Ðàçäåëû ýêçàìåíà:
Ðàçäåë 1 - Planning:
- 1.1 Given the existing organization and reporting structure, gather the requirements and develop the solution so that an Organization Structure design is created.
With emphasis on performing the following steps:
Gather organization structure requirements
Discuss alternatives
Formalize organization structure
Document organization structure
- 1.2 Given the desired services list and Organization Structure design, gather target platforms, business processes and develop the solution so a Service design is created.
With emphasis on performing the following steps:
Gather services target platforms
Define organization requirements
Gather platform business processes
Identify unsupported platforms
Document services requirements
- 1.3 Given the existing Human Resources data and the Services design, gather entity requirements and develop the solution so an Entities design is created.
With emphasis on performing the following steps:
Validate Human Resource data
Gather entity requirements
Design entities
Document entity design
- 1.4 Given the existing and projected business processes, gather the lifecycle management requirements and develop the solution so a Lifecycle Management design is created.
With emphasis on performing the following steps:
Gather lifecycle management requirements
Design lifecycle management strategy
Document lifecycle design
- 1.5 Given the existing and projected business processes, gather the email management requirements and develop the solution so an Email Management design is created.
With emphasis on performing the following steps:
Determine email volume and frequency
Determine aggregation policy
Determine format and content of the aggregated email
- 1.6 Given the existing role information and Organization Structure design, gather the role requirements and develop the solution so a Roles design is created.
With emphasis on performing the following steps:
Gather role requirements
Define organization requirements
Design the high-level role structure
Document role design
- 1.7 Given the existing provisioning policies and Organization Structure design, gather requirements, discuss and formalize the design so a Provisioning Policies design is created.
With emphasis on performing the following steps:
Gather policy requirements
Define organization requirements
Gather entitlement requirements
Define membership
Design high-level policy structure
Define service selection policies
Document policy design
- 1.8 Given the existing workflows and services design, gather the requirements including workflow scope and approach and develop the solution so the Workflow design is created.
With emphasis on performing the following steps:
Gather workflow requirements
Define workflow scope
Design workflow approach
Document the workflow design
- 1.9 Given the existing Human Resources data and the entities design, analyze and map the data to the IBM Tivoli Identity Manager LDAP attributes and develop the solution so the Identity design is created.
With emphasis on performing the following steps:
Gather identity source requirements
Analyze identity source data
Map identity data to IBM Tivoli Identity Manager
Document identity requirements
- 1.10 Given the existing Identity policies, Entities design and Identity sources design, gather the Identity Policy and Organizational requirements and develop the solution so the Identity Policy design is created.
With emphasis on performing the following steps:
Gather identity policy requirements
Define organizational requirements
Design high-level ID policy approach
Document ID policy design
- 1.11 Given the existing Password Policies and services design, gather the requirements and define the scope so the Password Policies design is created.
With emphasis on performing the following steps:
Gather password policy requirements
Define password policy scope
Define password settings
Document password policy design
- 1.12 Given the existing application security policies, Organization Structure design, Services design and Entity design, gather the IBM Tivoli Identity Manager Groups and ACIs so the Security Model design is created.
With emphasis on performing the following steps:
Gather IBM Tivoli Identity Manager access requirements
Design IBM Tivoli Identity Manager Groups
Design IBM Tivoli Identity Manager ACIs
Document IBM Tivoli Identity Manager security model
- 1.13 Given proper policies and documentation, gather the customization requirements and determine the feasibility and scope so the Customization design is created.
With emphasis on performing the following steps:
Gather customization requirements
Determine customization feasibility
Design high-level functionality
Determine customization scope
Document server customization design
- 1.14 Given proper documentation, gather the adapter requirements and develop the solution so a custom adapter design is created.
With emphasis on performing the following steps:
Gather agent requirements
Determine customization feasibility
Design high-level functionality
Determine customization scope
Document agent customization design
- 1.15 Given the hardware assets list, existing network configuration and the Services design, gather the system architecture requirements and design the solution so a System Architecture document is created.
With emphasis on performing the following steps:
Gather system architecture requirements
Design system architecture
Document system architecture
- 1.16 Given the Services design and existing project plans, prioritize the platforms and determine the adapter phases so that an Adapter Project Plan is created.
