IBM Maximo Asset Management

advertisement
IBM® Security Systems Division
Ready for IBM Security Intelligence
Validation requirements document for
IBM Security Identity Manager
Please visit the Ready for IBM Security Intelligence software validation site
for assistance, enablement support, and current copy of this document:
https://www.ibm.com/partnerworld/page/isv_com_dvm_techval_security
Validated solution integrations and extensions can be found in the Ready for IBM Security Intelligence
Showcase
http://www-304.ibm.com/partnerworld/gsd/homepage.do
Send documents to pwisv@us.ibm.com, “Ready for IBM Security Intelligence” in subject line.
Document Version 1.0
Table of Contents
Introduction ........................................................................................................................ 3
Items required to complete validation ................................................................................ 4
Validation contact information .......................................................................................... 6
Solution to be validated ...................................................................................................... 7
Solution overview .................................................................................................................................. 7
Integration requirements .................................................................................................... 8
Architecture and overview ..................................................................................................................... 8
Integration methods and interfaces ........................................................................................................ 9
Integration options for validation ..................................................................................... 12
Integration exceptions ...................................................................................................... 12
Resources.......................................................................................................................... 13
Validation Requirements Document
IBM Security Identity Manager
Page 2 of 13
Introduction
Ready for IBM Security Intelligence program validates partner integrations with IBM Security
software and represents the solution integrations in the IBM Security section of the Ready for IBM
Security Intelligence Showcase. This includes partners working to complete Industry Frameworks,
Solution Initiatives, and Specialties or other offerings with a dependency on validating integrations
with IBM Security Software.
This document provides the steps and validation requirements for demonstrating integrations with IBM
Security Identity Manager. A brief overview of the integration points are provided, along with the
testing, documentation and demonstration results needed to verify and validate the solution integration.
Reference the following resources for assistance. In addition, inquiries can be directed to the Security
Integration Specialist: Matthew Duggan, dugganm@us.ibm.com.
Ready for IBM Security Intelligence Resources
Ready for IBM Security Intelligence Home
Getting Started with the Ready for
IBM Security Intelligence program
Ready for IBM Security Intelligence
integration points and resources
Ready for IBM Security Intelligence
Message Board
IBM PartnerWorld Contact Services
assistance getting started
Ready for IBM Security Intelligence
Showcase
Program Manager Contact
IBM Security Communities
best practices and scenarios
IBM Service Management Connect
IBM Software Access Catalog
download IBM Security software
IBM PartnerWorld option support
assistance with listed products
Validation Requirements Document
IBM Security Identity Manager
https://www.ibm.com/partnerworld/wps/servlet/Content
Handler/isv_com_dvm_techval_security
https://www.ibm.com/partnerworld/wps/servlet/Content
Handler/isv_com_dvm_techval_security_start
https://www.ibm.com/partnerworld/wps/servlet/Content
Handler/isv_com_dvm_techval_security_integration
https://www.ibm.com/developerworks/mydeveloperwork
s/groups/service/forum/topics?communityUuid=85cce0f
0-581e-4b9e-9da8-b57c4a257949&ps=10&page=0
US Number: 800-426-9990, 770-858-5052, e-mail:
pwisv@us.ibm.com, ask for Ready for IBM Security
Intelligence assistance.
http://www-304.ibm.com/partnerworld/gsd/homepage.do
Russ Warren, russell.warren@us.ibm.com
Other Resources
http://www.ibm.com/developerworks/security/communit
y.html
https://www.ibm.com/developerworks/servicemanageme
nt/srm/index.html
http://www.ibm.com/isv/welcome/softmall.html
Voice US Number: 800-426-9990, 770-858-5052,
Remote e-mail:
https://www.ibm.com/isv/tech/member/index.html
Page 3 of 13
Items required to complete validation
To validate your IBM Security Identity Manager based integration and include the solution highlight in
the Integrated Service Management Library, the following items must be submitted to the validation lab
at pwisv@us.ibm.com. Please consult the Ready for IBM Security Intelligence software validation
Web site for guidance and details concerning the validation process at
https://www.ibm.com/partnerworld/wps/servlet/ContentHandler/isv_com_dvm_techval_security
Items required for validation
Final validation Final version of this document representing the solution integration being
requirements validated Ready for IBM Security Intelligence. Need to document and
document identify the classes and interfaces used.
Test plan report Document containing use scenarios, data points, and information on the
solution integration with IBM Security Identity Manager. Will be used when
reviewing test results and files, performing the validation, and during the
solution integration demonstration.
