file, configure the ui.properties file so that the user interface requirements meet customer expectations.
    With emphasis on performing the following tasks:

    1. Configure the customer logo.

    2. Configure page size.

    3. Configure page link maximum.

    4. Configure search results maximum.

    5. Configure console title bar.

    6. Configure console banner.

    7. Configure console footer.

    8. Configure post office template size limits.

    9. Configure report limits.

  17. Given the appropriate installation and custom files, configure E-mail properties for password notification so that the settings are configured.
    With emphasis on performing the following tasks:

    1. Configure the password notification method.

    2. Configure the property files.

    3. Add custom password notification workflows.

  18. Given an E-mail management design, configure the IBM Tivoli Identity Manager Post Office settings so that the E-mail management requirements have been met.
    With emphasis on performing the following tasks:

    1. Configure the System-wide Post Office setting.

    2. Configure the collection interval.

    3. Configure the Post Office settings on the manual activity nodes.

    4. Define the aggregate message.

  19. Given an E-mail management design, configure the workflow notification templates so that the E-mail management requirements have been met.
    With emphasis on performing the following tasks:

    1. Configure the default escalation limit.

    2. Configure reminder interval.

    3. Customize default notification templates.

  20. Given the default E-mail notification template, perform the modifications, test, and implement steps so that the E-mail notification contains the requested information that can be shared across multiple workflows.
    With emphasis on performing the following tasks:

    1. Clone the default template.

    2. Define the subject and body.

    3. Determine the xhtml content.

    4. Include the notification in a workflow.

  21. Given the standard self service view, perform the customizations so that customer requirements are met.
    With emphasis on performing the following tasks:

    1. Locate the default views.

    2. Modify tasks content available for a specified view.

    3. Create ACIs for view content.

    4. Modify operations to enable a task in the view.

    5. Re-order tasks on the homepage.

    6. Control page layout.

    7. Modify content for custom specifications.

    8. Customize style sheets to match a corporate specification.

  22. Given the appropriate Self Service Interface parameters and the SelfServiceUI.properties file,configure the SelfServiceUI.properties file so that the Self Service Interface satisfies the customer requirements.
    With emphasis on performing the following tasks:

    1. Configure the page size.

    2. Configure page link maximum.

    3. Configure search results maximum.

    4. Configure layout options.

    5. Configure user search attributes.

  23. Given an access plan and the target resource, define and validate the access entitlements for each participant so that it is verified that the access entitlements are configured correctly for the resource.
    With emphasis on performing the following tasks:

    1. Select participants.

    2. Define access entitlements.

    3. Validate access entitlements.

  24. Given the proper documentation and extension jar file, configure a new Javascript extension so that the Javascript extension satisfies the customization requirements.
    With emphasis on performing the following tasks:

    1. Gather extension documentation.

    2. Define required IBM Tivoli Identity Manager modules affected.

    3. Modify scriptframework.properties as required.

    4. Modify the WebSphere properties as required.

    5. Document modifications to current system.

  25. Given the existing role information and Organization Structure design, gather the requirements and define the scope so that the IBM Tivoli Identity Manager V5.1 Separation of Duty Policies design is created.
    With emphasis on performing the following tasks:

    1. Gather Separation of Duty requirements

    2. Define Role exclusions.

    3. Document Separation of Duty design.


Section 4-Data Management


  1. Given the detailed design,Human Resources (HR) data and the IBM Tivoli Identity Manager schema,determine the identity data sources and the load method so that an identity loading process is created.
    With emphasis on performing the following tasks:

    1. Identify data sources.

    2. Determine load method (IBM Tivoli Directory Integrator, JNDI, DSML, LDAP, AD) TJC: change LDAP to inetOrgPerson

    3. Map external data to IBM Tivoli Identity Manager schema.

    4. If using IBM Tivoli Directory Integrator, configure IBM Tivoli Directory Integrator assembly line.

  2. Given a HR feed data file and the Organization Structure design, create an IBM Tivoli Identity Manager HR feed service, schedule and run a reconciliation so that the data is loaded correctly into the IBM Tivoli Identity Manager repository.
    With emphasis on performing the following tasks:

