Identity Manager 3.6.1 Fan-Out Driver: Installation Quick Start for Linux and UNIX
1.0 Installation for Linux* and UNIX* Systems
This Quick Start provides basic steps for installing the Identity Manager Fan-Out Driver on Linux and UNIX systems, including AIX*, FreeBSD*, HP-UX, and Solaris*. It condenses information from other documentation that includes more details and additional tasks required to install, configure, and deploy the Fan-Out Driver.
There are two main sections to this Quick Start: the Core Driver setup and the Platform Services setup. If you have already installed and configured the Core Driver and are adding an additional Fan-Out Driver platform, follow the steps in Installing Platform Services.
1.1 Required Knowledge and Skills
This Quick Start assumes you are familiar with concepts, key components and facilities of the Fan-Out Driver, Novell eDirectory™, and the administration of the target operating system.
For complete installation, configuration and administration information, see the Identity Manager Fan-Out Driver for Linux and UNIX Administration Guide at the Identity Manager 3.6.1 Drivers Documentation Web site.
Before installing Fan-Out Driver components, obtain the latest support pack and product updates, and review the release notes and readme files. For the latest support information, see the Novell Support Web site.
1.2 Prerequisites
Verify you are running Identity Manager 3.5.1 or higher, as well as the required versions of eDirectory, iManager, and your target platforms. For more about these requirements, see the associated readme files on the Identity Manager Documentation Web site.
NOTE:The Identity Manager 3.6.1 Fan-Out Driver is compatible with Identity Manager 3.5. However, if you do install it on an Identity Manager 3.5 system, you will need to take the extra step of manually installing the Fan-Out driver’s schema extensions. For more details, see “Preparing for Core Driver Administration” in the Administration Guide.
The Fan-Out Driver includes two major components:
-
The Core Driver, which integrates with the system on which Identity Manager is running.
-
Platform Services, which is installed on the target system you wish to connect to Identity Manager.
Both the Core Driver and Platform Services use Secure Sockets Layer (SSL) for communications. SSL requires a source of entropy. If your systems do not have a /dev/random device to provide entropy, you must install and configure an entropy daemon on both the Identity Manager system and the target connected system prior to installing the Fan-Out Driver.
Solaris versions before Solaris 9 do not include a /dev/random device. Sun* has released this functionality for versions 2.6 onward in Patch ID 112438-01.
For your convenience, the Pseudo Random Number Generator Daemon PRNGD is included in the /prngd directory of the distribution.
For the LDAP server that you will use with the Core Driver, set the option to dereference aliases when resolving names, as follows:
-
In iManager, select
> > . -
Click the LDAP Server.
-
Under
, select , then click .
If the Core Driver you install will be designated as primary, ensure that the target server holds replicas of all objects to be covered by a Census Search object.
If the Core Driver you install will be designated as secondary, ensure that the primary Core Driver is available, since it provides installation configuration information.
1.3 Installing the Core Driver
Install the Core Driver on a Linux, Solaris or Windows* system running Identity Manager as follows:
-
From your installation media, locate and execute the installation software.
-
For Linux or Solaris, use one of the following self-extracting installers appropriate to your system:
sh linux_x86_coredriver.bin
sh linux_x86_64_coredriver.bin
sh solaris_sparc_coredriver.bin
NOTE:The x86 (32-bit) installer is compatible with both 32-bit and 64-bit versions of Linux. To use the x86_64 (64-bit) installer, you must first install and configure the 64-bit LDAP SDK.
-
For Windows, run the following command:
fan-out\IDMCoreDrivers\Win\win_x86_coredriver.exe
This x86 (32-bit) executable is compatible with both x86 and x64 versions of Windows.
-
-
Accept the license, select your installation directory and proceed to install the product files by responding to the prompts.
-
You may need to change the port setting for the Core Driver's built-in remote loader. This is especially likely if you are also using the standard remote loader that comes with Identity Manager. Both versions of the remote loader use port 8090 as their default setting.
The port setting for the Core Driver’s built-in remote loader resides in the fanout.conf file, which is located as follows:
-
For Linux and Solaris: /usr/local/ASAM/data/ASAM/data/
-
For Windows: C:\Novell\ASAM\data\
Edit the following line to reflect the desired port:
-connection "ca=/user/local/ASAM/keys/ca.pem port=8090"
-
-
Start the Core Driver shim. To start the shim:
-
In Linux or Solaris, enter /etc/init.d/asamcdrvd start
-
In Windows, start the
service
-
-
Import and configure the Fan-Out Driver.
-
In iManager, select
> . Select a new or existing driver set, then click .NOTE:If you are running a version of iManager that does not include the Fan-Out Driver application plug-in, see Installing the iManager Plug-In (If not Preinstalled).
-
Select the Fan-Out Driver from the list of drivers to import, then click
.NOTE:If the driver is not available in the list, select \rules\Fan-Out-IDM3_6_0-V1.xml in the directory where the Driver Shim is installed (C:\Novell\ASAM by default).
and select the file -
Provide the requested information, then click
. -
Click
, add your ASAM Master User object, then click . -
Click
, add the Admin user, your ASAM Master User, and any other high-privilege users to the list, then click . -
Click
.
-
-
Restart eDirectory to bring the new indexes online.
-
Start the Fan-Out Driver.
-
Select
> . -
Locate the driver in its driver set.
-
Click the status indicator in the upper right corner of the driver icon, then click
.