With emphasis on performing the following steps:
Prioritize platforms
Group agents into phases
Determine timeline for phases
Document agent rollout plan
- 1.17 Given the proper documentation, gather the initial timeline requirements and determine the initial solution rollout timeline so that an Initial Solution Rollout Project Plan is created.
With emphasis on performing the following steps:
Gather timeline requirements
Determine timeline for production rollout
Document timeline/plan
- 1.18 Given the System Architecture design and existing backup processes, gather the backup requirements and develop the solution so a Backup and Recovery Strategy design is created.
With emphasis on performing the following steps:
Gather backup requirements
Design backup strategy
Document backup strategy
- 1.19 Given proper documentation, analyze the current system and upgrade requirements so an Upgrade Planning document is created.
With emphasis on performing the following steps:
Analyze current system
Determine system changes from upgrade
Analyze customizations
Design the customization upgrade plan
Develop overall upgrade plan
Document upgrade plan
Ðàçäåë 2 - Installation
- 2.1 Given prerequisite and patch software, install and configure prerequisite software so that it is ready for IBM Tivoli Identity Manager.
With emphasis on performing the following steps:
Gather hardware and platform specifications
Validate and update hardware to IBM Tivoli Identity Manger specifications
Determine the prerequisite patch level required for IBM Tivoli Identity Manager
Install prerequisites
Install prerequisite patches
Configure prerequisites for IBM Tivoli Identity Manager installation
- 2.2 Given the IBM Tivoli Identity Manager installation software, review the installation guides and install the software so that it passes a basic functionality test.
With emphasis on performing the following steps:
Obtain software
Review installation documentation
Gather environment data
Install software
- 2.3 Given the IBM Tivoli Identity Manager adapter software, install the agent on the managed resource and the adapter profile on the IBM Tivoli Identity Manager server so that the adapter is properly installed and functioning.
With emphasis on performing the following steps:
Determine agent version required
Obtain proper agent software and profile
Install agent software
Install profile on IBM Tivoli Identity Manager server
- 2.4 Given the installed adapter, create a certificate request and install the certificate such that the adapter functions properly with its certificate.
With emphasis on performing the following steps:
Generate certificate request from agent
Submit certificate request to Certificate Authority (CA)
Obtain certificates from Certificate Authority (CA)
Install CA certificate on server
Install certificate on agent
- 2.5 Given an installed IBM Tivoli Identity Manager application, login and utilize the system functions to validate IBM Tivoli Identity Manager is running properly.
With emphasis on performing the following steps:
Startup IBM Tivoli Identity Manager environment
Review logs to ensure clean startup
Login
Navigate through environment
Submit scheduled request
Bring up workflow designer to verify applet environment
Ðàçäåë 3 - Implementation
- 3.1 Given the appropriate installation files, set the environment values such that the initial environment settings are configured.
With emphasis on performing the following steps:
Set memory settings
Set thread count
Configure recycle bin age limit
- 3.2 Given the appropriate organizational design documents, create the required organizational containers such that the organization structure is configured.
With emphasis on performing the following steps:
Create any additional organizations
Create organizational units
Create locations
Create business partner organizations
Create admin domains
- 3.3 Given the appropriate IBM Tivoli Identity Manager Group and ACI design and access to the ITIM GUI, create the ITIM Groups, ACIs and relationship expressions such that the ITIM security model meets customer expectations.
With emphasis on performing the following steps:
Create IBM Tivoli Identity Manager Groups
Create organizational ACIs
Create provisioning ACIs
Create report ACIs
Create category ACIs
Create required LDAP indices for attributes defined in relationship expressions
- 3.4 Given object classes, an appropriate list of attributes and access to the LDAP tool, create and configure custom attributes such that the schema is extended.
With emphasis on performing the following steps:
Add attributes to LDAP
Create new custom class
Create custom labels
Add attributes to the service schema
Add attributes to the agent schema
Add indexes as required
- 3.5 Given the Entities design, create custom entities that will satisfy customer requirements.
With emphasis on performing the following steps:
Add entity
Configure default search attribute
Configure name attribute
Configure mapped attributes
Create custom operation definitions
Save entity
- 3.6 Given the appropriate Forms design, configure the Forms such that all required Forms are customized.
