5.5 About the Installation Program

The User Application installation program does the following:

You can launch the installation program in one of three modes:

5.5.1 Installation Scripts and Executables

Obtain the Identity Manager 3.5.1 installation files by one of the following methods:

  • Download the correct User Application .iso image or .zip file for your system: Identity_Manager_3_5_1_User_Application.iso or Identity_Manager_3_5_1_User_Application_Provisioning.iso. Downloads are available from Novell Downloads. See Activating Novell Identity Manager Products for more information.

  • Download the product DVD, Identity_Manager_3_5_1_DVD.iso, from Novell, Inc.

Table 5-2 lists the files and scripts you need to install the Identity Manager 3.5.1 User Application.

Table 5-2 Files and Scripts Required for Installing the Identity Manager 3.5.1 User Application



User Application WAR

Choose one:

IDM.war. Includes the Identity Manager 3.5.1 User Application with Identity Self-Service features.

IDMProv.war. Includes the Identity Manager 3.5.1 User Application with Identity Self-Service features and the Provisioning Module.

The WAR files for your system, as well as the IdmUserApp.jar and silent.properties files, are initially available in the following delivery CD directory appropriate for your system:

5.5.2 Values Required at Installation

Table 5-3 is a worksheet for noting the installation parameter values you plan to use at installation on JBoss. User Application configuration parameters can also be set at installation; see Section 5.6.14, Configuring the User Application.

Table 5-3 Installation Parameters Worksheet for JBoss


Sample Value

Your Value

Install folder


Database platform


Database host


Database port


Database name or sid


Database user


Database user password

Java root folder


(JBoss) Base folder


JBoss host


JBoss port


Workflow Engine ID (For cluster installs. Must be unique for each cluster member.)

Application name (URL context)


Novell Audit Server

[name or IP address]

Encrypted master key. See Section 5.6.13, Specifying a Master Key.

_+FEJEefMAglH0A= =:3VRmp04lub21Y3GpdaXCY)LGqS1nBaL/