Isim Database Schema Reference Guide PDF
Isim Database Schema Reference Guide PDF
Version 6.0
SC14-7395-02
IBM Security Identity Manager
Version 6.0
SC14-7395-02
Note
Before using this information and the product it supports, read the information in “Notices” on page 263.
Edition notice
Note: This edition applies to version 6.0 of IBM Security Identity Manager (product number 5724-C34) and to
all subsequent releases and modifications until otherwise indicated in new editions.
© Copyright IBM Corporation 2012, 2014.
US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract
with IBM Corp.
Table of contents
Table list . . . . . . . . . . . . . . vii SYNCHRONIZATION_LOCK table . . . . . 29
RESOURCES_SYNCHRONIZATIONS table. . . 29
About this publication . . . . . . . . xi CHANGELOG table . . . . . . . . . . 30
RECONCILIATION table . . . . . . . . . 30
Access to publications and terminology . . . . . xi
RECONCILIATION_INFO table . . . . . . 31
Accessibility . . . . . . . . . . . . . . xii
SERVICE_ACCOUNT_MAPPING table . . . . 31
Technical training . . . . . . . . . . . . xii
RECERTIFIER_DETAILS_INFO table . . . . . 31
Support information . . . . . . . . . . . xii
Role assignment attribute tables . . . . . . . 32
Statement of Good Security Practices . . . . . . xii
PERSON_ROLE_ASSIGNMENT . . . . . . 32
PERSON_ROLE_ASSIGNMENT_VALUES table 32
Chapter 1. Database tables reference . . 1 ROLE_ASSIGNMENT_ATTRIBUTES table . . . 33
Workflow tables . . . . . . . . . . . . . 1 Provisioning policy tables . . . . . . . . . 33
PROCESS table . . . . . . . . . . . . 1 POLICY_ANALYSIS . . . . . . . . . . 33
PROCESSLOG table . . . . . . . . . . . 4 POLICY_ANALYSIS_ERROR . . . . . . . 34
PROCESSDATA table . . . . . . . . . . 7 ACCT_CHANGE . . . . . . . . . . . 35
ACTIVITY table . . . . . . . . . . . . 8 ATTR_CHANGE . . . . . . . . . . . 36
WORKITEM table . . . . . . . . . . . 10 COMPLIANCE_ALERT table . . . . . . . 37
WI_PARTICIPANT table . . . . . . . . . 12 Recertification policy tables . . . . . . . . . 38
PASSWORD_TRANSACTION table . . . . . 12 RECERTIFICATIONLOG table . . . . . . . 38
PASSWORD_SYNCH table . . . . . . . . 13 USERRECERT_HISTORY table . . . . . . . 39
NEXTVALUE table . . . . . . . . . . . 13 USERRECERT_ROLE table . . . . . . . . 40
PENDING table . . . . . . . . . . . . 13 USERRECERT_ACCOUNT table . . . . . . 41
WORKFLOW_CALLBACK table . . . . . . 14 USERRECERT_GROUP table . . . . . . . 42
SYNCH_POINT table . . . . . . . . . . 14 Shared access tables . . . . . . . . . . . 42
LISTDATA table . . . . . . . . . . . . 15 ERCREDENTIALLEASE table . . . . . . . 42
ACTIVITY_LOCK table . . . . . . . . . 15 DB_REPLICATION_CONFIG table . . . . . 43
Services tables . . . . . . . . . . . . . 16 SA_BULK_LOAD table . . . . . . . . . 44
RESOURCE_PROVIDERS table . . . . . . . 16 SA_CREDPOOL_DESCRIPTION table . . . . 44
REMOTE_SERVICES_REQUESTS table . . . . 17 SA_CREDPOOL_GROUP table . . . . . . . 44
REMOTE_RESOURCES_RECONS table . . . . 18 SA_CREDPOOL_OWNER table. . . . . . . 45
REMOTE_RESOURCES_RECON_QUERIES table 19 SA_EVALUATION_BU table. . . . . . . . 45
MANUAL_SERVICE_RECON_ACCOUNTS table 19 SA_EVALUATION_BU_HIERARCHY table . . . 45
SCRIPT table . . . . . . . . . . . . . 20 SA_EVALUATION_CREDENTIAL table . . . . 46
Import and export tables . . . . . . . . . . 20 SA_EVAL_CRED_DESCRIPTION table . . . . 47
BULK_DATA_SERVICE table . . . . . . . 21 SA_EVALUATION_CREDENTIAL_POOL table 47
BULK_DATA_STORE table . . . . . . . . 21 SA_EVALUATION_SERVICE table. . . . . . 48
BULK_DATA_INDEX table . . . . . . . . 21 SA_EVALUATION_SERVICE_TAG table . . . . 48
MIGRATION_STATUS table . . . . . . . . 22 SA_GLOBAL_CONFIGURATION table . . . . 49
I18NMESSAGES table . . . . . . . . . . 22 SA_POLICY table . . . . . . . . . . . 50
Post office tables. . . . . . . . . . . . . 22 SA_POLICY_DESCRIPTION table . . . . . . 51
PO_TOPIC_TABLE . . . . . . . . . . . 22 SA_POLICY_ENTITLEMENT table . . . . . 51
PO_NOTIFICATION_TABLE . . . . . . . 23 SA_POLICY_ERURI table. . . . . . . . . 52
PO_NOTIFICATION_HTMLBODY_TABLE . . . 24 SA_POLICY_MEMBERSHIP table . . . . . . 52
Reports tables . . . . . . . . . . . . . 24 SA_VAULT_SERVICE table . . . . . . . . 53
ENTITY_COLUMN table . . . . . . . . . 24 SA_VAULT_SERVICE_ALIAS table . . . . . 53
Report table . . . . . . . . . . . . . 25 SYNCH_OBJECT_LOCK table . . . . . . . 53
COLUMN_REPORT table. . . . . . . . . 25 V_AUTHORIZED_CREDENTIALS view . . . . 54
AUTHORIZATION_OWNERS table . . . . . 26 V_AUTHORIZED_CREDENTIALPOOLS view . 54
ACI table . . . . . . . . . . . . . . 26 V_SA_EVALUATION_SERVICE view . . . . . 55
ACI_ROLEDNS table . . . . . . . . . . 26 V_SAPOLICY_ENTITLEMENT_DETAIL view . . 55
ACI_PRINCIPALS table . . . . . . . . . 27 Access catalog tables and views . . . . . . . 56
ACI_PERMISSION_ATTRIBUTERIGHT table . . 27 T_AccessCatalog table . . . . . . . . . . 56
ACI_PERMISSION_CLASSRIGHT table . . . . 27 T_AccessCatalogTags table . . . . . . . . 57
ENTITLEMENT table . . . . . . . . . . 28 T_BADGES table . . . . . . . . . . . 57
ENTITLEMENT_PROVISIONINGPARAMS table 28 T_Owner table . . . . . . . . . . . . 57
SYNCHRONIZATION_HISTORY table . . . . 29 T_GROUP table . . . . . . . . . . . . 58
iv IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
AUDIT_MGMT_TARGET table . . . . . . 120 Table columns used in the AUDIT_EVENT table 152
Values for columns in the AUDIT_EVENT table 120 Service policy enforcement . . . . . . . . . 153
Table columns used in the AUDIT_EVENT table 121 Values for columns in the AUDIT_EVENT table 153
| Table columns for person management in the Table columns used in the AUDIT_EVENT table 153
| AUDIT_MGMT_ACCESS_REQUEST table . . . 122 Reconciliation . . . . . . . . . . . . . 153
| Table columns for person management in the Values for columns in the AUDIT_EVENT table 154
| AUDIT_MGMT_OBLIGATION table. . . . . 122 Table columns used in the AUDIT_EVENT table 154
Delegate authority. . . . . . . . . . . . 122 Entitlement workflow management . . . . . . 154
AUDIT_MGMT_DELEGATE table . . . . . 122 Values for columns in the AUDIT_EVENT table 154
Values for columns in the AUDIT_EVENT table 122 Table columns used in the AUDIT_EVENT table 155
Table columns used in the AUDIT_EVENT table 123 Entity operation management . . . . . . . . 155
Policy management . . . . . . . . . . . 123 Values for columns in the AUDIT_EVENT table 155
Values for columns in the AUDIT_EVENT table 123 Table columns used in the AUDIT_EVENT table 156
Table columns used in the AUDIT_EVENT table 124 System configuration . . . . . . . . . . . 156
ACI management . . . . . . . . . . . . 127 Values for columns in the AUDIT_EVENT table 156
AUDIT_MGMT_TARGET table . . . . . . 127 Table columns used in the AUDIT_EVENT table 157
Values for columns in the AUDIT_EVENT table 127 Runtime events. . . . . . . . . . . . . 158
Table columns used in the AUDIT_EVENT table 128 Values for columns in the AUDIT_EVENT table 158
Access request management . . . . . . . . 128 Table columns used in the AUDIT_EVENT table 159
AUDIT_MGMT_ACCESS_REQUEST table . . . 129 Self-password change . . . . . . . . . . 159
AUDIT_MGMT_OBLIGATION table. . . . . 130 Values for columns in the AUDIT_EVENT table 159
AUDIT_MGMT_OBLIGATION_ATTRIB table 131 Table columns used in the AUDIT_EVENT table 159
AUDIT_MGMT_OBLIGATION_RESOURCE Migration . . . . . . . . . . . . . . 160
table . . . . . . . . . . . . . . . 131 Values for columns in the AUDIT_EVENT table 160
AUDIT_MGMT_MESSAGE table . . . . . . 132 Table columns used in the AUDIT_EVENT table 160
Values for columns in the AUDIT_EVENT table Credential management . . . . . . . . . . 161
that is used by access request management . . 132 Values for columns in the AUDIT_EVENT table 161
Table columns used in the AUDIT_EVENT table 133 Table columns used in the AUDIT_EVENT table 161
| Manual activity events . . . . . . . . . . 133 Credential Pool management . . . . . . . . 162
| Create manual activity event . . . . . . . 133 Values for columns in the AUDIT_EVENT table 162
| Escalate manual activity event. . . . . . . 138 Table columns used in the AUDIT_EVENT table 162
| Table columns used in the AUDIT_Event table 141 Credential Lease management . . . . . . . . 163
| Lifecycle rule events . . . . . . . . . . . 141 AUDIT_MGMT_LEASE table . . . . . . . 163
| Values for columns in the AUDIT_EVENT table 141 Values for columns in the AUDIT_EVENT table 163
| Table columns used in the AUDIT_EVENT table 142 Table columns used in the AUDIT_EVENT table 164
Account management . . . . . . . . . . 142 Shared Access Policy management . . . . . . 165
AUDIT_MGMT_PROVISIONING table . . . . 142 Values for columns in the AUDIT_EVENT table 165
Values for columns in the AUDIT_EVENT table 142 Table columns used in the AUDIT_EVENT table 165
Table columns used in the AUDIT_EVENT table 143
| Table columns for account management in the Chapter 4. IBM Cognos reporting
| AUDIT_MGMT_ACCESS_REQUEST table . . . 144 query subjects and query items . . . 167
| Table columns for account management in the
Schema mapping . . . . . . . . . . . . 167
| AUDIT_MGMT_OBLIGATION table. . . . . 144
Mapping the attributes and entities . . . . . . 167
Container management . . . . . . . . . . 145
Audit namespace for shared access module . . . 169
Values for columns in the AUDIT_EVENT table 145
Query subjects for Audit namespace . . . . . 169
Table columns used in the AUDIT_EVENT table 145
Query items for Audit namespace . . . . . 170
Organization role management . . . . . . . 146
Configuration namespace for shared access
AUDIT_MGMT_TARGET table . . . . . . 146
module . . . . . . . . . . . . . . . 174
Values for columns in the AUDIT_EVENT table 146
Query subjects for Configuration namespace 175
Table columns used in the AUDIT_EVENT table 147
Query items for Configuration namespace . . 176
ITIM group management . . . . . . . . . 148
Recertification Audit namespace . . . . . . 181
AUDIT_MGMT_TARGET table . . . . . . 148
Query subjects for Recertification Audit
Values for columns in the AUDIT_EVENT table 148
namespace . . . . . . . . . . . . . 181
Table columns used in the AUDIT_EVENT table 149
Query items for Recertification Audit
Service management . . . . . . . . . . . 149
namespace . . . . . . . . . . . . . 183
AUDIT_MGNT_TARGET table . . . . . . 150
Recertification Config namespace . . . . . . 191
Values for columns in the AUDIT_EVENT table 150
Query subjects for Recertification Config
Table columns used in the AUDIT_EVENT table 150
namespace . . . . . . . . . . . . . 191
Group management . . . . . . . . . . . 151
Query items for Recertification Config
AUDIT_MGMT_TARGET table . . . . . . 151
namespace . . . . . . . . . . . . . 191
Values for columns in the AUDIT_EVENT table 152
Account Audit namespace . . . . . . . . . 198
Table of contents v
Query subjects for Account Audit namespace 198 Separation of Duty Configuration namespace . . 234
Query items for Account Audit namespace . . 199 Query subjects for Separation of Duty
Account Configuration namespace . . . . . . 202 Configuration namespace . . . . . . . . 234
Query subjects for Account Configuration Query items for Separation of Duty
namespace . . . . . . . . . . . . . 202 Configuration namespace . . . . . . . . 235
Query items for Account Configuration User Audit namespace . . . . . . . . . . 236
namespace . . . . . . . . . . . . . 204 Query subjects for User Audit namespace . . . 236
Provisioning Policy Audit namespace. . . . . 211 Query items for User Audit namespace. . . . 237
Query subjects for Provisioning Policy Audit User Configuration namespace . . . . . . . 240
namespace . . . . . . . . . . . . . 211 Query subjects for User Configuration
Query items for Provisioning Policy Audit namespace . . . . . . . . . . . . . 240
namespace . . . . . . . . . . . . . 212 Query items for User Configuration namespace 241
Provisioning Policy Config namespace . . . . 214 Service Audit namespace . . . . . . . . . 248
Query subjects for Provisioning Policy Config Query subjects for Service Audit namespace 248
namespace . . . . . . . . . . . . . 214 Query items for Service Audit namespace . . 249
Query items for Provisioning Policy Config Access Audit namespace . . . . . . . . . 251
namespace . . . . . . . . . . . . . 215 Query subjects for Access Audit namespace . . 252
Role Audit namespace . . . . . . . . . . 218 Query items for Access Audit namespace . . . 253
Query subjects for Role Audit namespace . . . 218 Access Configuration namespace . . . . . . 257
Query items for Role Audit namespace. . . . 219 Query subjects for Access Configuration
Role Configuration namespace . . . . . . . 221 namespace . . . . . . . . . . . . . 257
Query subjects for Role Configuration Query items for Access Configuration
namespace . . . . . . . . . . . . . 221 namespace . . . . . . . . . . . . . 258
Query items for Role Configuration namespace 223
Separation of Duty Audit namespace . . . . . 228 Notices . . . . . . . . . . . . . . 263
Query subjects for Separation of Duty Audit
namespace . . . . . . . . . . . . . 228
Index . . . . . . . . . . . . . . . 267
Query items for Separation of Duty Audit
namespace . . . . . . . . . . . . . 229
vi IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table list
1. PROCESS table. . . . . . . . . . . . 1 57. USERRECERT_HISTORY table . . . . . . . . 40
2. PROCESSLOG table . . . . . . . . . . . 4 58. USERRECERT_ROLE table . . . . . . . . . 40
3. PROCESSDATA table . . . . . . . . . . . 7 59. USERRECERT_ACCOUNT table . . . . . . . . 41
4. ACTIVITY table . . . . . . . . . . . . 8 60. USERRECERT_GROUP table . . . . . . . . 42
5. WORKITEM table . . . . . . . . . . . 10 61. ERCREDENTIALLEASE table . . . . . . . . 42
6. WI_PARTICIPANT table . . . . . . . . . 12 62. DB_REPLICATION_CONFIG table . . . . . . . 43
7. PASSWORD_TRANSACTION table . . . . . . . 13 63. SA_BULK_LOAD table . . . . . . . . . . 44
8. PASSWORD_SYNCH table . . . . . . . . . 13 64. SA_CREDPOOL_DESCRIPTION table . . . . . . 44
9. NEXTVALUE table . . . . . . . . . . . 13 65. SA_CREDPOOL_GROUP table . . . . . . . . 44
10. PENDING table . . . . . . . . . . . . 14 66. SA_CREDPOOL_OWNER table . . . . . . . . 45
11. WORKFLOW_CALLBACK table . . . . . . . . 14 67. SA_EVALUATION_BU table . . . . . . . . 45
12. SYNCH_POINT table . . . . . . . . . . 14 68. SA_EVALUATION_BU_HIERARCHY table . . . . . 45
13. LISTDATA table . . . . . . . . . . . 15 69. SA_EVALUATION_CREDENTIAL table . . . . . 46
14. ACTIVITY_LOCK table . . . . . . . . . . 15 70. SA_EVAL_CRED_DESCRIPTION table . . . . . 47
15. RESOURCE_PROVIDERS table . . . . . . . . 16 71. SA_ EVALUATION_CREDENTIAL_POOL table 47
16. REMOTE_SERVICES_REQUESTS table . . . . . 17 72. SA_EVALUATION_SERVICE table . . . . . . . 48
17. REMOTE_RESOURCES_RECONS table . . . . . . 18 73. SA_EVALUATION_SERVICE_TAG table . . . . . 49
18. REMOTE_RESOURCES_RECON_QUERIES table 19 74. The SA_GLOBAL_CONFIGURATION table . . . . 49
19. MANUAL_SERVICE_RECON_ACCOUNTS table . . . . 19 75. SA_POLICY table . . . . . . . . . . . 50
20. SCRIPT table . . . . . . . . . . . . 20 76. SA_POLICY_DESCRIPTION table . . . . . . . 51
21. BULK_DATA_SERVICE table . . . . . . . . 21 77. SA_POLICY_ENTITLEMENT table . . . . . . . 51
22. BULK_DATA_STORE table . . . . . . . . . 21 78. SA_POLICY_ERURI table . . . . . . . . . 52
23. BULK_DATA_INDEX table . . . . . . . . . 21 79. SA_POLICY_MEMBERSHIP table . . . . . . . 52
24. MIGRATION_STATUS table . . . . . . . . 22 80. SA_VAULT_SERVICE table . . . . . . . . 53
25. I18NMESSAGES table . . . . . . . . . . 22 81. SA_VAULT_SERVICE_ALIAS table . . . . . . 53
26. PO_TOPIC_TABLE table . . . . . . . . . 23 82. SYNCH_OBJECT_LOCK table . . . . . . . . 53
27. PO_NOTIFICATION_TABLE table . . . . . . . 23 83. V_AUTHORIZED_CREDENTIALS view . . . . . 54
28. PO_NOTIFICATION_HTMLBODY_TABLE . . . . . 24 84. V_AUTHORIZED_CREDENTIALPOOLS view . . . . 54
29. ENTITY_COLUMN table . . . . . . . . . . 24 85. V_SA_EVALUATION_SERVICE view . . . . . . 55
30. Report table . . . . . . . . . . . . 25 86. V_SAPOLICY_ENTITLEMENT_DETAIL view . . . . 55
31. COLUMN_REPORT table . . . . . . . . . . 25 87. T_AccessCatalog table . . . . . . . . . 56
32. AUTHORIZATION_OWNERS table . . . . . . . 26 88. T_AccessCatalogTags table . . . . . . . 57
33. ACI table . . . . . . . . . . . . . 26 89. T_BADGES table . . . . . . . . . . . 57
34. ACI_ROLEDNS table . . . . . . . . . . 26 90. T_Owner table . . . . . . . . . . . . 57
35. ACI_PRINCIPALS table . . . . . . . . . 27 91. T_GROUP table . . . . . . . . . . . . 58
36. ACI_PERMISSION_ATTRIBUTERIGHT table . . . . 27 92. T_Role table . . . . . . . . . . . . 58
37. ACI_PERMISSION_CLASSRIGHT table . . . . . 27 93. T_ProvisioningPolicy table . . . . . . . 59
38. ENTITLEMENT table . . . . . . . . . 28 94. T_PolicyMembership table . . . . . . . . 59
39. ENTITLEMENT_PROVISIONINGPARAMS table 28 95. T_ServiceEntitlement table . . . . . . . 59
40. SYNCHRONIZATION_HISTORY table . . . . . . 29 96. T_AttributeEntitlement table . . . . . . 60
41. SYNCHRONIZATION_LOCK table . . . . . . . 29 97. T_ServiceTags table . . . . . . . . . . 61
42. RESOURCES_SYNCHRONIZATIONS table . . . . . 29 98. TMP_HostSEByPerson table . . . . . . . . 61
43. CHANGELOG table . . . . . . . . . . . 30 99. TMP_JSAEByPerson table . . . . . . . . 62
44. RECONCILIATION table . . . . . . . . 30 100. T_Global_Settings table . . . . . . . . 62
45. RECONCILIATION_INFO table . . . . . . . 31 101. T_GROUP_PROFILE table . . . . . . . . . 62
46. SERVICE_ACCOUNT_MAPPING table . . . . . . 31 102. T_Joindirective table . . . . . . . . . 63
47. RECERTIFIER_DETAILS_INFO table . . . . . 31 103. V_GroupCatalog view . . . . . . . . . 63
48. The PERSON_ROLE_ASSIGNMENT table . . . . . 32 104. V_RoleCatalog view . . . . . . . . . . 64
49. The PERSON_ROLE_ASSIGNMENT table . . . . . 32 105. V_ServiceCatalog view . . . . . . . . 65
50. The ROLE_ASSIGNMENT_ATTRIBUTES table 33 106. V_DYNAMIC_ENTITLEMENT view . . . . . . . 66
51. POLICY_ANALYSIS table . . . . . . . . . 33 107. V_ServiceEntitlementByRole view . . . . . 66
52. POLICY_ANALYSIS_ERROR table . . . . . . 34 108. V_GROUP_PROFILE view . . . . . . . . . 66
53. ACCT_CHANGE table . . . . . . . . . . 35 109. V_GC_INTERSECT view . . . . . . . . . 67
54. ATTR_CHANGE table . . . . . . . . . . 36 110. V_GC_CUSTOM view . . . . . . . . . . 68
55. COMPLIANCE_ALERT table . . . . . . . . 37 111. PENDING_APPROVAL view . . . . . . . . 69
56. RECERTIFICATIONLOG table . . . . . . . . 38 112. ROOTPROCESSVIEW view table . . . . . . . 70
viii IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
221. Values for columns in the AUDIT_EVENT table 143 258. Query subjects in the Provisioning Policy
222. Values for columns in the AUDIT_EVENT table 145 Audit namespace . . . . . . . . . . 211
223. AUDIT_MGMT_TARGET table . . . . . . . . 146 259. Query items in the Provisioning Policy
224. Values for columns in the AUDIT_EVENT table 146 Audit namespace . . . . . . . . . . 213
225. AUDIT_MGMT_TARGET table . . . . . . . . 148 260. Query subjects in the Provisioning Policy
226. Values for columns in the AUDIT_EVENT table 148 Config namespace . . . . . . . . . . 215
227. AUDIT_MGNT_TARGET table . . . . . . . . 150 261. Query items in the Provisioning Policy
228. Values for columns in the AUDIT_EVENT table 150 Config namespace . . . . . . . . . . 216
229. AUDIT_MGMT_TARGET table . . . . . . . . 151 262. Query subjects in the Role Audit namespace 218
230. Values for columns in the AUDIT_EVENT table 152 263. List of query items in the Role Audit
231. Values for columns in the AUDIT_EVENT table 153 namespace . . . . . . . . . . . . 219
232. Values for columns in the AUDIT_EVENT table 154 264. Query subjects in the Role Configuration
233. Values for columns in the AUDIT_EVENT table 154 namespace . . . . . . . . . . . . 221
234. Values for columns in the AUDIT_EVENT table 155 265. List of query items in the Role Configuration
235. Values for columns in the AUDIT_EVENT table 156 namespace . . . . . . . . . . . . 223
236. Value of the entity_name column table 157 266. Query subjects in the Separation of Duty
237. Values for columns in the AUDIT_EVENT table 158 Audit namespace . . . . . . . . . . 229
238. Values for columns in the AUDIT_EVENT table 159 267. Query items in the Separation of Duty Audit
239. Values for columns in the AUDIT_EVENT table 160 namespace . . . . . . . . . . . . 230
240. Values for columns in the AUDIT_EVENT table 161 268. Query subjects in the Separation of Duty
241. Values for columns in the AUDIT_EVENT table 162 Configuration namespace . . . . . . . 234
242. AUDIT_MGMT_LEASE table . . . . . . . . 163 269. Query items in the Separation of Duty
243. Values for columns in the AUDIT_EVENT table 163 Configuration namespace . . . . . . . 235
244. Values for columns in the AUDIT_EVENT table 165 270. Query subjects in the User Audit namespace 236
245. Mapping the attributes and entities . . . . 168 271. List of query items in the User Audit
246. Query subjects in the Audit namespace 169 namespace . . . . . . . . . . . . 237
247. Query items in the Audit namespace 170 272. Query subjects in the User Configuration
248. List of query subjects in the Configuration namespace . . . . . . . . . . . . 240
namespace . . . . . . . . . . . . 175 273. List of query items in the User Configuration
249. Query items in the Configuration namespace 176 namespace . . . . . . . . . . . . 241
250. Query subjects in the Recertification Audit 274. Query subjects in the Service Audit
namespace for the recertification model . . . 181 namespace . . . . . . . . . . . . 248
251. Query items in the Recertification Audit 275. List of query items in the Service Audit
namespace . . . . . . . . . . . . 183 namespace . . . . . . . . . . . . 249
252. Query subjects in the Recertification 276. Query subjects in the Access Audit
Config namespace . . . . . . . . . . 191 namespace . . . . . . . . . . . . 252
253. List of query items in the Recertification 277. List of query items in the Access Audit
Config namespace . . . . . . . . . . 192 namespace . . . . . . . . . . . . 253
254. Query subjects in the Account Audit 278. Query subjects in the Access Configuration
namespace . . . . . . . . . . . . 198 namespace . . . . . . . . . . . . 257
255. Query items in the Account Audit namespace 199 279. List of query items in the Access
256. Query subjects in the Account Configuration Configuration namespace . . . . . . . 258
namespace . . . . . . . . . . . . 202
257. Query items in the Account Configuration
namespace . . . . . . . . . . . . 204
Table list ix
x IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
About this publication
The IBM® Security Identity Manager Database and Schema Reference Guide describes
data structures that IBM Security Identity Manager uses to perform various tasks.
The following documents are available in the IBM Security Identity Manager
library:
v IBM Security Identity Manager Quick Start Guide, CF3L2ML
v IBM Security Identity Manager Product Overview Guide, GC14-7692-02
v IBM Security Identity Manager Scenarios Guide, SC14-7693-02
v IBM Security Identity Manager Planning Guide, GC14-7694-02
v IBM Security Identity Manager Installation Guide, GC14-7695-02
v IBM Security Identity Manager Configuration Guide, SC14-7696-02
v IBM Security Identity Manager Security Guide, SC14-7699-02
v IBM Security Identity Manager Administration Guide, SC14-7701-02
v IBM Security Identity Manager Troubleshooting Guide, GC14-7702-02
v IBM Security Identity Manager Error Message Reference, GC14-7393-02
v IBM Security Identity Manager Reference Guide, SC14-7394-02
v IBM Security Identity Manager Database and Directory Server Schema Reference,
SC14-7395-02
v IBM Security Identity Manager Glossary, SC14-7397-01
Online publications
IBM posts product publications when the product is released and when the
publications are updated at the following locations:
IBM Security Identity Manager library
The product documentation site displays the welcome page and navigation
for the library.
http://www.ibm.com/support/knowledgecenter/SSRMWJ/welcome
IBM Security Systems Documentation Central
IBM Security Systems Documentation Central provides an alphabetical list
of all IBM Security Systems product libraries and links to the online
documentation for specific versions of each product.
IBM Publications Center
The IBM Publications Center sitehttp://www.ibm.com/e-business/
linkweb/publications/servlet/pbi.wss offers customized search functions
to help you find all the IBM publications you need.
The IBM Terminology website consolidates terminology for product libraries in one
location. You can access the Terminology website at http://www.ibm.com/
software/globalization/terminology.
Accessibility
Accessibility features help users with a physical disability, such as restricted
mobility or limited vision, to use software products successfully. With this product,
you can use assistive technologies to hear and navigate the interface. You can also
use the keyboard instead of the mouse to operate all features of the graphical user
interface.
For additional information, see the topic "Accessibility features for IBM Security
Identity Manager" in the IBM Security Identity Manager Overview Guide.
Technical training
For technical training information, see the following IBM Education website at
http://www.ibm.com/software/tivoli/education.
Support information
If you have a problem with your IBM software, you want to resolve it quickly. IBM
provides the following ways for you to obtain the support you need:
Online
Go to the IBM Software Support site at http://www.ibm.com/software/
support/probsub.html and follow the instructions.
IBM Support Assistant
The IBM Support Assistant (ISA) is a free local software serviceability
workbench that helps you resolve questions and problems with IBM
software products. The ISA provides quick access to support-related
information and serviceability tools for problem determination. To install
the ISA software, see the IBM Security Identity Manager Installation Guide.
Also see: http://www.ibm.com/software/support/isa.
Troubleshooting Guide
For more information about resolving problems, see the IBM Security
Identity Manager Troubleshooting Guide.
xii IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
Workflow tables
IBM Security Identity Manager stores workflow-specific information in the
database tables described in this section.
The workflow engine accesses these tables to retrieve information that is used
during the workflow process.
PROCESS table
The PROCESS table stores all the pending, running, and historical requests submitted
to the IBM Security Identity Manager workflow. Each request is represented as a
process.
