Mysql Database Application Guide

Mysql Database Application Guide

MySQL Database Application Guide Version 1.2 | November 2017 RSA Identity Governance and Lifecycle | Database MySQL Application Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: http://www.emc.com/domains/rsa/index.htm. For technical support, contact RSA at [email protected]. Trademarks Dell, RSA, the RSA Logo, EMC and other trademarks, are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa. License Agreement This software and the associated documentation are proprietary and confidential to Dell Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by Dell Inc. Third-Party Licenses This product may include software developed by parties other than RSA. The text of the license agreements applicable to third-party software in this product may be viewed on the product documentation page on RSA Link. By using this product, a user of this product agrees to be fully bound by terms of the license agreements. Note on Encryption Technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any Dell software described in this publication requires an applicable software license. Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." DELL INC. MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. ©2017 Dell Inc. or its subsidiaries All Rights Reserved. 1 RSA Identity Governance and Lifecycle | Database MySQL Application Guide CONTENTS Revision History ............................................................................................................................................ 3 Preface .......................................................................................................................................................... 4 Supported RSA Identity Governance and Lifecycle Version(s) ................................................................. 4 Supported MySQL Database Version(s) .................................................................................................... 4 Audience ................................................................................................................................................... 4 What is covered in the Guide.................................................................................................................... 4 Prerequisites for MySQL Database ............................................................................................................... 5 WildFly ...................................................................................................................................................... 5 WebSphere ............................................................................................................................................... 6 WebLogic ................................................................................................................................................... 6 Manage Endpoint Credentials Using a Password Vault ............................................................................ 7 Creating MySQL Database Collectors ........................................................................................................... 7 Creating a New Identity Data Collector (IDC) ........................................................................................... 7 Configuring the IDC Database Query .................................................................................................... 9 Creating a New Account Data Collector (ADC) ......................................................................................... 9 Configuring the ADC Database Query ................................................................................................. 11 Creating a New Entitlement Data Collector (EDC) .................................................................................. 14 Configuring the EDC Database Query ................................................................................................. 15 Creating a New Role Data Collector (RDC) .............................................................................................. 20 Configuring the RDC Database Query ................................................................................................. 22 How to Create Custom Attributes .......................................................................................................... 26 MySQL Database Connector Configuration ................................................................................................ 28 Connector Capabilities ............................................................................................................................ 29 Use-Cases .................................................................................................................................................... 36 Create Database Account Using a Request Form ................................................................................... 36 Use Stored Procedures in Connector ...................................................................................................... 39 2 RSA Identity Governance and Lifecycle | Database MySQL Application Guide REVISION HISTORY Revision Number Description Version 1.0 MySQL Server Application guide consist creation of Identity collector, Account collector, Entitlement collector creation, Connector and uses-cases. Version 1.1 Added instructions for configuring the password vault with RSA Identity Governance and Lifecycle ,DB2 Database , Identity Data Collector, Account Data Collector and Entitlement Data Collector Version 1.2 Updated document with minimum version support. 3 RSA Identity Governance and Lifecycle | Database MySQL Application Guide PREFACE The purpose of this guide is to provide an overview of setting up Collectors and Connectors in order to integrate MySQL Database with RSA Identity Governance and Lifecycle. This guide outlines required configurations, parameters, and mappings of different attributes in the connectors and collectors to create various components. The guide also includes use cases and troubleshooting tips. Supported RSA Identity Governance and Lifecycle Version(s) RSA Via Lifecycle and Governance 7.0.0 and later RSA Identity Governance and Lifecycle 7.0.1 and later Supported MySQL Database Version(s) MySQL Server 5.6 and later Audience This guide is intended for the users of RSA Identity Governance and Lifecycle, including security administrators, database administrators, and system configuration administrators. What is covered in the Guide Prerequisites section: explains the required configuration in order to integrate database with RSA Identity Governance and Lifecycle. Database connectors and collectors configuration section: provides the details to configure or change the collector and connector settings, if required. Tips & Troubleshooting section: provides information about probable errors and their solutions. 4 RSA Identity Governance and Lifecycle | Database MySQL Application Guide PREREQUISITES FOR MYSQL DATABASE a. Install MySQL database, against which data collectors will be configured b. Configure the MySQL database driver before creating MySQL data collectors Steps to configure MySQL database driver: a. Download the JAR containing MySQL driver (com.mysql.jdbc.Driver) o for example: mysql-connector-java-5.1.25-bin.jar b. Make sure that the downloaded JAR is copied to locations according to respective app-servers on RSA Identity Governance and Lifecycle server WildFly Customize RSA Identity Governance and Lifecycle On an RSA Identity Governance and Lifecycle appliance or software appliance running v7.0 or later, you must use the customizeACM.sh tool to extract the aveksa.ear file, customize it, and repackage it. The following procedure requires that you know how to use the customizeACM.sh tool. You can customize RSA Identity Governance and Lifecycle by modifying the aveksa.ear file located at /home/oracle/archive. RSA provides a utility (customizeACM.sh in /home/oracle/deploy) that allows you to conveniently extract aveksa.ear file and rebuild a customized version. For more information, see "Customize RSA Identity Governance and Lifecycle" in the Installation Guide. Procedure 1. Log on

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    41 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us