Integration Setup Solution setup or administration documentation, or a portion of a document
Information providing information customers would use to setup or configure the
integration between your solution and IBM Security Identity Manager.
Should include items in Identity Manager that need to be customized to
make the integration work.
Demonstration A remote demonstration or captured demo to walk through the integration
scenarios with IBM Security Identity Manager.
Ready for IBM Integration highlights (solution overview, requirements, contacts) used for
Security the Ready for IBM Security Intelligence Showcase solution entry
Intelligence (http://www-304.ibm.com/partnerworld/gsd/homepage.do). This should
Showcase include a company logo that can be used (Recommended size 100 x 50).
Web page To include your solution integration reference in the Ready for IBM Security
Intelligence Showcase (http://www304.ibm.com/partnerworld/gsd/homepage.do), you need to provide a Web
page link highlighting the solution integration. Also, encourage using the
Ready for IBM Security Intelligence logo mark on your Web page, solution
material, at conferences and on other marketing material.
Adapter profile The adapter profile, normally stored on the LDAP directory server, is
imported by the Security Identity Manager server. The profile has the
following components or files: (The variable <ADAPTER> should be
replaced by the adapter name.)
a. Schema definition (schema.dsml) (required).
b. Service definition (service.def) (required).
- Supported operation definitions
- Assembly line XML files for all operations.
c. Account form (er<ADAPTER> account.xml).
d. Service form (er<ADAPTER> service.xml).
e. CustomLabels.properties.
Validation Requirements Document
IBM Security Identity Manager
Page 4 of 13
Tivoli Directory
Integrator
assembly lines
Tivoli Directory
Integrator
connectors
Adapter operations
- Labels displayed on forms for attributes.
Note: The adapter profile is only required for Tivoli Directory
Integrator based RMI custom adapters.
The Tivoli Directory Integrator runs the appropriate assemblyline to perform
a requested operation on a managed resource. An assemblyline is a data flow
that receives information from an input unit, performs an operation on this
input, and then conveys the finished product through an output unit.
Note: The Tivoli Directory Integrator assemblyline(s) is only required
for Tivoli Directory Integrator based RMI custom adapters.
The adapter process uses connectors to establish communication between
Tivoli Directory Integrator and the managed resource. Connectors are the
input and output units of a Tivoli Directory Integrator assemblyline.
Note: The Tivoli Directory Integrator connector(s) is only required for
Tivoli Directory Integrator based RMI custom adapters.
A custom IBM Security Identity Manager adapter must support one or
more of the following operations for managing the resource. These
operations are specifically supported by RMI.
Add -- Add an account.
Delete -- Delete an account.
Modify -- Modify the specified attributes of an account.
Test -- Test connection parameters by opening a connection to the
managed resource.
Search -- Search for accounts matching the specified search filter.
The following additional operations, not directly supported by RMI (handled
by the Modify operation), can be issued from Tivoli Identity Manager:
Suspend --Suspend an account. This operation conveys an “account status”
attribute containing a “true” or “false” value.
Restore -- Restore a suspended account. This operation conveys an “account
status” attribute containing a “true” or “false” value.
changePassword -- Change the password on the specified account. This
operation conveys a new password value.
The following operation, not directly supported by RMI (handled by the
Search operation), can be issued from Tivoli Identity Manager:
Reconciliation
Note: Adapter operation(s) is only required for Tivoli Directory
Integrator based RMI custom adapters.
Validation Requirements Document
IBM Security Identity Manager
Page 5 of 13
Validation contact information
Please complete ALL the fields below to provide the validation project contact information.
Submitted by:
Title/Position:
Company:
Address:
Telephone:
Fax:
E-mail:
IBM Tivoli Product:
IBM Security Identity Manager (5.0 or higher)
Your Solution Name and
Version:
Solution URL:
Current Date:
Anticipated Solution Start
Date:
Anticipated Solution
Completion Date:
Validation Requirements Document
IBM Security Identity Manager
201X/mm/dd
201X/mm/dd
201X/mm/dd
Page 6 of 13
Solution to be validated
Solution overview
Please fill in the auto-sizing text box below to provide the validation lab a technical overview of
the application or solution, the integration points and solution to be validated.
To be filled in.
Validation Requirements Document
IBM Security Identity Manager
Page 7 of 13
Integration requirements
This section provides an overview of the Ready for IBM Security Intelligence validation
requirements for IBM Security Identity Manager. The next section “Integration Options for
Validation” will allow you to identify the configuration and pertinent platforms used by your
offering for validation.