Table 1. PROCESS table
Column Name Description Data type
ROOT_PROCESS_ID* The root process ID number. Numeric
ID* Process ID number. Primary key. Numeric
PARENT_ID Parent process ID number, if any. Numeric
PARENT_ACTIVITY_ID Parent activity ID number. Numeric
NAME Process name. Character (100)
2 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 1. PROCESS table (continued)
Column Name Description Data type
REQUESTER DN of the requester. Character (2000)
REQUESTER_NAME Requesters name. Character (100)
DESCRIPTION Description of the process. Character (300)
PRIORITY Priority of the process. Numeric
SCHEDULED Scheduled start time for the process. Character (50)
STARTED Time that the process is started. Character (50)
COMPLETED Time that the process is completed. Character (50)
LASTMODIFIED Time that the process was last modified. Character (50)
SUBMITTED Time that the process was submitted. Character (50)
STATE Current state of the process. Values include: Character (1)
v Running (R)
v Not Started (I)
v Terminated (T)
v Aborted (A)
v Suspended (S)
v Completed (C)
v Bypassed (B)
NOTIFY Specifies who is notified when a process is completed. You have the following Numeric
choices:
v NOTIFY_NONE (0)
v NOTIFY_REQUESTOR (1)
v NOTIFY_REQUESTEDFOR (2)
v NOTIFY_BOTH (3)
REQUESTEE DN of the requestee. Character (2000)
REQUESTEE_NAME Name of the requestee. Character (100)
SUBJECT The subject of the process. Character (2000)
SUBJECT_PROFILE The data service object profile name that indicates the type of the subject. Character (100)
SUBJECT_SERVICE If the subject is an account, this field contains the name of the service associated with Character (100)
the account.
SUBJECT_ACCESS_ID1 DN of the requested access. Character (2000)
1
SUBJECT_ACCESS_NAME Name of the requested access. Character (100)
COMMENTS Comments for the process. Character (200)
RESULT_SUMMARY Process result summary code. Values include: Character (2)
v Approved (AA)
v Rejected (AR)
v Submitted (RS)
v Success (SS)
v Timeout (ST)
v Failed (SF)
v Warning (SW)
v Pending (PE)
v Participant Resolution Failed (PF)
v Escalated (ES)
v Skipped (SK)
RESULT_DETAIL Detailed information about the process result. Long Character
SHORT_DETAIL1 Short detailed information about the process result. Character (4000)
TENANT
DN of the requesters tenant. Character (2000)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
PROCESSLOG table
The PROCESSLOG table maintains a record of audit events associated with a process.
Table 2. PROCESSLOG table
Column Name Description Data type
*
ID Log ID number. Primary key. Numeric
PROCESS_ID ID of the process associated with the log. Reference Numeric
PROCESS (ID).
ACTIVITY_ID ID of the activity associated with the log. Numeric
CREATED Time that the log was created. Character (50)
*
EVENTTYPE Log event type code. Values include: Character (2)
4 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 2. PROCESSLOG table (continued)
Column Name Description Data type
OLD_PARTICIPANT_TYPE Old participant type for the assignment change event. Character (2)
Values include:
User (U)
Person (P)
Role (R)
Supervisor (SU)
Sponsor (SP)
System (WS)
Requestor (RR)
Requestee (RE)
User (U)
Person (P)
Role (R)
Supervisor (SU)
Sponsor (SP)
System (WS)
Requestor (RR)
Requestee (RE)
6 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 2. PROCESSLOG table (continued)
Column Name Description Data type
OLD_STATE Old state for a state change event. Values include: Character (1)
Running (R)
Terminated (T)
Aborted (A)
Suspended (S)
Completed (C)
Bypassed (B)
NEW_STATE New state for a state change event. Values include: Character (1)
Running (R)
Terminated (T)
Aborted (A)
Suspended (S)
Completed (C)
Bypassed (B)
DATA_ID Data ID for a data change event. Character (100)
NEW_DATA Data value for a data change event. Long Character
1
SMALL_NEW_DATA Small data value a data change event. Character (4000)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
PROCESSDATA table
The PROCESSDATA table stores the runtime process data of a process. After the
process is completed, the record is removed.
Table 3. PROCESSDATA table
Column Name Description Data type
*
PROCESS_ID Process ID associated with the data. Primary Numeric
key. Reference PROCESS (ID).
DEF_ID* Definition ID for the corresponding relevant Character (100)
data in the process definition. Primary key.
NAME Data name. Maximum of 100 characters. Character (100)
REQUESTEE
SUBJECT
BOTH
DESCRIPTION Data description. Character (300)
TYPE Data type. Character (500)
COLLECTION_TYPE Element data type for sets of data. Character (500)
VALUE Data value. Long Character
SMALL_VALUE Small data value. Character (4000)
VALUE_LAST_MODIFIED The time in milliseconds that the last time Numeric
this process data value was modified.
*
Indicates the column is required and not null.
ACTIVITY table
The ACTIVITY table contains records of each workflow process implementation
flow.
Table 4. ACTIVITY table
Column Name Description Data type
*
ID Activity ID number. Primary key. Numeric
*
PROCESS_ID Activity process ID number. Reference Numeric
PROCESS (ID).
DEFINITION_ID* Activity definition identifier. Character (100)
ACTIVITY_INDEX Activity index (only if the activity is Numeric
inside of a loop).
LOOP_COUNT Specific to loop activity. Numeric
8 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 4. ACTIVITY table (continued)
Column Name Description Data type
TYPE Activity type. Values include: Character (1)
Application (A)
Subprocess (S)
Loop (L)
Route (R)
Manual (M)
Operation (O)
SUBTYPE Activity subtype. Values for manual Character (2)
activity type include:
Approval/Reject (AP)
Running (R)
Terminated (T)
Canceled (A)
Suspended (S)
Completed (C)
Bypassed (B)
Approved (AA)
Rejected (AR)
Submitted (RS)
Success (SS)
Timeout (ST)
Failed (SF)
Warning (SW)
Pending (PE)
Escalated (ES)
Skipped (SK)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
WORKITEM table
The WORKITEM table maintains a record of work items associated with manual
workflow activities for running processes. The records associated with the process
are removed after the process is completed.
Table 5. WORKITEM table
Column Name Description Data type
*
ID Unique work item ID. Primary key. Numeric
*
PROCESS_ID Process ID associated with this work Numeric
item. References PROCESS (ID).
ACTIVITY_ID* Activity ID associated with this work Numeric
item. References ACTIVITY (ID).
CREATED Date the work item was created. Character (50)
INPUT_PARAMETERS Parameters that were passed into the Long Character
workflow for this work item
(serialized form of a list).
10 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 5. WORKITEM table (continued)
Column Name Description Data type
DUE_DATE Due date for the work item. After this Numeric
time, the work item is escalated, or if
it already escalated, the work item is
canceled.
LOCK_OWNER LDAP DN for the participant that Character (512)
currently has this work item locked
(might be null if no one owns the
lock).
DESCRIPTION Activity ID associated with the data, if Character (4000)
any.
PROCESS_DEFINITION_ID* The process definition ID for the Character (512)
process that created this work item.
ACTIVITY_DEFINITION_ID* The activity definition ID for the Character (100)
activity that this work item relates to.
ACTIVITY_TYPE The type of the activity that this work Character (1)
item relates to. Values include:
Application (A)
Subprocess (S)
Loop (L)
Route (R)
Manual (M)
Operation (O)
ACTIVITY_SUBTYPE The activity subtype that corresponds Character (2)
to this work item. Values for manual
activity type include:
Approval (AP)
*
Indicates the column is required and not null.
WI_PARTICIPANT table
The WI_PARTICIPANT table stores information about the workflow participants for a
given work item. There can be more than one participant for each work item. This
data is removed from the table when the work item completes.
Table 6. WI_PARTICIPANT table
Header Header Header
*
ID Participant unique ID. Primary Key Numeric
*
WORKITEM_ID Work item ID that is associated with Numeric
the data. References WORKITEM (ID).
PARTICIPANT_TYPE* Work item participant type. Values Character (2)
include:
User (U)
Person (P)
Role (R)
Supervisor (SU)
Sponsor (SP)
System (WS)
Requestor (RR)
Requestee (RE)
*
Indicates the column is required and not null.
PASSWORD_TRANSACTION table
The PASSWORD_TRANSACTION table is used during secure password delivery to store
information. After the password is retrieved, the record is deleted from the table. If
the password is never picked up, this record is deleted upon password pickup
expiration.
12 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 7. PASSWORD_TRANSACTION table
Column Name Description Data type
*
TRANSACTION_ID Transaction ID used to retrieve the Numeric
password. Primary key.
ACCOUNT_DN Account DN for the password. Character (2000)
CREATION_DATE Password creation date. Character (50)
*
PROCESS_ID ID of the workflow that started the Numeric
password transaction process.
ACTIVITY_ID* ID of the activity that started the Numeric
password transaction process.
PASSWORD Encrypted password value. Character (500)
*
Indicates the column is required and not null.
PASSWORD_SYNCH table
The PASSWORD_SYNCH1 table stores the account password synchronization
information.
Table 8. PASSWORD_SYNCH table
Column Name Description Data type
*
ACTIVITY_ID The activity ID. Primary key. Numeric
ACCOUNT_DN The DN of the account. Character (512)
TIME_REQUESTED Time that the password synchronization is requested. Character (50)
PASSWORD The password of the account. Character (500)
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.0.
NEXTVALUE table
The NEXTVALUE table is used to create unique IDs for workflow tables. The
NEXTVALUE table is not directly used in a workflow.
PENDING table
The PENDING table stores all the provisioning requests that are being processed but
not yet completed.
*
Indicates the column is required and not null.
WORKFLOW_CALLBACK table
The WORKFLOW_CALLBACK table is used by the workflow engine to allow for callbacks
to be notified when a process completed. A callback is a JMS message object
(MESSAGE_OBJECT) that is put into the workflow JMS queues to be run after the
PROCESS_ID completes. This callback allows for control of the workflow to be given
back to the original Orchestrator of the process. After a workflow process
completes, all callbacks are notified and cleared from this table.
Table 11. WORKFLOW_CALLBACK table
Column Name Description Data type
*
ID Identifier for a callback. Primary key. Numeric
*
PROCESS_ID Process identifier. References PROCESS Numeric
(ID)
MESSAGE_OBJECT* The callback message object. Character (2000)
EVENT_TRIGGER Workflow state that this callback is Character (1)
queued. Values include:
Running (R)
Terminated (T)
Aborted (A)
Suspended (S)
Completed (C)
Bypassed (B)
*
Indicates the column is required and not null.
SYNCH_POINT table
The SYNCH_POINT table store data used for internal state tracking of workflows and
joins that need to be synchronized. Do not modify this table outside of the IBM
Security Identity Manager workflow engine.
Table 12. SYNCH_POINT table
Column Name Description Data type
*
PROCESS_ID Process ID this sync point is Numeric
associated with. Primary key.
14 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 12. SYNCH_POINT table (continued)
Column Name Description Data type
*
DEFINITION_ID The activity definition ID this sync Character (100)
point is associated with. Primary key.
ACTIVITY_INDEX* The activity index this sync point is Numeric
associated with. Primary key.
WAIT_LOCK* The wait lock this sync point is Numeric
associated with. Primary key.
JOIN_ENABLED* Indicates whether this sync point was Boolean
activated by at least one positive path
through the associated workflow.
*
Indicates the column is required and not null.
LISTDATA table
The LISTDATA table optimizes memory utilization and improves performance for
IBM Security Identity Manager. This table stores large data lists. Instead of loading
all data into memory, data is stored in this table and referenced by index in
memory.
Table 13. LISTDATA table
Column Name Description Data type
*
DATA_ID Unique identifier for the data. Numeric
Primary key.
INDEX_ID* List element index. Primary key. Numeric
*
VALUE The serialized list element. Long Character
*
Indicates the column is required and not null.
ACTIVITY_LOCK table
The activity lock count contention point can affect the performance of certain
large-scale workflows. To avoid this issue, the information in the LOCK_COUNT
column of the ACTIVITY table is broken into multiple rows of the ACTIVITY_LOCK
table. The ACTIVITY_LOCK1 table tracks the completion of an activity. The server and
thread identifiers control which row must be incremented; only one thread
attempts to update a row in this new table at any time.
Table 14. ACTIVITY_LOCK table
Column Name Description Data type
*
PROCESS_ID Unique ID of a process. Primary key. Numeric
References PROCESS (ID).
ACTIVITY_ID* Unique ID of an activity. Primary Numeric
key. References ACTIVITY (ID).
SERVER* String identifier of the server that Character (255)
makes the update
(cell/node/server). Primary key.
THREAD_ID* Identifier of the thread (within the Numeric
server) making the update. Primary
key.
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.0.
Services tables
IBM Security Identity Manager creates and uses these database tables to store
information related to managed resources.
RESOURCE_PROVIDERS table
The RESOURCE_PROVIDERS table stores cross-references between resource provider
IDs and stores reconciliation data for each resource provider.
Table 15. RESOURCE_PROVIDERS table
Column Name Description Data type
*
PROVIDER_ID Unique ID for each resource provider. Primary key. Character (20)
16 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 15. RESOURCE_PROVIDERS table (continued)
Column Name Description Data type
RESOURCE_STATUS Resource status (0 = ok, 1 = failed, 2 = failed service that is Numeric
being tested).
RESTART_TIME Timestamp of the last reconciliation started. Date
®
SERVER The ID of the WebSphere Application Server that initiated the Character (255)
recon. It is used in cluster mode during WebSphere Application
Server restart to decide whether a recon lock flag was left
enabled due to server failure. In that case, clean up locks and
set the recon state to failed or aborted.
RESOURCE_TEST_STATUS1 Resource status, including updates that resulted from Numeric
‘Test’(ping) request (0 = OK, 1 = failed, 2 = failed service that is
being tested).
LAST_TEST_STATUS_TIME1 Timestamp of last ping of the resource (to detect failed Date
resources).
FIRST_RESOURCE_FAIL_TIME2 Timestamp of the time the service was placed in failed state. Timestamp
2
LAST_ERROR The most recent error message returned when attempting to Character (2000)
send a request to the service.
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
2
Indicates the column or the value is added in IBM Security Identity Manager
release 6.0.
REMOTE_SERVICES_REQUESTS table
The REMOTE_SERVICES_REQUESTS table stores asynchronous requests or requests that
are made while reconciliation is in progress. It also stores requests issued while a
resource is in a failed state.
Table 16. REMOTE_SERVICES_REQUESTS table
Column Name Description Data type
PROVIDER_ID Unique ID for each resource provider. References RESOURCE, Character (20)
PROVIDERS, and(PROVIDER_ID).
REQUEST_ID* ID of the request made. Primary key. Character (20)
TYPE Request type: Numeric
0 – generic requests
1 – asynchronous requests
2 – intra-reconciliation requests
0 – No operation
1 – Add request
2 – Modify request
3 – Delete request
4 – Suspend request
5 – Restore request
*
Indicates the column is required and not null.
REMOTE_RESOURCES_RECONS table
The REMOTE_RESOURCES_RECONS table stores the reconciliation units associated with a
resource provider.
Table 17. REMOTE_RESOURCES_RECONS table
Column Name Description Data type
*
PROVIDER_ID Unique ID for each resource provider. References Character (20)
RESOURCE_PROVIDERS (PROVIDER_ID). Primary key.
RECON_ID* Unique ID for each reconciliation unit. Primary key. Numeric
DAY_OF_MONTH Day of month the reconciliation is scheduled to run. Numeric
MONTH_NUM Month the reconciliation is scheduled to run. Numeric
DAY_OF_WEEK Day of week the reconciliation is scheduled to run. Numeric
HOUR_NUM Hour of day the reconciliation is scheduled to run. Numeric
MINUTE_NUM Minute of hour the reconciliation is scheduled to run. Numeric
MAX_DURATION This value overrides the MAX_RECON_DURATION value in the Numeric
table.
18 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 17. REMOTE_RESOURCES_RECONS table (continued)
Column Name Description Data type
LOCK_SERVICE Indicates whether to lock the service during a Numeric
reconciliation. Values include:
Default: 1
1
RECON_NAME Name of the reconciliation. Character (300)
1
DESCRIPTION Description of the reconciliation. Character (300)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
REMOTE_RESOURCES_RECON_QUERIES table
The REMOTE_RESOURCES_RECON_QUERIES table stores reconciliation queries associated
with a reconciliation unit.
Table 18. REMOTE_RESOURCES_RECON_QUERIES table
Column Name Description Data type
*
PROVIDER_ID Unique ID for each resource provider. References Character (20)
REMOTE_RESOURCES_RECONS (PROVIDER_ID). Primary key.
RECON_ID* Unique ID for each reconciliation unit. References Numeric
REMOTE_RESOURCES_RECONS (RECON_ID). Primary key.
QUERY_ID* Unique ID for each reconciliation query. Primary key. Numeric
RECON_FILTER Filter associated with the reconciliation query. Character (4000)
RECON_BASE Search base associated with the reconciliation query. Character (4000)
MAX_DURATION Not used. Numeric
MAX_ENTRIES Not used. Numeric
ATTRIBUTES Attributes returned during a reconciliation request. Long Character
1
SUPPORT_DATA_ONLY Indication whether reconciliation only retrieves supporting data. Numeric
(0/null = normal, 1 = supporting data only recon).
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
MANUAL_SERVICE_RECON_ACCOUNTS table
The MANUAL_SERVICE_RECON_ACCOUNTS1 table stores account information for manual
service. The information verifies whether the account data was modified in
reconciliation.
Table 19. MANUAL_SERVICE_RECON_ACCOUNTS table
Column Name Description Data type
*
GLOBAL_ID Unique ID of the manual service reconciliation. Primary Character (255)
key.
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
SCRIPT table
The SCRIPT1 table stores predefined script rule parameters. Each row represents one
parameter of a rule. A rule might consist of several rows that represent multiple
attributes from the person schema to be concatenated. For example, the predefined
rule, firstinitial+lastname, is a concatenation of two person attributes: givenname
and sn.
Table 20. SCRIPT table
Column Name Description Data type
*
TYPE A character that represents the type of policy to which this rule is Character (1)
applied. Primary key. Values include:
A – Adoption rule
I – Identity policy
*
ID Unique identifier (key) of the rule. Primary key. Character (50)
*
JOIN_ORDER A number that represents the order for the attribute in Numeric
concatenation. Primary key.
PERSON_ATTRIBUTE* The person attribute where the value is obtained and concatenated; Character (100)
for example, givenname.
FIRST_LAST A number that is used to get the substring of the person attribute. Numeric
Values include:
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
20 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
BULK_DATA_SERVICE table
The BULK_DATA_SERVICE table holds information of the export.
Table 21. BULK_DATA_SERVICE table
Column Name Description Data type
*
ID Unique ID of the export. Primary Numeric
key.
STARTTIME Start time of the export. Date
ENDTIME End time of the export. Date
MIMETYPE Content type of export JAR file. Character (50)
NAME Name of the export JAR file. Character (50)
DATA Export JAR file stored in form of Binary
bytes.
FILENAME1 Name of export JAR file. Character (255)
Filesize Size of export JAR file. Numeric
1
DESCNAME Description of the export. Character (255)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
BULK_DATA_STORE table
The BULK_DATA_STORE table stores the XML content of export.
Table 22. BULK_DATA_STORE table
Column Name Description Data type
*
ID Unique ID for XML content of the Numeric
export. Primary key.
SERVICEID* Unique ID of the export. References Numeric
BULK_DATA_SERVICE (ID).
XML Content of the export XML file. Binary
*
Indicates the column is required and not null.
BULK_DATA_INDEX table
The BULK_DATA_INDEX table stores index for the data object and export XML
content.
Table 23. BULK_DATA_INDEX table
Column Name Description Data type
*
ID Unique ID of the index for export Numeric
data lookup. Primary key.
STOREID* ID of the export XML content. Numeric
References BULK_DATA_STORE (ID).
DATAOBJECTID ID of the export data object. Character (10)
*
Indicates the column is required and not null.
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
I18NMESSAGES table
The I18NMESSAGES table maintains labels in the database that allows any resource
bundles to be stored.
Table 25. I18NMESSAGES table
Column Name Description Data type
PROFILE Profile for which this label was Character (256)
inserted into the database.
NAME* Contains the full name of the Character (256)
resource bundle, For example, the
base name, country codes, and
variants.
MESSAGEKEY* Key that can retrieve the label. Character (256)
MESSAGE The label that needs to be shown to Character (2000)
the user.
*
Indicates the column is required and not null.
PO_TOPIC_TABLE
The PO_TOPIC_TABLE table stores information about the topics that are used by the
post office component. There is a row in the table for each group e-mail topic that
is actively in use for the system. PO_TOPIC_TABLE tracks the unique system
notification email topics seen during a Post Office interval. Intercepted emails are
later aggregated and forwarded on a per-topic basis.
22 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 26. PO_TOPIC_TABLE table
Column Name Description Data type
*
TENANT The name of the tenant for which this Character (256)
topic applies. Primary key.
TOPIC* The string that represents the group Character (256)
e-mail topicas defined in the
notification section of the workflow
definition for each manual activity.
Primary key.
SERVER The server that is currently Character (255)
processing the topic
CHECKPOINT_TIME A value that represents when the Numeric
current processing of this topic was
started, which is the number of
milliseconds since January 1, 1970,
00:00:00 Greenwich mean time.
TOPIC_ID* A unique ID that identifies this topic. Numeric
This column keys into the
PO_NOTIFICATION_TABLE to determine
which messages match the topic.
*
Indicates the column is required and not null.
PO_NOTIFICATION_TABLE
The PO_NOTIFICATION_TABLE table stores information about the original notification
objects that the post office component aggregates. All information about the
original notification is stored in this table except for the XHTML body.
Table 27. PO_NOTIFICATION_TABLE table
Column Name Description Data type
*
NOTIFICATION_ID A unique ID that identifies this Numeric
particular notification. Primary key.
TOPIC_ID* A reference to the topic ID as stored Numeric
in the PO_TOPIC_TABLE for this
notification. References
PO_TOPIC_TABLE(TOPIC_ID).
SUBJECT The subject of the original Character (2000)
notification message.
TEXTBODY The text body of the original Long Character
notification message.
RECEIVE_TIME* The time the notification was Numeric
intercepted by post office, which is
the number of milliseconds since
January 1, 1970, 00:00:00 Greenwich
mean time.
RECIPIENT_EADDR* The email address of the recipient of Character (320)
the original notification message.
RECIPIENT_LOCALE The locale of the recipient of the Character (256)
original notification message.
*
Indicates the column is required and not null.
*
Indicates the column is required and not null.
Reports tables
The tables in this section are used for reporting.
ENTITY_COLUMN table
During the configuration of the IBM Security Access Manager reporting interface
schema, the system administrator selects the entities and a set of attributes. The
reporting Interface stores the selected pairs of entities and attributes in this table.
The Report Designer can later choose to report on any of the attributes in the
ENTITY_COLUMN table.
Table 29. ENTITY_COLUMN table
Column Name Description Data type
*
ENTITY_NAME Name of the entity (for example Person). Primary key. Character (255)
*
COLUMN_NAME Column name as present in the entity table represented Character (255)
by the preceding entity name.
ATTRIBUTE_NAME* Name of the attribute as returned by the Tivoli® Identity Character (255)
Manager server. Primary key.
MULTI_VALUED Indicates whether the attribute is multi-valued or not. Character (1)
Value is Y/N. Maximum of 1 character.
IMPLICITLY_MAPPED Indicates whether the data synchronizer implicitly maps Character (1)
a particular attribute. If the attribute is present in the
object filter of some ACI, it is implicitly mapped.
Maximum of 1 character.
AVAILABLE_FOR_REPORTING Indicates whether the column is available for reporting. Character (255)
The value for this column represents different states in
which the corresponding data can be, such as newly
mapped or available.
TABLE_NAME Name of the table created for an entity. Character (255)
Note: V_ENTITY is a view. It is not a table.
24 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
*
Indicates the column is required and not null.
Report table
This table stores details of the reports designed and generated by IBM Security
Identity Manager users.
Table 30. Report table
Column Name Description Data type
*
ID Unique ID for the table. Primary key. Numeric
*
TITLE Report title given to the report. Character (255)
*
TYPE Indicates whether the report was designed with IBM Security Character (255)
Identity Manager or RI.
AUTHOR Author of the report (designer). Character (255)
REPORT_SIZE The size of the report template stored in the REPORT_DATA Numeric
column of this table.
REPORT_DATA The report (custom/third party) template is stored here. The Binary
templates must be shared by the different IBM Security
Identity Manager installations in a clustered environment and
so they are stored here.
STYLESHEET Name of the style sheet for the report. Character (255)
*
REPORTSUBTYPE Identifies if this report is a user-defined report or an Character (1)
out-of-box report.
REPORTCATEGORY* Identifies which category the run is to be listed on the Run Character (255)
Reports page.
EDITABLE Indicates whether this report can be edited or not. The value Character (1)
is N for reconciliation statistics, Audit Events, Recertification
History, Pending Recertification, Recertification Policies, and
access control information reports.
*
Indicates the column is required and not null.
COLUMN_REPORT table
This table stores the relationship between the ENTITY_COLUMN table and the REPORT
table. This relationship is required. It determines the reports that are affected if the
system administrator changes the IBM Security Identity Manager reporting
interface schema (deleting attributes available for reporting).
Table 31. COLUMN_REPORT table
Column Name Description Data type
*
COLUMN_NAME Name of the entity used in the report. Character (255)
Primary key.
ENTITY_NAME* Name of the column used in the report. Character (255)
Primary key.
REPORT_ID* ID of a report. Primary key. Numeric
*
Indicates the column is required and not null.
*
Indicates the column is required and not null.
ACI table
This table stores information of the access control information items in IBM
Security Identity Manager.
Table 33. ACI table
Column Name Description Data type
*
DN The DN of the organizational container where the Character (255)
ACI is defined. Primary key.
NAME* Name of the ACI. Primary key. Character (255)
SCOPE Scope of the ACI, for example, single or subtree. Character (255)
*
TARGET Target of this ACI. For a person ACI, the target is Character (255)
inetOrgPerson. Primary key.
PARENT DN of the container that is the parent of this Character (255)
container (where the ACI is defined).
CATEGORY DN of the container that is the parent of this Character (255)
container (where the ACI is defined).
OBJECTFILTER LDAP Filter that is part of this ACI. Character (1023)
*
Indicates the column is required and not null.
ACI_ROLEDNS table
This table stores information about the IBM Security Identity Manager access
control information (ACI) and the ITIM groups that are part of them. No primary
key constraints are defined for this table.
Table 34. ACI_ROLEDNS table
Column Name Description Data type
*
DN DN of the container where the ACI is defined. Character (255)
*
NAME Name of the ACI. Character (255)
*
TARGET Target of this ACI. Character (255)
*
ROLEDN DN of the ITIM group that is part of this ACI. Character (255)
26 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
*
Indicates the column is required and not null.
ACI_PRINCIPALS table
This table stores principals for access control information (ACI). No primary key
constraints are defined for this table.
Table 35. ACI_PRINCIPALS table
Column Name Description Data type
*
DN DN of the container where the ACI is defined. Character (255)
*
NAME Name of the ACI. Character (255)
*
TARGET Target of this ACI. Character (255)
*
PRINCIPALNAME Name of the principal that is part of this ACI. Possible Character (255)
values are self, supervisor, sponsor, and administrator.
*
Indicates the column is required and not null.
ACI_PERMISSION_ATTRIBUTERIGHT table
This table stores attribute permissions for ACIs. No primary key constraints are
defined for this table.
Table 36. ACI_PERMISSION_ATTRIBUTERIGHT table
Header Header Header
*
DN DN of the container where the ACI is defined. Character (255)
*
NAME Name of the ACI. Character (255)
*
TARGET Target of this ACI. Character (255)
*
ACTION Permission associated with an attribute protected by this Character (6)
ACI. Possible values are grant and deny.
OPERATION* Specifies the operation for which the preceding permission Character (3)
is applicable. The values for this attribute are r and w.
ATTRIBUTERIGHT* Name of the attribute that is being protected by the ACI. It Character (255)
can be a specific attribute or all.
*
Indicates the column is required and not null.
ACI_PERMISSION_CLASSRIGHT table
This table stores class operation permissions for ACIs. No primary key constraints
are available for this table.
Table 37. ACI_PERMISSION_CLASSRIGHT table
Column Name Description Data type
*
DN The DN of the container where the ACI is defined. Character (255)
*
NAME Name of the ACI. Character (255)
*
TARGET Target of this ACI. Character (255)
*
ACTION Permission associated with a class right, for example: Character (6)
grant, deny, or none.
CLASSRIGHT* The class operation for this ACI, for example: search, Character (255)
add, or modify.
ENTITLEMENT table
This table stores the parsed entitlements of various provisioning policies in the
IBM Security Identity Manager system. This table does not have a primary key
constraint.
Table 38. ENTITLEMENT table
Column Name Description Data type
*
DN The DN of the provisioning policy or this entitlement. Character (255)
*
TYPE Type of the entitlement. The possible values are: Character (255)
*
Indicates the column is required and not null.
ENTITLEMENT_PROVISIONINGPARAMS table
This table stores provisioning parameters for parsed entitlements. No primary key
constraints are defined for this table
Table 39. ENTITLEMENT_PROVISIONINGPARAMS table
Column Name Description Data type
*
DN The distinguished name of the provisioning policy or Character (255)
this entitlement.
ATTRIBUTEVALUE* Value of service attribute parameter. This value is a Character (4000)
provisioning parameter.
NAME* Name of the service attribute parameter. These Character (255)
parameters are visible under advanced provisioning
parameter list of the entitlement in IBM Security
Identity Manager user interface.
ENFORCEMENT Enforcement type of this service attribute parameter. Character (255)
Possible values represent mandatory or optional.
EXPRTYPE Expression Type for this service attribute parameter. Character (255)
An expression can be a constant expression or a
JavaScript expression.
SERVICETARGETNAME If the service type represents a specific service instance, Character (255)
then this column contains the DN of the service
instance. If service type represents a service profile or
service selection policy, then this column contains the
name of the service profile.
SERVICE_DN Distinguished name of the associated service, if any. Character (255)
*
Indicates the column is required and not null.