With emphasis on performing the following steps:
Select Form to be customized
Add or remove tabs
Add or remove attributes
Change control types
Populate attribute lists
Configure attribute "parameters"
Save form template
- 3.7 Given the appropriate organizational Roles design, create the static and/or dynamic role such that they are configured.
With emphasis on performing the following steps:
Create static roles
Create dynamic roles, including LDAP filter
- 3.8 Given the appropriate Services design and managed services data, create IBM Tivoli Identity Manager service objects such that they are configured and functioning.
With emphasis on performing the following steps:
Determine service type
Populate service form
Test service connectivity
Save service
Set policy enforcement type
Prevent adoption of system accounts
- 3.9 Given the appropriate Workflow design, create workflows such that they satisfy customer requirements.
With emphasis on performing the following steps:
Determine workflow type
Define workflow data
Add elements to workflow
Configure elements
Connect elements
Configure notification templates
Configure Action Text
Save workflow
- 3.10 Given the appropriate service selection policy design and the Java Script definitions, enter the definition for each service selection policy so that the service selection policies function as required.
With emphasis on performing the following steps:
Populate general tab
Determine service type
Enter Java Script definition
Save changes to policy
- 3.11 Given the appropriate Provisioning Policy design, add entitlements, memberships and targets such that the provisioning policies are properly configured.
With emphasis on performing the following steps:
Populate general tab
Add memberships
Add entitlement
Set target type
Configure parameter lists
Associate workflow
Save changes to policy
- 3.12 Given the appropriate Join Directives design, set the join directives for each profile so that the join directives are set.
With emphasis on performing the following steps:
Select service profile
Select attribute
Set join type
Save join directives
- 3.13 Given the Password Policy design and custom password policy extension, create password policy such that it creates the appropriate passwords for the specified service type.
With emphasis on performing the following steps:
Copy custom password policy extension files
Edit password policies file
Populate general tab
Choose target service types/instances
Set password rules
Save changes to policy
- 3.14 Given the Identity Policy design, create identity policy such that it creates the appropriate IDs for the specified service type.
With emphasis on performing the following steps:
Populate general tab
Choose target service types/instances
Enter Java Script definition
Save policy changes
- 3.15 Given the Password Settings design, configure password settings such that passwords are handled appropriately throughout IBM Tivoli Identity Manager.
With emphasis on performing the following steps:
Configure lost password behavior
Enable or disable password editing
Enable or disable password synchronization
Set password expiration period
Set password retrieval period
Set maximum number of invalid login attempts
Save password settings
- 3.16 Given the appropriate User Interface Parameters design and the ui.properties file, configure the ui.properties file so that the user interface requirements meet customer expectations.
With emphasis on performing the following steps:
Configure timeout value
Configure page size
Configure page link maximum
Configure search results maximum
Configure retry settings
- 3.17 Given the appropriate installation and custom files, enter email properties so the settings are configured.
With emphasis on performing the following steps:
Configure the password notification method
Enter email address for IBM Tivoli Identity Manager email address
Add custom password notification workflows
- 3.18 Given an email management design, configure the IBM Tivoli Identity Manager Post Office settings such that the email management requirements have been met.
With emphasis on performing the following steps:
Configure the System-wide Post Office setting
Configure the Post Office Interval
Configure the Post Office settings on the manual activity nodes
Define the aggregation email template
Define the aggregation method
- 3.19 Given an email management design, configure the workflow notification templates such that the email management requirements have been met.
With emphasis on performing the following steps:
Configure the default escalation limit
Configure reminder interval
Customize default notification templates
Ðàçäåë 4 - Data Management
- G4.1 Given the detailed design, Human Resources data and the IBM Tivoli Identity Manager schema, determine the identity data sources and the load method (IBM Tivoli Directory Integrator (ITDI) or DSML) to create an identity loading process.
With emphasis on performing the following steps:
Identify data sources
Determine load method (ITDI, custom JNDI or DSML)
Map external data to IBM Tivoli Identity Manager schema (DSML or CSV)
If using ITDI, configure ITDI server
- 4.2 Given an HR feed data file and the Organization Structure design, create an IBM Tivoli Identity Manager HR feed service, schedule and run a reconcile such that the data is loaded into the ITIM repository.