Architecture and overview
This following diagram shows the overall architecture of the IBM Security Identity Manager.
This following diagram shows the overall architecture of the IBM Security Identity Manager server.
The IBM Security Identity Manager server has a layered, modular design that is composed of:
1. A Web client (User Interface) layer that provides an authenticated user access to the system via
browser or via Web Services interface
2. An application layer containing application services for the management of user and policy data
3. A core services layer composed of modules that provide the low-level implementation of the
concepts presented by the application layer.
Validation Requirements Document
IBM Security Identity Manager
Page 8 of 13
The IBM Security Identity Manager server is a J2EE based application running on a Web application
server like IBM WebSphere. This application also provides the IBM Security Identity Manager
browser based admin tool.
The LDAP directory is an LDAPv3 directory such as IBM Directory Server or Oracle Directory. IBM
Security Identity Manager stores all user account information (i.e. userids, group membership, etc) in
LDAP.
Audit information is stored in a relational database such DB2, Oracle or MS-SQL Server.
Credential Vault is a new component introduced in the 6.0 release to store account credentials.
There are many possible integration methods since IBM Security Identity Manager provides a
common Identity Management platform for different application architectures. The following
sections describe the minimum technical requirements for each integration method that will meet
Ready for IBM Tivoli software integration standards. You should fill out the section(s) for the
integration method that you plan to use. You may need to fill out more than one section,
depending on your application/solution and integration plan.
Integration methods and interfaces
IBM Security Identity Manager API integration
The IBM Security Identity Manager Application API is designed to allow access to the application
layer of the IBM Security Identity Manager Platform. The Application API could be used to develop a
custom-lightweight user interface or integration with an existing application needing to leverage the
platform to extend its own functionality.
The Application API consists of a set of java classes that abstract the more commonly used functions of
the provisioning platform, such as identity management, password management, and account
management. The classes that make up this API are the same classes IBM Security Identity Manager
uses for its out-of-the-box user interface.
The application tier makes use of the low-level services to implement the end-to-end business logic
involved in a provisioning action. This may require workflow processes to execute (see the Workflow
API), the data store to be updated (see the Data Services API), or resources to be provisioned (see the
Service Provider API). These implementation details of a provisioning action are encapsulated within
the application module to ensure that the action will be implemented correctly and that backwards
compatibility with platform upgrades will not be an issue for the API client.
One aspect of the business logic behind a provisioning action is authorizing the caller to perform the
action by using the security mechanisms put in place the Authorization module. For this reason, all
Application API calls require user information about the caller so that the proper authorization can take
Validation Requirements Document
IBM Security Identity Manager
Page 9 of 13
place. To make calls in an unrestricted manner, the client must be authenticated as the administrator
and pass the administrator’s information into the API calls.
The Application API can be accessed remotely. This allows clients to communicate with the
provisioning platform without requiring co-location. To establish communications with the
provisioning platform, a context must be created. This context is established using a set of classes that
make up a framework that can support connecting to different platform deployment configurations
easily without changes to the client.
For complete details of the Application API and other IBM Security Identity Manager API’s please
refer to the IBM Security Identity Manager InfoCenter and please check for API examples under
<IBM_Security_Identity_Manager_install_dir>\extensions\6.0\examples
IBM Tivoli Directory Integrator integration
IBM Tivoli Directory Integrator is a data synchronization tool shipped with IBM Security Identity
Manager that will assist in manipulating data from a variety of identity sources and storing and
updating that identity information in IBM Security Identity Manager. Tivoli Directory Integrator can
manage account data from a variety of data sources. SQL Databases and LDAP directories can be
easily accessed with Tivoli Directory Integrator in a bi-directional way. Tivoli Directory Integrator is
useful in filling functionality gaps to deliver a complete solution.
Tivoli Directory Integrator identity feed
There are three scenarios where Tivoli Directory Integrator could feed information into IBM Security
Identity Manager:
1) Tivoli Directory Integrator can be used to load changes from many different authoritative data
sources (I.e. HR systems, email systems, etc) into IBM Security Identity Manager. This helps
solve a significant problem for many customers who have multiple sources for authoritative
data. For instance, some employee information is usually kept in an HR system such as
PeopleSoft. Many customers do not keep information on contractors or temporary employees
in their HR system. Contractor/temp information is often maintained in a separate datastore
(Oracle). Email addresses are often kept in yet another store, maybe Active Directory or
Domino NAB. That is three datastores alone. Tivoli Directory Integrator lets IBM Security
Identity Manager connect to each of these datastores and get only the data IBM Security
Identity Manager needs. Tivoli Directory Integrator can get manager names and department
numbers from PeopleSoft, contractor information from Oracle and email addresses from Active
Director or Domino. Tivoli Directory Integrator sends only the necessary pieces of information
to IBM Security Identity Manager. IBM Security Identity Manager now has the most current
information and uses that information to provision users.