28 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
SYNCHRONIZATION_HISTORY table
This table stores the history information of all the synchronizations that occurred.
Table 40. SYNCHRONIZATION_HISTORY table
Column Name Description Data type
*
SYNC_ID ID for this synchronization activity. Primary key. Numeric
*
REQUESTOR Requestor of this request. Character (255)
REQ_TYPE This attribute specifies the type of request. DS indicates Character (255)
full data synchronization. IDS indicates Incremental
Synchronization.
REQ_NAME Name of request. For example, Data Synchronization. Character (255)
1
STATUS Status like Started, Failure, Success, or Warning . Character (255)
TENANT Tenant DN for which synchronization is run. Character (255)
STATUS_DETAIL Detail string of the status. Character (255)
SCHEDULED_TIME Time for which this synchronization was scheduled. Numeric
Note: This attribute is deprecated. To get data
synchronization schedule information, use the
RESOURCES_SYNCHRONIZATIONS table.
SUBMITTED_TIME Time when this request was submitted. Numeric
*
STARTED_TIME Time when this synchronization started. Primary key. Numeric
COMPLETED_TIME Time when this synchronization completed. Numeric
SERVER_NAME Name of the IBM Security Identity Manager Server that Character (255)
started the synchronization.
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
SYNCHRONIZATION_LOCK table
This table is used to avoid race condition when two IBM Security Identity Manager
servers in a clustered environment start data synchronization at the same time.
Table 41. SYNCHRONIZATION_LOCK table
Column Name Description Data type
HOST IBM Security Identity Manager Server that acquires the lock to start Character (255)
data synchronization. Primary key.
RESOURCES_SYNCHRONIZATIONS table
This table stores the schedule information of all the synchronization schedules.
Table 42. RESOURCES_SYNCHRONIZATIONS table
Column Name Description Data type
*
SYNC_ID The identifier association with the synchronization. Numeric
Primary key.
DAY_OF_MONTH* Day of month. Numeric
*
MONTH_NUM Month number. Numeric
*
DAY_OF_WEEK Day of week. Numeric
*
Indicates the column is required and not null.
CHANGELOG table
This table stores the last change log number processed.
Table 43. CHANGELOG table
Column Name Description Data type
*
CHANGE_NUMBER This attribute is an integer that stores the last change Numeric
log number processed by the full or incremental data
synchronization.
*
Indicates the column is required and not null.
RECONCILIATION table
This table contains the summary of the information for reconciliation on various
service instances. The table contains an entry for all completed reconciliations on
various service instances.
Table 44. RECONCILIATION table
Column Name Description Data type
*
RECONID An identifier that identifies a reconciliation uniquely. Primary Character (255)
key.
SERVICEDN* The DN of the service for which this entry is recorded. Character (2000)
*
PROCESSEDACCOUNTS The number of processed accounts that exists for this service Numeric
instance during the last run of reconciliation.
LOCALACCOUNTS* Total number of new local accounts created. It does not Numeric
include the newly created orphan accounts for this service.
TIMUSERACCOUNTS* The number of processed accounts that belongs to users in Numeric
IBM Security Identity Manager.
POLICYVIOLATIONS* The number of policy violations found for accounts on this Numeric
service during reconciliation. This value includes accounts
where one or more attribute values are found to be different
from the local account. Any attribute value of the account is
not compliant with the governing provisioning policies. It
does not include accounts where the attribute values of the
local and remote accounts are the same, even if the values
are noncompliant.
STARTED* Time when the reconciliation started. Date
*
COMPLETED Time when the reconciliation completed. Date
1
ACTIVITY_ID Unique identifier of the activity. Numeric
*
Indicates the column is required and not null.
30 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
1
Indicates the column is added in release 4.6 Express®.
RECONCILIATION_INFO table
This table contains the details of the reconciliation on various service instances.
Table 45. RECONCILIATION_INFO table
Column Name Description Data type
*
RECONID An identifier that identifies a reconciliation uniquely. Character (255)
References RECONCILIATION(RECONID).
ACCOUNTID ID of any entry (for example, an account ID in case of an Character (255)
account reconciliation).
POLICYCOMPLIANCESTATUS Policy Compliance Status of each reconciled account. Character (20)
USERNAME Name of the user. Character (255)
OPERATION The operation for the entry of this service instance. Possible Character (20)
values for an account entry are NL, NO, SA, DA. These values
are codes that stand for various account operations. Codes
include New Local, New Orphan, Suspended Account,
Deprovisioned Account.
REMARKS Contains the reason for deprovisioning or suspension and the Character (1000)
list of attributes in case of modified accounts.
HANDLE1 Only for HR Feed service when workflow is used. The process Numeric
ID of the workflow request that processed this person entry. -1
for none.
*
Indicates the column is required and not null.
1
Indicates the column is added in release 4.6 Express.
SERVICE_ACCOUNT_MAPPING table
The SERVICE_ACCOUNT_MAPPING1 table stores the service profile and its corresponding
account profile.
Table 46. SERVICE_ACCOUNT_MAPPING table
Column Name Description Data type
*
SERVICEPROFILE Name of service type. Primary key. Character (255)
*
ACCOUNTPROFILE Name of the account profile corresponding to the Character (255)
service type. Primary key.
*
Indicates the column is required and not null.
1
Indicates the column is added in release 4.6 Express.
RECERTIFIER_DETAILS_INFO table
The RECERTIFIER_DETAILS_INFO1 table stores the recertifier's information of
recertification policies.
Table 47. RECERTIFIER_DETAILS_INFO table
Column Name Description Data type
*
DN The DN of the recertification policy. Primary Character (255)
key.
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
PERSON_ROLE_ASSIGNMENT
The PERSON_ROLE_ASSIGNMENT3 table stores the role assignment information for a
person.
Table 48. The PERSON_ROLE_ASSIGNMENT table
Column name Description Data type
*
ID The unique ID of person role Numeric
assignment. Primary key.
PERSON_DN* The person DN. Character (2000)
*
ROLE_DEFINED_DN The DN of the role that defines Character (2000)
the role assignment attributes.
ROLE_ASSIGNED_DN* The DN of the role of which the Character (2000)
person is a member.
*
Indicates the column is required and not NULL.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
PERSON_ROLE_ASSIGNMENT_VALUES table
The PERSON_ROLE_ASSIGNMENT_VALUES3 table stores the assignment attribute values.
The assignment attributes that a person can have depends on the role membership
of a person.
Table 49. The PERSON_ROLE_ASSIGNMENT table
Column name Description Data type
*
RA_ID The unique ID of the person role Numeric
assignment.
ATTRIBUTE_NAME* The role assignment attribute Character (256)
name.
ATTRIBUTE_VALUE* The role assignment attribute Character (2000)
value.
*
Indicates the column is required and not NULL.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
32 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
ROLE_ASSIGNMENT_ATTRIBUTES table
The ROLE_ASSIGNMENT_ATTRIBUTES table stores information about assignment
attributes that are defined on a static role. A role can have multiple assignment
attributes. You can populate this table by running a full or incremental data
synchronization in IBM Security Identity Manager.
Table 50. The ROLE_ASSIGNMENT_ATTRIBUTES table
Column name Description Data type
*
ROLE_DN Identifies the organizational role Character (2000)
to which the attribute belongs.
ATTRIBUTE_NAME* Specifies the name of the Character (256)
assignment attribute.
ROLE_NAME Specifies the name of the role. Character (256)
*
Indicates a required column.
POLICY_ANALYSIS
The POLICY_ANALYSIS table stores the policy analysis session formation during the
policy change and service enforcement change events.
Table 51. POLICY_ANALYSIS table
Column Name Description Data type
*
ANALYSIS_ID Unique ID. Primary key. Character (32)
TENANT_NAME Name of the tenant in a multi-tenant setting. Character (64)
*
STATUS Contains status: Numeric
NOT_STARTED=0
STARTING=1
INITIALIZING=2
PENDING=3
INTERRUPTED=4
ABORTED=5
ERROR=6
COMPLETE=7
INCOMPLETE=8
*
REASON Reason for the analysis: Numeric
POLICY_CHANGE=0
ENFORCEMENT_TYPE_CHANGE=1
*
CONTEXT Context of the analysis: Numeric
SIMULATION=0
ENFORCEMENT=1
POL_ADD=0
POL_REMOVE=1
POL_MODIFY=2
ENFORCEMENT_CHANGE_ALERT=3
ENFORCEMENT_CHANGE_ENFORCE=4
ENFORCEMENT_CHANGE_SUSPEND=5
*
LAST_ACCESSED Last accessed date. Date
*
WORKERS_STARTED Counter that is incremented when an analysis messaging Numeric
thread is started and assigned a unit of analysis work.
Default: 0
WORKERS_COMPLETED* This counter is incremented when an analysis messaging Numeric
thread completes its work. Default: 0
WORKERS_TOTAL* The number of messaging threads that do the analysis work. Numeric
Default: 0
ACCOUNT_EVALUATED* The number of accounts that were evaluated during policy Numeric
analysis. Default: 0
*
Indicates the column is required and not null.
POLICY_ANALYSIS_ERROR
The POLICY_ANALYSIS_ERROR table stores non-fatal errors encountered during policy
analysis.
Table 52. POLICY_ANALYSIS_ERROR table
Column Name Description Data type
*
ERROR_ID Unique identifier of policy analysis error. Primary key. Character (32)
ENTITY_NAME Name of an entity. Character (100)
ENTITY_IDENTIFIER Global ID. Character (255)
ENTITY_TYPE Type of entity: Numeric
Person=1
Service=2
Account=3
Role=4
SERVICE_NAME Name of the service. Character (200)
SERVICE_IDENTIFIER Global ID of the service. Character (255)
PERSON_NAME Name of the person. Character (200)
PERSON_IDENTIFIER Global ID of the person. Character (255)
POLICY_NAME Name of the policy. Character (100)
POLICY_IDENTIFIER Global ID of the policy. Character (255)
34 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 52. POLICY_ANALYSIS_ERROR table (continued)
Column Name Description Data type
ATTR_NAME Name of the attribute. Character (100)
*
ERROR_TYPE Account entity not found Numeric
*
Indicates the column is required and not null.
ACCT_CHANGE
The ACCT_CHANGE table represents general information about account actions that
result from a change in a system.
Table 53. ACCT_CHANGE table
Column Name Description Data type
*
CHANGE_ID Randomly generated unique ID. Primary key. Character (32)
*
ACCT_UID The UID of the account. Character (60)
*
ACCT_IDENTIFIER The UID of the account. Character (255)
*
SERVICE_NAME Name of the service instance for the account action. Character (200)
*
SERVICE_IDENTIFIER Global ID. Character (255)
*
OWNER_NAME Name of the account owner. Character (200)
*
OWNER_IDENTIFIER Global ID. Character (255)
DEPROV=0
PROV=1
FLAG_DISALLOWED=2
UNFLAG=3
SUSPEND_DISALLOWED=4
MODIFY=5
ALERT_DISALLOWED=6
FLAG_NONCOMPLIANT=7
SUSPEND_NONCOMPLIANT=8
ALERT_NONCOMPLIANT=9
ERROR=10
PROVISION_PRIORITY Priority of provisioning when there is an ordered Numeric
sequence with service prerequisites.
SEQUENCE_NR A sequence number.
*
REASON Enforcement violation reason. Values include: Numeric
0 – Disallowed
1 – Not Compliant
0 – Pending
1 - Done
*
POLICY_ANALYSIS_ID The analysis session ID this account enforcement Character (32)
action is associated. References
POLICY_ANALYSIS(ANALYSIS_ID). Primary key.
*
Indicates the column is required and not null.
ATTR_CHANGE
This table represents a single attribute value change.
Table 54. ATTR_CHANGE table
Column Name Description Data type
CHANGE_ID* Sequential identifier for a single attribute change for an Character (32)
account provision or modify action. Primary key.
ATTR_NAME* Name of the attribute associated with a value operation. Character (100)
36 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 54. ATTR_CHANGE table (continued)
Column Name Description Data type
ATTR_VALUE Value of the attribute associated with the operation. Character (2000)
*
OPERATION_TYPE Type of attribute operation: Numeric
ADD=0
REMOVE=1
REPLACE=2
*
PRIVILEGE_ACTION_TYPE Type of privilege action associated with the attribute Numeric
value operation:
REVOKATION=0
GRANT=1
*
ATTR_VALUE_PRESENCE The old state value of the attribute value before an ADD, Numeric
REMOVE, or REPLACE operation:
ADD=0
REMOVE=1
UNCHANGED=2
*
Indicates the column is required and not null.
COMPLIANCE_ALERT table
The COMPLIANCE_ALERT table relates compliance issues to the corresponding
compliance alert work item.
Table 55. COMPLIANCE_ALERT table
Column Name Description Data type
CA_PROC_ID Identifier for grouping of related compliance alerts. Numeric
*
CA_ISSUE_DN Distinguished name of the compliance issue found in the Character (512)
directory server. Primary key.
ACTIVITY_ID Work item activity ID associated with this compliance Numeric
issue.
ACCOUNT_DN* Distinguished name of the account associated with this Character (512)
compliance issue.
PARTICIPANT_DN Participant distinguished name associated with this Character (512)
compliance issue.
STARTED Status of the compliance issue: Character (1)
0 – Not Started
1 – Started
RECERTIFICATIONLOG table
The RECERTIFICATIONLOG1 table stores recertification policy audit information for
account and access recertification policies. This table is used by the Recertification
History report. Each row in the table represents the recertification of a single
account or access.
Table 56. RECERTIFICATIONLOG table
Column Name Description Data type
*
PROCESS_ID The workflow process ID associated with this Numeric
recertification. Primary key with ACTIVITY_ID.
ACTIVITY_ID* The workflow approval activity ID associated with this Numeric
recertification. Primary key with PROCESS_ID.
ENTITY_DN The DN of the entity is being recertified (DN of account). Character (255)
ACCESS_DN The DN of the access group definition (if access Character (255)
recertification).
ACCOUNT_ID The user ID of the account that is being recertified. Character (100)
ACCOUNT_OWNER_NAME Full name of the owner of the account or access that is Character (100)
being recertified.
ACCOUNT_OWNER DN of the owner of the account or access that is being Character (255)
recertified.
ACCESS_NAME The access name of the access that is being recertified. Character (100)
ACCESS_TYPE The access type of the access that is being recertified, for Character (100)
example, shared folder or application.
TYPE* Access or Account recertification. Valid values for this Character (2)
column are:
Account (AT)
Access (AS)
SERVICE DN of the service instance to which the account or access Character (255)
that is being recertified belongs.
SERVICE_NAME The name of the service instance to which the account or Character (100)
access that is being recertified belongs.
SERVICE_PROFILE The name of the service type to which the service instance Character (100)
belongs.
PARTICIPANT DN of the person who did the recertification. Character (255)
PARTICIPANT_NAME The full name of the person who did the recertification. Character (100)
PARTICIPANT_ID The Service user ID of the person who did the Character (100)
recertification.
38 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 56. RECERTIFICATIONLOG table (continued)
Column Name Description Data type
RECERT_RESULT The action taken on the approval node in the recertification Character (2)
task. Valid values for this column are as follows:
Approved (AA)
Rejected (RR)
Abort (AO)
Certified (CY)
Success (SS)
Warning (SW)
Failed (SF)
TENANT DN of the tenant Character (255)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.0.
USERRECERT_HISTORY table
The USERRECERT_HISTORY1 table stores recertification policy audit information for
user recertification policies. This table is used by the User Recertification History
Report. Each row in the table represents the completion of a user recertification
policy approval. Specific resources and decisions that were included in the
approval are recorded and described in the following additional tables.
Active (0)
Inactive (1)
PERSON_CONTAINER_DN The DN of the container that holds the person who is being Character (255)
recertified.
PERSON_CONTAINER_NAME The name of the container that holds the person who is being Character (128)
recertified.
POLICY_DN The DN of the recertification policy that is being run. Character (255)
POLICY_NAME The name of the recertification policy that is being run. Character (240)
SUBMITTED_DATE Timestamp when recertification started for this account/access. Character (50)
TIMEOUT An integer flag that indicates whether the workflow timed out Numeric
or completed normally. The following values are valid:
Timeout (1)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.1.
USERRECERT_ROLE table
The USERRECERT_ROLE1 table stores role membership recertification audit
information for user recertification policies. This table is used by the User
Recertification History Report. Each row in the table represents the approval or
rejection of a membership for a user in a particular role. This table references the
USERRECERT_HISTORY table through a foreign key.
Table 58. USERRECERT_ROLE table
Column Name Description Data type
*
ID A unique identifier for the role entry in this user recertification Numeric
approval. Primary key.
40 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 58. USERRECERT_ROLE table (continued)
Column Name Description Data type
*
RECERT_ID The unique identifier of this user recertification approval. This field Numeric
is a foreign key reference to the USERRECERT_HISTORY table ID
column.
ROLE_DN The DN of the role that is being recertified. Character (255)
ROLE_NAME The name of the role that is being recertified. Character (240)
ROLE_DESCRIPTION The description of the role that is being recertified. Character (500)
DECISION The decision submitted for this role. The following values are valid: Character (2)
v Approved (“AA”)
v Rejected (“AR”)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.1.
USERRECERT_ACCOUNT table
The USERRECERT_ACCOUNT1 table stores account recertification audit information for
user recertification policies. This table is used by the User Recertification History
Report. Each row in the table represents the approval or rejection of an account
owned by the user during recertification. This table references the
USERRECERT_HISTORY table through a foreign key.
Table 59. USERRECERT_ACCOUNT table
Column Name Description Data type
*
ID A unique identifier for the account entry in this user Numeric
recertification approval. Primary key.
RECERT_ID* The unique identifier of this user recertification approval. This Numeric
field is a foreign key reference to the USERRECERT_HISTORY
table ID column.
ACCOUNT_DN* The DN of the account that is being recertified. Character (255)
*
ACCOUNT_UID The user ID of the account that is being recertified. Character (240)
*
SERVICE_DN The DN of the service for the account that is being recertified. Character (255)
SERVICE_NAME The name of the service for the account that is being Character (240)
recertified.
SERVICE_DESCRIPTION The description of the service for the account that is being Character (240)
recertified.
DECISION The decision submitted for this account. The following values Character (2)
are valid:
Approved (“AA”)
Rejected (“AR”)
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.1.
*
Indicates the column is required and not null.
1
Indicates the column or the value is added in release 5.1.
ERCREDENTIALLEASE table
The ERCREDENTIALLEASE3 table stores the lease information for a checked out
credential. If a credential is checked out as a pool member, the table also stores the
pool information.
Table 61. ERCREDENTIALLEASE table
Column Name Description Data type
* ^
DN The credential lease DN. Primary key. Character
(2000)
ERCVCATALOG* ^
The credential DN. Character
(2000)
ERLESSEE* The person DN who checked out the Character
credential. (2000)
ERLESSEENAME The name of the person who checked out Character (256)
the credential.
ERLEASEEXPIRATIONTIME The lease expiration time. DATETIME
42 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 61. ERCREDENTIALLEASE table (continued)
Column Name Description Data type
ERJUSTIFICATION The business justification for checkout. Character
(2000)
ERLEASESTATUS Indicates the lease status. Values include: Numeric
v 0 – active
v 1 – inactive indicating the lease is in the
process of being checked in or checked
out at this moment.
ERCREDENTIALPOOLDN The credential pool DN if the credential is Character
not checked out as a pool member. (2000)
Otherwise, the value is empty.
ERCUSTOMATTRIBUTE1 Custom attributes. You can use these 5 Character
custom attributes if you want to extend (2000)
~ the lease object to have more information.
ERCUSTOMATTRIBUTE5
ERLASTNOTIFICATION The last lease expiration notification time. DATETIME
ERLEASECREATETIME The lease creation time. DATETIME
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
DB_REPLICATION_CONFIG table
The DB_REPLICATION_CONFIG3 table stores mapping information of the LDAP object
replicated to the database table.
Table 62. DB_REPLICATION_CONFIG table
Column Name Description Data type
ID The unique identifier. Numeric
OBJECT_CLASS_NAME The LDAP object class name. For example, Character (256)
ercredential.
ATTRIBUTE_NAME The LDAP attribute name. Character (256)
DB_TABLE_NAME The name of the database table which is Numeric
mapped to the object class in the
OBJECT_CLASS_NAME column.
KEY_COLUMN_NAME The primary key column name of the table Character (256)
in the DB_TABLE_NAME column.
REPLICATE_COLUMN_NAME The name of the column, which is mapped Character (256)
to the attribute name in the ATTRIBUTE_NAME
column.
MULTI_VALUE Indicates whether the attribute is multivalue Character (1)
attribute. Values include:
v y – multivalue attribute
v n – single-value attribute
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_BULK_LOAD table
The SA_BULK_LOAD3 table stores the shared access batch load request data.
Table 63. SA_BULK_LOAD table
Column Name Description Data type
LOAD_ID* The unique identifier for the shared access Character (255)
batch load request. Primary key.
DATA_CLOB The shared access batch load data. Big Data
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_CREDPOOL_DESCRIPTION table
The SA_CREDPOOL_DESCRIPTION3 table stores the description of a credential pool.
Each credential pool might have zero or multiple descriptions.
Table 64. SA_CREDPOOL_DESCRIPTION table
Column Name Description Data type
*
DN The credential pool DN. Character (2000)
DESCRIPTION The description of credential Character (2000)
pool.
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_CREDPOOL_GROUP table
The SA_CREDPOOL_GROUP3 table stores the group definition of a credential pool. Each
credential pool might consist of one or multiple groups.
Table 65. SA_CREDPOOL_GROUP table
Column Name Description Data type
DN* The credential pool DN. Character (2000)
ERSERVICEGROUP The DN of the service group. Character (2000)
44 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_CREDPOOL_OWNER table
The SA_CREDPOOL_OWNER3 table stores the owner of a credential pool. Each credential
pool might have zero or multiple owners. A pool owner can be an organizational
role or a person.
Table 66. SA_CREDPOOL_OWNER table
Column Name Description Data type
*
DN The credential pool DN. Character (2000)
OWNER The DN of the POOL owner. The Character (2000)
owner can be an organizational
role or a person.
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_EVALUATION_BU table
The SA_EVALUATION_BU3 table stores organizational container information.
Table 67. SA_EVALUATION_BU table
Column Name Description Data type
* ^
DN The DN of the organizational Character (2000)
container. Primary key.
NAME The name of the organizational Character (256)
container.
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_EVALUATION_BU_HIERARCHY table
The SA_EVALUATION_BU_HIERARCHY3 table stores the flattened organizational
container hierarchy tree.
Table 68. SA_EVALUATION_BU_HIERARCHY table
Column Name Description Data type
* ^
BU_DN The DN of the organizational Character (2000)
container. Primary key.
CHILD_DN* The DN of the child container. Character (2000)
*
Indicates the column is required and not null.
SA_EVALUATION_CREDENTIAL table
The SA_EVALUATION_CREDENTIAL3 table stores credential information relevant to
shared access authorization evaluation.
Table 69. SA_EVALUATION_CREDENTIAL table
Column Name Description Data type
*^
DN The credential DN. Primary key. Character
(2000)
ACCOUNT_DN The account DN. Character
(2000)
ACCOUNT_UID The account user ID. Character (256)
USE_GLOBAL_SETTINGS Indicates whether use global setting for Numeric
the credential. Value includes:
v 0 – use global setting
v 1 – use the own setting of the credential
IS_SEARCHABLE Indicates whether the credential is Numeric
available for checkout search. Values
includes:
v 0 – search enabled
v 1 – search disabled, credential is
intended to be checked out only as pool
member
IS_EXCLUSIVE Indicates the credential access mode. Numeric
Values include:
v 0 – exclusive
v 1 – non-exclusive
v 2 – non-shared
IS_PASSWORD_VIEWABLE Indicates whether the password can be Numeric
displayed to user. Values include:
v 0 – viewable
v 1 – not viewable
ACCOUNT_STATUS Indicates the account status. Values Numeric
include:
v 0 – active
v 1 – inactive
^
SERVICE_DN The global identifier of the credential Character
service. (2000)
Note: For legacy credentials created in
IBM Security Privileged Identity Manager
1.0, this column stores the service DN
string.
RESET_PASSWORD Indicates whether the password is reset Numeric
during checkin. Values include:
v 0 – password is reset
v 1 – password not changed
46 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 69. SA_EVALUATION_CREDENTIAL table (continued)
Column Name Description Data type
MAX_CHECKOUT_TIME The maximum checkout duration in Numeric
hours.
OBJECTPROFILE_NAME# This attribute is not used. Character (255)
NAME Credential name. Character (255)
OWNERSHIP_TYPE The account ownership type. Character (255)
OWNER_DN The account owner DN. Character
(2000)
BU_DN^ The DN of the organizational container Character
where the credential is created. (2000)
Note: For legacy credentials created in
IBM Security Privileged Identity Manager
1.0, this column is NULL.
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
#
Indicates the column is currently not being used. The value is always NULL.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_EVAL_CRED_DESCRIPTION table
The SA_EVAL_CRED_DESCRIPTION3 table stores the description of a credential. Each
credential might have zero or multiple descriptions.
Table 70. SA_EVAL_CRED_DESCRIPTION table
Column Name Description Data type
*^
DN The credential DN. Character
(2000)
DESCRIPTION The description of credential. Character
(2000)
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_EVALUATION_CREDENTIAL_POOL table
The SA_ EVALUATION_CREDENTIAL_POOL3 table stores credential pool information
relevant to shared access authorization evaluation.
Table 71. SA_ EVALUATION_CREDENTIAL_POOL table
Column Name Description Data type
*
DN The credential DN. Primary key. Character (2000)
NAME The pool name. Character (256)
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
#
Indicates the column is currently not being used. The value is always NULL.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_EVALUATION_SERVICE table
The SA_EVALUATION_SERVICE3 table stores service, which contains either credentials
in the vault or credential pools. This table stores only the service information
relevant to shared access authorization evaluation.
Table 72. SA_EVALUATION_SERVICE table
Column Name Description Data type
* ^
DN The service DN. Primary key. Character (2000)
NAME The service name. Character (256)
TYPE The service profile name. Character (256)
^
BU_DN The DN of the organizational Character (2000)
container.
ID4 The unique identifier of the Long Integer
service.
ENFORCEMENT4 The service enforcement action. Short Integer
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
4
Indicates that the column is added in IBM Security Identity Manager 6.0.0.2.
SA_EVALUATION_SERVICE_TAG table
The SA_EVALUATION_SERVICE_TAG3 table stores the service tag information for
services stored in SA_EVALUATION_SERVICE or SA_VAULT_SERVICE. Each service might
have zero or multiple tags.
48 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 73. SA_EVALUATION_SERVICE_TAG table
Column Name Description Data type
* ^
SERVICE_DN v Stores the service DN if the Character (2000)
tag is defined for the service
from the
SA_EVALUATION_SERVICE table.
v Stores the service id if the tag
is defined for the credential
service from the
SA_VAULT_SERVICE table.
TAG The service tag. Character (500)
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_GLOBAL_CONFIGURATION table
The SA_GLOBAL_CONFIGURATION3 table stores information about the shared access
global configuration settings. This table has only one row.
Table 74. The SA_GLOBAL_CONFIGURATION table
Column name Description
ACCESS_MODE Specifies the access mode of credentials.
v 0: Indicates exclusive permissions.
v 1: Indicates non-exclusive permissions.
v 2: Indicates non-shared credentials.
MAX_CHECKOUT_DURATION Specifies the duration for which a credential can be
checked out. You must specify this attribute if the access
is exclusive. Specify the time in weeks, days, or hours by
adding the suffix, as described in the following
examples:
v 8 w: Indicates 8 weeks.
v 8 d: Indicates 8 days.
v 8 h: Indicates 8 hours.
By default, the duration is considered in hours if no
suffix is specified. The default duration is 8 h.
PASSWORD_VIEWABLE Specifies whether to show the credential password to
users on the IBM Security Identity Manager self-service
user interface. You must specify this attribute if the
access mode value is 0 (TRUE) or 1 (FALSE). The default
value is FALSE, which indicates that the credential
password must not be shown.
SHAREDACCOUNT_SEARCH Specifies whether checkout search must be enabled for
the credential on the Self Service user interface. The
valid values are:
v 0 for enabling the checkout search.
v 1 for disabling the checkout search.
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_POLICY table
The SA_POLICY3 table stores shared access policy information.
Table 75. SA_POLICY table
Column Name Description Data type
*
ID Unique identifier. Primary key. NUMERIC
DN Distinguished Name of the policy. Character (2000)
^
BU_DN Distinguished Name of the Character (2000)
organization container.
SCOPE The policy scope. Values include: NUMERIC
v 1 – one level
v 2 – sub tree
STATUS The policy status. Values include: NUMERIC
v 0 – active
v 1 – inactive
50 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 75. SA_POLICY table (continued)
Column Name Description Data type
POLICY_NAME The policy name. Character (255)
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_POLICY_DESCRIPTION table
The SA_POLICY_DESCRIPTION3 table stores the description of a shared access policy.
Each policy might have zero or multiple descriptions.
Table 76. SA_POLICY_DESCRIPTION table
Column Name Description Data type
*
POLICY_ID ID of the policy ID associated with Numeric
the description.
DESCRIPTION Distinguished Name of the Character (2000)
organizational role, or * indicates
all people.
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_POLICY_ENTITLEMENT table
The SA_POLICY_ENTITLEMENT3 table stores the shared access policy entitlements.
Each policy might have one or multiple entitlements.
Table 77. SA_POLICY_ENTITLEMENT table
Column Name Description Data type
*
ID Unique global ID. Primary key. Numeric
*
POLICY_ID ID of the policy ID associated with Numeric
the entitlement.
TYPE The entitlement type. Values Numeric
include:
v 0 – Credential
v 1 – Credential pool
DEFINITION_TYPE The entitlement definition type. Numeric
Values include:
v 0 – specific credential object
entitlement
v 1 – filter entitlement
NAME The entitlement name. Character (256)
TARGET_NAME The account uid or pool name that Character (256)
matches the string.