With emphasis on performing the following steps:
Create DSML or IDI service
Define placement rule
Initiate reconcile
Validate reconciled user data
Schedule reconcile
- 4.3 Given the IBM Tivoli Identity Manager adapter and service definition, migrate existing accounts so that the accounts are associated with appropriate identities.
With emphasis on performing the following steps:
Define reconciliation for services
Define adoption rules at the appropriate level
Run initial reconciliation
Verify reconciliation results
- 4.4 Given orphan accounts and their appropriate owners, configure the correct Aliases on the owner's person records so that the orphan accounts are resolved.
With emphasis on performing the following steps:
Identify orphan accounts
Identify owners for orphan accounts
Add user ID of orphan to owner's ER aliases attributes
Add system "Person" records to adopt system accounts
Run reconciliation again
Verify orphans get matched with correct person records
- 4.5 Given workload information and required file access, configure and schedule recycle bin clean up so that expired objects are removed.
With emphasis on performing the following steps:
Configure recycle bin age limit
Create cron job for recycle bin cleaning
Ðàçäåë 5 - Troubleshooting
- 5.1 Given access to the relevant logs and files, review logs to help resolve the issues.
With emphasis on performing the following steps:
Gather log files
Review IBM Tivoli Identity Manager log files
Review middleware logs (DB2, IDS, WAS)
Determine problem category
Increase logging level for appropriate category
Reproduce problem if possible
Re-level log file for addition/problem information
Call Support for PMR #
Take appropriate action
- 5.2 Given a non-working configuration and access to relevant logs and files, identify the source of problems.
- 5.3 Given a problematic data management scenario, identify the source of problems.
- 5.4 Given adapater related problems, troubleshoot to identify the source of the problem and resolve if possible.
Ðàçäåë 6 - Production
- 6.1 Given a functioning test environment and production systems, copy configurations to the production environment such that the production system mirrors the test systems and functions with production agents.
With emphasis on performing the following steps:
Create production environment including prerequisites
Apply security to production system
Promote ITIM configuration data to production using appropriate tools
Promote customizations from test to production using appropriate tools
Modify services to match production adapters
Reconcile production adapters
Test the production system
- 6.2 Given a list of services and a schedule for the reconciliations, create reconciliation schedules for each service with appropriate filters.
With emphasis on performing the following steps:
Determine systems to be reconciled
Determine frequency of reconciliation for each service
Define any reconciliation filters for each service
Create reconciliation schedule for each service
- 6.3 Given a production environment copied from a functioning test environment, perform production verification and acceptance.
With emphasis on performing the following steps:
Validating communication between ITIM server and all adapters
Validate provisioning policy changes using Policy Preview
Validate email notifications are reaching the appropriate target(s)
Ðàçäåë 7 - Maintenance
- 7.1 Given the IBM Tivoli Identity Manager systems, implement monitoring procedures so that the ITIM deployment can be monitored.
With emphasis on performing the following steps:
Monitor connectivity to database and LDAP
Monitor disk space of application servers and repositories
Track logs and log sizes
Monitor error logs for problems
Manage LDAP recycle bin
Monitor cluster members
Schedule system backups
- 7.2 Given the IBM Tivoli Identity Manager upgrade software and documentation, upgrade ITIM on test and production systems so that it is functioning properly.
With emphasis on performing the following steps:
Determine components to upgrade
Obtain server component upgrade software
Request backup of all ITIM components
Request backup of all system components
Create "Test" environment
Install upgrade on "Test"
Repackage custom applications with upgraded API JAR files
Validate "Test" upgrade environment
Install upgrade on production server
Test server
- 7.3 Given the adapter software and documentation, upgrade and test the IBM Tivoli Identity Manager adapters so that it is upgraded and functioning properly.
With emphasis on performing the following steps:
Obtain new adapter software
Determine components to install
Request backup systems to be upgraded
Install new adapter/upgrade
Install adapter profile
Verify certificates
Test adapter
- 7.4 Given the fixpack software and documentation, install the appropriate fixpack on the test and production systems such that the software is functioning properly.
With emphasis on performing the following steps:
Obtain fixpack software
Determine requirements for fixpack from fixpack documents
Create "Test" environment
Install fixpack on "Test"
Perform function test on items fixed by fixpack
Request backup system
Install fixpack on production server
Test the fixpack
- 7.5 Given the Performance Tuning Guide and customer's hardware specifications, configure system settings such that IBM Tivoli Identity Manager is tuned and functioning properly.