    1. Create HR Feed service (DSML, IBM Tivoli Directory Integrator, AD, LDAP) TJC: change LDAP to inetOrgPerson

    2. Define placement rule.

    3. Schedule reconciliation.

    4. Initiate reconciliation.

    5. Validate reconciled user data.

  3. Given the IBM Tivoli Identity Manager adapter and service definition, migrate existing accounts so that the accounts are associated with appropriate identities.
    With emphasis on performing the following tasks:

    1. Define reconciliation for services.

    2. Define adoption rules at the appropriate level.

    3. Run initial reconciliation.

    4. Verify reconciliation results.

  4. Given orphan accounts and their appropriate owners, configure the correct owners' person records so that the orphan accounts are adopted.
    With emphasis on performing the following tasks:

    1. Identify orphan accounts.

    2. Identify owners for orphan accounts.

    3. Map the account to the owner by using Javascript or the preferred user ID.

    4. Define a method to manage system accounts.

    5. Run reconciliation again.

    6. Verify orphans get adopted by correct person records.


Section 5-Troubleshooting


  1. Given access to the relevant logs and files, review logs so that the issues are identified.
    With emphasis on performing the following tasks:

    1. Gather log files.

    2. Review IBM Tivoli Identity Manager log files.

    3. Review middleware logs. (DB2, IDS, WAS)

    4. Determine problem category.

    5. Increase logging level for appropriate category.

    6. Reproduce problem if possible.

  2. Given a problem description, analyze the data flow so that the component that is the source of the problem is isolated.
    With emphasis on performing the following tasks:

    1. Determine the source of the data.

    2. Determine all components that store or move the data.

    3. Isolate the components that perform operations on the data.

    4. Analyze logs and audit records to verify data integrity at all steps.

    5. Identify components where the data is mishandled.

  3. Given adapter related problems, troubleshoot the source of the problem so that the problem is identified.
    With emphasis on performing the following tasks:

    1. Analyze the completed and/or pending requests view.

    2. Gather log data from adapter and server.

    3. Analyze log data and audit records.

    4. Modify server and adapter logging levels as necessary.


Section 6-Production


  1. Given a functioning test environment and production systems, copy configurations to the production environment so that the production system mirrors the test systems and functions with production agents.
    With emphasis on performing the following tasks:

    1. Enable security on the production system.

    2. Promote customizations from test to production by using appropriate tools. Promote IBM Tivoli Identity Manager configuration data to production by using appropriate tools.

    3. Modify services to match production adapters.

    4. Reconcile supporting data from production adapters.

    5. Test the production system.

  2. Given a list of services and a schedule for the reconciliations, create reconciliation schedules for each service with appropriate filters so that reconciliation data is available.
    With emphasis on performing the following tasks:

    1. Determine systems to be reconciled.

    2. Determine frequency of reconciliation for each service.

    3. Define any reconciliation filters for each service.

    4. Create reconciliation schedule for each service.

  3. Given a production environment copied from a functioning test environment and the acceptance test plan, perform production verification and acceptance so that the production system is functional.
    With emphasis on performing the following tasks:

    1. Execute the test plan.

    2. Validate communication between IBM Tivoli Identity Manager server and all adapters.

    3. Validate provisioning policy changes by using Policy Preview.

    4. Validate E-mail notifications are reaching the appropriate target(s).

    5. Validate the user interface.

  4. Given the existing security strategy and SSL certificates, install the certificates and enable SSL on all components so that secure communication between IBM Tivoli Identity Manager and the middleware and adapters are configured.
    With emphasis on performing the following tasks:

    1. Configure the IBM Tivoli Identity Manager HTTP Server for HTTPS only communications with the user and install the certificate.