SERVICE_TYPE The service profile name. Character (256)
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_POLICY_ERURI table
The SA_POLICY_ERURI3 table stores the universal resource identifier of a shared
access policy. Each policy might have zero or multiple universal resource
identifiers.
Table 78. SA_POLICY_ERURI table
Column Name Description Data type
*
POLICY_ID ID of the policy ID associated with Numeric
the universal resource identifier.
ERURI The universal resource identifier. Character (2000)
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
SA_POLICY_MEMBERSHIP table
The SA_POLICY_MEMBERSHIP3 table stores the shared access policy memberships.
Each policy might have one or multiple memberships.
Table 79. SA_POLICY_MEMBERSHIP table
Column Name Description Data type
*
ID Unique ID. Primary key. Numeric
*
POLICY_ID ID of the policy ID associated with the Numeric
membership.
ROLE_DN Distinguished Name of the organizational Character
role. The value can be a role DN or *, (2000)
which indicates all people.
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
52 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
SA_VAULT_SERVICE table
The SA_VAULT_SERVICE4 table stores credential service information.
Table 80. SA_VAULT_SERVICE table
Column Name Description Data type
*^
ID The global identifier of the credential Character
service. Primary key. (2000)
SERVICE_URI*^ The unique resource identifier of the Character (500)
credential service.
TYPE The type of the credential service. Character (256)
NAME The name of the credential service. Character (256)
^
BU_DN The DN of the organizational container. Character
(2000)
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
4
Indicates the table is added in IBM Security Identity Manager 6.0.0.2.
SA_VAULT_SERVICE_ALIAS table
The SA_VAULT_SERVICE_ALIAS4 table stores the credential service aliases. Each
credential service might have zero or multiple aliases.
Table 81. SA_VAULT_SERVICE_ALIAS table
Column Name Description Data type
*^
SERVICE_ID The global identifier of the credential Character (20)
service.
SERVICE_ALIAS* The service tag. Character (500)
*
Indicates the column is required and not null.
^
Indicates the column is associated with a generated lowercase column with name
L_columnName.
4
Indicates the table is added in IBM Security Identity Manager 6.0.0.2.
SYNCH_OBJECT_LOCK table
The SYNCH_OBJECT_LOCK3 table is used for locking objects during update to prevent
data replication target object out of synch with the replication source.
Table 82. SYNCH_OBJECT_LOCK table
Column Name Description Data type
*
OBJ_ID The DN of the object. Primary key. Character (2000)
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
3
Indicates the view is added in IBM Security Identity Manager 6.0.
V_AUTHORIZED_CREDENTIALPOOLS view
The V_AUTHORIZED_CREDENTIALPOOLS3 view returns the authorized credential pools
by policy, role, and entitlement.
Table 84. V_AUTHORIZED_CREDENTIALPOOLS view
Column Name Description Data type
CREDPOOL_DN The credential DN. Character (2000)
CREDPOOL_NAME The pool name. Character (256)
GROUP_DN The account user ID. Character (2000)
SA_MEMBER_ROLE_DN Distinguished Name of the organizational Character (2000)
role. The value can be a role DN or *, which
indicates all people.
SERVICE_DN The service DN. Character (2000)
SERVICE The service name. Character (256)
SERVICE_BUDN The DN of the organizational container Character (2000)
where the service is located.
SERVICE_BU The name of the organizational container Character (256)
where the service is located.
54 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 84. V_AUTHORIZED_CREDENTIALPOOLS view (continued)
Column Name Description Data type
SA_POLICY_ID The policy unique identifier. Numeric
POLICY_NAME The policy name. Character (255)
SA_ENTITLEMENT_ID The entitlement unique identifier. Numeric
3
Indicates the view is added in IBM Security Identity Manager 6.0.
V_SA_EVALUATION_SERVICE view
The V_SA_EVALUATION_SERVICE4 view returns the union of SA_EVALUATION_SERVICE
and SA_VAULT_SERVICE.
Table 85. V_SA_EVALUATION_SERVICE view
Column Name Description Data type
DN The global identifier of the credential service. Character (2000)
Note: For legacy credentials created in IBM
Security Privileged Identity Manager 1.0, this
column stores the service DN string.
NAME The service name. Character (256)
TYPE The service type. Character (256)
BU_DN The DN of the organizational container. Character (2000)
4
Indicates the view is added in IBM Security Identity Manager 6.0.0.2.
V_SAPOLICY_ENTITLEMENT_DETAIL view
The V_SAPOLICY_ENTITLEMENT_DETAIL3 view returns the shared access policy and
entitlement details.
Table 86. V_SAPOLICY_ENTITLEMENT_DETAIL view
Column Name Description Data type
SAPENTITLE_DN The DN of the shared access policy. Character (2000)
SAPENTITLE_TYPE The entitlement type. Values include: Numeric
v 0 – Credential
v 1 – Credential pool
SAPENTITLE_DEFINITION_TYPE The entitlement definition type. Numeric
Values include:
v 0 – specific credential object
entitlement
v 1 – filter entitlement
SAPENTITLE_NAME The entitlement name. Character (256)
SAPENTITLE_TARGET_NAME The matching string of account uid Character (2000)
or pool name.
SAPENTITLE_SERVICE_TYPE The service profile name. Character (256)
SAPENTITLE_SERVICE_NAME The matching string of the service Character (2000)
name.
SAPENTITLE_SERVICE_GROUP The matching string of the service Character (256)
tag.
3
Indicates the view is added in IBM Security Identity Manager 6.0.
T_AccessCatalog table
The T_AccessCatalog4 table stores information about the access, including name,
description, category, badge, and search terms. The access information is displayed
in the Request Access user interface in the Identity Service Center.
Table 87. T_AccessCatalog table
Column Name Description Data type
entity_id* The unique identifier of the access. Big integer
entity_type* The entity type of the access. Supported Small integer
access types are:
1: Service
2: Group
3: Role
name*^ Access name. Character (255)
description^ Access description. Character
(2000)
view_option Indicates whether access is enabled in Small integer
Request Access and whether it is a
common requested access:
1: Access Disabled
2: Enabled
3: Enabled as common access
Note: Common access is used only in
Access Request in the self-service console
and administrative console; it is not
supported in the Identity Service Center.
Category Access category. Character
(1000)
icon_url The URL of the icon of the access. This Character (255)
icon is displayed when the user searches
for the access in the Identity Service
Center.
additionalinfo^ Additional information about the access. Character
This information is displayed in the access (2000)
card when the user searches for the access
in the Identity Service Center.
56 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
*
Indicates that the column is required and not null.
^
Indicates that the column is associated with a generated lowercase column with
name L_columnName. Use this column if the search is not case sensitive.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_AccessCatalogTags table
The T_AccessCatalogTags4 table stores the access search terms. Each access can
have zero or many search terms defined.
Table 88. T_AccessCatalogTags table
Column Name Description Data type
tag ^ Access search term. Character (100)
access_id* Access identifier. Big integer
*
Indicates that the column is required and not null.
^
Indicates that the column is associated with a generated lowercase column with
name L_columnName. Use this column if the search is not case sensitive.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_BADGES table
The T_BADGES4 table stores the access badge information.
Table 89. T_BADGES table
Column Name Description Data type
ENTITY_ID Access identifier. Big integer
^
BADGE_TEXT The key of the badge text, which is Character
localized for supported languages. (1000)
BADGE_STYLE The style used to display the badge. For Character
example, if the style is green, it indicates (2000)
that badge is displayed in green color.
^
Indicates that the column is associated with a generated lowercase column with
name L_columnName. Use this column if the search is not case sensitive.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_Owner table
The T_Owner4 table stores the access owner information.
Table 90. T_Owner table
Column Name Description Data type
type Owner type: Small integer
1: Role
2: Person
owner_dn Distinguished name of the owner. Character
(2000)
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_GROUP table
The T_GROUP4 table stores the information for group entities.
Table 91. T_GROUP table
Column Name Description Data type
Type* Name of the group profile. Character (256)
Rdn* RDN attribute of the group. Character
(1000)
dn Distinguished Name of the group Character
(2000)
service_id* Service identifier of the group Big integer
Id* Unique identifier of the group Big integer
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_Role table
The T_Role4 table stores the information for the role entities.
Table 92. T_Role table
Column Name Description Data type
Id* Unique identifier of the role. Big integer
Dn* Distinguished name of the role. Character
(2000)
bu_dn*^ Distinguished name of the business unit Character
of the role (2000)
*
Indicates that the column is required and not null.
^
Indicates that the column is associated with a generated lowercase column with
name L_columnName. Use this column if the search is not case sensitive.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_ProvisioningPolicy table
The T_ProvisioningPolicy4 table stores the information for provisioning policies.
This information is replicated from LDAP to the database to optimize performance
when searching for authorized access.
58 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 93. T_ProvisioningPolicy table
Column Name Description Data type
Id* Unique identifier of the provisioning Big integer
policy.
Dn* Distinguished name of the provisioning Character
policy. (2000)
Name* Name of the provisioning policy. Character (256)
scope Scope of the provisioning policy. Small integer
1: Single-level
2: Sub-tree
status Indicates whether the policy is active or Small integer
not.
0: Active
1: Inactive
Bu*^ Distinguished name of the business unit Character
of the provisioning policy. (2000)
priority Priority of the policy. Big integer
*
Indicates that the column is required and not null.
^
Indicates that the column is associated with a generated lowercase column with
name L_columnName.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_PolicyMembership table
The T_PolicyMembership4 table stores the information for the memberships of a
provisioning policy.
Table 94. T_PolicyMembership table
Column Name Description Data type
policy_id* Identifier of the provisioning policy. Big integer
role_id* Identifies the role membership. Can be Character (100)
either of the following:
The keyword EVERYONE or OTHERS
The identifier of the role as a string
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_ServiceEntitlement table
The T_ServiceEntitlement4 table stores the information for the service entitlement
of a provisioning policy.
Table 95. T_ServiceEntitlement table
Column Name Description Data type
Id* System-generated ID of the service Big integer
entitlement.
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_AttributeEntitlement table
The T_AttributeEntitlement4 table stores the information for the entitled attribute
values of a service entitlement in a provisioning policy.
Table 96. T_AttributeEntitlement table
Column Name Description Data type
se_id* Identifier of the service entitlement. Big integer
attr_name* Name of the account attribute. Character (100)
| attr_value Stores an attribute value whose Character
| value_type is Regular Expression(20) or (2000)
| Constant value(30).
Type* Type of entitlement. Small integer
0: Excluded. Implies that all values are
granted except for the specified value
in the attr_value column.
1: Allowed. Implies that the specific
value in the attr_value column is
granted
2: Default. Implies that the specified
value in the attr_value column is a
default. Default values are considered
granted as well.
3: Mandatory. Implies that the
specified value in the attr_value
column is required.
60 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 96. T_AttributeEntitlement table (continued)
Column Name Description Data type
value_type The value type, which defines the format Small integer
of the value.
10: JavaScript
20: Regular Expression
30: Constant value
| JS_ATTR_VALUE Stores an attribute value whose Long character
| value_type is JavaScript(10).
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_ServiceTags table
The T_ServiceTags4 table stores the information for service tags for a service
entitlement in a provisioning policy.
Table 97. T_ServiceTags table
Column Name Description Data type
se_id* Identifier of the service entitlement. Big integer
Tag* Service tag. For each service entitlement, Character (100)
there can be zero or many tags defined.
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
TMP_HostSEByPerson table
The TMP_HostSEByPerson4 table stores the information for service targets that are
applicable to a specific user according to the host selection policy when a service
entitlement target type is host selection policy. Information in this table is
dynamically generated during service or group authorization for a specific user,
and it is associated with a unique transaction ID that corresponds to the
authorization evaluation process. The data is automatically removed by the system
upon completion of the authorization evaluation process.
Table 98. TMP_HostSEByPerson table
Column Name Description Data type
se_id* Identifier of the service entitlement. Big integer
transaction_id* System-generated transaction ID for the Big integer
service or group access evaluation.
target_id* The service identifier of the service target, Big integer
based on the host selection policy.
target_dn* The distinguished name of the service Character
target, based on the host selection policy. (2000)
*
Indicates that the column is required and not null.
TMP_JSAEByPerson table
The TMP_JSAEByPerson4 table stores the information for the evaluated JavaScript
attribute values for a specific user according to the attribute entitlements with the
JavaScript value type in a provisioning policy. Information in this table is
dynamically generated during service or group authorization for a specific user,
and it is associated with a unique transaction ID that corresponds to the
authorization evaluation process. The data is automatically removed by the system
upon completion of the authorization evaluation process.
Table 99. TMP_JSAEByPerson table
Column Name Description Data type
se_id* Identifier of the service entitlement. Big integer
transaction_id* System generated transaction ID for the Big integer
service or group access evaluation.
attr_name* Attribute name. Character (100)
attr_value* Evaluated attribute value based on the Character
JavaScript. (2000)
service_id* Identifier of the service. Big integer
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_Global_Settings table
The T_Global_Settings4 table stores the global configuration properties for IBM
Security Identity Manager that are required for service and group authorization
evaluation.
Table 100. T_Global_Settings table
Column Name Description Data type
name Name of the system property. Character (255)
value Value of the system property. Character (255)
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_GROUP_PROFILE table
The T_GROUP_PROFILE4 table stores the group profile information.
Table 101. T_GROUP_PROFILE table
Column Name Description Data type
name* Profile name. Character (100)
rdn_attr* Name of the account attribute for group Character (100)
membership.
acct_attr* Name of the account attribute for group Character (100)
membership
62 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 101. T_GROUP_PROFILE table (continued)
Column Name Description Data type
case_sensitivity Used for regression expression match for Integer
group.
0: Case sensitive
2: Not case sensitive
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
T_Joindirective table
The T_Joindirective4 table stores the attribute join directive definitions.
Table 102. T_Joindirective table
Column Name Description Data type
attr_name* Name of the attribute Character (100)
joinDirective* Name of the attribute join directive. Small integer
0: Priority Join
3: Union Join
*
Indicates that the column is required and not null.
4
Indicates that the table is added in IBM Security Identity Manager 6.0.0.2.
V_GroupCatalog view
The V_GroupCatalog4 view provides information for groups in the access catalog.
Table 103. V_GroupCatalog view
Column Name Description
ID See the entity_id column in “T_AccessCatalog table”
on page 56.
NAME See the name column in “T_AccessCatalog table” on
page 56.
L_NAME See the name column in “T_AccessCatalog table” on
page 56.
DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
L_DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
CATEGORY See the Category column in “T_AccessCatalog table”
on page 56.
VIEW_OPTION See the view_option column in “T_AccessCatalog
table” on page 56.
ICON_URL See the icon_url column in “T_AccessCatalog table”
on page 56.
ADDITIONALINFO See the additionalinfo column in “T_AccessCatalog
table” on page 56.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
V_RoleCatalog view
The V_RoleCatalog4 view provides information for roles in the access catalog.
Table 104. V_RoleCatalog view
Column Name Description
ID See the entity_id column in “T_AccessCatalog table”
on page 56.
NAME See the name column in “T_AccessCatalog table” on
page 56.
L_NAME See the name column in “T_AccessCatalog table” on
page 56.
DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
L_DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
CATEGORY See the Category column in “T_AccessCatalog table”
on page 56.
VIEW_OPTION See the view_option column in “T_AccessCatalog
table” on page 56.
ICON_URL See the icon_url column in “T_AccessCatalog table”
on page 56.
ADDITIONALINFO See the additionalinfo column in “T_AccessCatalog
table” on page 56.
L_ADDITIONALINFO See the additionalinfo column in “T_AccessCatalog
table” on page 56.
64 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 104. V_RoleCatalog view (continued)
Column Name Description
DN See the Dn column in “T_Role table” on page 58.
BU_DN See the bu_dn column in “T_Role table” on page 58.
L_BU_DN See the bu_dn column in “T_Role table” on page 58.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
V_ServiceCatalog view
The V_ServiceCatalog4 view provides information for services in the access
catalog.
Table 105. V_ServiceCatalog view
Column Name Description
ID See the entity_id column in “T_AccessCatalog table”
on page 56.
NAME See the name column in “T_AccessCatalog table” on
page 56.
L_NAME See the name column in “T_AccessCatalog table” on
page 56.
DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
L_DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
CATEGORY See the Category column in “T_AccessCatalog table”
on page 56.
VIEW_OPTION See the view_option column in “T_AccessCatalog
table” on page 56.
ICON_URL See the icon_url column in “T_AccessCatalog table”
on page 56.
ADDITIONALINFO See the additionalinfo column in “T_AccessCatalog
table” on page 56.
L_ADDITIONALINFO See the additionalinfo column in “T_AccessCatalog
table” on page 56.
DN See the DN column in
“SA_EVALUATION_SERVICE table” on page 48.
PROFILE See the TYPE column in
“SA_EVALUATION_SERVICE table” on page 48.
BU_DN See the BU_DN column in
“SA_EVALUATION_SERVICE table” on page 48.
L_BU_DN See the BU_DN column in
“SA_EVALUATION_SERVICE table” on page 48.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
V_DYNAMIC_ENTITLEMENT view
The V_DYNAMIC_ENTITLEMENT4 view provides information for entitlements in the
provisioning policy that need to be dynamically evaluated.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
V_ServiceEntitlementByRole view
The V_ServiceEntitlementByRole4 view provides information about service
entitlements by role.
Table 107. V_ServiceEntitlementByRole view
Column Name Description
ROLE_ID See the Id column in “T_Role table” on page 58.
SERVICE_ID See the ID column in “SA_EVALUATION_SERVICE
table” on page 48.
SERVICE_DN See the DN column in
“SA_EVALUATION_SERVICE table” on page 48.
L_SERVICE_DN See the DN column in
“SA_EVALUATION_SERVICE table” on page 48.
SE_REF_ID See the Id column in “T_ServiceEntitlement table”
on page 59.
SE_PRIORITY See the Priority column in “T_ServiceEntitlement
table” on page 59.
POLICY_ID See the policy_id column in “T_ServiceEntitlement
table” on page 59.
POLICY_DN See the Dn column in “T_ProvisioningPolicy table”
on page 58.
POLICY_PRIORITY See the priority column in “T_ProvisioningPolicy
table” on page 58.
OWNERSHIP_TYPE See the ownership_type column in
“T_ServiceEntitlement table” on page 59.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
V_GROUP_PROFILE view
The V_GROUP_PROFILE4 view provides metadata for groups.
Table 108. V_GROUP_PROFILE view
Column Name Description
NAME Group profile name. See the name column in
“T_GROUP_PROFILE table” on page 62.
66 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 108. V_GROUP_PROFILE view (continued)
Column Name Description
RDN_ATTR RDN attribute name. See the rdn_attr column in
“T_GROUP_PROFILE table” on page 62.
ACCT_ATTR Group membership account attribute name. See the
acct_attr column in “T_GROUP_PROFILE table” on
page 62.
JOINDIRECTIVE Join directive of the group attribute. See the
joinDirective column in “T_Joindirective table” on
page 63.
CASE_SENSITIVITY Case sensitivity for regular expression evaluation.
See the case_sensitivity column in
“T_GROUP_PROFILE table” on page 62.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
V_GC_INTERSECT view
The V_GC_INTERSECT4 view provides information for groups in the access catalog
that use intersection join in the provisioning policy.
Table 109. V_GC_INTERSECT view
Column Name Description
ID See the entity_id column in “T_AccessCatalog table”
on page 56.
NAME See the name column in “T_AccessCatalog table” on
page 56.
L_NAME See the name column in “T_AccessCatalog table” on
page 56.
DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
L_DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
CATEGORY See the Category column in “T_AccessCatalog table”
on page 56.
VIEW_OPTION See the view_option column in “T_AccessCatalog
table” on page 56.
ICON_URL See the icon_url column in “T_AccessCatalog table”
on page 56.
DN See the dn column in “T_GROUP table” on page 58.
PROFILE See the Type column in “T_GROUP table” on page
58.
BU_DN See the BU_DN column in
“SA_EVALUATION_SERVICE table” on page 48.
L_BU_DN See the BU_DN column in
“SA_EVALUATION_SERVICE table” on page 48.
RDN See the rdn_attr column in “T_GROUP_PROFILE
table” on page 62.
SERVICE_DN See the DN column in
“SA_EVALUATION_SERVICE table” on page 48.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
V_GC_CUSTOM view
The V_GC_CUSTOM4 view provides information for groups in the access catalog that
use custom join in the provisioning policy.
Table 110. V_GC_CUSTOM view
Column Name Description
ID See the entity_id column in “T_AccessCatalog table”
on page 56.
NAME See the name column in “T_AccessCatalog table” on
page 56.
L_NAME See the name column in “T_AccessCatalog table” on
page 56.
DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
L_DESCRIPTION See the description column in “T_AccessCatalog
table” on page 56.
CATEGORY See the Category column in “T_AccessCatalog table”
on page 56.
VIEW_OPTION See the view_option column in “T_AccessCatalog
table” on page 56.
ICON_URL See the icon_url column in “T_AccessCatalog table”
on page 56.
DN See the dn column in “T_GROUP table” on page 58.
PROFILE See the Type column in “T_GROUP table” on page
58.
68 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 110. V_GC_CUSTOM view (continued)
Column Name Description
BU_DN See the BU_DN column in
“SA_EVALUATION_SERVICE table” on page 48.
L_BU_DN See the BU_DN column in
“SA_EVALUATION_SERVICE table” on page 48.
RDN See the rdn_attr column in “T_GROUP_PROFILE
table” on page 62.
SERVICE_DN See the DN column in
“SA_EVALUATION_SERVICE table” on page 48.
SERVICE_ID See the ID column in “SA_EVALUATION_SERVICE
table” on page 48.
ACCT_ATTR See the acct_attr column in “T_GROUP_PROFILE
table” on page 62.
CASE_SENSITIVITY See the case_sensitivity column in
“T_GROUP_PROFILE table” on page 62.
TAG See the tag column in “T_AccessCatalogTags table”
on page 57.
L_TAG See the tag column in “T_AccessCatalogTags table”
on page 57.
BADGE_TEXT See the BADGE_TEXT column in “T_BADGES
table” on page 57.
BADGE_STYLE See the BADGE_STYLE column in “T_BADGES
table” on page 57.
ADDITIONALINFO See the additionalinfo column in “T_AccessCatalog
table” on page 56.
L_ADDITIONALINFO See the additionalinfo column in “T_AccessCatalog
table” on page 56.
4
Indicates that the view is added in IBM Security Identity Manager 6.0.0.2.
PENDING_APPROVAL view
This view is used in the design of Pending Approvals report. This view provides
information about the process ID of a process with pending work items and the
associated status.
Table 111. PENDING_APPROVAL view
Column Name Description Data type
PROCESSID ID of the parent process for which there exists a pending work item. Numeric
PE: The work item has some pending manual action from a workflow
participant.
ROOTPROCESSVIEW view
This view is used in the design of Account operations and Account operations by
individual report. The ROOTPROCESSVIEW captures all root processes, their IDs, types,
and requestor information from PROCESS table. It is an SQL view defined on
PROCESS table.
Table 112. ROOTPROCESSVIEW view table
Column Name Description Data type
ID ID of the parent process initiated for am IBM Security Identity Numeric
Manageroperation.
TYPE ID of the parent process initiated for am IBM Security Identity Manager Character
operation.
REQUESTER The DN of the user who requested this process. PROCESS (REQUESTER). Character
SUBPROCESSVIEW view
This view is used in the design of Account operations and Account operations by
individual report. This view provides information about the subprocesses that are
initiated due to various root processes. These processes are in turn initiated for
different operations in the IBM Security Identity Manager system.
Table 113. SUBPROCESSVIEW view table
Column Name Description Data type
ROOT_PROCESS_ID ID of the parent process initiated for an IBM Security Identity Numeric
Manager operation.
SUBMITTED Time that the subprocess was submitted. Numeric
COMPLETED Time that the subprocess is completed. Numeric
SUBJECT_PROFILE Profile name of the subject. Character
SUBJECT_SERVICE ITIM service name. Character
SUBJECT Process subject. Character
70 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 113. SUBPROCESSVIEW view table (continued)
Column Name Description Data type
RESULT_SUMMARY Process result summary code. Values include: Character
Approved (AA)
Rejected (AR)
Submitted (RS)
Success (SS)
Timeout (ST)
Failed (SF)
Warning (SW)
Pending (PE)
Escalated (ES)
Skipped (SK)
TYPE Type of the subprocess. Values include: Character
SUSPENDED_USERS view
The SUSPENDED_USERS1 view is used in the design of Suspended Users report. This
view provides the completion time of latest user suspend operation for a requestee.
Table 114. SUSPENDED_USERS view table
Column Name Description Data type
REQUESTEE DN of the requestee. Character
COMPLETED Completion time of latest suspend operation for a Character
requestee.
1
Indicates the view is added in release 4.6 Express.
SUSPENDED_ACCOUNT_OPERATIONS view
The SUSPENDED_ACCOUNT_OPERATIONS1 view is used in the design of Suspended
Accounts report. This view provides information about suspended account
operation for each requestee. It is an SQL view defined on PROCESS table.
1
Indicates the view is added in release 5.0.
PROCESS_VIEW view
The PROCESS_VIEW1 view is used in the design of Operations Report, User Report,
and Rejected Report. This view is defined on PROCESS table.
Table 116. PROCESS_VIEW view table
Column Name Description Data type
ID ID of the process. Numeric
REQUESTER DN of the requester. Character
REQUESTEE DN of the requestee. Character
1
Indicates the view is added in release 5.0.
SOD_OWNER table
The SOD_OWNER1 table stores information about the owners for a separation of duty
policy. There can be more than one owner for each separation of duty policy.
Table 117. SOD_OWNER table
Column Name Description Data type
*
ID Owner unique ID. Primary key. Numeric
*
POLICY_ID Separation of duty policy ID that is associated with the data. Numeric
References SOD_POLICY(ID).
OWNER_NAME Name of the person or role that is listed as the owner of this Character (256)
separation of duty policy.
BUSINESS_UNIT_NAME Name of the business unit of the person or role defined in Character (256)
OWNER_NAME.
TYPE The type of owner represented by this row. Valid values are: Character (2)
Person (P)
Role (R)
72 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 117. SOD_OWNER table (continued)
Column Name Description Data type
DN DN to the owner specified in the IBM Security Identity Manager Character
LDAP store. (2000)
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
SOD_POLICY table
The SOD_POLICY1 table stores information about a separation of duty policy. This
table is used by the inner workings of separation of duty implementation and
separation of duty reports.
Table 118. SOD_POLICY table
Column Name Description Data type
*
ID Separation of duty policy unique ID. Primary key. Numeric
*
GLOBAL_ID The global identifier of this separation of duty policy in LDAP. Numeric
NAME Name of this separation of duty policy. Character (256)
DESCRIPTION Description of this separation of duty policy. Character (500)
BUSINESS_UNIT_NAME Name of the business unit for this separation of duty policy. Character (256)
ENABLED The state of the separation of duty policy. Valid values are: Character (1)
Enabled (T)
Disabled (F)
Deleted (D)
DN DN to this separation of duty policy as specified in the IBM Character (2000)
Security Identity Manager LDAP store.
VERSION* Timestamp for when this policy was written to the database. It Numeric
might happen through policy add/modify/delete/evaluate.
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
SOD_RULE table
The SOD_RULE1 table stores information about a separation of duty policy rule. This
table is used by the inner workings of separation of duty implementation and
separation of duty reports.
Table 119. SOD_RULE table
Column Name Description Data type
*
ID Separation of duty policy rule unique ID. Primary key. Numeric
*
POLICY_ID Separation of duty policy ID that is associated with the data. Numeric
References SOD_POLICY(ID).
GLOBAL_ID* The global ID of this separation of duty policy rule in LDAP. Numeric
NAME Name of this separation of duty policy rule. Character (500)
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
SOD_RULE_ROLE table
The SOD_RULE_ROLE1 table stores information about the roles listed in a
separation of duty policy rule. This table is used by the inner workings of
separation of duty implementation and separation of duty reports.
Table 120. SOD_RULE_ROLE table
Column Name Description Data type
*
ID Separation of duty policy rule unique ID. Primary key. Numeric
*
POLICY_RULE_ID Separation of duty policy rule ID that is associated with Numeric
the data. References SOD_RULE(ID).
GLOBAL_ID* The global identifier of this role in LDAP. Numeric
NAME Name of this role. Character (256)
DESCRIPTION Description of this role. Character (500)
BUSINESS_UNIT_NAME Name of the business unit for this role. Character (100)
DN DN to this role as specified in the IBM Security Identity Character (2000)
Manager LDAP store.
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
SOD_VIOLATION_HISTORY table
The SOD_VIOLATION_HISTORY1 table stores historical information about exemptions
and violations for a separation of duty policy.
Table 121. SOD_VIOLATION_HISTORY table
Column Name Description Data type
*
ID Unique ID for this historical record of separation of duty Numeric
violation. Primary key.
POLICY_GLOBAL_ID* The global identifier of the separation of duty policy in LDAP to Numeric
which this record refers.
RULE_GLOBAL_ID* The global identifier of the separation of duty policy rule in Numeric
LDAP to which this record refers.
PERSON_GLOBAL_ID* The global identifier of the person to which this violation refers Numeric
in LDAP.
PERSON_NAME Name of the person to which this violation refers. Character (256)
PERSON_BU Name of the business unit for the person in PERSON_DN. Character (256)
74 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 121. SOD_VIOLATION_HISTORY table (continued)
Column Name Description Data type
PERSON_DN DN to the person record as specified in the IBM Security Character (2000)
Identity Manager LDAP store.
PROCESS_ID The associated workflow process ID that changed the state of Numeric
this violation. It might not have a value if the violation was
discovered by policy evaluation or exemption administration
through the administrative console.
ADMIN_NAME Name of the person who revoked or exempted this violation. Character (256)
ADMIN_BU Name of the business unit for the person in ADMIN_DN. Character (256)
ADMIN_DN DN to the person record who revoked or exempted this Character (2000)
violation as specified in the IBM Security Identity Manager
LDAP store.