-
1.4 Installing the iManager Plug-In (If not Preinstalled)
You will use the Fan-Out Driver’s Web application to complete the Core Driver installation. This application resides in recent versions of iManager as a standard plug-in. If your version of iManager does not include the plug-in, you can install it from the software that comes with the Core Driver software.
-
Login to iManager as an administrative user.
-
Click the
icon at the top. -
Click
under on the left menu. -
Click
above the list of plug-ins. -
Select fan-out\iManagerPlugIn\FanOutWeb.npm from your installation media and click .
-
Check the box next to
and click above the list of plug-ins. -
Restart the Tomcat or Tomcat5 service on your iManager system, and exit and log back into iManager.
-
If the Fan-Out Driver Configuration role has not appeared, continue with the following steps.
-
Click the
icon at the top. -
Click
under on the left menu. -
Click the number under the
column in the table. -
Check the box next to
and click above the list. -
Click the
icon at the top.
This procedure adds two new roles to iManager: Fan-Out Driver Configuration and Fan-Out Driver Utilities. The first time you use one of these roles, you are prompted for the DNS name or IP address and the TCP port number of the primary Core Driver. After you provide this information, the Fan-Out Driver is ready for you to continue with your deployment and testing plan.
1.5 Installing Platform Services
Install Platform Services on a Linux or UNIX system as follows:
-
If you do not have an appropriately configured Platform Set object, use iManager to create a Platform Set object.
Associate users and groups with your Platform Set using the appropriate Search object configuration.
Platform Sets are established for platforms that share a common population of users and groups. Multiple types of platforms can reside in a single Platform Set, and individual users and groups can appear on multiple Platform Sets.
Whenever you modify Search objects, start a Trawl to populate the platforms.
-
Use the iManager Fan-Out Driver plug-in to create a Platform object for your platform in an appropriate Platform Set.
You must define all of the IP addresses for the platform so that mutually authenticated SSL can function properly.
-
Log in as root to the server where you are installing Platform Services.
-
From your installation media, locate and execute the appropriate self-extracting installer:
sh aix_platformservices.bin sh freebsd_x86_platformservices.bin sh hpux_platformservices.bin sh hpux_ia64_platformservices.bin sh linux_x86_platformservices.bin sh linux_x86_64_platformservices.bin sh debian_x86_platformservices.bin sh linux_s390x_platformservices.bin sh solaris_sparc_platformservices.bin sh solaris_x86_platformservices.bin sh tru64_platformservices.bin
-
Accept the license, select your installation directory and proceed to install the product files by responding to the prompts.
-
When you are asked to choose a provisioning option to configure this platform:
-
Select /etc/passwd and /etc/group.
to provision users and groups to -
Select
to setup the system’s Name Service Switch (NSS) for virtual provisioning. -
Select
to configure this platform for API use only (no provisioning).
-
-
When you are asked to choose an option for user password authentication:
-
Select
to redirect authentication requests to the Metadirectory. -
Select /etc/shadow.
to authenticate users locally from -
Select
to redirect authentication requests to the Metadirectory but synchronize passwords to provide local failover.
-
-
Review the contents of the platform configuration file /usr/local/ASAM/data/asamplat.conf.
If your system does not have a /dev/random device, you must include an ENTROPY statement to specify a source of entropy.
For an example asamplat.conf file, see /usr/local/ASAM/data/sampleplat.conf.
-
If you are using Authentication Redirection, configure PAM to call Platform Services.
FreeBSD: Edit your /etc/pam.d/* files to call the pam_ascauth.so module.
HP-UX: Edit your /etc/pam.conf file to call the /usr/lib/security/libpam_ascauth.1 module.
Linux: Edit your /etc/pam.d/* files to call the /lib/security/pam_ascauth.so module.
Solaris: Edit your /etc/pam.conf file to call the /usr/lib/security/pam_ascauth.so.1 module.
Sample PAM configuration files are included in ASAM/bin/PlatformServices.
-
If you are not using the Name Service Switch, set up Receiver scripts.
The Platform Receiver responds to events by running corresponding Receiver scripts. The Platform Receiver runs Receiver scripts from /usr/local/ASAM/bin/PlatformServices/PlatformReceiver/scripts. The base set of Receiver scripts is delivered in a subdirectory of /usr/local/ASAM/bin/PlatformServices/PlatformReceiver/scripts called platformName-passwd. The install script offers to install the base scripts for you. If you accept, then the plat-config script copies all of the scripts in platformName-passwd up one level to /usr/local/ASAM/bin/PlatformServices/PlatformReceiver/scripts.
If you have developed your own set of custom scripts, copy your custom scripts to /usr/local/ASAM/bin/PlatformServices/PlatformReceiver/scripts.
For information about developing your own custom scripts, see /usr/local/ASAM/bin/PlatformServices/PlatformReceiver/scripts/scriptwriters.README.
2.0 Legal Notice
Copyright © 2004, 2007-2009 Omnibond Systems, LLC. All rights reserved. Licensed to Novell, Inc. No part of this publication may be reproduced, photocopied, stored on a retrieval system, or transmitted without the express written consent of the publisher. For Novell trademarks, see the Novell Trademark and Service Mark list. All third-party products are the property of their respective owners. A trademark symbol ( ®, TM, etc.) denotes a Novell trademark; an asterisk (*) denotes a third-party trademark.