The following procedure describes how to install Identity Governance or Identity Governance and Identity Reporting on the same server using the guided installation or the console installation methods. To perform a silent, unattended installation, see Section 6.6, Silently Installing Identity Governance and Identity Reporting.
Ensure that you meet the prerequisites and requirements before starting the installation. For more information, see Section 6.3, Prerequisites for Identity Governance and Section 2.4.1, Identity Governance Server System Requirements.
To install Identity Governance or to install Identity Governance and Identity Reporting:
Ensure that you have completed the Identity Governance Installation Worksheet. For more information, see Table 6-1.
Log in as root on Linux server or as an administrator on Windows server to the server where you want to install Identity Governance.
Download and extract the Identity Governance installation files. For more information, see Section 2.2, Obtaining Identity Governance, Identity Reporting, and OSP.
If you are in a clustered environment, proceed to Step 5. If you are not using HTTPS for this installation, stop Apache Tomcat. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.
From the directory that contains the installation files, complete one of the following actions:
Linux: Enter the following from a command prompt.
Guided:./identity-governance-install-linux.bin
Console:./identity-governance-install-linux.bin -i console
Windows: Enter the following from a command prompt.
Guided: identity-governance-install-win.exe
Console: identity-governance-install-win.exe -i console
NOTE:To execute the file, you might need to use the chmod +x or sh command for Linux or use Run as administrator if you did not log in to your Windows server as an administrator.
Read and accept the license agreement.
Select whether to install Identity Governance, Identity Reporting, or both.
Specify an installation path for each installed feature.
Complete the installation following the prompts and using the information you gathered in the Table 6-1, Identity Governance Installation Worksheet.
Review the pre-installation summary.
NOTE:Application URL represents the URL that connects users to Identity Governance.
Click Install.
(Conditional) If prompted, accept or reject any untrusted certificates and acknowledge any errors.
The installer checks to see if you selected SSL/TLS or https for communication to the connected systems. The installer attempts to retrieve those certificates and add them to the trust store. If you used a self-signed certificate for any of the connected systems, the installer prompts you to accept or reject the certificates because self-signed certificates are untrusted certificates. The installer adds the accepted certificates to the trust store. For more information, see Section 3.8, Securing Connections with TLS/SSL
The installer displays errors in the following conditions:
A single warning about potential future failures for all rejected certificates
A single warning for any errors when connecting to the secured servers
(Conditional) If you are in a clustered environment, or if you are using HTTPS, stop Apache Tomcat if it is still running. For more information, see Section 3.4.3, Starting and Stopping Apache Tomcat.
When the installation process completes, review the Identity_Governance_InstallLog.log file. The default location of the Identity_Governance_InstallLog.log file is here:
Linux: /opt/netiq/idm/apps/idgov/logs
Windows: C:\netiq\idm\apps\idgov\logs
Proceed to Section 8.3, Starting and Initializing Identity Governance
or
If you are installing Identity Reporting on a separate server, proceed to Section 7.0, Installing Identity Reporting.