This is an old revision of the document!
System
The CzechIdM system determines the behavior towards connected end systems.
The system allows:
- to define configuration and connection of an end system (via connector).
- to create / generate a scheme of an end system.
- to create mapping for provisioning and sync .
- to create mapping attributes. These allow you to define the behavior of attributes (and their values) both towards the end system and IDM.
- to create and start synchronization configurations.
- to manage queues and archive provisioning .
Creating a copy of a system
The system in CzechIdM can be duplicated. The duplicate contains the entire system configuration:
- Configuration of the system connection, including secret values.
- System scheme.
- Mapping system.
- Mapped attributes.
- Synchronization configuration.
The system name must be unique, so a unique name is generated when duplicating.
For example, if you duplicate a system named LDAP, then the resulting system is Copy-of-LDAP. If this system already exists, then a number postfix is added (Copy-of-LDAP1) and etc.
A newly created duplicate is always set as an inactive system. Likewise, all possible sync settings are set to inactive.
Password for confidential storage
In previous IdM versions (>7.6.0), confidential storage may store passwords for remote connector servers for systems that don’t exist. If you encounter difficulties with stored passwords you can remove these values by a database query. From version 7.6.0 onwards, all values from the confidential storage are deleted once a system has been removed.