With emphasis on performing the following steps:
Identify IBM Tivoli Identity Manager deployment parameters and settings
Utilize Performance Tuning Guide
Set memory settings
Configure logging levels, options and file sizes
Set messaging - timeout values
Set disk usage limits
Ïîäãîòîâêà ê ýêçàìåíó:
Êóðñû ñ ïðåïîäàâàòåëåì:
Course title: IBM Tivoli Identity Manager 4.6 Introduction
Course duration: 2 hours, self-paced
Course number: n/a. Course numbers vary depending on the education delivery arm used in each geography. Please refer to the Web site below to find the appropriate course number according to the education delivery vendor chosen.
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is approved for IBM PartnerWorld You-Pass, We-Pay.
Abstract: The IBM Tivoli Identity Manager 4.6 Introduction course is directed to anyone new to the Identity Manager system. Material covered includes: Identity Manager functionality, advantages and benefits, how Identity Manager is used and system architecture.
Course title: Preparing for an IBM Tivoli Identity Manager 4.6 Implementation
Course duration: 2 days
Course number: TV351-IBM Technical Education Services. Course numbers vary depending on the education delivery arm used in each geography. Please refer to the Web site below to find the appropriate course number according to the education delivery vendor chosen.
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is approved for IBM PartnerWorld You-Pass, We-Pay.
Abstract: Preparing for an IBM Tivoli Identity Manager 4.6 Implementation teaches the student to build a comprehensive deployment strategy for Tivoli Identity Manager. The students step through the planning required to ensure a successful Tivoli Identity Manager deployment that is aligned with business objectives. During class students first learn to identify key business requirements. Then, through lecture and group discussions, they learn to design a deployment strategy modeled around the business requirements as well as the security policy. Important planning considerations covered in class will include user repositories, access control, organization trees, policies, and so on. At the completion of this two-day course, the students will be able to help plan the IBM Tivoli Identity Manager implementation project for their organizations.
Course title: IBM Tivoli Identity Manager 4.6 Installation and Configuration
Course duration: 2 days
Geo education page: Worldwide schedules available at Tivoli software education.
IBM PartnerWorld "You Pass We Pay": This course is approved for
Abstract: The IBM Tivoli Identity Manager 4.6 Installation and Configuration course is designed for individuals who need to know the core steps of how to install IBM Tivoli Identity Manager (ITIM) 4.6. Topics include middleware installation and configuration, IBM Tivoli Identity Manager 4.6 installation and configuration, Linux adapter installation and configuration, and IBM Tivoli Directory Integrator integration. This course contains lectures and labs.
This course is built on Red Hat Enterprise Linux 3.0 Update 5 servers. The final configuration of the classroom will be used in future courses so that the base scenario can be expanded.
It is recommended that the Preparing for an IBM Tivoli Identity Manager 4.6 Implementation course be completed prior to taking this course.
For information on pricing, scheduling and course registration: Course names and/or course numbers vary depending on the education delivery arm used in each geography. Please refer to the Tivoli software education Web site to find the appropriate course and education delivery vendor for each geography.
General training information can also be found at: IBM IT Training.
(ibm.com/training)
Ëèòåðàòóðà:
Publication title: Certification Study Guide: IBM Tivoli Identity Manager Version 4.6
Publication order number: SG24-7118-00 (IBM Form Number); 0738493910 (ISBN)
Abstract: This IBM Redbook is a study guide for the "IBM Certified Deployment Professional - IBM Tivoli Identity Manager V4.6" certification test, test number 877, and is meant for those who want to achieve IBM Certifications for this specific product.
Publication title: Redbook - Identity Management Design Guide with IBM Tivoli Identity Manager
Publication order number: SG24-6996-01
Abstract: This publication provides a methodology for designing an Identity Management solution with IBM Tivoli Identity Manager 4.6. Starting from the high-level, organizational viewpoint we show how to define user registration and maintenance processes using the Self Registration and Self Care Interfaces as well as the Delegated Administration capabilities. Using the Integrated Workflow we will automate the submission/approval processes for identity management requests and with the Automated User Provisioning we will take workflow output and automatically implement the administrative requests on the environment with no administrative intervention. This book is a valuable resource for security administrators and architects who wish to understand and implement a centralized identity management and security infrastructure.