ADMIN_NOTES Justification notes (text) that the person in column ADMIN_DN Character
entered at time of revoke/exempt of violation.
STATUS The state of this historical record about a violation or exemption. Character (1)
Valid values are:
Violation (V)
Exemption (A)
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
SOD_VIOLATION_STATUS table
The SOD_VIOLATION_STATUS1 table stores current information about exemptions and
violations for a separation of duty policy.
Table 122. SOD_VIOLATION_STATUS table
Column Name Description Data type
*
ID Unique ID for this record of separation of duty violation. Primary Numeric
key.
POLICY_GLOBAL_ID* The global identifier of the separation of duty policy in LDAP to Numeric
which this record refers.
RULE_GLOBAL_ID* The global identifier of the separation of duty policy rule in LDAP to Numeric
which this record refers.
PERSON_GLOBAL_ID* The global identifier of the person to which this violation refers in Numeric
LDAP this record.
PERSON_NAME Name of the person to which this violation refers. Character (256)
PERSON_BU Name of the business unit of the person in PERSON_DN. Character (256)
PERSON_DN DN to the person record as specified in the IBM Security Identity Character (2000)
Manager LDAP store.
Violation (V)
Exemption (A)
*
TS Timestamp when the action recorded in this record occurred. Numeric
*
EVAL_TS Timestamp when this violation was last known to be true during sod Numeric
policy evaluation.
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
SOD_VIOLATION_ROLE_MAP table
The SOD_VIOLATION_ROLE_MAP1 table stores information about the roles that are
involved in a violation. The roles on the person that are part of a violation are
mapped to the roles in the policy rule.
Table 123. SOD_VIOLATION_ROLE_MAP table
Column Name Description Data type
*
ID Unique ID for this record. Primary key. Numeric
*
VIOLATION_ID Separation of duty violation ID that is associated with the data. Numeric
References SOD_VIOLATION_STATUS(ID) and
SOD_VIOLATION_HISTORY(ID).
RULEROLE The DN of the role as referenced in the separation of duty Character (2000)
policy rule that is involved in this violation.
PERSONROLE The DN of the role on the person that is found to be in Character (2000)
violation of the separation of duty policy rule.
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.1.
Others
This section describes other tables.
76 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
ACI_CATEGORIES table
The ACI_CATEGORIES3 stores the access control protection categories.
Table 124. ACI_CATEGORIES table
Column Name Description Data type
*
ID The unique ID of the ACI category. Numeric
*
NAME The ACI category name. Primary key. Character (255)
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
AUTH_KEY table
The AUTH_KEY table stores the keys for signing and verifying authentication
requests.
Table 125. AUTH_KEY table
Column Name Description Data type
*
Y The public key in the DSA algorithm. Character (2000)
*
P The prime number in the DSA algorithm. Character (2000)
*
Q The subprime number in the DSA algorithm. Character (2000)
*
G The modulus in the DSA algorithm. Character (2000)
*
X The private key in the DSA algorithm. Character (2000)
*
Indicates the column is required and not null.
COMMON_TASKS table
The COMMON_TASKS1 table stores common tasks for each persona.
Table 126. COMMON_TASKS table
Column Name Description Data type
*
PERSONA Name of the persona. Primary key. Character (100)
*
TASK_ID Unique ID of a task. Primary key. References Character (255)
TASKS_VIEWABLE (TASK_ID).
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.0.
LCR_INPROGRESS_TABLE table
LCR_INPROGRESS_TABLE tracks the lifecycle rule that is in progress for a particular
entity. This table prevents two or more lifecycle rules from operating on the same
entity at any time.
Table 127. LCR_INPROGRESS_TABLE table
Column Name Description Data type
*
TENANT The name of the tenant for which the lifecycle rule applies. Character (256)
*
RULE_ID Identifier for the lifecycle rule. Numeric
*
Indicates the column is required and not null.
ROLE_INHERITANCE table
The ROLE_INHERITANCE1 table stores the relationships between roles in the role
hierarchy.
Table 128. ROLE_INHERITANCE table
Column Name Description Data type
ASCENDENT The DN of the parent role in this parent-child relationship. Character (2000)
DESCENDENT The DN of the child role in this parent-child relationship. Character (2000)
1
Indicates the table is added in release 5.1.
SCHEDULED_MESSAGE table
The SCHEDULED_MESSAGE table stores information associated with a scheduled event
that is provided by the scheduler. The scheduler is a component of IBM Security
Identity Manager that stores one-time or regularly scheduled events. These events
are typically user requests that are made through the workflow engine or recurring
reconciliation events.
Table 129. SCHEDULED_MESSAGE table
Column Name Description Data type
SCHEDULED_TIME A value that represents the time of the scheduled event, which Numeric
is the number of milliseconds since January 1, 1970, 00:00:00
Greenwich mean time.
SCHEDULED_MESSAGE_ID* Unique ID for each scheduled event. Primary key. Numeric
MESSAGE A serialized object that represents the detailed information Long Character
about the scheduled event.
SMALL_MESSAGE1 A small serialized object that represents the detailed Character (4000)
information about the scheduled event.
SERVER The server that picks up the most recently scheduled event. Character (255)
CHECKPOINT_TIME A value that represents the last pickup time of the scheduled Numeric
event, which is the number of milliseconds since January 1,
1970, 00:00:00 Greenwich mean time.
REFERENCE_ID Used only for scheduled workflow events, it is the workflow Numeric
process ID from which the scheduled event is coming.
REFERENCE_ID2 Used to store label and meta information about the scheduled Numeric
message.
*
Indicates the column is required and not null.
78 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
1
Indicates the table is added in release 5.0.
TASK_TREE table
The TASK_TREE3 stores the master task IDs and the task tree structure information
from Set System Security > Manage Views in the IBM Security Identity Manager
Console.
Table 130. TASK_TREE table
Column Name Description Data type
PARENT The unique ID of the parent task. Character (500)
*
TASK_ID The unique ID of the task. Primary key. Character (500)
SEQUENCE_NO The sequence number of the task for ordering purpose. Numeric
ADMIN_ONLY The flag indicates whether the task is exposed from Set System Character (1)
Security > Manage Views in the IBM Security Identity Manager
Console. Values include:
v Y – not exposed and therefore not configurable.
v N – exposed and configurable for each view.
*
Indicates the column is required and not null.
3
Indicates the table is added in IBM Security Identity Manager 6.0.
TASKS_VIEWABLE table
The TASKS_VIEWABLE1 table stores task settings for each view. The information
determines which tasks are available and enabled in a view.
Table 131. TASKS_VIEWABLE table
Column Name Description Data type
*
TASK_ID Unique ID of a task. Primary key. Numeric
VIEW_ID Unique ID of a view definition. References Numeric
VIEW_DEFINITION (ID).
VIEWABLE To determine whether a task is enabled for in a view. Character (1)
Values: ‘Y' or ‘N’.
*
Indicates the column is required and not null.
1
Indicates the table is added in release 5.0.
VIEW_DEFINITION table
The VIEW_DEFINITION1 table stores view definitions. The information is used to
create, modify, delete, and search views.
Table 132. VIEW_DEFINITION table
Column Name Description Data type
*
ID Unique ID of a view definition. Primary key. Numeric
NAME Name of a view definition. Character (100)
DESCRIPTION Description of a view definition. Character (2000)
*
Indicates the column is required and not null.
80 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Chapter 2. IBM Tivoli Directory Server schema and class
reference
This section provides descriptions about the IBM Security Identity Manager
directory information tree and the classes it uses in the Tivoli Directory Server.
The following is a diagram of a basic IBM Security Identity Manager directory tree:
ou = itim
(application information) ou = companyName
ou = constraints
ou=itim
erglobalid = <globalID>
(service information)
erdictionary = password
ou = org Chart ou = policies ou = category ou = cycleBin
ou = assemblyLine ou = challenges
ou = 0
ou = 0
ou = config ou = accessType
ou = n
ou = n
ou = excludeAccounts ou = policies
82 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 133. Brief descriptions of each container in the directory tree (continued)
Container Description
1
ou=policies This container stores information about account defaults for each service.
2
ou=ownershipType This container stores information about ownership types.
1
Indicates that the container is added in Version 5.0.
2
Indicates that the container is added in Version 6.0
General classes
The IBM Security Identity Manager system uses the directory server default
schema and a specific schema.
erBPPersonItem
The erBPPersonItem class is an auxiliary class that identifies attributes for a IBM
Business Partner person. This class is a domain entry. The parent class is top.
Table 134. erBPPersonItem table
Attribute name Description Type
Mail Email address. directory string
Cn Common name for person. directory string
erPersonStatus Status of person. integer
erSponsor DN of sponsor for this person. distinguished
name
erRoles DN of roles for person. distinguished
name
erAliases Aliases for person. directory string
erSharedSecret Value used by the user for password pickup. directory string
erCustomDisplay User-selected attribute to display in the BP Person directory string
list.
erLocale The locale preference of the user. Default is the directory string
system locale.
erCreateDate Timestamp of when the object is created. The directory string
timestamp is in Greenwich Mean Time format.
erSynchPassword Password to be used for account creation. binary
erLastStatusChangeDate Timestamp of when the status is updated. The directory string
timestamp is in Greenwich Mean Time format.
erLastOperation Available for custom use for lifecycle event. directory string
1
Indicates the attribute is added in release 4.6 Express.
2
Indicates the attribute is added in release 5.1.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erBPOrg
The erBPOrg class is a structural class that stores business partner organization
information. This class is a domain entry. The parent class is top.
Table 135. erBPOrg table
Attribute name Description Type
ou Organizational unit. This attribute is required. directory string
description Description of the business partner directory string
organization.
erBPOrgItem
The erBPOrgItem class is an auxiliary class that stores business partner (BP)
organization information. This class is a domain entry. The parent class is top.
84 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 136. erBPOrgItem table
Attribute name Description Type
ou Organizational unit name. directory string
erBPOrgStatus Status of the BP organization. integer
erSponsor DN of organizational unit supervisor. distinguished name
3
erURI The universal resource identifier. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erDictionary
The erDictionary class stores words that cannot be used as passwords. This class
is a domain entry. The parent class is top.
Table 137. erDictionary table
Attribute name Description Type
erDictionaryName The name of the dictionary. This directory string
attribute is required.
description Description of the dictionary. directory string
erDictionaryItem
The erDictionaryItem class stores an individual word that is not allowed as a
password. These classes are then linked together with the erDictionary class. This
class is a domain entry. The parent class is top.
Table 138. erDictionaryItem table
Attribute name Description Type
erWord The word that is excluded from being directory string
used as a password. This attribute is
required.
description Description of the word and the reason directory string
it cannot be used as a password.
erDynamicRole
The erDynamicRole class provides the structure for a dynamic role. The parent class
is erRole.
Table 139. erDynamicRole table
Attribute name Description Type
erJavaScript Role evaluation definition. This binary
definition is used to evaluate members
of a role.
erScope Scope of role evaluation: single or integer
subtree scope.
erFormTemplate
The erFormTemplate class stores form template information. This class is a domain
entry. The parent class is top.
erIdentityExclusion
The erIdentityExclusion class stores the names of the accounts that are not
retrieved during reconciliation. This class is a domain entry. The parent class is top.
Table 141. erIdentityExclusion table
Attribute name Description Type
cn Common name. This attribute is directory string
required.
erObjectProfileName Service profile name. directory string
erAccountID Account ID to exclude from the directory string
reconciliation.
erLocationItem
The erLocationItem class is an auxiliary class that stores attributes of a location
within the system. The location name attribute must be defined. The
erLocationItem class is a domain entry and includes the erManagedItem class. The
parent class is top.
Table 142. erLocationItem table
Attribute name Description Type
l Location name. This attribute is directory string
required.
erSupervisor DN of location supervisor. distinguished name
3
erURI The universal resource identifier. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erManagedItem
The erManagedItem class is an auxiliary class that is added to all domain entries
(organizations, organizational units, people, and roles) that require access control.
The erManagedItem class defines a unique ID, a parent entry (if present), and an
access control list. The parent class is top.
Table 143. erManagedItem table
Attribute name Description Type
erGlobalId Unique, random ID assigned to all number string
entries in a directory. Used as the
regional DN for each entry.
erLastModifiedTime Entry removal date and time (GMT directory string
format).
erAcl Access control list. binary
86 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 143. erManagedItem table (continued)
Attribute name Description Type
erAuthorizationOwner Owner of access control. distinguished name
erParent Entry organizational unit DN. distinguished name
erIsDeleted True, if in recycle bin. directory string
erLifecycleEnable Specifies whether the lifecycle operation Boolean
is defined on an entity. If true, there is
a lifecycle operation defined for an
entity.
erProfileName Profile name of an object. directory string
1
erURI Universal resource identifier of an case exact matching string
object.
1
Indicates the attribute is added in Version 6.0.
erOrganizationItem
The erOrganizationItem class is an auxiliary class that is added to organizations.
The erOrganizationItem class is a domain entry and includes the erManagedItem
class. It defines the organization name and status. The parent class is top.
Table 144. erOrganizationItem table
Attribute name Description Type
o Organization name. directory string
erOrgStatus Organization status. integer
3
erURI The universal resource identifier. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erOrgUnitItem
The erOrgUnitItem class is an auxiliary class that stores information about an
organizational unit. It contains information about the ou name and optionally the
supervisor (erSupervisor) for an organizational unit. The erOrgUnitItem is a
domain entry. The parent class is top.
Table 145. erOrgUnitItem table
Attribute name Description Type
ou Organizational unit. directory string
erSupervisor DN of organizational unit supervisor. distinguished name
3
erURI The universal resource identifier. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erPersonItem
The erPersonItem class is an auxiliary class that identifies attributes for a person.
The erPersonItem is a domain entry. The parent class is top.
Certified (CERTIFIED)
88 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
1
Indicates the attribute is added in release 4.6 Express.
2
Indicates the attribute is added in release 5.1.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erRole
The erRole class stores the name and description for an organizational role.
However, it does not store membership information. The user membership is
stored in erPersonItem.erRoles, and the role membership is stored in the
ROLE_INHERITANCE database table. This class is a domain entry. The parent class is
top.
Table 147. erRole table
Attribute name Description Type
erRoleName Name of the organizational role. This attribute directory string
is required.
description Description of the role. directory string
1
erSubRoles Contains no value, attribute is used for ACI directory string
permission on managing child roles.
erRoleClassification1 The classification of role, application role, directory string
system role, and others.
owner1 The owner of the role, can be person dn or role distinguished name
dn.
erRoleAssignmentKey3 The assignment attributes of a role directory string
(multi-valued attribute).
erURI3 The universal resource identifier. directory string
1
Indicates the attribute is added in release 5.1.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erSecurityDomainItem
The erSecurityDomainItem class is an auxiliary class for an admin domain. The
parent class is top.
Table 148. erSecurityDomainItem table
Attribute name Description Type
ou Organizational unit. directory string
erAdministrator DN of the administrator of an admin distinguished name
domain.
erURI3 The universal resource identifier. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
SecurityDomain
The SecurityDomain class stores admin domain information. This class is a domain
entry. The parent class is top.
erTemplate
The erTemplate class stores notification template information. This class is a
domain entry. The parent class is top.
Table 150. erTemplate table
Attribute name Description Type
cn Either name or global ID of the directory string
notification template.
erEnabled Specifies whether the notification Boolean
template is enabled.
erTemplateName1 Name of the notification template. directory string
erSubject Content in the subject field of the binary
notification.
erText Content in the text field of the binary
notification.
erXHTML Content in the XHTML field of the binary
notification.
erType1 Type of the notification template. directory string
Values include:
0 – Undefined
1 – Recertification Approval
3 – Mail Template
1
Indicates the attribute is added in release 4.6 Express.
2
Indicates the attribute value is added in release 5.1.
erTenant
The erTenant class defines properties based on a tenant, such as the ou if
passwords can be edited or lost passwords can be mailed. The parent class is top.
90 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 151. erTenant table
Attribute name Description Type
ou Organization unit that contains this tenant. This directory string
attribute is required.
erIsActive Indicates whether this tenant is active. This attribute Boolean
is required.
description Description of tenant. directory string
erPswdEditAllowed Indicates whether passwords might be set (true) or Boolean
generated (false). This attribute is required.
erLostPswdByMail Indicates whether passwords can be mailed to a user Boolean
for this tenant. This attribute is required.
erBucketCount Hash bucket number. This attribute is required. integer
erLastModifiedTime Time the tenant was last modified (attributes). directory string
erPswdExpirationPeriod Number of days after which the password becomes integer
expired. When the user tries to access the system
after the password expires, the user is forced to
change the password. When this value is set to 0, the
password does not expire.
erPswdTransactionExpPeriod Number of hours after which the transaction to integer
retrieve an account password expires. The password
is typically retrieved with the URL link provided in
an email message from the system. When this value
is set to 0, the URL link does not expire.
erLogonCount Number of invalid login attempts that the user can integer
have before the user account is suspended. When this
value is set to 0, the user can attempt to access the
system without limit, and the system does not
suspend the account.
erResponseEnable Attribute for enabling or disabling the password Boolean
challenge and response feature. When this attribute is
set to TRUE, the user can use the Forgot Your
Password link to enter the system by providing
correct answers to the password challenge and
response questions.
erResponseDescription Message on the login page when the user account is directory string
suspended after the user
v Tries to log in to the system too many times.
v Fails to respond correctly to the password
challenge and response questions.
erResponseEmail Message emailed to the administrator responsible for directory string
user accounts suspended when the user fails to
access the system in the defined number of tries.
Reconciliation (0)
92 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 151. erTenant table (continued)
Attribute name Description Type
1
erShowGenPwd Indicates whether the generated password is Boolean
displayed on the screen.
erPwdEnabled2 Indicates whether password is enabled. Boolean
2
erAutoGroupMembershipEnabled Indicates whether automatic group membership of Boolean
certain IBM Security Identity Manager accounts is
enabled.
1
Indicates the attribute is added in release 4.6 Express.
2
Indicates the attribute value is added in release 5.0.
erWorkflowDefinition
The erWorkflowDefinition class stores workflow information. This class is a
domain entry. The parent class is top.
Table 152. erWorkflowDefinition table
Attribute name Description Type
erProcessName The name of the workflow. This directory string
attribute is required.
erObjectProfileName Service profile name. directory string
erXML Definition of workflow. binary
erCategory Type of entity to manage, such as directory string
Person, BPPerson, or Account.
description1 Description of the workflow. directory string
1
Indicates the attribute value is added in release 5.0.
erOwnershipType
The erOwnershipType class is a structural class that represents an ownership type.
The parent class is top.
Table 153. erOwnershipType table
Attribute name Description Type
erObjectProfileName Name of the ownership type. directory string
description Description of the ownership type. directory string
erCredential
The erCredential3 class stores credential-specific attributes. The parent class is
erCredentialComponent.
3
Indicates the class is added in IBM Security Identity Manager 6.0.
erCredentialComponent
The erCredentialComponent3 class stores credential component-specific attributes.
Attributes are shared by both erCredential and erCredentialPool classes. The
parent class is top.
Table 155. erCredentialComponent table
Attribute name Description Type
erCredentialName Name of either the credential or directory string
credential pool. This attribute is
required.
description A description of the credential directory string
component.
erObjectProfileName This attribute is not used. Reserved for directory string
future use.
erUseGlobalSettings Indication whether this credential boolean
component uses global settings. For
example, true or false.
Note: This attribute is not used by
credential pool.
3
Indicates the class is added in IBM Security Identity Manager 6.0.
erCredentialLease
The attributes of the erCredentialLease3 class are for access control item (ACI)
permission. The credential lease information is stored in the erCredentialLease
94 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
database table. The parent class is top. See the database erCredentialLease table
for the detailed description of each attribute.
Table 156. erCredentialLease table
Attribute name Description Type
erCVCatalog Contains no value; attribute is used for distinguished name
ACI permission.
erLessee Contains no value; attribute is used for distinguished name
ACI permission.
erLesseeName Contains no value; attribute is used for directory string
ACI permission.
erLeaseExpirationTime Contains no value; attribute is used for directory string
ACI permission.
erJustification Contains no value; attribute is used for directory string
ACI permission.
erCustomAttribute1 Contains no value; attribute is used for directory string
ACI permission.
erCustomAttribute2 Contains no value; attribute is used for directory string
ACI permission.
erCustomAttribute3 Contains no value; attribute is used for directory string
ACI permission.
erCustomAttribute4 Contains no value; attribute is used for directory string
ACI permission.
erCustomAttribute5 Contains no value; attribute is used for directory string
ACI permission.
erCredentialPoolDN Contains no value; attribute is used for distinguished name
ACI permission.
erLeaseStatus Contains no value; attribute is used for integer
ACI permission.
erLastNotification Contains no value; attribute is used for directory string
ACI permission.
erLeaseCreateTime Contains no value; attribute is used for directory string
ACI permission.
3
Indicates the class is added in IBM Security Identity Manager 6.0.
erCredentialPool
The erCredentialPool3 class stores credential pool-specific attributes. The parent
class is erCredentialComponent.
Table 157. erCredentialPool table
Attribute name Description Type
owner The owner of the credential pool, can distinguished name
be person dn or role dn.
erService The service of the credential pool. distinguished name
erServiceGroup The service group DN of the credential distinguished name
pool indicating that all credentials are
member of the pool.
3
Indicates the class is added in IBM Security Identity Manager 6.0.
4
Indicates the class is added in IBM Security Identity Manager 6.0.0.2.
erSharedAccessPolicy
The erSharedAccessPolicy3 class stores shared access policy-specific attributes. It
does not store the membership and entitlement information. The membership and
entitlement are stored in SA_POLICY_MEMBERSHIP and SA_POLICY_ENTITLEMENT
database tables. The parent class is top.
Table 159. erSharedAccessPolicy table
Attribute name Description Type
erPolicyItemName The policy name. This attribute is directory string
required.
description A description of the policy. directory string
erPolicyEnabled Flag indicating whether the policy boolean
participates in the shared access
evaluation process.
96 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 159. erSharedAccessPolicy table (continued)
Attribute name Description Type
erScope Determines which credentials and integer
credential pools are governed by this
policy.
Values include:
v Single-level scope limits the policy to
affect only those credentials and
credential pools at the same level as
the policy.
v Subtree scope allows a policy to
affect credentials and credential pools
at the same level as the policy,
credentials, and credential pools
under policy.
erURI The universal resource identifier. directory string
erSharedAccessRole Contains no value; attribute is used for directory string
ACI permission on defining the policy
membership.
3
Indicates the class is added in IBM Security Identity Manager 6.0.
Service classes
Services can be hosted or owned. A hosted service is a service that is shared by
multiple organizations, such as in an ASP environment. An owned service is not
shared. Each type of service has its own, different representation in the system.
erAccessItem
The erAccessItem1 class is an auxiliary class that defines required attributes for
Access Entitlement. The parent class is top.
Table 160. erAccessItem table
Attribute name Description Type
erAccessName Name of an access. directory string
erObjectProfileName Access types defined in the system. directory string
Default access types are: Role,
Application, SharedFolder, MailGroup
1
Indicates the class is added in release 5.0.
erAccessType
The erAccessType1 class is a structural class to represent an access type. The parent
class is top.
Table 161. erAccessType table
Attribute name Description Type
erObjectProfileName Name of the access type. This attribute directory string
is required.
description Description of the access type. directory string
1
Indicates the class is added in release 5.0.
erAccountItem
The erAccountItem class is an auxiliary class that defines required attributes for a
user account. The parent class is top.
Table 162. erAccountItem table
Attribute name Description Type
erUid Account login ID. directory string
Owner DN of the account owner. distinguished
name
erAccountStatus Account status. integer
98 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 162. erAccountItem table (continued)
Attribute name Description Type
erAccountCompliance Compliancy of the account. Possible values are: integer
Certified (CERTIFIED)
Certified (CERTIFIED)
0 – user account
1 – system account
erObjectProfileName Name of the ownership type. directory string
4
erAccountOwnershipType The account ownership type. If the value is not directory string
specified, it is interpreted as Individual account.
erURI4 The universal resource identifier. directory string
4
erCVCatalog The DN of the credential if the account is added to distinguished
the credential vault. name
1
Indicates the attribute is added in release 4.6 Express.
2
Indicates the class is added in release 5.0.
3
Indicates the class is added in release 5.1.
4
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erADJNDIFeed
The erADJNDIFeed1 class is a structural class and provides the structure for the
Active Directory (AD) JNDI Identity Feeds service. The AD JNDI Identity Feed
service is used to feed identity data in the Active Directory server. The parent class
is top.
Table 163. erADJNDIFeed table
Attribute name Description Type
erServiceName Name that is on the user interface. This attribute is directory string
required.
erURL URL of the data source. Supported protocols include: file, directory string
http, and https. This attribute is required.
100 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 163. erADJNDIFeed table (continued)
Attribute name Description Type
erPassword Key to authenticate the data source for the JNDI client. directory string
erUid Name of the principal to authenticate the data source for directory string
the JNDI client.
Ernamingattribute The naming attribute on a service used to define the directory string
distinguished names of entries in the feed.
Ernamingcontexts Identifies the location of identity feed data in the data distinguished name
source. This attribute is required.
erPersonProfileName Name of the profile to be used for the identity feed. directory string
erAttrMapFilename A full path name of a file that contains a mapping of directory string
attributes for the identity feed.
erPlacementRule A script fragment that defines the location of the user binary
within the organization chart during the HR feed.
erpersonsearchfilter An LDAP filter to scope which data is to be used for directory string
identity feed.
erUseWorkflow Indication if the identity feed is to be processed by using Boolean
the workflow engine.
erEvaluateSoD2 Indication if the separation of duty policy is to be Boolean
evaluated when workflow is used for the feed.
1
Indicates the class is added in release 5.0.
2
Indicates the class is added in release 5.1.
erAttributeConstraint
The erAttributeConstraint class provides the IBM Security Identity Manager
structure for an attribute constraint. The parent class is top.
Table 164. erAttributeConstraint table
Attribute name Description Type
erOid Attribute Object Identification Number (Oid). This directory string
attribute is required.
cn Name of the constraint on the attribute. directory string
erType Attribute type. directory string
erIsReadOnly True, if this attribute is read-only. Boolean
erDefaultValue Attribute default values. directory string
erCustomConstraint Attribute definition constraints. directory string
erChallenges
The erChallenges class provides the structure for administrator-defined questions
of password challenge and response. The parent class is top.
Table 165. erChallenges table
Attribute name Description Type
cn Name of the challenge and response directory string
entry. This attribute is required.
Chapter 2. IBM Tivoli Directory Server schema and class reference 101
Table 165. erChallenges table (continued)
Attribute name Description Type
erLastModifiedTime Last time the challenge and response directory string
question list of the user was updated.
erLostPasswordQuestion Password challenge and response directory string
question list of the user.
erComplianceIssue
The erComplianceIssue class represents the compliance issue of an account. When
an account is noncompliant, a compliance issue might be created for an attribute
value. The parent class is top.
Table 166. erComplianceIssue table
Attribute name Description Type
erGlobalId Unique, random ID assigned to all entries in a directory. number string
Used as the regional DN for each entry. This attribute is
required.
erAttributeName Name of account attribute. directory string
erOverride Indicates whether the issue is for a non-compliant Boolean
attribute or disallowed account.
erCustomData Value of the attribute. directory string
erAttributeAction Action of the attribute. integer
erCreateDate Timestamp (GMT format) of when the object is created. directory string
1
erBigCustomData Large value of the attribute. binary
1
Indicates the attribute is added in release 5.0.
erCSVFeed
The erCSVFeed1 class is a structural class and provides the structure for Identity
feed that is in comma-separated value (CSV) format. The parent class is top.
Table 167. erCSVFeed table
Attribute name Description Type
erServiceName Name to display on the user interface. directory string
This attribute is required.
erCSVFileName A full path name of a CSV file that directory string
contains identity data in
comma-separated-value format. This
attribute is required.
ernamingattribute The naming attribute on a service used directory string
to define the distinguished names of
entries in the feed.
erPersonProfileName Name of the profile to be used for the directory string
identity feed.
erPlacementRule A script fragment that defines the binary
location of the user in the organization
chart during the identity feed.
102 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 167. erCSVFeed table (continued)
Attribute name Description Type
erUseWorkflow Indication if the identity feed is to be Boolean
processed by using the workflow
engine.
erEvaluateSoD2 Indication if the separation of duty Boolean
policy is to be evaluated when
workflow is used for the feed.
1
Indicates the class was added in release 5.0.
2
Indicates the attribute was added in release 5.1.
erDSMLInfoService
Table 168. erDSMLInfoService table
Attribute name Description Type
erServiceName The display name for service instances. This attribute is required. directory string
erDSMLFileName The name of a DSML file stored on disk. directory string
erUseWorkflow A Boolean flag used on a DSMLInfoService to indicate that people Boolean
are to be processed by the workflow engine.
erUid An identifier used to uniquely identify a user of a service. directory string
erPassword A password used to authenticate a user. binary
erPlacementRule A script fragment that defines the location of the user in the binary
organization chart.
erproperties Defines protocol and behavior properties for service profiles. directory string
erprotocolmappings Specifies the service attributes that must be used in messages sent directory string
to managed resources.
erserviceproviderfactory Defines the name of the Java class for creating the directory string
ServiceProvider used to communicate with the managed resource.
erxforms Defines transforms for IBM Security Identity Manager adapters. binary
1
erEvaluateSoD Indication if the separation of duty policy is to be evaluated when Boolean
workflow is used for the feed.
1
Indicates the attribute is added in release 5.1.
erDSML2Service
The erDSML2Service class provides the Directory Service Markup Language Version
2 (DSMLv2) class to import data into IBM Security Identity Manager. The parent
class is top.
