Do you plan to customize the REXX execs provided with the driver?
For details about the provided execs, see Table 6-1, Identity Vault Command Processing Execs; Table 6-2, Other Execs; and the execs themselves.
Do you plan to add attributes or classes to the connected system schema file?
For details about the connected system schema file, see Section 6.2, The Connected System Schema File.
What options do you plan to use in your driver shim configuration file?
For details about the driver shim configuration file, see Section 5.2, The Driver Shim Configuration File.
How will you use the include/exclude file?
For details about the include/exclude file, see Section 6.3, The Connected System Include/Exclude File.
Do you plan to customize policies?
For details about customizing policies, see the Policy Builder and Driver Customization Guide on the Identity Manager 3.6.1 Documentation Web site.
Are the resources needed to perform the customization available within your organization?