© 2016 IBM Corporation Virtual Appliance migration self-assessment May 2016 IBM Security Identity Manager.

Slides:



Advertisements
Similar presentations
Successful Information Management With Knowledgebase Manager Pro Is Reality.
Advertisements

1 H2 Cost Driver Map and Analysi s Table of Contents Cost Driver Map and Analysis 1. Context 2. Cost Driver Map 3. Cost Driver Analysis Appendix A - Replica.
1 ILANTUS Proprietary Jaunary 20, 2014 Enabling complete AGS features on ISIM Compliance Express – ISIM Integration.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Unit 8 Design Strategies and Refactoring. Key Concepts Design strategy deliverables Requirements and constraints Outsourcing Sources of software Platform.
Tom Sheridan IT Director Gas Technology Institute (GTI)
3rd Annual Plex/2E Worldwide Users Conference Page based on Title Slide from Slide Layout palette. Design is cacorp Title text for Title or Divider.
Update on Version Control Systems: GitLab, SVN, Git, Trac, CERNforge
Lesson 18: Configuring Application Restriction Policies
User Group 2015 Version 5 Features & Infrastructure Enhancements.
Deploying and Managing Software by Using Group Policy.
Sage CRM Developers Course
By Jeerarat Boonyanit. As you can see I have chosen Cpanel for my server management tool. cPanel is a Linux based web hosting control panel that provides.
©Ian Sommerville 2004Software Engineering, 7th edition. Chapter 18 Slide 1 Software Reuse 2.
IBM Proof of Technology Discovering the Value of SOA with WebSphere Process Integration © 2005 IBM Corporation SOA on your terms and our expertise WebSphere.
03/07/08 © 2008 DSR and LDAP Authentication Avocent Technical Support.
This chapter is extracted from Sommerville’s slides. Text book chapter
VASCO Data Security 1 End Of Live VACMAN MIDDLEWARE VASCO ENTERPRISE SECURITY.
Best Implementation Practices for Discoverer April Sims OCP 8i 9i.
Chapter-4 Windows 2000 Professional Win2K Professional provides a very usable interface and was designed for use in the desktop PC. Microsoft server system.
Security Information and Event Management Services June, 2011 Minsk, Belarus.
INFO425: Systems Design INFORMATION X Finalizing Scope (functions/level of automation)  Finalizing scope in terms of functions and level of.
XA R7.8 Upgrade Process and Technical Overview Ruth Anne Pharr Sr. IT Consultant, CISTECH Inc.
9/10/20151 Hyperion Enterprise 6.5 New Features & Functionality Robert Cybulski, CPA Finit Solutions.
70-294: MCSE Guide to Microsoft Windows Server 2003 Active Directory Chapter 12: Deploying and Managing Software with Group Policy.
Futurestate IT Confidential APPLICATION COMPATIBILITY AND CURRENCY MANAGEMENT™ John Doe Partner Company.
VS Anywhere. Visual Studio Industry Partner VS Anywhere NEXT STEPS Contact us at: Websitehttps://vsanywhere.com Blog- Facebook.
11 MANAGING AND DISTRIBUTING SOFTWARE BY USING GROUP POLICY Chapter 5.
Developing Applications for SSO Justen Stepka Authentisoft, LLC
Based on AIIM Industry Watch MatchPoint Benefits.
IBM Software Group, TPF Support and Services Presentation subtitle: 20pt Arial Regular, teal R045 | G182 | B179 Recommended maximum length: 2 lines IBM.
Computer Emergency Notification System (CENS)
Module 6: Configuring User Environments Using Group Policy.
Portal for ArcGIS An Introduction
