Configuration of a new system that will go through ROI iAM
Prerequisite
- The installation steps of the IdM accelerator must be completed.
- The repository must be configured on the ROI iAM side (source, target, system details).
- Initial load of the system is executed in ROI iAM.
- All HR users must exist in ROI iAM and have their
ROIAM_IDENTIFIER_<hubName>populated in IdM.
Steps
- Create connector repository
- Create a repository of type
ROIAM_CONNECTOR. - Configure these repository constants:
ROIAM_HUB_REPOSITORY– HUB repository storing ROI iAM connection details and configuration.ROIAM_TARGET_REPOSITORY– Name of the system in ROI iAM.
- Create a repository of type
Optional
Configure Privilege MSKEYVALUE/ROIAM UID creation
Configure these constants to apply a custom naming convention to Privileges loaded from the system.
ROIAM_UID_TEMPLATE- Controls how IdM Privilege MSKEYVALUE/ROIAM UID is created. The default value isPRIV:<externalType>:<idm_rep_name>:<displayName>. The following parameters can be inserted into triangle brackets to be replaced with data from the groups load or the IdM Repository name (idm_rep_name):iddisplayNamedescriptionuniqueIdentifierexternalNamesrcRepositoryexternalTypetypeidm_rep_name
ROIAM_UID_REGEX_REPLACE- Regex(es) (delimited with||) to be replaced in the last section of the template, after the last colon.ROIAM_UID_REGEX_REPLACE_SYMBOL- String(s) (delimited with||) to replace the String found by the regex from theROIAM_UID_REGEX_REPLACEconstant. If it has more values, it needs to have the same number as the previous constants. Replacements work on a pair basis and are run sequentially, from left to right.ROIAM_UID_REGEX_REMOVE- Regex(es) or String(s) to be removed from the last section of the template, delimited with||.
These constants can be set on HUB level and/or CONNECTOR level. In case any of the fields in the CONNECTOR are empty, the ones from the appropriate HUB will be used. ROIAM_UID_REGEX_REPLACE and ROIAM_UID_REGEX_REPLACE_SYMBOL must both be empty or configured.
Run connector initial load
Open the repository in the IdM Admin UI.
Go to Jobs and execute job "[1] Read - ROI iAM data".
Confirm success by checking:
- The IdM job log shows success.
- These database tables exist:
roiam_%$rep.$NAME%_usersroiam_%$rep.$NAME%_userLinks_loadroiam_%$rep.$NAME%_accountsroiam_%$rep.$NAME%_groupsroiam_%$rep.$NAME%_groupMembers_load
- Verify the data in these tables is correct.
Run steps 2, 3 and 4 of the connector’s initial load for the new connector repository:
- Execute job “[2] Write - SAP IdM attributes and system privileges” and confirm it finishes successfully.
- Execute job “[3] Write - ROI iAM data in IdM” and confirm backend user access in IdM.
- When it is verified that all entries and links are successfully created in IdM, execute job “[4] Activate - IdM triggers” to add the triggers to the respective privileges.
Once all jobs are executed, the system can be considered as fully live.
Test provisioning
INFO
This step is required only for the pilot system.
Test end-to-end provisioning:
CreateUserModifyUserDeleteUserAssignUserMembershipRevokeUserMembershipEnableUserDisableUser
Important In the current ROI iAM version, the source of the entries does not change. SAP IdM continues to create both
MX_PERSONandMX_PRIVILEGEentries, while the ROI iAM load jobs enhance them with the values required for provisioning to target systems.