Managing IBM Security Directory Integrator adapters
You can install and uninstall Security Directory Integrator adapters through the virtual appliance. The adapters enable Identity Governance and Intelligence to communicate with various resources.
Before you begin
About this task
The virtual appliance has the UNIX and Linux adapter preinstalled.
Some adapters require third-party JAR files to be downloaded and then uploaded to virtual appliance during the adapter installation process. These jars are then added to the adapter bundle inside the virtual appliance. Use the download option to install the complete adapter bundle that includes the third-party JAR files on another Security Directory Integrator instance.
If you have a cluster environment, adapter management tasks must be performed on the primary node. The adapter management tasks that are performed on a directory integrator instance propagate to the same instance on each node in the cluster during node synchronization. If the instance on the primary node becomes unavailable, the failover action is for Identity Governance and Intelligence to connect to the directory integrator instance on the secondary node. If the instance is unavailable on the secondary node, Identity Governance and Intelligence continues to try to connect to the instance on member nodes.
For more information about adapters, see Installing and configuring Identity Brokerage Adapters.