Publication title: Redbook - Identity and Access Managment Solutions
Publication order number: SG24-6692-00
Abstract: The identity and access management solutions described in this IBM Redbook include the following key areas: User provisioning: Develop a portlet interface for self-care (user and account management), and approval of user provisioning requests by utilizing the Tivoli Identity Manager (TIM) APIs, services, workflow and policies. Tivoli Directory Integrator Assembly Lines and connectors are used to provision users to an LDAP directory, DB2 UDB database, and DB2 Content Manager. Authentication: Provide an integrated single sign-on (SSO) authentication solution using Tivoli Access Manager, and related technologies such as trusted association interceptor (TAI), Credential Vault, and LtpaToken. Authorization: Manage user access control through TIM provisioning policies and role mapping with products that have access models such as Tivoli Access Manager, WebSphere Portal, and DB2 Content Manager. First, we describe the key concepts, benefits, and architecture of an identity and access management solution. Then we present an end-to-end working example scenario for identity and access management system. The example includes business requirements, architecture, details for implementing the runtime and development environments, creation of Identity Manager policies and workflow, provisioning portlet development, deployment, and administration. Finally, we provide procedures to deploy and run the HR and document management applications used in the working example.
Publication title: Redbook - IBM Tivoli WebMEDs Deployment Guide Access Manager, Identity Manager and Privacy Manager on One Machine
Publication order number: SG24-7036-00
Abstract: This Deployment Guide provides a step-by-step installation of the WebMED demonstration environment for the IBM Tivoli security products:IBM Tivoli Access Manager for e-business, IBM Tivoli Identity Manager, IBM Tivoli Privacy Manager.
Publication title: Redbook - Enterprise Security Architecture using IBM Tivoli Security Solutions
Publication order number: SG24-6014-00
Abstract: This redbook looks at an overall Enterprise Security IT Architecture, focusing on the integration of audit, access control, flow control, identity/credential, and integrity subsystems throughout extensive e-business enterprise implementations. The available security product diversity in the marketplace challenges everybody in charge of designing single secure solutions or an overall enterprise security architecture. With Access Manager, Risk Manager, PKI, Identity Manager, User Admin, and Security Manager, Tivoli offers a complete set of security products designed to address these challenges.
This redbook depicts several e-business scenarios with different security challenges and requirements. It will use the IBM Method for Architecting Secure Solutions (MASS) to describe necessary architectural building blocks and components. By matching the desired Tivoli security product criteria, it will describe appropriate security implementations that will meet the targeted requirements.
This book is a valuable resource for security officers, administrators, and architects who wish to understand and implement enterprise security following architectural guidelines.
To order publication access IBM Publications Center on the Web or by phone: (note publication order number):
IBM Publications Center
or call IBM Direct Publications: 1-800-879-2755 (US) 1-800-426-4968 (Canada) or from any non-IBM bookstore
Ñàìîñòîÿòåëüíàÿïîäãîòîâêà:
Self Study title: IBM Tivoli Identity Manager V4.6 Product Information and Related Links
Order number: n/a
Abstract: The IBM Tivoli identity management solution can help you get users, systems and applications online and productive fast, reduce costs and maximize return on investment. This solution can automate and simplify the management of user identities, access rights and privacy policies across the e-business infrastructure. To effectively manage internal users as well as an increasing number of customers and partners through the Internet, IBM Tivoli provides the only integrated solution that addresses all four key areas of identity management.
Ïðàêòè÷åñêèé òåñò
Ïðèìå÷àíèå: Ýòîò òåñò ðàçðàáîòàí ñ öåëüþ äàòü êàíäèäàòó ïðåäñòàâëåíèå î ñîäåðæàíèè è ôîðìàòå âîïðîñîâ ñåðòèôèêàöèîííîãî ýêçàìåíà. Äàííûé òåñò íå ÿâëÿåòñÿ îöåíî÷íûì òåñòîì. Âûïîëíåíèå åãî íå ãàðàíòèðóåò âûïîëíåíèå ñåðòèôèêàöèîííîãî òåñòà.
