Introduction
New customers install DirX Identity and work with the product. Existing customers must migrate their environment.
Migration from Versions older than V8.3
With DirX Identity V8.3, the Messaging functionality was changed.If you want to preserve and process your unprocessed messages (like password changes, Provisioning events, and so on), you must migrate them to the new Messaging functionality.DirX Identity V8.3 offers a migration tool for this task.In this case, you must migrate to V8.3. After successful migration to V8.3, you can migrate to the current version in a second step.See the V8.3 migration guide for information on how to migrate to V8.3. If you are not interested in message migration, you can migrate directly to V8.6.
Migration from Versions older than V8.7
This section is only of interest if you use the RACF schema extensions.
In all versions older than V8.7, the following RACF attributes were incorrectly defined with conflicting equality matching rules (Case Ignore equality matching) and substring matching rules (Case Exact substring matching).
-
racfLNotesShortName
-
racfNdsUserName
-
krbPrincipalName
-
racfLdapBindDN
-
racfLdapBindPw
To solve this problem, we provide an automatic migration procedure that runs as part of the DirX Identity Configuration tool.The procedure copies the attribute values from the erroneous attributes to the new attributes that are correctly defined.We have renamed the erroneous attributes to LDAP attribute names with the suffix OLD; for example, racfLNotesShortNameOLD.After the data has been migrated in LDAP, you’ll need to update the LDAP schema to remove these renamed erroneous attributes from several object classes.For details, see the section “Extending the DirX Identity Schema for Customer Domains” in the chapter “Manual Migration”.
Manual Migration Overview
The following table lists the relevant manual steps described in the sections of chapter “Manual Migration” you should consider depending on your base version:
| Base \ Target version \ version |
V8.10 |
|---|---|
V8.9 |
“General Aspects” and “Aspects Relevant for DirX Identity V8.9” |
V8.7 |
Additional to the sections above “Aspects Relevant for Upgrade from V8.7” in this chapter |
V8.6 |
Additional to the sections above “Aspects Relevant for Upgrade from V8.6” in this chapter |
V8.5 |
Additional to the sections above “Aspects Relevant for Upgrade from V8.5” in this chapter |
V8.4 |
Additional to the sections above “Aspects Relevant for Upgrade from V8.4” in this chapter |
V8.3 , V8.3 R2 |
Additional to the sections above “Aspects Relevant for Upgrade from V8.3” in this chapter |
V8.2C |
Additional to the sections above “Aspects Relevant for Upgrade from V8.2C” in this chapter |
V8.2B |
Additional to the sections above “Aspects Relevant for Upgrade from V8.2B” in this chapter |
V8.2A |
All sections. |
Web Center Migration Overview
For Web Center migration, you need to consider all the change files on the version path.For example, if you want to migrate from V8.2A SP2 to V8.5, you need to read the following files:
-
WebCenterChanges-82A-SP2-to-82C.txt
-
WebCenterChanges-82C-to-83.txt
-
WebCenterChanges-83-to-84.txt
-
WebCenterChanges-83-to-85.txt
Features to be Migrated
This section gives an overview of the features to be migrated and explains the underlying concepts.
Many items in the next sections are performed automatically, but in some cases, manual steps are necessary.Consider all these next sections accordingly depending on the base version from which you want to upgrade.
General Issues
This section discusses issues that are relevant to all versions.
Deletion of Old Objects
Renaming of objects in the Provisioning configuration database requires deletion of the old objects after adding the new ones. This comes from the fact that the cn, which is part of the DN, is used as a display attribute. Procedures exist that handle the deletion task automatically.
Issues Relevant for Upgrade from V8.2A
This chapter describes all issues that are relevant for V8.2A only.
Issues Relevant for Upgrade from V8.2B
This section comprises all issues relevant for V8.2B only.
Migration of JMS Subscriptions
Subscription IDs of the C++-based Server were unified. The structure of the subscription IDs is now identical for Windows and UNIX systems. Statustracker subscription IDs no longer include the hostname of the system where it runs, because it may move to another host.
The new format for subscription ID is:
host.jms.module.topic
For statustracker:
jms.module.topic
The old format is:
-
Windows:
host.jms.module.host.topic
For statustracker:
jms.module.host.topic
-
UNIX:
host.libmqjms_dxm.host.topic
For statustracker:
libmqjms_dxm.module.host.topic
An automatic migration routine performs this task during the upgrade configuration when you start the C++-based Server hosting ATS the first time.
Migration of Activation Date in Request Workflow Instances
Request workflows started with older versions may include an activation date (the workflow creation date) in the order. This causes a ticket creation during processing of the order. Migration eliminates these activation dates.
Migration of XML Content to LDAP Attributes in Request Workflow/Activity instances
In older versions, a lot of attributes were managed by an XML structure in the dxmContent LDAP attribute. For performance reasons, these attributes are now represented by LDAP attributes. Without a migration Request Workflow/Activity instances cannot be displayed correctly in the Identity Manager (especially the graphic). Therefore Request Workflow/Activity instances created by older versions are migrated.
