Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Install and configure the standalone IdM service
- Task 1: Deploy IdM on a web application server
- Task 2: Configure SSL in the IdM web application server
- Task 3: Create an IdM client trust store
- Task 4: Configure SAML SSO
- Task 5: Configure a tenant and specify the ADFS metadata URL
- Task 6: Configure the IdM service for LW-SSO compatibility
- Task 7: Specify an IdM token signing key
- Task 8: Specify an IdM user account for Service Manager
- Task 9: Replace JRE policy files for the IdM server
- Task 10: Configure the SAML keystore in IdM
- Task 11: Import the IdP public key into the IdM SAML keystore
- Task 12: Encrypt IdM passwords and keys
- Task 13: Create an empty database for IdM
- Task 14: Configure database connection in the IdM service
- Task 15: Download the IdM metadata
- Task 16: Create a trust relationship with ADFS
- Task 17: Adjust the max authentication age setting in the IdM service
- Configure SAML authentication by using the IdM admin console
Task 9: Replace JRE policy files for the IdM server
Note Skip this task if your version of JRE 8 already contains the unlimited strength JCE policy files. To check this, see if your JRE has the <JRE>\lib\security\policy\unlimited directory.
Important This task is required for the standalone IdM only.
By default, Microsoft ADFS uses the SHA-256 secure hash algorithm, which requires you to replace the default JRE policy files used by the IdM web application server.
To do this, follow these steps:
-
Download the unlimited strength JCE policy files for your JRE:
-
local_policy.jar
- US_export_policy.jar
For example, for Tomcat 8.0, visit the Oracle website to download the unlimited strength JCE policy files:
http://www.oracle.com/technetwork/java/javase/downloads/jce8-download-2133166.html (for JRE 8)
http://www.oracle.com/technetwork/java/javase/downloads/jce-7-download-432124.html (for JRE 7)
-
- On the IdM web application server host, browse to the <JRE>\lib\security folder.
- Replace the policy files with the unlimited strength JCE policy files that you have downloaded.