    2. Install certificates in WebSphere.

    3. Install certificates in ADK adapters.

    4. Install certificates in IBM Tivoli Directory Integrator.

    5. Enable SSL on ADK adapters and IBM Tivoli Directory Integrator.

    6. Install certificates on LDAP server.

    7. Configure LDAP server to use SSL.

    8. Configure IBM Tivoli Identity Manager to use SSL for LDAP connections.

  5. Given the entity design and identity feed design, set up a schedule for synchronizing identity data from the authoritative data source so that identities in IBM Tivoli Identity Manager are onboarded, kept current, and offboarded.
    With emphasis on performing the following tasks:

    1. Determine the source and form of identity data.

    2. Determine frequency of identity synchronization. (or near real time).

    3. Determine entity type and placement of identities in the IBM Tivoli Identity Manager organization tree.

    4. Determine if policies are to be evaluated during identity feed.

    5. Define the appropriate identity feed service in IBM Tivoli Identity Manager.

    6. Create external IBM Tivoli Directory Integrator Assembly Line if necessary to communicate with Identity source and IBM Tivoli Identity Manager.


Section 7-Maintenance


  1. Given the IBM Tivoli Identity Manager systems, implement monitoring procedures so that the IBM Tivoli Identity Manager deployment can be monitored.
    With emphasis on performing the following tasks:

    1. Monitor connectivity to database, LDAP and adapters.

    2. Monitor disk space of application servers and repositories.

    3. Track logs and log sizes.

    4. Monitor error logs for problems.

    5. Monitor LDAP recycle bin if enabled.

    6. Monitor cluster members.

    7. Schedule system backups.

    8. Monitor performance.

  2. Given the IBM Tivoli Identity Manager version upgrade software and documentation, upgrade IBM Tivoli Identity Manager on test and production systems so that it is functioning properly.
    With emphasis on performing the following tasks:

    1. Determine middleware components to upgrade.

    2. Obtain server component upgrade software.

    3. Request backup of all IBM Tivoli Identity Manager components.

    4. Request backup of all system components.

    5. Create "Test" environment.

    6. Install upgrade on "Test".

    7. Repackage custom applications with upgraded API JAR files.

    8. Validate "Test" upgrade environment.

    9. Install upgrade on production server.

    10. Test server.

  3. Given the adapter software and documentation, upgrade and test the IBM Tivoli Identity Manager adapters so that they are upgraded and functioning properly.
    With emphasis on performing the following tasks:

    1. Obtain new adapter software.

    2. Determine components to install.

    3. Request backup systems to be upgraded.

    4. Install new adapter/upgrade.

    5. Install adapter profile.

    6. Verify certificates.

    7. Test adapter.

  4. Given the IBM Tivoli Identity Manager fixpack software and documentation, install the appropriate fixpack on the test and production systems so that the software is functioning properly.
    With emphasis on performing the following tasks:

    1. Obtain fixpack software.

    2. Determine requirements for fixpack from fixpack documents.

    3. Create "Test" environment.

    4. Install fixpack on "Test".

    5. Perform function test on items fixed by fixpack.

    6. Request backup system.

    7. Install fixpack on production server.

    8. Test the fixpack.

  5. Given the Performance Tuning Guide and customer's hardware specifications, configure system settings so that IBM Tivoli Identity Manager is tuned and functioning properly.
    With emphasis on performing the following tasks:

    1. Identify IBM Tivoli Identity Manager deployment parameters and settings.

    2. Utilize Performance Tuning Guide.

    3. Set memory settings.

    4. Configure logging levels, options and file sizes.

    5. Set messaging - timeout values.

    6. Set disk usage limits.

  6. Given workload information and archive requirements, configure and schedule directory and database cleanup so that historical and temporary objects are removed.
    With emphasis on performing the following tasks:

    1. Enable the recycle bin.

    2. Configure recycle bin age limit.

    3. Create cron job for recycle bin cleaning.

    4. Perform database backup.

    5. Create SQL command for database cleaning.



Promotions


Connect with Us