IBM Security Privileged Identity Manager, Version 2.1.1

Setting up a member node for the IBM Security Privileged Identity Manager

For high availability deployment mode, you can set up a member node for the IBM® Security Privileged Identity Manager cluster by using the initial configuration wizard.

Before you begin

Configure the initial virtual appliance settings.

The primary and member nodes must be able to communicate with each other.

About this task

In a web browser, log on to the initial configuration wizard from the web user interface after you complete the virtual appliance logon configuration.

Use the Set up a Member node for the IBM Security Privileged Identity Manager cluster option to set up a member node.

Take note of the following limitations if you are enabling FIPS mode on the virtual appliance:
  • FIPS mode can be enabled only on new virtual appliance installations.
  • All virtual appliances in a cluster must have the same settings. For example, if FIPS is enabled in the cluster, all members of the cluster must also have FIPS enabled.
  • Virtual appliances that are operating in FIPS-mode can only securely connect to FIPS-mode systems.

Procedure

  1. In a web browser, enter the host name of the configured virtual appliance in the following format.
    https://hostname:9443
    For example: https://pimva1.jk.example.com:9443
  2. In the Connect to Primary tab of the Setup Progress page, provide the details of the primary node.
    1. Type the host name in the Primary node host name field. For example, pimva1.jk.example.com.

      The Primary node host name must be same that was used to create the primary virtual appliance host name. That is, the value in the Issued To field of the primary node host name must match with the value that you entered in the Primary node host name field of the Connect to Primary tab.

    2. Type the password in the Primary node administrator password field. For example, admin.
  3. Click Test Connection to validate the details and to verify this connection of the member node with the primary node. The system notifies that the connection to the primary node was successful.
  4. Click Next page.
    Note: The Next page button is activated only when the connection to the primary node is successful.

    The Completion tab is displayed.

  5. Click Fetch Configuration to obtain configuration details from the primary node. A progress bar indicates about fetching the configuration details from the primary node. The Start Configuration button is activated only when the Fetch Configuration operation is completed successfully.
  6. Click Start Configuration to start the initial configuration for the IBM Security Privileged Identity Manager virtual appliance. The Completion page opens to indicate the data synchronization process. Do one of these actions:
    • If the configuration is successful, a message indicates to restart the IBM Security Privileged Identity Manager virtual appliance. See Restarting or shutting down.
    • If the configuration is not complete or not successful, a message indicates the reason. Do one of the following actions:
      • Click the Log files link to open the Log Retrieval and Configuration page and check for any messages and errors in the log files.
      • Click the Click here link to restart the configuration process in case of failures.


Feedback