Issues Relevant for Upgrade from V8.2C
This section describes all issues relevant for version V8.2C only.
Migration of Realtime Channels to Support Delta Handling
DirX Identity V8.3 supports delta handling in realtime workflows. This new feature requires an extension in the XML definition of the realtime channels. (LDAP attribute “dxmContent”).
An automatic migration routine performs this task during the upgrade configuration.
You can run this routine by hand at any time.
Migration of Event Port in Realtime Workflows
The realtime workflows can send JMS events for the event-based workflows. Internally the workflows have an event port integrated that starts a JMS connector. The XML definition for this JMS connector (LDAP attribute “dxmContent”) had some connection parameters defined that were not used by the workflow at runtime. With the integration of ActiveMQ as the JMS messaging system, these parameters were even invalid due to broken links to LDAP objects that no longer existed. Therefore, the XML definition of the JMS connector will now be updated by the migration routine.
An automatic migration routine performs this task during the upgrade configuration.
You can run this routine by hand at any time.
Deletion of the Certificate Handler adaptor in the IdS-J
The Certificate Handler is automatically deleted during the upgrade configuration.
It was used in the pre V8.2C versions for the Windows Password Listener. In V8.2C, the feature to distribute certificates and the message server list was assumed by the Configuration Handler adaptor. Therefore, in V8.3, this adaptor is no longer necessary.
Issues Relevant for Upgrade from V8.4
This section comprises all issues relevant for V8.4 only.
Java-based Server
There are two new special adaptors responsible for the consumption of scheduler and Identity Manager messages:
-
The Entry Change Start Workflow Listener and
-
The Provisioning Request Start Workflow Listener.
The Entry Change Start Workflow Listener (or Provisioning Request Start Workflow Listener) is always co-located with the Entry Change Listener adaptor (or Provisioning Request Listener adaptor) and starts event-based processing (or provisioning) workflows.
These new adaptors replace the legacy adaptor Start Realtime Workflow Listener. There are no manual steps necessary.
Issues Relevant for Upgrade from V8.5
This section describes all issues relevant for V8.5 only.
Use of SSL
In V8.6, SSL handling has been extended. For ActiveMQ, only client-side SSL is now supported. As a result, you need to perform the manual steps described in the chapter “Manual Migration” to migrate Windows Password Listeners that connect with SSL to ActiveMQ to connect with client-side SSL.
Issues Relevant for Upgrade from V8.6
This section describes all issues relevant for V8.6 only.
Clear Text Passwords
In V8.7, the use of clear text passwords has been minimized. In older versions, the following features stored clear text passwords in LDAP:
-
Passwords for JMS-based auditing
-
Passwords for sending e-mail notifications in request workflows
-
Passwords for sending notification e-mail in Tcl-based workflows
Now these passwords are stored encrypted. See the relevant sections in the chapter “Manual Migration” for details on how to migrate the passwords formerly stored as clear text passwords.
Issues Relevant for Upgrade from V8.7
This section describes all issues relevant for V8.7 only.
Topic Prefixes
In V8.9, target system-specific adaptors were introduced. In this context, the topic prefix name of the following listeners was changed:
| Listener | Old Topic Prefix | New Topic Prefix |
|---|---|---|
SetAccountPasswordListener |
dxm.setPasswordRequest |
dxm.setPasswordRequest._default |
ProvisioningRequestListener |
dxm.request.provisionToTS |
dxm.request.provisionToTS._default |
ProvisioningRequest |
dxm.request.workflow. |
dxm.request.workflow. |
If you upgrade from an older version, for example, V8.5, these changes were not made in all cases automatically. So, you must make the canges manually with Web Admin.
Issues Relevant for Upgrade from V8.9
This section describes all issues relevant for V8.9 only.
Client-side SSL Support in Realtime Workflows
In V8.10, client-side SSL for realtime workflows using either an ADS Connector or LDAP Connector or RACF Connector is supported. Additional connection parameters for this feature need to be put into the XML workflow definition. There are no manual steps necessary.
New LDAP Controls LDAP_CTRL_NO_MODTIME_UPD (1.3.12.2.1107.1.3.2.12.9) and LDAP Conditioned Operation Control (1.3.12.2.1107.1.3.2.12.10)
In V8.10, the LDAP lock mechanism has been revised and improved. For better performance, two new LDAP controls are implemented by the DirX Directory server V8.9 (9.4.454 or higher). These controls are set at the LDAP root in the LDAP attribute supportedControl (DAP attribute name: SCON) if you installed DirX Directory from scratch. If you just do a DirX Directory upgrade installation, these LDAP controls are not set at the LDAP root.
DirX Identity checks at configuration time whether the current DirX Directory version supports these controls. If the LDAP controls are supported, then it updates the LDAP-root automatically if missing. But keep in mind that manual migration is necessary if you decide to upgrade the DirX installation later.