Virtual appliance administration
With the Appliance Dashboard, you can manage the virtual appliance configuration for the data store, directory server, and mail server. You can also customize the server properties and manage logs.
To manage the virtual appliance, log on to the Appliance Dashboard at https://isigva_hostname:9443. For example: https://isigva1.jk.example.com:9443.
- Viewing the event logs
System events are logged when the system settings are changed and when problems occur with the system. Use the Event Log management page to view and to export system events on your network. - Viewing the memory usage
View the memory graph to see the memory that is used by the IBM® Security Identity Governance and Intelligence virtual appliance. - Viewing the CPU usage
View the CPU graph to see the CPU that is used by the IBM Security Identity Governance and Intelligence virtual appliance. - Viewing the storage usage
View the storage graph to see the percentage of disk space that is used by the boot and root partitions of the IBM Security Identity Governance and Intelligence virtual appliance. - Managing the SNMP monitoring
You can monitor the current IBM Security Identity Governance and Intelligence virtual appliance status with SNMP. This status shows an SNMP agent, which can be queried by any SNMP manager or monitoring tools that support SNMP to obtain the status of the running virtual appliance. - Enabling Identity Brokerage Providers in the virtual appliance
You can use the IBM Identity Brokerage Providers in the IBM Security Identity Governance and Intelligence virtual appliance to communicate with managed resources. - Managing directory server configuration
Use the Directory Server Configuration page to configure the directory server in the IBM Security Identity Governance and Intelligence virtual appliance. - Authenticating users from an external user registry to the Local Management Interface
You can choose to use an external user registry, in place of the default custom registry, to designate which users can authenticate to the local management interface (LMI) of the virtual appliance. - Managing the database server configuration
Use the Database Server Configuration page to configure, reconfigure, or unconfigure the database server for the IBM Security Identity Governance and Intelligence virtual appliance. - Managing the PostgreSQL database
IBM Security Identity Governance and Intelligence contains an internal PostgreSQL database that can store you data. If you choose to use the internal PostgreSQL database, use the following procedure to manage the database. - Transferring connector files to the virtual appliance from an external source
You can securely transfer subsets of files into the appliance from an external computer by using Secure Copy (scp). - Creating a Network Files System (NFS) mount point to access connector files
If you are transferring connector files from external sources to the virtual appliance, you can use a network file system to link to those external sources directly. - Managing OpenID connect configuration
You can use OpenID connect to access the Service Center. The OpenID connect provider must be able to authenticate the user and provide claims to a relying party about the authentication event and the user. - Managing LTPA-based single sign-on configuration
Use the LTPA-based Single Sign-On Configuration page to generate, import, or export LTPA keys and to configure, or unconfigure the single sign-on for the IBM Security Identity Governance and Intelligence virtual appliance. - Managing the mail server configuration
Use the Mail Server Configuration page to configure the email notifications for the IBM Security Identity Governance and Intelligence virtual appliance. - Managing custom files
View custom files and folders that are related to the IBM Security Identity Governance and Intelligence virtual appliance. - Managing certificates
Administrators can update the IBM Security Identity Governance and Intelligence application server certificate. - Updating the JAVA security policy JAR files
The IBM® SDK, on all platforms, provides strong but limited jurisdiction policy files. By default, the key strength is 2048 bits. If you want greater security, you must create custom US_export_policy.jar and the local_policy.jar files with greater key strength and upload them to the Virtual Appliance. - Managing IBM Security Directory Integrator instances
IBM Security Identity Governance and Intelligence uses IBM Security Identity Adapters to communicate with various managed resources. These adapters are deployed and run on instances of the Security Directory Integrator. The properties of the Security Directory Integrator or Dispatcher affect all of the adapters that run on the instance. Therefore, some adapters might need to run on separate instances of the Security Directory Integrator. Use this task to create and manage multiple instances of the Security Directory Integrator. - Viewing the update history
View the update history to see which firmware and security content updates are downloaded, installed, and rolled back on the IBM Security Identity Governance and Intelligence virtual appliance. - Viewing the licensing
View the licensing to see the service agreement that you accepted when you installed the virtual appliance. You can also add a license module to manage the licensing. - Managing the firmware settings
The IBM Security Identity Governance and Intelligence virtual appliance has two partitions with separate firmware on each partition. Partitions are swapped during firmware updates so that you can roll back the firmware updates. - Installing a fix pack
Install a fix pack on the virtual appliance to address software maintenance updates for reliability and performance enhancements. - Managing the log configuration
You can view component-specific and virtual appliance log files to troubleshoot virtual appliance issues. You can also configure the file size and settings of the log files in the Log Retrieval and Configuration page. - Managing JavaCore and core dump files
Use the Core Dumps page to generate, delete, or download core dump files in the IBM Security Identity Governance and Intelligence virtual appliance. - Viewing the About page information
View the About page to learn more about the IBM Security Identity Governance and Intelligence virtual appliance and its content. - Managing application interfaces
To manage application interfaces with the management interface, use the Application Interfaces page. - Managing advanced tuning parameters
Change the advanced tuning parameter values only under the supervision of IBM Customer Support. - Configuring for bidirectional languages
The Identity Governance and Intelligence user interfaces provide support for bidirectional languages. Use the BiDi Properties pane to adapt the bidirectional settings to your language and to your preferences. - Managing hosts file
To manage hosts file with the IBM Security Identity Governance and Intelligence virtual appliance, use the Manage Hosts File page. - Configuring static routes
Configure static routes to the paired protection interfaces on your virtual appliance to enable network routers to redirect users to block pages or authentication pages. - Managing a network file system (NFS)
To access files on a remote server, you can configure the virtual appliance as an NFS client. - Exporting or importing the configuration settings
Export all your configuration settings from one virtual appliance into a package for use on another virtual appliance. You can configure the settings on the virtual appliance with the Export/Import Settings page. You can also view or download reports from the Export/Import Settings page. - Configuring the date and time settings
Use the Date/Time page to configure the date, time, time zone, and NTP server information of the IBM Security Identity Governance and Intelligence virtual appliance. - Configuring the administrator settings
Use the administrator settings to change the password that you use to access your IBM Security Identity Governance and Intelligence virtual appliance. Use the settings to also access the length of idle time that is granted to pass before your session times out. - Managing the snapshots
Use snapshots to restore prior configuration and policy settings to the IBM Security Identity Governance and Intelligence virtual appliance. - Managing the support files
IBM Customer Support uses support files to help you troubleshoot problems with the IBM Security Identity Governance and Intelligence virtual appliance. Support files contain all log files, temporary and intermediate files, and command output that is needed to diagnose customer support problems. - Configuring system audit events
Configure where you want the IBM Security Identity Governance and Intelligence virtual appliance to send notifications about changes to system settings and problems with the virtual appliance. - Restarting or shutting down
Use the Restart or Shut down page to restart or shut down the IBM Security Identity Governance and Intelligence virtual appliance. - Virtual appliance command-line interface
Access the command-line interface (CLI) of the virtual appliance by using either an ssh session or the console.
Parent topic: Administration of the virtual appliance