Table 169. erDSML2Service table
Attribute name Description Type
erCategory Type of entity to manage. This attribute is required. directory string
erServiceName Name to display on the user interface. This attribute is required. directory string
erURL URL of the data source. Supported protocols include: file, http, and directory string
https. This attribute is required.
erPassword Key to authenticate DSMLv2 clients for the JNDI client. binary
Chapter 2. IBM Tivoli Directory Server schema and class reference 103
Table 169. erDSML2Service table (continued)
Attribute name Description Type
erPlacementRule Placement rule that defines a script to place entries in the organization binary
chart.
erUid Name of the principal to authenticate DSMLv2 clients for the JNDI client. directory string
erUseWorkflow Boolean flag to indicate whether to use workflow to manage data. A boolean
value of true evaluates provisioning policies and places an entry in the
audit trail.
ernamingattribute The naming attribute on a service used to define the distinguished directory string
names of entries in event notification.
Ernamingcontexts1 Identifies the service. distinguished
name
This attribute is required when IBM Security Identity Manager is acting
as a DSMLv2 service.
erEvaluateSoD2 Indication if the separation of duty policy is to be evaluated when boolean
workflow is used for the feed.
1
The namingcontext attribute is deprecated and is replaced with ernamingcontexts
in release 5.0.
2
Indicates the attribute is added in release 5.1.
erGroupItem
The erGroupItem1 class is an auxiliary class to represent a service group to which
the account belongs. The parent class is top.
Table 170. erGroupItem table
Attribute name Description Type
erGroupId Unique identifier of the service group. directory string
erGroupName Name of the service group. directory string
erGroupDescription Description of the service group. directory string
3
erURI The universal resource identifier. directory string
1
Indicates the class was added in release 5.0.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erHostedAccountItem
The erHostedAccountItem class is an auxiliary class that is added to account entries
for hosted services (that is, represented by erHostedService entries). The erHost
attribute holds a reference to the owned service entry and provides a more efficient
search when it tries to identify the owned service. The parent is erAccountItem.
Table 171. erHostedAccountItem table
Attribute name Description Type
erHost Distinguished name of owned service entry. distinguished name
104 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
erHostedService
The erHostedService class describes a hosted service. The erHostedService class is
a domain entry. The parent class is top.
Table 172. erHostedService table
Attribute name Description Type
erServiceName Name of the service. This attribute is required. directory string
erService DN of the target service to be managed. This distinguished name
attribute is required.
erObjectProfileName Service profile name for target service. This attribute directory string
is required.
erHostSelectionPolicy
The erHostSelectionPolicy class provides the structure for a host selection policy.
The parent class is erPolicyItemBase.
Table 173. erHostSelectionPolicy table
Attribute name Description Type
erJavaScript Contains a scriptlet used at run time to return a service binary
instance. This attribute is required.
erObjectProfileName Name corresponding to the service type. This attribute is directory string
required.
erUserClass Name of a user class, such as Person or BPPerson. This directory string
attribute is required.
erITIMService
The erITIMService class provides the IBM Security Identity Manager structure for
IBM Security Identity Manager service. The parent class is top.
Table 174. erITIMService table
Attribute name Description Type
erServiceName IBM Security Identity Manager service name. This attribute is directory string
required.
owner Service owner (person). distinguished name
3
erRepositoryService The existing account repository used by IBM Security Identity directory string
Manager for authentication.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erJNDIFeed
The erJNDIFeed1 class is a structural class and provides the structure for
InetOrgPerson JNDI Identity Feeds service. The parent class is top.
Table 175. erJNDIFeed table
Attribute name Description Type
erServiceName Name to display on the user interface. This attribute is directory string
required.
Chapter 2. IBM Tivoli Directory Server schema and class reference 105
Table 175. erJNDIFeed table (continued)
Attribute name Description Type
erURL URL of the data source. Supported protocols include: directory string
file, http, and https. This attribute is required.
erPassword Key to authenticate the data source for the JNDI client. directory string
erUid Name of the principal to authenticate the data source directory string
for the JNDI client.
ernamingattribute The naming attribute on a service used to define the directory string
distinguished names of entries in the feed.
ernamingcontexts Identifies the location of identity feed data in the data distinguished name
source. This attribute is required.
erPersonProfileName Name of the profile to be used for the identity feed. directory string
erAttrMapFilename A full path name of a file that contains a mapping of directory string
attributes for the identity feed.
erPlacementRule A script fragment that defines the location of the user binary
in the organization chart during the HR feed.
erpersonsearchfilter An LDAP filter to scope which data is to be used for directory string
identity feed.
erUseWorkflow Indication if the identity feed is to be processed by Boolean
using the workflow engine.
1
Indicates the class was added in release 5.0.
erJoinDirective
The erJoinDirective class provides the structure for a join directive used in
merging provisioning parameters. The parent class is top.
Table 176. erJoinDirective table
Attribute name Description Type
erAttributeName Name of service attribute. This attribute is required. directory string
erDirectiveType Type of join directive to be used. This attribute is required. directory string
description Description of how the directive is used. directory string
erCustomData Contains any parameters to be passed to the class that directory string
implements the JoinDirective interface.
erPrecedenceSequence Sequence of allowed values for a single valued attribute with directory string
the most preferable values listed first.
erPrivilegeRule
The erPrivilegeRule class provides the structure for a privilege rule used in
privileges of account attributes. The parent class is top.
Table 177. erPrivilegeRule table
Attribute name Description Type
erAttributeName Name of account attribute. This attribute is required. directory string
106 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 177. erPrivilegeRule table (continued)
Attribute name Description Type
erDirectiveType Type of join directive to be used. This attribute is required. Possible directory string
values:
4 – Precedence sequence
erPrecedenceSequence Sequence of allowed values for a single valued attribute with the directory string
most preferable values listed first.
erObjectCategory
The erObjectCategory class provides the structure for an entity type. The parent
class is top.
Table 178. erObjectCategory table
Attribute name Description Type
erType Name of the entity category. This attribute is required. directory string
erXML Object Operation definition for lifecycle management. binary
erLifecycleRule LifecycleRule data structure for lifecycle management. binary
erObjectProfile
The erObjectProfile class provides the IBM Security Identity Manager structure
for an object profile. The parent class is top.
Table 179. erObjectProfile table
Attribute name Description Type
erObjectProfileName Profile name. This attribute is required. directory string
erCategory Entity category such as Person, Role, System User, or other directory string
category.
erCustomClass Name of the class used to create an entity. directory string
erRdnAttr Name attribute. directory string
erSearchAttr Search attribute. directory string
erAttrMap Map of the logical attribute name and physical attribute name. directory string
Key: logical attribute name.
erXML ObjectOperation data structure for lifecycle management. binary
erLifecycleRule LifecycleRule data structure for lifecycle management. binary
1
description Description of the profile. directory string
2
erCustomProperties List of properties that are defined on the profile. Key = property directory string
value. For example, Managed=true.
erDaoClass3 The data access object implementation class name. directory string
1
Indicates the attribute is added in release 5.0.
Chapter 2. IBM Tivoli Directory Server schema and class reference 107
2
Indicates the attribute is added in release 5.1.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erLifecycleProfile
The erLifecycleProfile class provides the IBM Security Identity Manager
structure for a lifecycle profile on an entity. The parent class is top.
Table 180. erLifecycleProfile table
Attribute name Description Type
erGlobalId Unique, random ID assigned to all entries in a directory. Used as the number string
regional DN for each entry. This attribute is required.
erEntityTarget Distinguished name of the entity that the lifecycle profile is defined distinguished name
for. This attribute is required.
cn Name of the object. directory string
erXML ObjectOperation data structure for lifecycle management. binary
erRemoteServiceItem
The erRemoteServiceItem class is an auxiliary class that describes a hosted service.
The parent class is erServiceItem.
Table 181. erRemoteServiceItem table
Attribute name Description Type
erUid The login ID of the user for the service. directory string
erPassword The password of the user. binary
erCheckPolicy Flag to determine whether to check the user against the defined Boolean
policies.
erDisallowedAction The action to be taken during reconciliation if an account is prevented directory string
by a provisioning policy. Possible values are:
Log Only
Suspend
Delete
erConstraintViolationAction The action to be taken during reconciliation if an account is prevented directory string
by a provisioning policy but the account values are not compliant.
Possible values are:
Log Only
erServiceItem
The erServiceItem class is an auxiliary class that describes an owned service. This
class is a domain entry. The parent class is top.
Table 182. erServiceItem table
Attribute name Description Type
erServiceName Name of the service. directory string
108 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 182. erServiceItem table (continued)
Attribute name Description Type
owner DN of the service owner. distinguished name
erPrerequisite Required prerequisite for the account. distinguished name
erNonComplianceAction Compliant action for accounts of the service. Possible values are: integer
v Mark NonCompliant (0)
v Suspend NonCompliant (1)
v Correct NonCompliant (2)
v Use Workflow (3)
v Use Global Settings (4)
erAlertOption Option settings for when compliance alert is triggered. Only applicable integer
when compliant action is set to 3 (Use Workflow). Possible values are:
v Reconciliation (0)
v Policy change (1)
v Person data change (2)
v Account data change (3)
description Description of the service. directory string
3
erConnectionMode The current Connection Mode of the Service Instance, such as Manual or directory string
Automatic.
erURI3 The universal resource identifier. directory string
erTag3 The service tag. directory string
3
erServiceSSOMapping Corresponding IBM Security Access Manager ESSO Service ID for a directory string
service item.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erServiceProfile
The erServiceProfile class provides the IBM Security Identity Manager structure
for a service profile. The parent class is erObjectProfile.
Table 183. erServiceProfile table
Attribute name Description Type
erAccountClass Name of a custom class used to create an account. directory string
erAccountName Name of profile associated with the account. directory string
erproperties Service attributes used in messages sent to the managed resources. This directory string
attribute is required.
erprotocolmappings Service attributes used in messages sent to the managed resources. directory string
erserviceproviderfactory Name of the Java class to create the ServiceProvider used to communicate directory string
with the managed resource. This attribute is required.
erxforms Defines transforms for IBM Security Identity Manager adapters. binary
erserivcesupportclass List of objectclass that is used for services that support data, such as group. directory string
1
ergroupmappings A map of account attribute for a group. directory string
erOpRequired1 List of required attributes per service or account operation. directory string (1000)
erOpSend1 List of send-only attributes per operation. directory string (1000)
erOpMultiReplace1 List of replace-multi-value attributes per operation. directory string (1000)
erOpSingleAddDelete1 List of add-delete-single-value attributes per operation. directory string (1000)
erAttributeHandler1 Name of the attribute handler class. directory string (1000)
erComplexAttributes1 Name of the complex attribute list. directory string (1000)
1
Indicates the attribute was added in release 5.0.
Chapter 2. IBM Tivoli Directory Server schema and class reference 109
erSystemItem
The erSystemItem class provides the IBM Security Identity Manager auxiliary class
for the IBM Security Identity Manager system. The parent class is top.
erSystemRole
The erSystemRole class represents a system role, however, it does not include
membership information. Members are defined in erSystemUser.erRoles. This class
is a domain entry. The parent class is top.
Table 184. erSystemRole table
Attribute name Description Type
erRoleName The system role name. This attribute is required. directory string
description Description of the role. directory string
erSystemRoleCategory Level of access – End User, Supervisor, System Administrator. integer
3
erURI The universal resource identifier. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erSystemUser
The erSystemUser class stores IBM Security Identity Manager system accounts such
as the pre-defined IBM Security Identity Manager system account. The
erAccountItem is also added to each erSystemUser entry since it is an account
managed by the system. This class is a domain entry. The parent class is top.
Table 185. erServiceProfile table
Attribute name Description Type
erUid Account login ID. This attribute is required. directory string
erLostPasswordQuestion Account lost password question. directory string
erLostPasswordAnswer Account lost password answer. binary
erIsDelegated Flag determining whether the account workflow can be sent to Boolean
delegates.
erDelegate Delegate of the user. directory string
erWorkflow Filter for viewing pending requests and completed requests. directory string
erRoles Roles associated with the account. distinguished name
erHomePage Login home page. directory string
erPswdLastChanged Date and time that the password was last changed. generalized time
erNumLogonAttempt Number of times that the user attempted to log on. integer
erChangePswdRequired Flag indicating whether the user is required to change the Boolean
password the next time that the user logs on to the system.
erRespLastChange Date and time that the challenge response was last changed. generalized time
Policy classes
There are several types of policies: password, identity, provisioning, adoption,
recertification, separation of duty, and account defaults. These policies all share
some general attributes. These attributes are represented in the erPolicyBase and
erPolicyItemBase classes. The erPolicyBase class inherits from the
erPolicyItemBase class. All policies are domain entries.
110 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
erAccountTemplate
The erAccountTemplate1 class stores account default-specific attributes. The parent
class is erPolicyBase.
Table 186. erAccountTemplate table
Attribute name Description Type
erStaticDefaultAttrMap Static default (attribute=value) pair for account defaults. binary
erScriptedDefaultAttrMap Scripted default (attribute=value) pair for account defaults. binary
1
Indicates the class is added in release 5.0.
erAdoptionPolicy
The erAdoptionPolicy class stores adoption policy-specific attributes. The parent
class is erPolicyBase.
Table 187. erAdoptionPolicy table
Attribute name Description Type
erJavaScript Script that resolves the owner for an adoption account. binary
erIdentityPolicy
The erIdentityPolicy class stores identity policy-specific attributes. The parent
class is erPolicyBase.
Table 188. erIdentityPolicy table
Attribute name Description Type
erJavaScript Script that is evaluated to create the user ID. binary
erUserClass Class home of the user. directory string
erPasswordPolicy
The erPasswordPolicy class stores password policy-specific attributes. The parent
class is erPolicyBase.
Table 189. erPasswordPolicy table
Attribute name Description Type
erXML XML document containing password rules. This attribute is required. binary
erPolicyBase
The erPolicyBase class stores commonly used functional attributes such as state
information and the target of the policy. The parent class is erPolicyItemBase.
Chapter 2. IBM Tivoli Directory Server schema and class reference 111
Table 190. erPolicyBase table
Attribute name Description Type
erPolicyTarget Services or service instances targeted by the policy. directory string
If a service instance is targeted, the value is the string that represents the
service instance DN. Format: 1;<value>
If a service profile is targeted, the value is the name of the service profile.
Format: 0;<value>
If a service selection policy is targeted, the value is the name of the service
profile affected by the service selection policy. Format: 3;<value>
erReqPolicyTarget Lists required policy targets (service instance or service profile). directory string
erPolicyItemBase
The erPolicyItemBase class stores general bookkeeping attributes for policies, such
as name and description. The parent class is top.
Table 191. erPolicyItemBase table
Attribute name Description Type
erPolicyItemName The policy name. This attribute is required. directory string
erLabel The label name for the policy. directory string
erKeywords A list of key words. directory string
description A description of the policy. directory string
erEnabled Flag indicating whether the policy participates in the provisioning process. Boolean
If the flag is enabled, the policy participates in the provisioning process. If
the flag is disabled, the policy does not participate in the provisioning
process.
erScope Determines which service instances are governed by this policy. Single-level integer
scope limits the policy to affect only those service instances at the same
level as the policy. With subtree scope, a policy affects service instances at
the same level as the policy and service instances in levels below the policy.
erURI3 The universal resource identifier. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erProvisioningPolicy
The erProvisioningPolicy class stores provisioning policy-specific attributes. The
parent class is erPolicyBase.
Table 192. erProvisioningPolicy table
Attribute name Description Type
erEntitlements Policy access definitions. This attribute is required. binary
erPriority The priority level for this policy. This attribute is required. integer
erPolicyMembership Policy principals. Identifies users who are governed by this directory string
policy. This attribute is required.
erDraft True if the policy is saved as draft. Boolean
erOriginalPolicyDN Distinguished name of original policy. distinguished name
112 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 192. erProvisioningPolicy table (continued)
Attribute name Description Type
3
erEntitlementOwnershipTypes The entitlement ownership types. directory string
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
erRecertificationPolicy
The erRecertificationPolicy1 class stores recertification policy-specific attributes.
The parent class is erPolicyBase.
Table 193. erRecertificationPolicy table
Attribute name Description Type
erType Type of entities this recertification policy governs. Values directory string
include:
CALENDAR
ROLLING
APPROVE
REJECT
NONE 2
erTimeoutPeriod The timeout period for recertification process (in days). integer
erRejectAction The action to take on the account/access when recertification directory string
is rejected. Values:
MARK
SUSPEND
DELETE
erRejectNotify Information of the participant who receives the rejection directory string
notice upon rejection of the recertification notice or work item.
erRecertTemplateDN DN pointing to the notification template used for the initial distinguished name
recertification notice.
Chapter 2. IBM Tivoli Directory Server schema and class reference 113
Table 193. erRecertificationPolicy table (continued)
Attribute name Description Type
erRecertRejectTemplateDN DN pointing to the notification template used for the rejection distinguished name
notice.
erUserClass The person category for the recertification policy. Values: directory string
ALL
PERSON
BPPERSON
erSchedule Information of the schedule for the recertification policy. directory string
erLifecycleRule The lifecycle rule information for the policy. binary
erXML XML content of the workflow operations for the policy. binary
erGlobalID Unique ID of the policy. number string
erLifecycleEnable Indication whether the policy has a lifecycle operation Boolean
defined. Values: True False. Always true for recertification
policy.
1
Indicates the class was added in release 5.0.
2
Indicates the attribute value was added in release 5.1.
erSeparationOfDutyPolicy
The erSeparationOfDutyPolicy1 class stores separation of duty policy-specific
attributes. The parent class is erPolicyBase.
Table 194. erSeparationOfDutyPolicy table
Attribute name Description Type
Owner Multivalue attribute pointing to the owner of this policy. Can be any distinguished name
combination of DNs pointing to persons or roles.
erXML Unused attribute reserved for future use. binary
1
Indicates the class was added in release 5.1.
erSeparationOfDutyRule
The erSeparationOfDutyRule1 class stores separation of duty policy rule-specific
attributes. The parent class is top.
Table 195. erSeparationOfDutyPolicy table
Attribute name Description Type
cn Name of the separation of duty policy rule (required). directory string
erCardinality Number of roles allowed.
erRoles Multivalue attribute pointing to the DNs of the roles that are involved distinguished name
in this separation of duty policy rule. This attribute is the expanded
hierarchy of roles that relate to the erAffectedRoles attribute of this
entry.
erAffectedRoles Multivalue attribute pointing to the DNs of the roles that are explicitly distinguished name
defined in this separation of duty policy rule.
erURI3 The universal resource identifier. directory string
114 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
1
Indicates the class was added in release 5.1.
3
Indicates the attribute is added in IBM Security Identity Manager 6.0.
Chapter 2. IBM Tivoli Directory Server schema and class reference 115
116 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Chapter 3. Auditing schema tables
The audit event schema has a common base event table, audit_event, which
contains fields common to all audit events.
Separate tables are created for an event type only if that event type contains
attributes, which are not generic enough to keep in a common table. As a rule, any
element that is common to most audit events is kept in the audit_event container
table. This design choice helps reduce the number of table joins when event data is
queried.
AUDIT_MGMT_OBLIGATION
AUDIT_MGMT_OBLIGATION_ATTRIB
AUDIT_MGMT_OBLIGATION_RESOURCE
AUDIT_MGMT_MESSAGE
| “Manual activity events” on page 133 AUDIT_MGMT_ACTIVITY
AUDIT_MGMT_PARTICIPANT
| “Lifecycle rule events” on page 141 No event-specific table
Account management AUDIT_MGMT_PROVISIONING
Container management No event-specific table
Organization role management AUDIT_MGMT_TARGET
AUDIT_EVENT table
The AUDIT_EVENT table is common for all audit events. However, the value for some
columns is different depending on the event. See the specific event for the column
values.
Table 197. AUDIT_EVENT table
Column Name Column Description Data type
*
ID ID by which this event is identified. Primary key. Numeric
*
ITIM_EVENT_CATEGORY IBM Security Identity Manager type of the event Character (50)
ENTITY_NAME Name of the IBM Security Identity Manager entities altered Character (1000)
by this event. The size of this column is 100 characters,
which assumes that the name of the entity that is being
audited is 100 or less character long.
ENTITY_DN DN of the entity involved in this event. Character (1000)
ENTITY_TYPE Type of the IBM Security Identity Manager entity. Character (50)
*
ACTION The value of this column depends on the event type. Each Character (25)
event type has a set of actions.
WORKFLOW_PROCESS_ID Process ID of the workflow initiated. This column is Numeric
applicable to workflow operations.
INITIATOR_NAME The user ID of the ITIM account that submitted the request. Character (1000)
INITIATOR_DN The distinguished name of the ITIM account that submitted Character (1000)
the request.
| INITIATOR_TYPE PERSON - Indicates that the request was submitted by a Character (50)
person.
118 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 197. AUDIT_EVENT table (continued)
Column Name Column Description Data type
| INITIATOR_PERSON_NAME Name of the person who submitted the request. Character (1000)
CONTAINER_NAME Name of the container that holds the entity. Character (1000)
CONTAINER_DN Distinguished name of the container that holds the entity. Character (1000)
RESULT_SUMMARY The results of an event: Character (25)
Success
Failure
*
Indicates the column is required and not null.
ChallengeResponse
BasicAuth
ACTION Authentication
| getAuthenticatedObject
In addition to the AUDIT_EVENT table, these tables are used by person management
events: AUDIT_MGMT_TARGET, AUDIT_MGMT_ACCESS_REQUEST, AUDIT_MGMT_OBLIGATION,
AUDIT_MGMT_OBLIGATION_ATTRIB, and AUDIT_MGMT_OBLIGATION_RESOURCE.
AUDIT_MGMT_TARGET table
| The AUDIT_MGMT_TARGET table is used if the action is Transfer.
Table 199. AUDIT_MGMT_TARGET table
Column Name Column Description Data type
*
EVENT_ID Identification that is assigned to the event. References Numeric
AUDIT_EVENT (ID).
TARGET_ENTITY_NAME The name of container to which the person is being Character (1000)
transferred. Applicable if action=Transfer
TARGET_ENTITY_DN The DN of container to which the person is being Character (1000)
transferred. Applicable if action=Transfer
TARGET_ENTITY_TYPE The type of container to which the person is being Character (50)
transferred.
*
Indicates the column is required and not null.
120 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 200. Values for columns in the AUDIT_EVENT table (continued)
Column Name Value
RESULT_SUMMARY Result of operation:
Delegate authority
This section describes events related to delegate authority, such as add and modify.
AUDIT_MGMT_DELEGATE table
The AUDIT_MGMT_DELEGATE table is used if the action is to delegate a member.
Table 201. AUDIT_MGMT_DELEGATE table
Column Name Column Description Data type
*
EVENT_ID ID by which this event is identified. References Numeric
AUDIT_EVENT (ID).
DELEGATE_NAME The name of the account to which authorities are Character (1000)
delegated.
DELEGATE_DN The DN of the account to which authorities are Character (1000)
delegated.
DELEGATE_START_TIME Start time of the delegation. Character (1000)
DELEGATE_END_TIME End time of the delegation. Character (1000)
*
Indicates the column is required and not null.
122 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 202. Values for columns in the AUDIT_EVENT table
Column Name Value
itim_event_category Delegate authority.
entity_name Name of the account whose rights are being delegated.
entity_dn Distinguished name of the account whose rights are being delegated.
entity_type Account.
workflow_process_id Process ID of the initiated workflow.
result_summary Result of operation:
Policy management
This section describes events related to IBM Security Identity Manager polices,
such as provisioning, service selection, identity, password, separation of duty, and
recertification policies.
IdentityPolicy – Identity policy specifies how identities, or user IDs, are generated
when provisioning one or more resources.
PasswordPolicy – A password policy specifies a set of rules that all passwords for one
or more services must conform.
124 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| Delete Host Selection Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Add Provisioning Policy event
| entity_name, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Modify Provisioning Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Delete Provisioning Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Enforce Entire Provisioning Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Save Draft Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| container_name, container_dn, timestamp, result_summary
| Commit Draft Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Delete Draft Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| container_name, container_dn, timestamp, result_summary
| Add Identity Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| container_name, container_dn, timestamp, result_summary
| Modify Identity Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| container_name, container_dn, timestamp, result_summary
| Delete Identity Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| container_name, container_dn, timestamp, result_summary
126 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Delete Recertification Policy event
| entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
| initiator_type, initiator_person_dn, initiator_person_name,
| workflow_process_id, container_name, container_dn, timestamp,
| result_summary
| Enforce Policy Import event
| itim_event_category, action, workflow_process_id, initiator_name,
| initiator_dn, initiator_type, initiator_person_dn,
| initiator_person_name, result_summary
ACI management
This section describes the columns used by events related to IBM Security Identity
Manager access control information (ACI).
AUDIT_MGMT_TARGET table
The AUDIT_MGMT_TARGET table is used if the action is Add Member or Remove.
Table 204. AUDIT_MGMT_TARGET table
Column Name Column Description Value Type Required?
event_id ID by which this event is identified. This column long Yes
contains the foreign key to the ID column of the
audit_event table.
target_entity_name Name of the target ACI for Action = string Yes for action =
AddAuthOwneror Action=DeleteAuthOwner. AddAuthOwner or
Action=DeleteAuthOwner
In addition to the AUDIT_EVENT table, access request management events use the
following tables.
| v AUDIT_MGMT_ACCESS_REQUEST
| v AUDIT_MGMT_OBLIGATION
| v AUDIT_MGMT_OBLIGATION_ATTRIB
| v AUDIT_MGMT_OBLIGATION_RESOURCE
| v AUDIT_MGMT_MESSAGE
128 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
AUDIT_MGMT_ACCESS_REQUEST table
The AUDIT_MGMT_ACCESS_REQUEST table contains information about account, group,
person, and role provisioning that is submitted through the Administrative
console, Self-service user interface, and Identity Service Center user interface.
*
Indicates the column is required and not null.
**
| Indicates the column is null if the event category is not AccessRequest.
Note: The AUDIT_MGMT_ACCESS_REQUEST table contains multiple rows that have the
same WORKFLOW_PROCESS_ID column value if there is more than one access that is
associated with the corresponding request.
AUDIT_MGMT_OBLIGATION table
The AUDIT_MGMT_OBLIGATION table contains information about obligations that are
related to access requests submitted through the Administrative console,
Self-service user interface, and Identity Service Center user interface.
130 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 207. AccessRequest values for the AUDIT_MGMT_OBLIGATION table (continued)
Column name Column description Data type
*
OBLIGATION_TYPE Type of the obligation. Character (50)
CREATE_ACCOUNT, MODIFY_ACCOUNT,
DELETE_ACCOUNT, SUSPEND_ACCOUNT, and
RESTORE_ACCOUNT
SET_SYNCPASSWORD, SELECT_ACCOUNTS, and
CHANGE_PASSWORD
CREATE_PERSON, MODIFY_PERSON,
DELETE_PERSON, SUSPEND_PERSON,
RESTORE_PERSON, TRANSFER_PERSON, and
SELF_REGISTER.
SYSTEM_GENERATED* Indicates whether the obligation was Character (1)
system-generated. Values are Y or N
ACCESS_FORM_TEMPLATE Form template in JSON format that presents Long character (100 K)
related attributes in the CREATE_ACCOUNT
obligation. Form template will be shown
only if the create account request is
submitted from Identity Service Center.
*
Indicates the column is required and not null.
AUDIT_MGMT_OBLIGATION_ATTRIB table
The AUDIT_MGMT_OBLIGATION_ATTRIB table contains information about attributes of
the obligations that are related to access requests submitted through the Identity
Service Center user interface.
*
Indicates the column is required and not null.
AUDIT_MGMT_OBLIGATION_RESOURCE table
The AUDIT_MGMT_OBLIGATION_RESOURCE table contains information about the
obligation resource attributes.
*
Indicates the column is required and not null.
AUDIT_MGMT_MESSAGE table
The AUDIT_MGMT_MESSAGE table contains messages that are related to access requests.
It includes extra audit data that is related to rows in the AUDIT_EVENT table for
which the ITIM_EVENT_CATEGORY column contains the value AccessRequest.
*
Indicates the column is required and not null.
Note: The AUDIT_MGMT_MESSAGE table contains multiple rows that have the same
WORKFLOW_PROCESS_ID column value if there is more than one message that is
associated with the corresponding request.
132 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| Table 211. AUDIT_EVENT table for access request management (continued)
| Column Name Column Description Data type
| INITIATOR_DN The distinguished name of the ITIM account that submitted Character (1000)
| the request.
| INITIATOR_TYPE PERSON - Indicates that the request was submitted by a Character (50)
| person.
| The following are the manual activities that are created by the system:
| Approval
| Request for information
| Work order
| User recertification
| In addition to the AUDIT_EVENT table, create manual activity events use the
| following tables.
| v AUDIT_MGMT_ACTIVITY
| v AUDIT_MGMT_PARTICIPANT
| AUDIT_MGMT_ACTIVITY table
| The AUDIT_MGMT_ACTIVITY table contains information about the manual activity that
| was created and its status.
