6.1 Checklist for Installing Identity Governance

Before beginning the installation process, you must review the following steps:

Checklist Items

  1. Ensure that your environment meets the prerequisites and requirements for hosting Identity Governance. For more information, see Section 6.3, Prerequisites for Identity Governance and Section 2.4, Hardware and Software Requirements.

  1. Decide whether you want to install Identity Governance in a clustered environment. For more information about the requirements, see Section 2.3.4, Ensuring High Availability or Load Balancing for Identity Governance.

 

  1. Determine if you need Identity Reporting. For more information, see Understanding Identity Reporting.

  1. Determine how many servers to use with your Identity Governance deployment. For more information, see Section 2.3, Recommended Production Environment Installation Scenarios.

  1. Determine which installation method you will use. For more information, see Section 1.2, Understanding the Installation Methods.

  1. Ensure that your environment has the required components installed and configured. For more information, see Section 3.0, Installing Components Required for Identity Governance, Identity Reporting, and OSP.

  1. Ensure that you installed one of the following supported databases on a separate server for a production environment.

    • (Conditional) Microsoft SQL Server

    • (Conditional) Oracle

    • (Conditional) PostgreSQL

    For more information about supported databases and versions, see Section 2.4.2, Database Requirements.

  1. Ensure that your environment has a supported version of OSP or Access Manager installed. For more information, see Section 4.0, Installing an Authentication Service.

  1. The installation directory for Identity Governance cannot contain any spaces in the name. If it does contain spaces, the installation fails.

  1. Complete the Identity Governance Installation Worksheet before starting the installation. For more information, see Section 6.4, Identity Governance Installation Worksheet.

  1. (Conditional) To use TLS auditing, the audit server should be up and running when you install Identity Governance so that the installer can connect to the audit server and retrieve the certificate to add to the trust store. For more information, see Section 3.8, Securing Connections with TLS/SSL.

  1. Install Identity Governance and Identity Reporting (optional):