1. Which information is relevant to the creation of an identity feed?
A. social security number, payroll information
B. surname, employee ID, common name
C. auto license ID, business phone
D. mother's maiden name, spouse name
2. What are the possible server configurations for an application server design?
A. single server, clustered
B. single server, peer-to-peer
C. peer-to-peer, multi-master
D. multi-master, on-demand
3. Which Application Server does IBM Tivoli Identity Manager (ITIM) V4.6 support?
A. IBM WebSphere
B. Sybase EAServer
C. Oracle 9i Application Server
D. Microsoft .NET Server
4. In which directory would you find the UNIX script for removing an agent profile from IBM Tivoli Identity Manager (ITIM)?
A. $ITIM_HOME/bin/unix
B. $ITIM_HOME/data/
C. $ITIM_HOME/bin/agents/
D. $ITIM_HOME/data/remote_resources/
5. What is the base objectclass used to extend the schema to add new attributes to create a custom person class?
A. inetOrgPerson
B. erperson
C. ldapPerson
D. bpPerson
6. When are dynamic organizational roles evaluated? (Choose two.)?
A. when the provisioning policy is executed
B. when a user’s personal information is changed
C. when the provisioning policy is created with a membership containing the organizational role
D. when the ITIM server is started
E. when a new user is created
7. As a result of the policy’s evaluation, a user’s account must be moved to a different service instance than the one the user is currently using. Which three actions can occur based on the system’s configuration? (Choose three.)
A. create a new user account for the new service instance and suspend the existing user account on the old service instance
B. create a new user account for the new service instance and delete the existing user account on the old service instance
C. create a new user account on the new service instance, lock the existing account, and send an email to the administrator that the account must be physically removed on the existing service instance
D. move the user account to the new service instance and suspend the existing user account on the old service instance
E. move the user account to the new service instance and locks the existing user account on the old service instance
F. create a new user account for the new service instance and send an email to the administrator of the service instance that the account must be physically moved from the old service instance to the new service instance
8. What is the default join directive for a single-valued string?
A. Priority
B. Union
C. Append
D. Highest
9. With challenge response enabled, what happens when the user exceeds the maximum number of invalid logon attempts?
A. The user is able to be able to log in with the correct challenge response answer(s).
B. The user's account is suspended. An administrator needs to unlock the account for the user.
C. The administrator is notified and the user is forced to change the password.
D. The user's account is deleted. An administrator needs to restore the account.
10. How can you control the set of account user IDs returned by the adapter during a reconciliation? (Choose two.)
A. by defining an Identity Policy for the service
B. by setting a query when scheduling a reconciliation in the IBM Tivoli Identity Manager (ITIM)
C. by defining aliases on persons to match the needed set of account user IDs
D. by setting up reconciliation account exclusion in the ITIM LDAP
E. by configuring the adapter using the agentCfg tool to return a selective set of user IDs to ITIM
11. Which three items can be found using the agentCfg utility? (Choose three.)
A. ADK version
B. ACI version
C. adapter's local platform IP address
D. the location of the certificate the adapter is using
E. adapter version
F. Protocol Server port number
12. Which two tasks do adapter reconciliations perform? (Choose two.)
A. load access information into the Tivoli Identity Manager directory
B. load person identity records into the Tivoli Identity Manager directory
C. update the eralias attribute on the person’s identity record
D. restore suspended accounts that are compliant with a provisioning policy
E. monitor accesses granted outside of Tivoli Identity Manager
13. Which three actions are recommended prior to executing an IBM Tivoli Identity Manager (ITIM) Server upgrade from version V4.5 to V4.6? (Choose three.)
A. install appropriate system and middleware prerequisite/upgrade software
B. install latest version of browser software
C. back up ITIM data contained in Directory Server and database
D. back up {ITIM_HOME}/data directory and {WAS_HOME}/system/config
E. upgrade mail server software
F. increase CPU speed
14. What are three recommended methods of testing a successful fixpack installation on an IBM Tivoli Identity Manager (ITIM) Server V4.6? (Choose three.)
A. confirm email is being sent by the email server
B. successfully ping the ITIM Server
C. successfully start the Internet browser
D. successfully start the ITIM Server
E. login successfully to the ITIM application
F. confirm functionality within the ITIM application
Answer Key:
7. B
8. A
9. A
10. A
11. A
12. BE
13. ABF
14. A
15. B
16. BD
17. AEF
18. AE
19. ACD
20. DEF