Searching the Help
To search for information in the Help, type a word or phrase in the Search box. When you enter a group of words, OR is inferred. You can use Boolean operators to refine your search.
Results returned are case insensitive. However, results ranking takes case into account and assigns higher scores to case matches. Therefore, a search for "cats" followed by a search for "Cats" would return the same number of Help topics, but the order in which the topics are listed would be different.
Search for | Example | Results |
---|---|---|
A single word | cat
|
Topics that contain the word "cat". You will also find its grammatical variations, such as "cats". |
A phrase. You can specify that the search results contain a specific phrase. |
"cat food" (quotation marks) |
Topics that contain the literal phrase "cat food" and all its grammatical variations. Without the quotation marks, the query is equivalent to specifying an OR operator, which finds topics with one of the individual words instead of the phrase. |
Search for | Operator | Example |
---|---|---|
Two or more words in the same topic |
|
|
Either word in a topic |
|
|
Topics that do not contain a specific word or phrase |
|
|
Topics that contain one string and do not contain another | ^ (caret) |
cat ^ mouse
|
A combination of search types | ( ) parentheses |
|
- Install and configure the standalone IdM service
- Task 1: Deploy IdM on a web application server
- Task 2: Configure SSL in the IdM web application server
- Task 3: Create an IdM client trust store
- Task 4: Configure SAML SSO
- Task 5: Configure a tenant and specify the ADFS metadata URL
- Task 6: Configure the IdM service for LW-SSO compatibility
- Task 7: Specify an IdM token signing key
- Task 8: Specify an IdM user account for Service Manager
- Task 9: Replace JRE policy files for the IdM server
- Task 10: Configure the SAML keystore in IdM
- Task 11: Import the IdP public key into the IdM SAML keystore
- Task 12: Encrypt IdM passwords and keys
- Task 13: Create an empty database for IdM
- Task 14: Configure database connection in the IdM service
- Task 15: Download the IdM metadata
- Task 16: Create a trust relationship with ADFS
- Task 17: Adjust the max authentication age setting in the IdM service
- Configure SAML authentication by using the IdM admin console
Task 8: Specify an IdM user account for Service Manager
Note This is an optional task.
Each IdM client (the Service Manager Web Tier, SRC, or Mobility Client) needs an IdM user account to access the IdM service.
By default, the IdM service has a user account defined: idmTransportUser (user name) and idmTransportUser (password). You can skip this task and simply specify this default user account in the SM Web Tier, SRC, and Mobility Client. For details, see Configure SAML SSO in Service Manager (using standalone IdM).
Important You cannot change the user name. However, you can change the password as you like.
To change the IdM user account password, follow these steps:
-
Open the <idm-service>/WEB-INF/classes/integrationusers.properties file in a text editor.
-
Locate the line with an encrypted string:
idmTransportUser=ENC(xxxx)
Where: xxxx represents an encrypted string.
-
Change this line to the following:
idmTransportUser=idmTransportUser,ROLE_ADMIN,PERM_IMPERSONATE,enabled
Where:
- "idmTransportUser" on the left side of the equals sign (=) is the user name, which must not be changed.
- On the right side of the equals sign (=), "idmTransportUser" is the default password and the rest of the string are other properties of the user account.
-
Change the default password to your own value. For example, change it to "1Qaz2wsx3edc":
idmTransportUser=1Qaz2wsx3edc,ROLE_ADMIN,PERM_IMPERSONATE,enabled
-
Save the file.
Note You will also need to specify the same user name and password (for example, 1Qaz2wsx3edc) on the Service Manager side. For details, see Configure SAML SSO in Service Manager (using standalone IdM).
Note In the last task, you will run the IdM encryption tool to encrypt all IdM passwords and keys, including the entire IdM user account property string. You will need to copy the encrypted string back to this file.