134 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| Table 212. Create manual activity values for the AUDIT_MGMT_ACTIVITY table (continued)
| Column name Column description Data type
| SERVICE_DN Distinguished name of the service for Character (1000)
| which the manual activity was created.
| ACCOUNT_USERID User ID of the account for which the Character (1000)
| manual activity was created.
| ACCOUNT_DN Distinguished name of the account for Character (1000)
| which the manual activity was created. The
| ACCOUNT_DN is populated only if the account
| exists at the time that the activity was
| created.
| ACCESS_CATALOG_ID Identifier of the access catalog item for Numeric
| which the manual activity was created.
| ACCESS_CATALOG_NAME Name of the access catalog item for which Character (1000)
| the manual activity was created.
| ACCESS_CATALOG_DESCRIPTION Description of the access catalog item for Character (1000)
| which the manual activity was created.
| ACCESS_CATALOG_CATEGORY Category of the access catalog item for Character (1000)
| which the manual activity was created.
| ACCESS_CATALOG_ICON URL of the access catalog icon for which Character (1000)
| the manual activity was created.
| ACCESS_CATALOG_BADGE_1 Text and style of the first badge for the Character (1000)
| access catalog item for which the manual
| activity was created.
| ACCESS_CATALOG_BADGE_2 Text and style of the second badge for the Character (1000)
| access catalog item for which the manual
| activity was created.
| ACCESS_CATALOG_BADGE_3 Text and style of the third badge for the Character (1000)
| access catalog item for which the manual
| activity was created.
| ACCESS_CATALOG_BADGE_4 Text and style of the fourth badge for the Character (1000)
| access catalog item for which the manual
| activity was created.
| ACCESS_CATALOG_BADGE_5 Text and style of the fifth badge for the Character (1000)
| access catalog item for which the manual
| activity was created.
| CREATED_DATE* Date and time when the manual activity Character (50)
| was created.
| ESCALATED_DATE Date and time when the manual activity Character (50)
| was escalated.
| Note: This column is not set when the
| manual activity is created.
| DUE_DATE Date and time when the activity escalates Character (50)
| or times out if it is already escalated, or
| times out if no escalation participants exist.
| Note: This column is updated to set the
| new due date and time for the escalation
| participants.
| COMPLETED_DATE Date and time when the manual activity is Character (50)
| completed, canceled, or times out. This
| column is not set when the manual activity
| is created.
| Note: The columns for a specified row in the AUDIT_MGMT_ACTIVITY table might
| change as the manual activity changes from one state to another.
| v If a participant completes the manual activity, the COMPLETED_DATE column
| is updated with the date and time that the manual activity was completed. The
| COMPLETION_CODE column is updated with the completion or result code
| that is specified by the participant at the time of completion. The COMMENTS
| column is updated with any comments specified by the participant who
| completed the activity. The STATUS column is updated accordingly.
| v If the manual activity is canceled, skipped, or times out, the
| COMPLETED_DATE column is updated to contain the date and time of the
| occurrence. The STATUS column is updated accordingly.
| v If the manual activity escalates, the EVENT_ID column remains the unchanged.
| The WORKITEM_ID column is updated to contain the identifier of the work
| item that represents the escalation participant assignments and the due date. The
| ESCALATED_DATE column is updated to contain the date and time when the
| manual activity was escalated. The DUE_DATE column is updated to contain
| the new due date for the escalation participant assignments.
136 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| AUDIT_MGMT_PARTICIPANT table
| The AUDIT_MGMT_PARTICIPANT table contains information about participants of
| manual activities. It includes extra audit data that is related to rows in the
| AUDIT_EVENT table for which the ITIM_EVENT_CATEGORY column contains the value
| ManualActivity.
| Note: The AUDIT_MGMT_PARTICIPANT table contains multiple rows that have the
| same ACTIVITY_ID column value if there is more than one participant for the
| corresponding activity.
| The rows for a specific ACTIVITY_ID might change as the manual activity changes
| from one state to another:
| Normal escalation occurs when the activity is not completed by the due date.
| Escalation also occurs when the participant for the activity cannot be resolved. In
| this case, the activity is created in an escalated state.
| In addition to the AUDIT_EVENT table, escalate manual activity events use the
| following tables.
| v AUDIT_MGMT_ACTIVITY
| v AUDIT_MGMT_PARTICIPANT
| AUDIT_MGMT_ACTIVITY table
| The AUDIT_MGMT_ACTIVITY table is modified if a manual activity event is escalated
| normally or if the participants that are assigned cannot be resolved.
| Normal escalation
| If the manual activity was not completed by the original participants by the due
| date and was reassigned to the escalation participants the following columns are
| changed in the AUDIT_MGMT_ACTIVITY table. That table was created when the create
| manual activity event occurred.
138 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| Table 215. Escalate manual activity values for the AUDIT_MGMT_ACTIVITY table
| Column name Column description Data type
*
| WORKITEM_ID Identifier of the work item that represents Numeric
| the escalation participant assignments and
| the due date for the manual activity.
| ESCALATED_DATE Date and time when the manual activity Character (50)
| was escalated.
| Note: This column is not set when the
| manual activity is created.
| DUE_DATE Date and time when the activity is due or Character (50)
| times out.
| Note: This column is updated to set the
| new due date and time for the escalation
| participants.
|
*
| Indicates the column is required and not null.
| If the participants for a manual activity cannot be resolved, the activity is created
| in an escalated state. An example of unresolved participants is an activity that is
| assigned to a group or role that has no members. The content of the
| AUDIT_MGMT_ACTIVITY table is the same as the create manual activity event with the
| following modifications.
| Table 216. Escalate manual activity values for the AUDIT_MGMT_ACTIVITY table
| Column name Column description Data type
*
| EVENT_ID Identifier that corresponds to the ID column Numeric
| in the AUDIT_EVENT table for the escalate
| manual activity event.
| ESCALATED_DATE Date and time when the manual activity Character (50)
| was escalated.
| DUE_DATE Date and time that is set for the escalation Character (50)
| participants.
|
*
| Indicates the column is required and not null.
| AUDIT_MGMT_PARTICIPANT table
| The AUDIT_MGMT_PARTICIPANT table contains information about participants of
| manual activities. It includes extra audit data that is related to rows in the
| AUDIT_EVENT table for which the ITIM_EVENT_CATEGORY column contains the value
| ManualActivity.
| Note: The AUDIT_MGMT_PARTICIPANT table contains multiple rows that have the
| same ACTIVITY_ID column value if there is more than one participant for the
| corresponding activity.
| The rows for a specific ACTIVITY_ID might change as the manual activity changes
| from one state to another:
| v Initially the rows represent the original participants for the manual activity.
| v If the manual activity escalates, the STATUS column for the original participant
| rows is updated to ESCALATED. New rows that represent the escalation
| participants are added with the STATUS column set to PENDING.
| v If a participant completes the manual activity, the STATUS column is updated to
| COMPLETED. Other participants for which the STATUS was PENDING, are
| updated to COMPLETED_OTHER.
| v If the manual activity is canceled or times out, the rows for the participants for
| which the STATUS is PENDING is updated to CANCELED or TIMED_OUT.
140 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| Values for columns in the AUDIT_EVENT table for the escalate
| manual activity event
| The AUDIT_EVENT table is common for all audit events. However, the value for some
| columns is different depending on the event. See the specific event for the column
| values.
| Table 218. AUDIT_EVENT table for the escalate manual activity event
| Column Name Column Description Data type
*
| ID ID by which this event is identified. Primary key. Numeric
*
| ITIM_EVENT_CATEGORY ManualActivity. Character (50)
*
| ACTION Escalate Character (25)
*
| TIMESTAMP The time stamp for when the manual activity was escalated. Character (50)
|
*
| Indicates the column is required and not null.
In addition to the AUDIT_EVENT table, these tables are used by account management
events: AUDIT_MGMT_PROVISIONING, AUDIT_MGMT_ACCESS_REQUEST,
AUDIT_MGMT_OBLIGATION, AUDIT_MGMT_OBLIGATION_ATTRIB, and
AUDIT_MGMT_OBLIGATION_RESOURCE.
AUDIT_MGMT_PROVISIONING table
Table 220. AUDIT_MGMT_PROVISIONING table
Column Name Column Description Data type
*
EVENT_ID Identifier assigned to this event. References AUDIT_EVENT (ID). Numeric
OWNER_NAME Name of the account owner. Character (1000)
OWNER_DN Distinguished name of the owner. Character (1000)
*
SERVICE_NAME Name of the service to which the account belongs. Character (1000)
*
SERVICE_DN Distinguished name of the service. Character (1000)
1
ACCESS_NAME Name of the access type that the account acquired. Character (1000)
1
ACCESS_DN Distinguished name of the access type. Character (1000)
*
Indicates the column is required and not null.
1
Indicates the column was added in release 5.0.
142 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 221. Values for columns in the AUDIT_EVENT table
Column Name Value
itim_event_category Account Management.
entity_name Name of the account.
entity_dn Distinguished name of the account.
entity_type Types of the account (service). For example, Active Directory, Oracle, LDAP, Windows
2000, or IBM Security Identity Manager.
action Types of actions:
144 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| v Person_Dn
| v Obligation_Type
| v System_Generated
Container management
This section describes the columns used by events related to events specific to
container management, such as add, modify, and delete.
Organization
Org_unit
Business_Partner_Organization
Location
Admin_Domain
action Types of actions:
AUDIT_MGMT_TARGET table
The AUDIT_MGMT_TARGET table is used if the action is Add Member or
Remove Member.
Table 223. AUDIT_MGMT_TARGET table
Column Name Column Description Value Type Required?
event_id Identifier for the event. Foreign key to the ID long Yes
column of the table audit_event.
target_entity_name The name of the member that is being added to string Yes, when action= Add
or removed from the role. Member or Remove
Member
Applicable if action= Add Member/ Remove
Member.
target_entity_dn The distinguished name of the member that is string Yes, when action= Add
being added to or removed from the role. Member or Remove
Member
Applicable if action= Add Member/ Remove
Member.
target_entity_type The type of the member that is being added to or string Yes, when action= Add
removed from the role. Member or Remove
Member
Applicable if action= Add Member/ Remove
Member.
146 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 224. Values for columns in the AUDIT_EVENT table (continued)
Column Name Value
action Types of actions:
AUDIT_MGMT_TARGET table
| The AUDIT_MGMT_TARGET table is used if the action is Add Member or
| Remove Member.
Table 225. AUDIT_MGMT_TARGET table
Column Name Column Description Value Type Required?
event_id Identifier associated with this event. Foreign key to long Yes
the ID column of the table audit_event.
target_entity_name The name of the member that is being added to or string Yes, when action= Add
removed from the ITIM group. Member or Remove
Member
Applicable if action= Add Member or Remove
Member.
target_entity_dn The distinguished name of the member that is string Yes, when action= Add
being added to or removed from the ITIM group. Member or Remove
Member
Applicable if action= Add Member or Remove
Member.
target_entity_type The type of the member that is being added to or string Yes when action= Add
removed from the ITIM group. Member or Remove
Member
Applicable if action= Add Member or Remove
Member.
148 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 226. Values for columns in the AUDIT_EVENT table (continued)
Column Name Value
entity_type Types of entities:
Service management
This section describes the columns used by event-specific to service, such as add,
modify, and delete.
AUDIT_MGNT_TARGET table
Table 227. AUDIT_MGNT_TARGET table
Column Name Column Description Value Type Required?
event_id Identifier associated with this event. Foreign key to the ID long Yes
column of the table audit_event.
target_entity_name Name of the target (service, service profile, or all services) string Yes for action= Add, Modify, or
for the adoption rule. Delete an adoption rule
Modify – Modify a service. This action includes the change compliance alert
operation.
150 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
entity_name, entity_type, initiator_name, initiator_dn, container_name,
container_dn, timestamp, result_summary
v Modify Service event
entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
container_name, container_dn, timestamp, result_summary
v Delete Service event
entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
container_name, container_dn, timestamp, result_summary
v Add Adoption rule Service event
entity_name, entity_dn, initiator_name, initiator_dn, timestamp,
result_summary
AUDIT_MGMT_TARGET table: target_entity_name, target_entity_dn
v Modify Adoption rule Service event
entity_name, entity_dn, initiator_name, initiator_dn, timestamp,
result_summary
AUDIT_MGMT_TARGET table: target_entity_name, target_entity_dn
v Delete Adoption rule Service event
entity_name, entity_dn, initiator_name, initiator_dn, timestamp,
result_summary
AUDIT_MGMT_TARGET table: target_entity_name, target_entity_dn
Group management
This section describes the tables that are used by events that are related to group,
such as add, modify, and delete.
AUDIT_MGMT_TARGET table
The AUDIT_MGMT_TARGET table is used if the action is Add Member or
Remove Member.
Table 229. AUDIT_MGMT_TARGET table
Column Name Column Description Value Type Required?
event_id Identifier that is associated with this event. Foreign long Yes
key to the ID column of the table audit_event.
target_entity_name The name of the member that is being added to or string Yes, when action= Add
removed from the group. Member or Remove
Member
Applicable if action= Add Member or Remove
Member.
target_entity_dn The distinguished name of the member that is string Yes, when action= Add
being added to or removed from the group. Member or Remove
Member
Applicable if action= Add Member or Remove
Member.
target_entity_type The type of the member that is being added to or string Yes when action= Add
removed from the group. Member or Remove
Member
Applicable if action= Add Member or Remove
Member.
152 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
| AUDIT_MGMT_TARGET table: target_entity_name, target_entity_dn,
| target_entity_type
Reconciliation
This section describes the columns used by events specific to reconciliation, such as
runRecon, setServiceParams, and setReconUnit.
154 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 233. Values for columns in the AUDIT_EVENT table (continued)
Column Name Value
entity_type Types of entities:
System configuration
This section describes the columns used by events specific to IBM Security Identity
Manager configuration performed through the Configuration tab.
<ITIM System Entity > – System defined entities. For example, Person, Account,
BPperson, Organization, BPOrganization, ITIMAccount, SQLAccount, and others.
156 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 235. Values for columns in the AUDIT_EVENT table (continued)
Column Name Value
action Types of actions:
Runtime events
This section describes the columns used by event related to IBM Security Identity
Manager start and stop events.
158 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 237. Values for columns in the AUDIT_EVENT table (continued)
Column Name Value
action Types of actions:
Self-password change
This section describes the columns that are used by events that are related to
password change.
| If a self-password change request affects at least one ITIM account and at least one
| non-ITIM account, two separate events are audited for the request. One
| self-password change event is audited for the ITIM accounts. Another
| self-password change event is audited for the non-ITIM accounts.
StartImport
StopImport
StartExport
StopExport
InstallAgentProfile
160 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Credential management
This section describes the columns used by events related to Credential
management. For example, add to vault, modify, delete, register password, view
password history, or get password for non-exclusive credential.
162 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
container_name, container_dn, timestamp, result_summary
AUDIT_MGMT_LEASE table
The AUDIT_MGMT_LEASE table is used in the following events.
*
Indicates the column is required and not null.
v Checkin event
entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
workflow_process_id, container_name, container_dn, timestamp,
result_summary, comments
Note: If a user or an IBM Security Access Manager ESSO session tries to check
in a credential already checked in by someone else, then the second checkin
attempt is audited as a Checkin event. The result_summary is FAILURE and the
comment is Invalid lease during checkin.
164 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
v Notify Expired Lease event
entity_name, entity_dn, entity_type, initiator_name, initiator_dn,
workflow_process_id, container_name, container_dn, timestamp,
result_summary
166 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Chapter 4. IBM Cognos reporting query subjects and query
items
You can use the query subjects and query items to customize the reports.
IBM Cognos reporting model is broadly dived into audit and configuration
namespaces.
Audit namespace
Consists of the query subjects and query items for the audit activities.
Configuration namespace
Consists of the query subjects and query items for the configuration
activities.
Schema mapping
Before you work with the query subjects and query items, you must map the
attributes to the entities.
To map the attributes and entities, see “Mapping the attributes and entities.”
Note: After you map the schema by using IBM Security Identity Manager
administration console, it might take some time to reflect the updated data in the
Cognos report. You must run a successful data synchronization after mapping the
attributes. You must restart IBM Cognos Business Intelligence server to reflect the
updated schema in the report.
168 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 245. Mapping the attributes and entities (continued)
Namespace Entity Attribute Name
Access Audit Group v Access Options
v Group Name
Organizational Role v Access Name
v Object Profile Name
Access Configuration Business Partner Person v Full Name
v Last Name
v Organizational Unit Name
Chapter 4. IBM Cognos reporting query subjects and query items 169
Table 246. Query subjects in the Audit namespace (continued)
Query subject Description
Credential Pool Business Represents a business unit that is associated with the credential pool.
Unit You must use this query subject with the Credential Pool to obtain
information about the configuration attributes of the business unit.
Audit Comments
The comments that are specified by a user during audit
action.
Audit Justification
The justification that is provided by a user during the
check-out action.
Audit Pool Name
The name of the pool if a credential on which the audit
action performed belongs to the credential pool.
Audit Pool Dn
The Lightweight Directory Access Protocol (LDAP)
distinguished name for the audit pool.
170 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 247. Query items in the Audit namespace (continued)
Query subject Query items and their description
Account Owner
Person Full Name
The full name of a user who owns an account.
Person Last Name
The surname of a user who owns an account.
Person Status
The status of a user who owns an account.
Person Dn
An LDAP distinguished name for a user owner of an
account corresponding to a credential.
Person Business Unit Dn
An LDAP distinguished name for the business unit to which
an account owner belongs.
Person Supervisor
The supervisor of a user who owns an account.
Account Owner Business
Unit Business Unit Name
The name of a business unit to which an account owner
belongs.
Business Unit Supervisor
The supervisor of a user who owns the business unit.
Business Unit Dn
An LDAP distinguished name for a business unit to which
an account owner belongs.
Chapter 4. IBM Cognos reporting query subjects and query items 171
Table 247. Query items in the Audit namespace (continued)
Query subject Query items and their description
Credential
Credential Name
The name of a credential on which the audit action is
performed.
Credential Description
The detailed description of a credential that is specified by
an administrator during the addition of an account into the
vault.
Credential IS Exclusive
Indicates whether the credential is exclusive or not. You
must check out an exclusive credential to view its password
or other details.
Credential USE Global Settings
A flag that indicates whether a credential uses the shared
access global settings. 0 represents Uses global settings,
and 1 represents Does not use gloabl settings.
Credential IS Searchable
Indicates whether a credential is searchable or not. 0
represents Credential can be searched, and 1 represents
Credential cannot be searched.
Credential IS Password Viewable
Specifies whether a user can view the password on a
credential. 0 represents password is viewable, and 1
represents password is not viewable.
Credential Account Status
The status of an account corresponding to a credential
whether it is active or inactive. 0 represents Active, and 1
represents Inactive.
172 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 247. Query items in the Audit namespace (continued)
Query subject Query items and their description
Account
Account Name
The name of an account that is associated with a credential.
Account Service Dn
An LDAP distinguished name for a service that provisions
an account.
Account Status
The detailed information of an account status.
Account Compliance
The details about an account compliance. The valid values
are Unknown, Compliant, Non Compliant, and Disallowed.
Service Type
The profile type of the service.
Service Dn
An LDAP distinguished name for the service on which an
account is provisioned.
Chapter 4. IBM Cognos reporting query subjects and query items 173
Table 247. Query items in the Audit namespace (continued)
Query subject Query items and their description
Credential Pool
Credential Pool Dn
An LDAP distinguished name for the credential pool.
Credential Pool Name
The name of the credential pool.
Credential Pool Service Dn
An LDAP distinguished name for the service to which a
group associated with a credential pool is provisioned.
Credential Pool Business Unit Dn
An LDAP distinguished name for a business unit of the
credential pool.
174 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Query subjects for Configuration namespace
The following table lists the query subjects in the Configuration namespace.
Table 248. List of query subjects in the Configuration namespace
Query subject Description
Shared Access Policy Represents the shared access policy that provides entitlements for
credentials and credential pools to a user or the role members. You
must use this query subject with the Credential Entitled to Shared
Access Policy and Credential Pool Entitled to Shared Access
Policy.
Credential Entitled to Shared Represents the credentials that are entitled by using a shared access
Access Policy policy.
Credential Pool Entitled to Represents the credential pools that are entitled by using a shared
Shared Access Policy access policy.
Role Owning Credentials Represents the roles that have entitlements for credentials through a
shared access policy. You must use this query subject with the
Credential Entitled to Shared Access Policy to obtain information
about the direct and indirect roles that have entitlements.
Role Owning Credential Pool Represents the roles that have entitlements for credential pools
through a shared access policy. You must use this query subject with
the Credential Pool Entitled to Shared Access Policy to obtain
information about the direct and indirect roles with entitlements.
Group Represents a group corresponding to the credential pool. You must
use this query subject with the query subject Credential Pool
Entitled to Shared Access Policy.
Credential Pool Owner Represents an entity that is an owner of the credential pool. The entity
can be either a person owner or a role owner. You must use this query
subject with the Credential Pool Entitled to Shared Access Policy.
Account Represents an account entity and some of its configuration attributes.
You must use this query subject with the Credential Entitled to
Shared Access Policy query subject to obtain information about:
v The accounts that are configured as shared credentials.
v The accounts that are entitled through the shared access policy.
Account Owner Represents a user owner of an account. You must use this query
subject with the Account query subject to obtain information about the
account owners.
Credential Service Represents the service on which a credential account is provisioned.
You must use this query subject with the Account query subject to
obtain configuration information about the account service.
Credential Service Represents the business unit of the credential service. You must use
Organization this query subject with the Credential Service query subject to obtain
configuration information for the business unit of the service.
Credential Pool Service Represents the service on which the group corresponding to a
credential pool is provisioned. You must use this query subject with
the Credential Pool Entitled to Shared Access Policy query
subject to obtain the configuration information about the service.
Credential Pool Service Represents the business unit of the credential pool service. You must
Organization use this query subject with the Credential Pool Service query
subject to obtain the configuration information about the service
business unit.
Account Owner Business Represents the business unit to which a user owner of an account
Unit belongs. You must use this query subject with the Account Owner
query subject to obtain the configuration information of the business
unit that is associated to the owner.
Shared Access Policy Represents the business unit to which the shared access policy applies.
Organization You must use this query subject with the Shared Access Policy query
subject. By doing so, you can obtain the configuration information
about the business unit to which the shared access policy applies.
Chapter 4. IBM Cognos reporting query subjects and query items 175
Query items for Configuration namespace
The following table lists the query items in the Configuration namespace.
Table 249. Query items in the Configuration namespace
Query subject Query items and their description
Shared Access Policy
Shared Access Policy Name
The name of the shared access policy.
Shared Access Policy Scope
The scope of a shared access policy in terms of business
units the policy applies. The valid values and their
meanings:
v single - The policy applies to a business unit and not its
subunits.
v subtree - The policy applies to the subunits of a business
organization.
Shared Access Policy Status
Represents whether a policy is enabled or not. 0 represents
Enabled, and 1 represents Disabled.
176 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 249. Query items in the Configuration namespace (continued)
Query subject Query items and their description
Credential Entitled to Shared
Access Policy Credential Name
The name of an account that is configured as a shared
credential.
Credential Description
The description of a credential as specified in the credential
configuration.
Credential Service
The name of a service to which the credential is
provisioned.
Credential Service Organization
The name of an organization to which the credential service
belongs.
Credential Policy Name
The name of a policy that provides the entitlements for the
credential.
Chapter 4. IBM Cognos reporting query subjects and query items 177
Table 249. Query items in the Configuration namespace (continued)
Query subject Query items and their description
Credential Pool Entitled to
Shared Access Policy Credential Pool Name
The name of the credential pool.
Credential Pool Service
The name of the service on which the groups corresponding
to the credential pool are provisioned.
Credential Pool Service Organization
The name of an organization to which the credential pool
service belongs.
Role DN
An LDAP distinguished name for the role.
Role Container Dn
An LDAP distinguished name for an organization to which
the role belongs.
Role Owning Credential Pool
Role Name
The name of a role that is entitled to the credential pool.
Role Organization Name
The name of an organization to which the role belongs.
Role Member
The user members of the role.
Role Dn
An LDAP distinguished name for the role.
Role Container Dn
An LDAP distinguished name for an organization to which
the role belongs.
Group
Group Name
An LDAP distinguished name of a group that corresponds
to the credential pool.
178 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 249. Query items in the Configuration namespace (continued)
Query subject Query items and their description
Credential Pool Owner
Credential Pool Dn
An LDAP distinguished name for the pool.
Credential Pool Owner Dn
An LDAP distinguished name for an owner of the credential
pool.
Credential Pool Owner Name
The name of an owner of the credential pool.
Credential Pool Owner Business Unit
The name of a business unit to which the credential pool
owner belongs.
Account Status
The status of an account. The valid values are Active or
Inactive.
Account Compliance
The details about an account compliance. The valid values
are Unknown, Compliant, Non-compliant, and Disallowed.
Chapter 4. IBM Cognos reporting query subjects and query items 179
Table 249. Query items in the Configuration namespace (continued)
Query subject Query items and their description
Credential Service
Service Name
The name of the service on which the credentials are
provisioned.
Service Type
The profile type of the service.
Service DN
An LDAP distinguished name for the service.
Service Business Unit Dn
An LDAP distinguished name for a business unit of the
service.
Service ID
An identifier for a service on which the credentials are
provisioned.
Credential Service Business
Unit Business Unit Name
The name of a business unit.
Service Name
The name of a service on which the groups corresponding
to the credential pool are provisioned.
Service Type
The profile type of the service.
Service Business Unit Dn
An LDAP distinguished name for a business unit of the
service.
Service ID
An identifier for the service.
Credential Pool Service
Organization Business Unit Name
The name of a business unit.
Business Unit Supervisor
The user supervisor of a business unit.
Business Unit Dn
An LDAP distinguished name for the business unit.
Business Unit Container Dn
An LDAP distinguished name for the parent business unit.
Account Owner Business
Unit Business Unit Name
The name of a business unit.
Business Unit Supervisor
The user supervisor of a business unit.
Business Unit Dn
An LDAP distinguished name for the business unit.
Business Unit Container Dn
An LDAP distinguished name for the parent business unit.
180 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 249. Query items in the Configuration namespace (continued)
Query subject Query items and their description
Shared Access Policy
Organization Business Unit Name
The name of a business unit.
Business Unit Supervisor
The user supervisor of a business unit.
Business Unit Dn
An LDAP distinguished name for the business unit.
Chapter 4. IBM Cognos reporting query subjects and query items 181
Table 250. Query subjects in the Recertification Audit namespace for the recertification
model (continued)
Query subject Description
User Recert Role Represents the recertification audit history for a role membership that
is recertified as part of the user recertification. You must use this
query subject with the User Recert History. By doing so, you can
obtain the information about role memberships of the users that are
being recertified.
Account Represents an account entity and some of its configuration attributes.
You must use this query subject with the Account Recert History
query subject. By doing so, you can generate recertification history
reports of accounts.
Account Service Represents service that is associated to an account. These accounts
participate in the account and access recertification.
Account Owner Represents user owners of the accounts that are participating in the
account and access recertification.
Account Recert History Represents the recertification audit history for accounts. You must use
this query subject with the Account query subjects. By doing so, you
can find out the accounts in the recertification audit.
Access Represents the group access and some of its configuration attributes.
You must use this query subject with the Access Recert History
query subject to generate recertification history reports of access.
Access Recert History Represents the recertification audit history for access. You must use
this query subject with the Access query subjects. By doing so, you
can find out the accesses in the recertification audit.
182 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Query items for Recertification Audit namespace
The following table lists the query items in the Recertification Audit namespace.
Table 251. Query items in the Recertification Audit namespace
Query subject Query items and their description
User Recertification Policy
Recertification Policy Name
The name of the recertification policy.
Recertification Policy Type
The type of an entity that gets recertified by using this
policy. The valid values are Account, Access, and Identity.
Recertification Policy Description
The description of the policy as specified in the policy
configuration.
Chapter 4. IBM Cognos reporting query subjects and query items 183
Table 251. Query items in the Recertification Audit namespace (continued)
Query subject Query items and their description
User Recert History
User Recert History Person Name
The full name of a person.
User Recert History Person Email
The user email identifier.
User Recert History Person Status
A user status at the end of the recertification workflow
process. The valid values are Active and Inactive.
User Recert History Person Business Unit Name
A business unit to which a user belongs.
User Recert History Recertification Policy Name
The recertification policy that created a user entity.
User Recert History Timeout
Shows whether the recertification process is timed out or not.
0 represents Not timed out, and 1 represents Timed out.
Person Dn
An LDAP distinguished name for a user entity.
Person Business Unit Dn
An LDAP distinguished name for a business unit to which a
user belongs.
Person Supervisor
The name of a user who is the supervisor of a user entity.
Person Organization
Business Unit Name
The name of a business unit to which a user belongs.
Chapter 4. IBM Cognos reporting query subjects and query items 185
Table 251. Query items in the Recertification Audit namespace (continued)
Query subject Query items and their description
User Recert Group
User Recert Group Name
The name of a group in the user recertification.
User Recert Group Description
Describes the recertification group.
User Recert Group Status
The status of a group at the end of the recertification. The
valid values are Approved and Rejected.
User Recert Group Recert Id
A unique numeric ID assigned by IBM Security Identity
Manager to a group recertification.
Service Name
The name of a service to which the group belongs.
Service Type
The service profile type.
Service Url
A URL that connects to the managed resource.
Service DN
An LDAP distinguished name for a service to which the
group belongs.
Service Container Dn
An LDAP distinguished name for a business unit of the
service that is associated with a group.
Service Owner Dn
An LDAP distinguished name for a user owner of the
service.
Group Dn
An LDAP distinguished name for a group entity in the
recertification.
User Recert Role
User Recert Role Name
The name of a role in the user recertification.
User Recert Role Description
The description of a role.
User Recert Role Status
The status of a role at the end of the recertification. The valid
values are Approved and Rejected.
User Recert Role Recert Id
A unique numeric identifier that is assigned by IBM Security
Identity Manager to a role recertification.
186 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 251. Query items in the Recertification Audit namespace (continued)
Query subject Query items and their description
Account
Account Name
The name of an account.
Account Service Dn
An LDAP distinguished name for a service that provisions
an account.
Account Status
The status of an account. The valid values are Active and
Inactive.
Account Compliance
The details about an account compliance. The valid values
are Unknown, Compliant, Non Compliant, and Disallowed.
Account Container Dn
An LDAP distinguished name for a business unit to which
an account belongs.
Account Service
Service Name
The name of a service to which an account belongs.
Service Dn
An LDAP distinguished name for a service to which an
account belongs.
Service Container DN
An LDAP distinguished name for a business unit of a service
that is associated to the accounts.
Service Owner DN
An LDAP distinguished name for a user owner of the
service.
Service Url
A URL that connects to the managed resource.
Service Type
The service profile type.
Account Owner
Person Full Name
The full name of a user who owns an account.
Person Last Name
The surname of a user who owns an account.
Person Status
The status of a user who owns an account.
Person DN
An LDAP distinguished name for an account owner.
Person Business Unit DN
An LDAP distinguished name for a business unit that is
associated to an account owner.
Person Supervisor
The supervisor of an account owner.
