Managing IBM Security Directory Integrator instances
IBM® Security Identity Governance and Intelligence uses IBM Security Identity Adapters to communicate with various managed resources. These adapters are deployed and run on instances of the Security Directory Integrator. The properties of the Security Directory Integrator or Dispatcher affect all of the adapters that run on the instance. Therefore, some adapters might need to run on separate instances of the Security Directory Integrator. Use this task to create and manage multiple instances of the Security Directory Integrator.
About this task
Changes that you make to the Directory Integrator instance are propagated to the nodes in a cluster by the node synchronization process.
Before the virtual appliance routes the request, it checks the connections to the host, <host:port>.
For example, the instance SDI3 crashed on the primary node. Any request that is sent to SDI3 on the primary node is routed to instance SDI3 on one of the member nodes in the cluster. If instance SDI3 crashed on member node, any request that is sent to SDI3 on the member node is routed to another instance of SDI3. The instance can be on the primary node or on one of the member nodes in the cluster.