Riva Managed Identity Integration for Active Directory and Novell ® GroupWise ® Aldo Zanoni CEO, Managing Director Omni Technology Solutions
Chris Wright Senior Systems Engineer, Lucity MOVING TO ONE DATABASE FOR SQL SERVER.
CAS Lightning Talk Jasig-Sakai 2012 Tuesday June 12th 2012 Atlanta, GA Andrew Petro - Unicon, Inc.
Partners’ Webinar 01/31/2013 Karol Jarkovsky Solution Architect Upgrading Kentico.
Module 6: Deploying and Managing Software by Using Group Policy.
© 2007 IBM Corporation SOA on your terms and our expertise Software WebSphere Process Server and Portal Integration Overview.
Enhanced Storage Architecture
Running Kuali: A Technical Perspective Ailish Byrne (Indiana University) Jonathan Keller (University of California, Davis)
Deploying Software with Group Policy Chapter Twelve.
Plug-in Architectures Presented by Truc Nguyen. What’s a plug-in? “a type of program that tightly integrates with a larger application to add a special.
8-1 © Prentice Hall, 2007 Topic 8: Selecting the Best Alternative Design Strategy Object-Oriented Systems Analysis and Design Joey F. George, Dinesh Batra,
1 Chapter 12 Configuration management This chapter is extracted from Sommerville’s slides. Text book chapter 29 1.
CLM Case Study An investigation of deployment options for IBM Rational Team Concert in a ClearCase/ClearQuest environment July 18, 2011 Michael Gormley.
CHAPTER 5 MANAGING USER ACCOUNTS & GROUPS. User Accounts Windows 95, 98 & Me do not need a user account like Windows XP Professional to access computer.
15 Copyright © 2004, Oracle. All rights reserved. Adding JAAS Security to the Client.
Instant Queue Manager Version 4 Enterprise Click to Chat for IBM Lotus Sametime and Microsoft OCS.
CIT’s Web Single Sign-on Service SRM Report CUWebAuth Investigation Identity Management Team OIT/CIT Security April 16, 2007.
IBM Express Runtime Quick Start Workshop © 2007 IBM Corporation Deploying a Solution.
QlikView Integration Overview June Agenda Data Source Integration Web & Application Integration Security Integration Integration with 3rd party.
IBM Software Group © 2006 IBM Corporation Confidentiality/date line: 13pt Arial Regular, white Maximum length: 1 line Information separated by vertical.
© CGI Group Inc. PrimePortal & #define Annika Maltesson, Project Krister Sundkvist,
Support Services APIs Support Case Management API Dispatch Request API Warranty Status API.
©Ian Sommerville 2007COTS-based System Engineering Slide 1 COTS-based System Engineering.
Excel Services Displays all or parts of interactive Excel worksheets in the browser –Excel “publish” feature with optional parameters defined in worksheet.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
Make the Decision to Upgrade to Microsoft Office 2010.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Office of Administration Enterprise Server Farm November 2004 Briefing.
1© Copyright 2012 EMC Corporation. All rights reserved. Authentication Manager Integration Services (AMIS) RSA Global Services Customer Presentation SP.
Alain Bethuyne Web Security Architect BNPParibas Fortis
Managing User Desktops with Group Policy
Identity & Access Management Services
PSC Group, LLc Office 365/SharePoint Online Migration traps and tricks
Purge-it! USP's, pre-sales process & helping the customer to decide
Technical Capabilities
Presentation transcript:

© 2016 IBM Corporation Virtual Appliance migration self-assessment May 2016 IBM Security Identity Manager

2 © 2016 IBM Corporation Purpose/Overview  Use this self-assessment survey to help you decide if you should upgrade your IBM Tivoli Identity Manager (ITIM, now IBM Security Identity Manager – ISIM) to the release 6 software installation or version 7 virtual appliance (“VA”) –Note: v7 and v6 both provide equivalent identity management functionality  After completing this assessment, you may choose to embark either on a v6 upgrade or a v7 migration. We always recommend seeking assistance from IBM Security professional services consultants or experience business partners. However, for the less complex upgrades and migrations, customers with highly proficient staff may prefer to self-deploy. In any case, we strongly urge all customers to contact Technical Support for pointers to latest documentation and technical notes and expert advice.  Before you begin: –This survey assumes you have in-depth technical knowledge of your Identity Manager environment: components used and any customizations implemented. –If you are not deeply familiar with your deployment, we recommend engaging with either IBM Security professional services or a certified business partner, to help you assess your environment –Please read the following technical papers which provide information on SIM v7 deployment constraints: SIM VA customization constraints: SIM v7 VA vs. SIM v6 comparison:

3 © 2016 IBM Corporation General approach/ guidance  What version are you currently running? –SIM v6: you can stay on v6 and apply fixpacks or migrate to v7 for future upgradeability improvement –TIM v5.1: take the survey –TIM v5.0: out of support; automated upgrade to v6 possible, else redeploy “fresh start” to v7 within VA design constraints –TIM v4.6: no supported automated upgrades available to v6 or v7. Strongly consider “refresh start” redeploy within constraints of VA.  What level of Identity Manager expertise does your organization have? –We maintain it ourselves, implement customizations and are very familiar –We can do basic maintenance, but had help with the initial deployment and the development of the customizations –We lost the original staff who were familiar with our deployment and its customizations, and no longer have internal expertise to make significant environment and configuration changes  Unless you have deep current knowledge and expertise, of your environment, its configuration and customizations, we strongly urge you to enlist the help of IBM or partner professional services for an environmental assessment and the upgrade/migration project itself

4 © 2016 IBM Corporation User Interface 1.Does your organization use the TIM v5.x Self-Service Interface (SSUI)? (Yes/No) 2.Does your organization use a custom developed user interface instead of, or in addition to the SSUI? (custom application client) 3.Does your organization support user requests via another application’s UI (for example, a ticketing system or other in-house application) which is integrated (via workflows or APIs) with the Identity Manager server? See slide notes for background on these questions

5 © 2016 IBM Corporation Java, WebSphere, forms customizations and extensions 4.Have you installed a custom J2EE module on the ISIM application server? 5.Have you made direct configuration changes or use any special features in the WebSphere server that hosts ISIM? 6.Have you changed files,other than property files, that are outside the “custom” directory (for example: custom login JSP)? 7.Have you created any additional tables in the SIM Schema? 8.Do you make use of custom subforms, javascript, workflow or policy extensions? 9.Do you use custom password rules implemented via.js extensions? 10.Is your current production environment a single server WAS ND installation? See slide notes for background on these questions

6 © 2016 IBM Corporation Integrations, SSO and Adapters 11.Are you using custom developed adapters? -These need to be hosted on a separate server from the virtual appliance 12.Are you using any TIM 5.1 adapters that may have been discontinued? –(see for list of supported V7 adapters) 13.Are you using SSO with WebSeal (Access Manager) or 3 rd party SSO product? –If ISAM, may need some minor reconfiguration. –If you have configured Identity Manager for SSO with another vendors’ SSO product (e.g. SiteMinder), this will likely require modifications 14. Are you using any customized WAS authentication (e.g. the context of APIs/custom code)? –This works differently under SIM v6 and above than in previous releases and you will probably need to modify this area of your custom code 15.Are you using the pre-GA version of the Identity Manager Web Services APIs? –The GA version (SIM v6 and 7) is somewhat different – you may need to modify your custom application

7 © 2016 IBM Corporation Summary and recommendations Results: If you have:Recommendations High level of expertise about your SIM environment and its history A few basic customizations, all supportable on the Virtual Appliance.. Or wish to “start fresh” with a clean re-implementation You may be able to deploy the SIM v7 virtual appliance with the help of IBM Technical Support. You may need to manually migrate any minimal amount of key data from your previous deployment Some Identity Manager expertise, A deployment that includes some customizations, most of which are directly supported by the VA or can be redesigned fairly easily, Your current deployment may be a good candidate for a v7 migration, but we recommend engaging IBM Security professional services (or business partner experienced with v7 deployments and migrations specifically) to better assess which aspects may need to be reconfigured or reimplemented No deep expertise with SIM and are not familiar with the history of your original deployment A deployment that includes many of the customizations discussed You may experience difficulties migrating to the v7 VA. Please engage IBM Security professional services (or IBM partner experienced with v7 deployments and migrations specifically) to assess your situation and help plan how to reimplement your customizations. Otherwise, consider a v6 upgrade instead. As a next step, we recommend you reach out to your IBM technical account contacts for more info and guidance on how to proceed