IBM Tivoli Federated Identity Manager, Version 6.2.2
Installing
Use the IBM® Update
Installer for WebSphere® Software to
install risk-based access. After you install risk-based access, use
the manageRbaConfiguration command to deploy the
various components.
Software requirements
Before you install and configure risk-based access, you
must ensure that your environment meets the requirements for operating
systems, databases, and web browsers.
Installation Prerequisites
Before you install risk-based access, you must prepare
your environment by installing and configuring prerequisite software.
Database considerations
The risk-based access database stores the configuration
properties, device fingerprints, and session attributes. You can choose
between an automatic setup of an embedded solidDB database or manual
setup of a supported database.
Installing risk-based access
Use the Update Installer for WebSphere Software to install the components
and plug-ins for risk-based access.
Deploying risk-based access
After you install risk-based access, use the deploy operation
of the manageRbaConfiguration command to set up
the risk-based access database and deploy the various components.
Uninstalling risk-based access
Use the manageRbaConfiguration command
to remove the risk-based access components. After you remove the components,
use the IBM® Update Installer for WebSphere Software to uninstall
risk-based access.
Known issues and workarounds
Risk-based access issues can include problems with retrieving
or collecting attributes, connection errors, and performance issues.
Use the workarounds to troubleshoot issues that you might encounter
when you use risk-based access.