2) This scenario is slightly different from the first scenario. In the first scenario, we were using
Tivoli Directory Integrator to obtain authoritative identity information for a user. In this second
scenario, Tivoli Directory Integrator can be used to bulk load existing users from an existing
data-store into IBM Security Identity Manager (i.e. AD or RACF). This is particularly useful
Validation Requirements Document
IBM Security Identity Manager
Page 10 of 13
during new deployments of IBM Security Identity Manager when customers already have a
significant number of users in another datastore.
3) Tivoli Directory Integrator can also be used to synchronize information between two endpoints
that are managed by IBM Security Identity Manager. For example, a customer might be using
MS-Exchange, Active Directory and SunOne LDAP. They may have a requirement to store
email addresses in both AD and the SunOne Directory. Tivoli Directory Integrator can be
configured to read only the user’s email address from AD and write the email address to the
user’s corresponding mail attribute in LDAP.
Tivoli Directory Integrator Resource adapter
Tivoli Directory Integrator can be used as a custom rmi resource adapter. A custom Tivoli
Directory Integrator resource adapter provides the ability to do additional data manipulation and
customization that a normal IBM Security Identity Manager agent would not. In this case a custom
Tivoli Directory Integrator assembly line can be created for each of the IBM Security Identity
Manager actions. That is, an assembly line can be created for adding a user, modifying a user,
deleting a user and so on.
Workflow extensions API
Features:


Integrated with IBM Security Identity Manager UI
Allows definition of custom workflow units that are executed as part of the IBM
Security Identity Manager workflow engine.
The workflow API is designed for interaction with the IBM Security Identity Manager workflow
engine, and allows you to create your own workflow extensions that can be called within a lifecycle
operation or approval process. Clients may also integrate other systems, possibly other workflow
engines, into a workflow process through this API.
All workflow extensions are defined in workflowextensions.xml.
Validation Requirements Document
IBM Security Identity Manager
Page 11 of 13
Integration options for validation
Check each integration type you will use to integrate your solution with IBM Security Identity
Manager. Check each operating system platform the integration supports.
IBM Identity
Manager API
integration?
IBM Directory
Integrator
integration?
Workflow
extensions API
integrations?
OS platforms:
Yes
No
Yes
No
Yes
No
Windows 2008
Windows 2008 R2
Solaris
AIX
RedHat
SUSE
Other (Specify)
Integration exceptions
Use this section to note any exceptions to the Integration Requirements that should be considered for
this integration. Also List any additional considerations or system impact not explicitly stated
previously. May include, but not limited to: database changes, application functionality, or any task that
affects the integration but is outside the scope of this estimate. Information will be review and
discussed during validation.
Validation Requirements Document
IBM Security Identity Manager
Page 12 of 13
Resources
Use the following information and resource links to assist with setting up and integrating with IBM
Security Identity Manager.
IBM Security Identity Manager
Information
IBM Security Identity Manager
Documentation
IBM Security Identity Manager (ISIM)
Adapter Development Tool (ADT)
http://www01.ibm.com/software/tivoli/products/identity-mgr/
Documentation Tool (DocTool) for
Identity Manager
Ready for IBM Security Enablement
Resources
http://www.ibm.com/software/ismlibrary?NavCode=1TW10I
M0C
Support Portal
Support Forum
SMC Community
Validation Requirements Document
IBM Security Identity Manager
http://www.ibm.com/developerworks/wikis/display/tivolidoccentral/
Tivoli+Identity+Manager
http://www.ibm.com/software/ismlibrary?NavCode=1TW10I
M0H
https://www.ibm.com/partnerworld/page/isv_com_dvm_techv
al_security
http://www947.ibm.com/support/entry/myportal/Overview/Software/Tivo
li/Tivoli_Identity_Manager
http://www.ibm.com/developerworks/forums/forum.jspa?foru
mID=1517
https://www.ibm.com/developerworks/servicemanagement/
Page 13 of 13
Download