Robust Data Synchronization with IBM Tivoli Directory Integrator

Book description

Don’t be fooled by the name; IBM Tivoli Directory Integrator integrates anything, and it is not in any way limited to directories. It is a truly generic data integration tool that is suitable for a wide range of problems that usually require custom coding and significantly more resources to address with traditional integration tools.

This IBM Redbooks publication shows you how Directory Integrator can be used for a wide range of applications utilizing its unique architecture and unparalleled flexibility. We discuss the business context for this evolutionary data integration and tell you how to architect and design an enterprise data synchronization approach. By telling you everything about Directory Integrator’s component structure and then applying all the techniques in two comprehensive business scenarios, we build a formidable base for your own data integration and synchronization projects.

This book is a valuable resource for security administrators and architects who want to understand and implement a directory synchronization project.

Please note that the additional material referenced in the text is not available from IBM.

Table of contents

  1. Notices
    1. Trademarks
  2. Preface
    1. The team that wrote this redbook
    2. Become a published author
    3. Comments welcome
  3. Part 1: Architecture and design
    1. Chapter 1: Business context for evolutionary integration
      1. A close look at the challenge
      2. Benefits of synchronization
      3. Directory Integrator in non-synchronizing scenarios
      4. Synchronization patterns and approaches
        1. How and when synchronization can be invoked
        2. Data flow patterns
      5. Business and technical scenarios
        1. Multiple existing directories and security concern
        2. Existing directory cannot be modified
        3. Single sign-on into multiple directories with Access Manager
        4. Data is located in several places
        5. Use of virtual directory - access data in place
      6. Conclusion
    2. Chapter 2: Architecting an enterprise data synchronization solution
      1. Typical business requirements
      2. Detailed data identification
        1. Data location
        2. Data owner
        3. Data access
        4. Initial data format
        5. Unique data
      3. Plan the data flows
        1. Authoritative attributes
        2. Unique link criteria
        3. Special conditions or requirements
        4. Final data format
        5. Data cleanup
        6. Phased approach
        7. Frequency
      4. Review results
      5. Instrument and test a solution (1/2)
      6. Instrument and test a solution (2/2)
        1. Create workable units
        2. Naming conventions
        3. High availability and failover
        4. System administration
        5. Security
        6. Password synchronization
      7. Who are the players in the solution
        1. Common roles and responsibilities
      8. Conclusion
    3. Chapter 3: Directory Integrator component structure
      1. Concept of integration
        1. Data sources
        2. Data flows
        3. Events
      2. Base components (1/5)
      3. Base components (2/5)
      4. Base components (3/5)
      5. Base components (4/5)
      6. Base components (5/5)
        1. AssemblyLines
        2. Connectors
        3. Parsers
        4. EventHandlers
        5. Hooks
        6. Scripts
        7. Function components
        8. Attribute Map components
        9. Branch components
        10. Loop components
        11. Password synchronization
      7. Security capability
      8. Physical architecture
        1. Combination with an enterprise directory
        2. Base topologies
        3. Multiple servers
      9. Availability and scalability
      10. Logging
      11. Administration and monitoring
      12. Conclusion
  4. Part 2: Customer scenarios
    1. Chapter 4: Penguin Financial Incorporated
      1. Business requirements
        1. Current architecture
      2. Functional requirements
      3. Solution design (1/2)
      4. Solution design (2/2)
        1. Architectural decisions for phase 1
        2. Architectural decisions for phase 2
      5. Phase 1: User integration (1/12)
      6. Phase 1: User integration (2/12)
      7. Phase 1: User integration (3/12)
      8. Phase 1: User integration (4/12)
      9. Phase 1: User integration (5/12)
      10. Phase 1: User integration (6/12)
      11. Phase 1: User integration (7/12)
      12. Phase 1: User integration (8/12)
      13. Phase 1: User integration (9/12)
      14. Phase 1: User integration (10/12)
      15. Phase 1: User integration (11/12)
      16. Phase 1: User integration (12/12)
        1. Detailed data identification
        2. Data flows
        3. Instrument and test a solution
      17. Phase 2: Password synchronization (1/21)
      18. Phase 2: Password synchronization (2/21)
      19. Phase 2: Password synchronization (3/21)
      20. Phase 2: Password synchronization (4/21)
      21. Phase 2: Password synchronization (5/21)
      22. Phase 2: Password synchronization (6/21)
