This is an old revision of the document!


The CzechIdM system determines the behavior towards connected end systems.

The system allows:

  • to define configuration and connection of an end system (via connector).
  • to create / generate a scheme of an end system.
  • to create mapping for provisioning and sync .
  • to create mapping attributes. These allow you to define the behavior of attributes (and their values) both towards the end system and IDM.
  • to create and start synchronization configurations.
  • to manage queues and archive provisioning .

The system in CzechIdM can be duplicated. The duplicate contains the entire system configuration:

  • Configuration of the system connection, including secret values.
  • System scheme.
  • Mapping system.
  • Mapped attributes.
  • Synchronization configuration.
The system name must be unique, so a unique name is generated when duplicating. For example, if you duplicate a system named LDAP, then the resulting system is Copy-of-LDAP. If this system already exists, then a number postfix is added (Copy-of-LDAP1) and etc.
A newly created duplicate is always set as an inactive system. Likewise, all possible sync settings are set to inactive.

In previous IdM versions (>7.6.0), confidential storage may store passwords for remote connector servers for systems that don’t exist. If you encounter difficulties with stored passwords you can remove these values by a database query. From version 7.6.0 onwards, all values from the confidential storage are deleted once a system has been removed.

  • by kotisovam