IBM 4.6 manual Best practices

Page 20

7 Best practices

The IBM Tivoli Identity Manager product can be set up and configured in many ways. The following are some suggested best practices to help guide you in setting up your environment.

Each agent modifies the LDAP schema by adding new attributes to support a new service. These attributes are created without indexes, and for services that service thousand of users, a large benefit can be achieved by adding indexes to attributes with many members.

Complicated provisioning policies can result in complicated directory and database queries with poor performance. Policies with small numbers of roles and services will perform best.

Dynamic roles affect people in a given scope, either one-level or subtree. When a person object within that scope is modified or added, that role must be re-evaluated. This is true for every dynamic role in the system. For instance, if there are three dynamic roles with subtree scope and a person object within that scope is updated, all three dynamic roles will be re-evaluated. For this reason, it is recommended that you limit the number of dynamic roles, either by number or by scope, that affect people that are modified frequently. It doesn’t matter if the dynamic role ends up enrolling the person or not, the evaluation itself is the performance-impacting overhead.

Limiting the scope (via placement within the organizational tree) and number of ACIs will increase performance by requiring fewer evaluations. When doing a person search via the APIs, be sure to limit the scope of your search to be as narrow as possible to avoid the system evaluating more ACIs than necessary.

When enabling WebSphere global security, do not enable Java 2 security unless it is required for your environment. Enabling WebSphere global security automatically enables Java 2 security unless it is explicitly disabled. Having Java 2 security enabled can cause a significant performance degradation to IBM Tivoli Identity Manager.

Page 18

IBM Tivoli Identity Manager Performance Tuning Guide

Image 20
Contents Issue Date Copyright Notice TrademarksTable of contents About this guide Who should use this guideVital tunings Initial tuningsIntroduction Resource allocationDisk space Memory2 CPU Java virtual machine JVM size Workload management WLM timeoutIBM WebSphere Application Server Message driven bean MDB request timeout Transaction timeoutSelect Container Services Select ORB Service Change WLM timeout to wlmtimeoutSetting the values IBM Tivoli Identity Manager application Recycle binReconciliations ThreadsLimiting attributes returned from the adapter Limiting the attributes evaluatedMaximum duration Select ReconciliationSet the Max Duration to maxduration IBM Tivoli Identity Manager adapters Microsoft Active DirectoryIdle thread timeout APARsBuffer pools Determining the values JCL location DescriptionLocks per user limit Active log duplexingReorg and Runstats Default value Recommended value Additional ZparmsMax connections IBM Ldap ServerCache sizes Changelog limits Row locking on SearchtsIndexing RunstatsBest practices Regular maintenance Other resources

4.6 specifications

IBM 4.6, known for its robust and versatile capabilities, represents a significant evolution in the realm of enterprise software solutions. This version is primarily associated with IBM's middleware offerings, notably IBM WebSphere Application Server. It is engineered to support the development, deployment, and management of web applications with a focus on scalability, reliability, and security.

One of the standout features of IBM 4.6 is its enhanced performance optimizations. The platform employs advanced caching strategies and efficient resource management to improve application response times and throughput. This means that businesses can handle heavier loads with fewer resources, making it an economical choice for enterprises of all sizes.

Another notable characteristic is its support for a wide range of programming models and standards, including Java EE. This allows developers to build applications using familiar tools and frameworks, accelerating development timelines and improving productivity. Additionally, IBM 4.6 offers robust integration capabilities with existing enterprise systems through its support for web services and messaging protocols.

IBM 4.6 also emphasizes security. It includes features such as role-based access control, data encryption, and comprehensive auditing capabilities. These measures help organizations safeguard sensitive information and comply with various regulatory requirements.

The compatibility with multiple platforms, including cloud environments, is another significant advantage. IBM 4.6 simplifies deployment across diverse infrastructures, enabling businesses to operate in hybrid environments seamlessly. This flexibility is particularly beneficial as organizations increasingly adopt cloud migration strategies.

Furthermore, IBM 4.6 is equipped with a range of monitoring and management tools. These tools provide insights into application performance and health, allowing IT teams to proactively identify and address potential issues before they impact users. This capability is critical in maintaining high availability and reliability of services.

In summary, IBM 4.6 stands out as a comprehensive solution for enterprise application development and management. Its key features, such as enhanced performance, support for industry standards, strong security measures, platform compatibility, and monitoring tools, make it a compelling choice for organizations seeking to modernize their IT infrastructure. Implementing IBM 4.6 can empower businesses to innovate faster while ensuring their applications remain secure and efficient in a rapidly evolving digital landscape.