      23. Phase 2: Password synchronization (7/21)
      24. Phase 2: Password synchronization (8/21)
      25. Phase 2: Password synchronization (9/21)
      26. Phase 2: Password synchronization (10/21)
      27. Phase 2: Password synchronization (11/21)
      28. Phase 2: Password synchronization (12/21)
      29. Phase 2: Password synchronization (13/21)
      30. Phase 2: Password synchronization (14/21)
      31. Phase 2: Password synchronization (15/21)
      32. Phase 2: Password synchronization (16/21)
      33. Phase 2: Password synchronization (17/21)
      34. Phase 2: Password synchronization (18/21)
      35. Phase 2: Password synchronization (19/21)
      36. Phase 2: Password synchronization (20/21)
      37. Phase 2: Password synchronization (21/21)
        1. Components
        2. Architecture
        3. Detailed data identification
        4. Plan the data flows
        5. Review results
        6. Instrument and test a solution
    2. Chapter 5: Blue Glue Enterprises
      1. Company profile
      2. Blue Glue business requirements
      3. Blue Glue functional requirements
      4. Solution design
      5. Phase 1: Human resources data feed (1/5)
      6. Phase 1: Human resources data feed (2/5)
      7. Phase 1: Human resources data feed (3/5)
      8. Phase 1: Human resources data feed (4/5)
      9. Phase 1: Human resources data feed (5/5)
        1. Detailed data identification, data flows and review
        2. Instrument and test solution
      10. Phase 2: Store management application (1/23)
      11. Phase 2: Store management application (2/23)
      12. Phase 2: Store management application (3/23)
      13. Phase 2: Store management application (4/23)
      14. Phase 2: Store management application (5/23)
      15. Phase 2: Store management application (6/23)
      16. Phase 2: Store management application (7/23)
      17. Phase 2: Store management application (8/23)
      18. Phase 2: Store management application (9/23)
      19. Phase 2: Store management application (10/23)
      20. Phase 2: Store management application (11/23)
      21. Phase 2: Store management application (12/23)
      22. Phase 2: Store management application (13/23)
      23. Phase 2: Store management application (14/23)
      24. Phase 2: Store management application (15/23)
      25. Phase 2: Store management application (16/23)
      26. Phase 2: Store management application (17/23)
      27. Phase 2: Store management application (18/23)
      28. Phase 2: Store management application (19/23)
      29. Phase 2: Store management application (20/23)
      30. Phase 2: Store management application (21/23)
      31. Phase 2: Store management application (22/23)
      32. Phase 2: Store management application (23/23)
        1. Detailed data identification
        2. Data flows
        3. Review results
        4. Instrument and test solution
  5. Part 3: Appendixes
    1. Appendix A: Tricky connections
      1. Introduction to JDBC drivers
      2. Database connectivity to Oracle
        1. Obtaining the drivers
        2. Installing the drivers
        3. Driver configuration
      3. Database connectivity to DB2
        1. Obtaining the drivers
        2. Installing the drivers
        3. Driver configuration
      4. Database connectivity to SQL Server (1/2)
      5. Database connectivity to SQL Server (2/2)
        1. Obtaining the drivers
        2. Installing the drivers
        3. Driver configuration
      6. Connectivity to Domino Server
        1. Identity Manager Notes Agent configuration
    2. Appendix B: Directory Integrator’s view of JavaScript
      1. The script engine
        1. Scripts and configuration files
        2. Scripting tools
      2. Scripts: Where
      3. Scripting JavaScript and Java (1/2)
      4. Scripting JavaScript and Java (2/2)
        1. Core JavaScript
        2. Regular expressions (regex)
        3. Java through JavaScript
        4. Java to JavaScript and back
      5. Common tasks
        1. Creating arrays and Java utility objects
        2. Managing dates
        3. Working with entries and attributes
      6. Conclusion
    3. Appendix C: Handling exceptions and errors
      1. Reading the error dump
      2. Errors = exceptions
        1. The error object
        2. Exception handling in script
      3. Error Hooks
        1. Mandatory
        2. Connection Failure
        3. Mode-specific On Error
        4. Default On Error
      4. Logging
    4. Appendix D: Additional material
      1. Locating the Web material
      2. Using the Web material
        1. How to use the Web material
    5. Glossary
    6. Related publications
      1. IBM Redbooks
      2. Other publications
      3. Online resources
      4. How to get IBM Redbooks
      5. Help from IBM
    7. Index (1/3)
    8. Index (2/3)
    9. Index (3/3)
    10. Back cover

Product information

  • Title: Robust Data Synchronization with IBM Tivoli Directory Integrator
  • Author(s): Axel Buecker, Franc Cervan, Christian Chateauvieux, David Druker, Eddie Hartman, Rana Katikitala, Elizabeth Melvin, Todd Trimble, Johan Varno
  • Release date: May 2006
  • Publisher(s): IBM Redbooks
  • ISBN: None