Chapter 4. IBM Cognos reporting query subjects and query items 187
Table 251. Query items in the Recertification Audit namespace (continued)
Query subject Query items and their description
Account Recert History
Recert History Service Name
The name of a service to which accounts and groups belong.
These accounts and groups are involved with an account
recertification audit.
Recert History Service Profile
The profile type of a service.
Recert History Status
An account status at the end of the recertification workflow
process. The valid values are Abort, Approved, Timeout,
Pending, and Rejected.
Recert History Action
The action that is taken on an account at the end of
recertification process as defined by the recertification policy.
The valid values are Abort, Certify, Delete, Mark, Certify
Administrative, and Suspend.
188 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 251. Query items in the Recertification Audit namespace (continued)
Query subject Query items and their description
Access
Group ID
An identifier for a group.
Group Name
The name of a group for which an access is defined.
Group Type
The profile type of a group.
Group Container DN
An LDAP distinguished name for a business unit that is
associated with a group.
Group Service DN
An LDAP distinguished name for the service that is
associated to a group.
Chapter 4. IBM Cognos reporting query subjects and query items 189
Table 251. Query items in the Recertification Audit namespace (continued)
Query subject Query items and their description
Access Recert History
Recert History Service Name
The name of a service to which accesses and groups belong.
These accesses and groups are involved with an access
recertification audit.
Recert History Service Profile
The profile type of a service.
Recert History Status
An access status at the end of the recertification workflow
process. The valid values are Abort, Approved, Timeout,
Pending, and Rejected.
Recert History Action
The action that is taken on an access at the end of
recertification process as defined by the recertification policy.
The valid values are Abort, Certify, Delete, Mark, Certify
Administrative, and Suspend.
190 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Recertification Config namespace
The Recertification Config namespace provides information about the defined
recertification policies and target that is defined for those policies.
Chapter 4. IBM Cognos reporting query subjects and query items 191
Table 253. List of query items in the Recertification Config namespace
Query subject Query items and their description
Recertification Policy
Recertification Policy Name
The name of the recertification policy.
Recertification Policy Type
The type of an entity that gets recertified by using this
policy. The valid values are User, Account, and Access.
Recertification Policy Description
The policy description as specified in the policy
configuration.
192 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 253. List of query items in the Recertification Config namespace (continued)
Query subject Query items and their description
Recertification Policy
Schedule Recertification Policy Detailed Schedule
The recertification schedule in terms of the units of time.
Note: Do not use this query item with Oracle database. This
query item is supported only for DB2 database.
Recertification Policy Schedule
The schedule that automatically triggers the recertification
policy. The query item represents the schedule in the
numeric format. The format of the schedule is Minute Hours
Month DayOfWeek DayOfMonth DayOfQuarter DayOfSemiAnnual.
For example, 0 0 0 0 -1 0 0.
v Minute - Represents the time in minutes.
v Hours - Represents the time in hours. -1 indicates that the
recertification policy is applied every hour.
v Month - Represents the month for the recertification. 1
represents January, 2 represents February, and so on. -1
indicates that the recertification policy is applied every
month.
v DayOfWeek - Represents the day of a week. 1 represents
Sunday, 2 represents Monday, and so on. The positive value
indicates that policy is applied weekly on a specific day.
-1 indicates that the recertification policy is not applied
based on the day of a week.
v DayOfMonth - Represents the date. -1 indicates that the
recertification policy is applied daily.
v DayOfQuarter - Represents the number of days after the
start of each quarter. 0 indicates that the policy is not
applied quarterly.
v DayOfSemiAnnual - Represents the number of days after the
start of each half year. 0 indicates that the policy is not
applied semi-annually.
v The policy is applied annually if the value of Month and
DayOfMonth is positive.
Recertification Policy DN
An LDAP distinguished name for the recertification policy.
Policy Recertifier
Recertifier Type
The type of the recertifier. The valid values and their
meanings:
v Account Owner: User being recertified
Note: This meaning applies only for the recertification
policies that are related to the users. For all other
recertification policies, Account Owner is an owner of the
account.
v System Administrator: Administrator
v Manager: Manager
v Person: Specified user
v Role: Specified organizational role
v System Role: Specified group
Recertifier Name
The name of a specific user, role, or group that is defined as
an approver of the recertification. When the recertification
policy's recertifier is set to User being recertified, then the
Recertifier Name is shown as a blank.
Recert Policy Dn
An LDAP distinguished name for the recertification policy.
Chapter 4. IBM Cognos reporting query subjects and query items 193
Table 253. List of query items in the Recertification Config namespace (continued)
Query subject Query items and their description
Recert Policy Business Unit
Business Unit Name
The name of a business unit.
Business Unit Supervisor
The user supervisor of a business unit.
Business Unit Dn
An LDAP distinguished name for a business unit.
Role Type
The type of a role. The valid values are Static and Dynamic.
The value of a role type is empty if the role name is
mentioned as ALL ROLES WITHIN POLICY ORGANIZATION.
Role Business Unit Name
The business unit to which the role belongs.
Role DN
An LDAP distinguished name for the role.
Role Business Unit DN
An LDAP distinguished name for the business unit to which
role belongs.
Recert Policy Dn
An LDAP distinguished name for the recertification policy.
194 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 253. List of query items in the Recertification Config namespace (continued)
Query subject Query items and their description
Recert Policy Access Target
Group Name
The name for a group. If the policy applies to all the groups
in an organization, then ALL GROUPS WITHIN POLICY
ORGANIZATION is displayed. If the policy applies to all the
groups for a service, then ALL GROUPS ON A SPECIFIED
SERVICE is displayed.
Group Description
The description of a group.
Group Type
The profile type of a group.
Group Access Name
An access name that is defined for a group entity.
Group Access Description
The description of an access that is defined for a group
entity.
Group Dn
An LDAP distinguished name for a group.
Group Service DN
An LDAP distinguished name for the service on which a
group is provisioned.
Group Container DN
An LDAP distinguished name for an organization to which a
group belongs.
Recert Policy DN
An LDAP distinguished name for the recertification policy.
Recert Policy Access Owner
Group Dn
An LDAP distinguished name for a group.
Chapter 4. IBM Cognos reporting query subjects and query items 195
Table 253. List of query items in the Recertification Config namespace (continued)
Query subject Query items and their description
Group Members
Account Name
The name of an account that is associated with a credential.
Account Service Dn
An LDAP distinguished name for a service that provisions
an account.
Account Status
The status of an account that indicates whether the account
is active or inactive.
Account Compliance
The details about an account compliance. The valid values
are Unknown, Compliant, Non Compliant, and Disallowed.
Account Container Dn
An LDAP distinguished name for a business unit of an
account.
Recert Policy Account Target
Account Service Name
The name of the service. If the policy applies to all the
accounts in the service, then ALL ACCOUNT WITHIN POLICY
ORGANIZATION is displayed.
Account Service Business Unit Name
The name of the business unit to which a service belongs.
Account Service DN
An LDAP distinguished name for the service.
Account Service Description
The description of a service.
196 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 253. List of query items in the Recertification Config namespace (continued)
Query subject Query items and their description
Account
Account Name
The name of an account that is associated with a credential.
Account Service Dn
An LDAP distinguished name for a service that provisions
an account.
Account Status
The status of an account that indicates whether the account
is active or inactive.
Account Compliance
The details about an account compliance. The valid values
are Unknown, Compliant, Non Compliant, and Disallowed.
Account Container Dn
An LDAP distinguished name for a business unit of an
account.
Person
Person Full Name
The full name of a user.
Person Status
The status of a user.
Person Dn
An LDAP distinguished name for a user entity.
Chapter 4. IBM Cognos reporting query subjects and query items 197
Account Audit namespace
The Account Audit namespace pertains to the audit history of the accounts. This
namespace contains query subjects that are related to the audit of accounts,
reconciliation, and provisioning policy.
198 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Query items for Account Audit namespace
The following table lists the query items in the Account Audit namespace.
Table 255. Query items in the Account Audit namespace
Query subject Query items and their description
Account Audit
Audit Account Name
The name of an account on which the audit action is performed.
Audit Action
The action that is performed on an account. For example, Add,
Delete, Modify, and ChangePassword.
Audit Comments
The comments that are entered by the audit workflow approver.
Audit Account Business Unit
The business unit of an account.
Audit Process Subject
A user who is the owner of an account on which the audit
action is performed.
Audit Process Service Profile
The profile type of a service to which an account belongs.
Chapter 4. IBM Cognos reporting query subjects and query items 199
Table 255. Query items in the Account Audit namespace (continued)
Query subject Query items and their description
Account
Account Name
The name of an account on which the audit action is performed.
Account Service Name
The name of a service on which the account is provisioned.
Account Status
The account status. The valid values are Active and Inactive.
Account Is Orphan
Indicates whether an account is associated with a user or not.
The valid values are Yes and No. Yes represents the account is
orphaned, and No represents the account is not orphaned.
Account Compliance
Indicates whether an account is compliant or not. The valid
values are Compliant, Non compliant, Unknown, and Disallowed.
Account Last Access Date
The last accessed date and time of an account.
Account Owner First Name
The given name of a user who is the owner of an account.
Account Owner Last Name
The surname of a user who is the owner of an account.
Account Dn
An LDAP distinguished name for an account.
Account Service DN
An LDAP distinguished name for the service to which an
account belongs.
Account Owner Business Unit Dn
An LDAP distinguished name for the business unit to which an
account owner belongs.
Account Owner Dn
An LDAP distinguished name for the account owner.
200 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 255. Query items in the Account Audit namespace (continued)
Query subject Query items and their description
Reconciliation Audit
Reconciliation User Name
The name of a user to whom an account is associated during the
reconciliation operation.
Reconciliation Operation
The operation that is performed for the entry of the service
instance. The possible values for an account entry are New Local,
New Orphan, Suspended Account, and Deprovisioned Account.
Reconciliation Requester Name
The name of an initiator who initiates the reconciliation
operation on the account for a service.
Chapter 4. IBM Cognos reporting query subjects and query items 201
Table 255. Query items in the Account Audit namespace (continued)
Query subject Query items and their description
Provisioning Policy
Provisioning Policy Name
The name of a provisioning policy through which an account is
provisioned on the service.
Provisioning Policy Dn
An LDAP distinguished name for the provisioning policy.
Provisioning Policy Container Dn
An LDAP distinguished name for the business unit to which the
provisioning policy applies.
202 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 256. Query subjects in the Account Configuration namespace (continued)
Query subject Description
ACI Operations Represents the operations that are governed by an ACI. You must use
this query subject with the Account ACI query subject to obtain
information about an ACI associated with the account.
ACI Attribute Permisions Represents the attributes and operations that can be performed on an
attribute. You must use this query subject with the Account ACI query
subject to obtain information about an ACI associated with the
account.
Identity Policy Represents the identity policy and its configuration attributes. You
must use this query subject with the Account query subject to obtain
information about the accounts that are managed by the policy.
Provisioning Policy Represents the provisioning policy and some of its configuration
attributes. You must use this query subject with the Account query
subject to obtain information about the policy that provisioned the
account.
Recertification Policy Represents the recertification policy and some of its configuration
attributes. You must use this query subject with the Account query
subject to obtain information about the accounts that are recertified by
the policy.
Password Policy Represents the password policy and its configuration attributes. You
must use this query subject with the Account query subject to obtain
information about the accounts that are managed by the policy.
Chapter 4. IBM Cognos reporting query subjects and query items 203
Query items for Account Configuration namespace
The following table lists the query items in the Account Configuration namespace.
Table 257. Query items in the Account Configuration namespace
Query subject Query items and their description
Account
Account Name
The name of an account.
Account Status
An account status. The valid values are Active and Inactive.
Account Compliance
Indicates whether an account is compliant or not. The valid
values are Unknown, Compliant, Non Compliant, and Disallowed.
Account Ownership Type
The type of the account ownership. The valid values are Device,
Individual, System, and Vendor.
Account Dn
An LDAP distinguished name for an account.
Account Container Dn
An LDAP distinguished name for a business unit to which an
account belongs.
Account Service Dn
An LDAP distinguished name for a service to which the
accounts belong.
204 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 257. Query items in the Account Configuration namespace (continued)
Query subject Query items and their description
Account Owner Role
Membership Role Name
The name of a role.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for a role.
Role Container DN
An LDAP distinguished name for the business unit that is
associated with a role.
Group
Group Name
The name of a group for which an access is defined.
Group Type
The profile type of a group.
Group DN
An LDAP distinguished name for a group to which an access is
defined.
Group Container Dn
An LDAP distinguished name for the business unit that is
associated with a group.
Group Service Dn
An LDAP distinguished name for the service that is associated
with a group.
Service Business Unit
Business Unit Name
The name of the business unit to which a user belongs.
Business Unit Supervisor
The user supervisor of the business unit.
Business Unit Dn
An LDAP distinguished name for the business unit to which a
user belongs.
Business Unit Container Dn
An LDAP distinguished name for the parent the business unit of
an organization entity.
Chapter 4. IBM Cognos reporting query subjects and query items 205
Table 257. Query items in the Account Configuration namespace (continued)
Query subject Query items and their description
Credential
Credential Name
The name of a shared credential.
Credential Policy Name
The name of a policy that provides the entitlements for a
credential.
Credential Description
Describes a credential as specified in the credential
configuration.
Credential Is Exclusive
Indicates whether the credential is exclusive or not. 0 represents
Yes, and 1 represents No.
Credential Is Searchable
Indicates whether a credential is searchable or not. 0 represents
Can be searched, and 1 represents cannot be searched.
206 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 257. Query items in the Account Configuration namespace (continued)
Query subject Query items and their description
Credential Pool
Credential Pool Name
The name of the credential pool.
Credential Pool Policy Name
The name of a policy that provides the entitlements for the
credential pool.
Credential Pool Service Name
The name of the service on which the groups corresponding to
the credential pool are provisioned.
Chapter 4. IBM Cognos reporting query subjects and query items 207
Table 257. Query items in the Account Configuration namespace (continued)
Query subject Query items and their description
Account ACI
ACI Name
The name of an ACI.
ACI Business Unit Name
The name of a business unit to which an ACI applies.
ACI Protection Category
The category of an entity that is protected by an ACI. The value
of this item must be Account.
ACI Target
The type of selected protection category that is associated with
an ACI. The valid values and their meanings:
v erAccountItem - All type of the accounts.
v erLDAPUserAccount - LDAP accounts.
v erPosixAixAccount - POSIX AIX accounts.
v erPosixHpuxAccount - POSIX HP-UX accounts.
v erPosixLinuxAccount - POSIX Linux accounts.
v erPosixSolarisAccount - POSIX Solaris accounts.
ACI scope
The scope of an ACI. It determines whether an ACI applies to
subunits of a business organization or not. The valid values and
their meanings:
v single - The policy applies to a business unit and not its
subunits.
v subtree - The policy applies to the subunits of a business
organization.
ACI Member Name
The members who are governed by an ACI. The valid values
are:
v All users in the system.
v The account owner.
v The manager of the account owner.
v The owner of the service that the account resides on.
v The owner of any access defined on the service that the
account resides on.
v The sponsor of the business partner organization in
which the account resides.
v The administrator of the domain in which the account
resides.
ACI System Group Name
Represents the name of the group whose members are governed
by an ACI.
ACI Business Unit Dn
An LDAP distinguished name for the business unit.
ACI System Group Dn
An LDAP distinguished name for a system group.
ACI Operations
ACI Operation Name
The name of an operation that is governed by an ACI.
ACI Operation Permission
The permission applicable on an ACI operation. The valid
values are grant, deny, and none.
ACI Business Unit Dn
An LDAP distinguished name for the business unit.
208 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 257. Query items in the Account Configuration namespace (continued)
Query subject Query items and their description
ACI Attribute Permisions
ACI Attribute Name
The name of an LDAP attribute on which the permissions are
controlled by an ACI.
Identity Policy Dn
An LDAP distinguished name for the identity policy.
Identity Policy Target Dn
An LDAP distinguished name for the service on which the
identity policy is applied.
Chapter 4. IBM Cognos reporting query subjects and query items 209
Table 257. Query items in the Account Configuration namespace (continued)
Query subject Query items and their description
Provisioning Policy
Provisioning Policy Name
The name of a provisioning policy.
Provisioning Policy Member Name
The name of the entities that is provisioned by a policy. The
valid values are:
v All users in the organization
v All other users who are not granted to the
entitlement(s) defined by this provisioning policy via
other policies.
Provisioning Policy Dn
An LDAP distinguished name for the provisioning policy.
210 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 257. Query items in the Account Configuration namespace (continued)
Query subject Query items and their description
Password Policy
Password Policy Name
The name of a password policy.
Password Policy Scope
The scope of a password policy. It determines whether the
policy applies to subunits of a business organization or not. The
valid values and their meanings:
v single - The policy applies to a business unit and not its
subunits.
v subtree - The policy applies to the subunits of a business
organization.
Password Policy Enabled
Shows whether or not the policy is enabled.
Password Policy Target Type
Determines the type of a service within the policy business unit
on which the password policy is applied. The valid values are:
v All Services - All the defined services.
v Specific Service - The services that are explicitly added by a
user.
v PosixLinuxProfile - All the services of type POSIX Linux
profile.
v LdapProfile - All the services of type LDAP profile.
v PosixAixProfile - All the services of type POSIX AIX profile.
v PosixSolarisProfile - All the services of type POSIX Solaris
profile.
v PosixHpuxProfile - All the services of type POSIX HP_UX
Profile.
v ITIMService - Default service that is used for IBM Security
Identity Manager accounts.
Password Policy Dn
An LDAP distinguished name for the password policy.
Password Policy Target Dn
An LDAP distinguished name for the service on which the
password policy is applied.
Password Policy Container Dn
An LDAP distinguished name for the business unit where the
identity policy is located.
Chapter 4. IBM Cognos reporting query subjects and query items 211
Table 258. Query subjects in the Provisioning Policy Audit namespace (continued)
Query subject Description
Provisioning Policy Represents the provisioning policies on which the audit actions are
performed. To obtain more information about the policy and accounts
that go through the audit actions, use this query subject with the
following query subjects:
v Provisioning Policy Audit
v Provisioning Policy Business Unit
v Provisioning Policy Service
Provisioning Policy Business Represents the business unit to which the provisioning policy applies.
Unit
Provisioning Policy Service Represents the managed service to which the provisioning policy
applies.
212 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 259. Query items in the Provisioning Policy Audit namespace
Query subject Query items and their description
Provisioning Policy
Audit Audit Provisioning Policy Name
The name of a provisioning policy.
Audit Provisioning Policy Business Unit
The name of a business unit to which the provisioning policy
applies.
Audit Action
The action that is performed on the provisioning policy. For
example, Add, Modify, and EnforceEntirePolicy.
Activity Name
The name of the audit activity.
Activity Submission Time
The audit activity submission date and time.
Activity Completion Time
The audit activity completion date and time.
Audit Activity Result Summary
The result summary of an activity in the account request
workflow process.
Audit Process Recertifier
The name of a user who approves the audit process workflow.
Chapter 4. IBM Cognos reporting query subjects and query items 213
Table 259. Query items in the Provisioning Policy Audit namespace (continued)
Query subject Query items and their description
Provisioning Policy
Provisioning Policy Name
The name of a provisioning policy.
Provisioning Policy Scope
The scope in terms of a hierarchy of the business units to which
the provisioning policy applies.
Provisioning Policy Dn
An LDAP distinguished name for the provisioning policy.
Provisioning Policy Business Unit Dn
An LDAP distinguished name for the business unit to which the
provisioning policy applies.
Provisioning Policy
Business Unit Business Unit Name
The name of the business unit to which the provisioning policy
applies.
Business Unit Supervisor
The supervisor of a user for the business unit to which the
provisioning policy applies.
Business Unit Container Dn
An LDAP distinguished name for the business unit where the
provisioning policy business unit is located.
Business Unit Dn
An LDAP distinguished name for the business unit to which the
provisioning policy belongs.
Provisioning Policy
Service Service Name
The name of a service to which the provisioning policy applies.
Service Type
The profile type of a service to which the provisioning policy
applies.
Service Business Unit
The business unit of a service to which the provisioning policy
applies.
Service Dn
An LDAP distinguished name for a service to which the
provisioning policy belongs.
Service Business Unit Dn
An LDAP distinguished name for the business unit to which the
service belongs.
Service Owner Dn
An LDAP distinguished name for the user owner of a service.
214 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 260. Query subjects in the Provisioning Policy Config namespace
Query subject Description
Provisioning Policy Represents the provisioning policy and its configuration attributes.
Provisioning Policy Parameters Represents the parameters that are defined for the entitlements of a
provisioning policy. You must use this query subject with the
Provisioning Policy query subject.
Provisioning Policy Role Represents the user members of a role that is a part of the
Members provisioning policy. You must use this query subject with the
Provisioning Policy query Subject.
ACI Attribute Permissions Represents the permissions that are defined on the attributes by an
ACI. You must use this query subject with the Provisioning Policy
ACI query subject.
ACI Operations Represents the permissions that are defined on the class operations
by an ACI. You must use this query subject with the Provisioning
Policy ACI query subject.
Provisioning Policy ACI Represents an ACI associated with a provisioning policy. You must
use this query subject with the Provisioning Policy query subject.
Note: The policies that are in the Draft mode cannot be identified. Although the
draft policies are in the list, there is no attribute that can identify the draft policies.
Chapter 4. IBM Cognos reporting query subjects and query items 215
Table 261. Query items in the Provisioning Policy Config namespace
Query subject Query items and their description
Provisioning Policy
Provisioning Policy Name
The name of a provisioning policy.
Provisioning Policy Business Unit
The name of a business unit to which the provisioning policy
applies.
Provisioning Policy Is Enabled
Represents whether the provisioning policy is enabled or not.
The valid values are Enabled and Disabled.
Provisioning Policy Dn
An LDAP distinguished name for the provisioning policy.
Provisioning Policy Business Unit Dn
An LDAP distinguished name for the business unit to which the
provisioning policy applies.
Provisioning Policy Service Name
The name of a service to which the provisioning policy applies.
216 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 261. Query items in the Provisioning Policy Config namespace (continued)
Query subject Query items and their description
Provisioning Policy Role
Members Role Member First Name
The given name of a role member.
Role Member Last Name
The surname of a role member.
Role Member Status
The current state of the role member. The valid values are
Active and Inactive.
Role Member Dn
An LDAP distinguished name for a role member.
Role Member Business Unit Dn
An LDAP distinguished name for the business unit of a role
member.
Role Member Supervisor
The user supervisor of the role member.
ACI Attribute
Permissions ACI Attribute Name
The name of an attribute that is controlled by an ACI.
Chapter 4. IBM Cognos reporting query subjects and query items 217
Table 261. Query items in the Provisioning Policy Config namespace (continued)
Query subject Query items and their description
Provisioning Policy ACI
ACI Name
The name of an ACI associated with the provisioning policy.
ACI Business Unit
The name of a business unit to which an ACI applies.
ACI Scope
The hierarchy of the business units to which an ACI applies.
218 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 262. Query subjects in the Role Audit namespace (continued)
Query subject Description
Role Membership Represents the person who is the member of a role and its
configuration attributes. You must use this query subject with the Role
query subject.
Role Owner Represents an owner of a role that is associated with the audit action.
The owner can be a user or role. You must use this query subject with
the Role query subject.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for the role.
Role Container Dn
An LDAP distinguished name for the container of the role.
Chapter 4. IBM Cognos reporting query subjects and query items 219
Table 263. List of query items in the Role Audit namespace (continued)
Query subject Query items and their description
Role Audit
Audit Role Name
The name of a role entity on which the audit action is
performed.
Audit Comments
The comments that are entered by the audit workflow
approver.
Note: Along with the audit comments, this query item might
contain the operational data.
Audit Initiator Name
The name of a user who initiated the audit action.
220 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 263. List of query items in the Role Audit namespace (continued)
Query subject Query items and their description
Role Business Unit
Business Unit Name
The name of a business unit to which the role belongs.
Business Unit Supervisor
A person who is the supervisor of a business unit to which
the role belongs.
Business Unit Dn
An LDAP distinguished name for a business unit to which
the role belongs.
Role Member Dn
An LDAP distinguished name for a role member.
Role Dn
An LDAP distinguished name for a role.
Chapter 4. IBM Cognos reporting query subjects and query items 221
Table 264. Query subjects in the Role Configuration namespace (continued)
Query subject Description
Parent Roles Represents the parent of a role. You must use this query subject with
the Role query subject to obtain information about the parent of the
role.
Role Assignment Attributes Represents an assignment attributes for a role. You must use this
query subject with the Role query subject to obtain information about
the assignment attributes for the role.
Role Members Represents the user members of a role. You must use this query
subject with the Role query subject to obtain information about the
members of the role.
Role ACI Represents an ACI that is applicable on the roles. You must use this
query subject with the Role query subject to obtain information about
the roles that are managed by an ACI.
ACI Operations Represents information about operations that are governed by an ACI.
You must use this query subject with the Role ACI query subject to
obtain information about an ACI associated with the role.
ACI Attribute Permissions Represents information about the attributes and operations that can be
performed on the attributes. You must use this query subject with the
Role ACI query subject to obtain information about an ACI associated
with a role.
Recertification Policy Represents the recertification policy and some of its configuration
attributes. You must use this query subject with the Role query subject
to obtain information about the roles that are recertified by the
recertification policy.
Recertification Policy Represents a business unit to which the recertification policy is
Business Unit applicable.
Provisioning Policy Represents the provisioning policy and some of its configuration
attributes. You must use this query subject with the Role query subject
to obtain information about the roles who are member of a
provisioning policy.
Shared Access Policy Represents the shared access policy that provides entitlements for the
credentials and credential pools. You must use this query subject with
the Role query subject to obtain information about the role members
of the shared access policy.
Separation of Duty Policy Represents a separation of duty policy and some of its configuration
attributes. You must use this query subject with the Role query subject
to obtain information about the roles to which the policy applies.
Separation of Duty Rule Represents the rule that is defined for a separation of duty policy. You
must use this query subject with the Separation of Duty Policy and
Role query subjects to obtain information about:
v The rules that are defined for a separation of duty policy.
v The roles that are covered by a separation of duty rule.
222 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Query items for Role Configuration namespace
The following table lists the query items in the Role Configuration namespace.
Table 265. List of query items in the Role Configuration namespace
Query subject Query items and their description
Role
Role Name
The name of a role.
Role Description
The description of a role.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for the role.
Role Business Unit Dn
An LDAP distinguished name for the business unit of a role.
Parent Role Dn
An LDAP distinguished name for the role.
Parent Business Unit Dn
An LDAP distinguished name for the business unit of the
parent role.
Role Assignment Attributes
Attribute Name
The name of an attribute.
Role Dn
An LDAP distinguished name for the role to which an
attribute is assigned.
Chapter 4. IBM Cognos reporting query subjects and query items 223
Table 265. List of query items in the Role Configuration namespace (continued)
Query subject Query items and their description
Role Members
Role Member First Name
The given name of a role member.
Role Member Last Name
The surname of a role member.
Role Member Attribute Name
The name of the assignment attribute that is associated with
a role member.
Role Member Attribute Value
An assignment attribute value that is associated with a role
member.
Role Member Dn
An LDAP distinguished name for a role member.
Role Member Business Unit Dn
An LDAP distinguished name for the business unit of a role
member.
Role ACI
Role ACI Name
The name of an ACI that applies to a role.
224 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 265. List of query items in the Role Configuration namespace (continued)
Query subject Query items and their description
ACI Operations
ACI Operation Name
The name of an operation that is governed by an ACI.
ACI Operation Permission
The permission applicable on an ACI operation. The valid
values are grant, deny, and none.
ACI Business Unit Dn
An LDAP distinguished name for the business unit to which
an ACI applies.
ACI Attribute Permissions
ACI Attribute Name
The name of an LDAP attribute on which the permissions
are controlled by an ACI.
ACI Attribute Operation
The name of an operation that an ACI governs.
ACI Attribute Permission
The permission applicable on an ACI operation. The valid
values are grant and deny.
ACI Business Unit Dn
An LDAP distinguished name for a business unit to which
an ACI applies.
Chapter 4. IBM Cognos reporting query subjects and query items 225
Table 265. List of query items in the Role Configuration namespace (continued)
Query subject Query items and their description
Recertification Policy
Recertification Policy Name
The name of the recertification policy.
Recertification Policy Type
The type of an entity that gets recertified by using this
policy. The valid values are: Account, Access, and Identity.
Recertification Policy Description
Describes the policy as specified in the policy configuration.
Recertification Policy Enabled
Shows whether or not the policy is enabled.
Recertification Policy Scheduling Mode
The recertification scheduling modes. The valid values are
CALENDAR and ROLLING.
Recertification Policy Rolling Interval
Represents the recertification period if the recertification
policy scheduling mode is ROLLING. No value in this query
item indicates that the scheduling is not in the ROLLING
mode.
Recertification Policy Reject Action
An action that is taken if the recertification is rejected.
Business Unit Dn
An LDAP distinguished name for a business unit.
226 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 265. List of query items in the Role Configuration namespace (continued)
Query subject Query items and their description
Provisioning Policy
Provisioning Policy Name
The name of the provisioning policy.
Provisioning Policy Business Unit Name
The name of a business unit to which the provisioning policy
applies.
Provisioning Policy Dn
An LDAP distinguished name for the provisioning policy.
Provisioning Policy Business Unit Dn
An LDAP distinguished name for the business unit to which
the provisioning policy applies.
Chapter 4. IBM Cognos reporting query subjects and query items 227
Table 265. List of query items in the Role Configuration namespace (continued)
Query subject Query items and their description
Separation of Duty Policy
Separation of Duty Policy Name
The name of the separation of duty policy.
Separation of Duty Policy Description
The description of the separation of duty policy.
Separation of Duty Policy Business Unit Name
The name of the business unit to which the separation of
duty policy applies.
Separation of Duty Policy Enabled
Represents whether the policy is enabled or not. True
represents Enabled, and False represents Disabled.
228 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 266. Query subjects in the Separation of Duty Audit namespace
Query subject Description
Separation of Duty Policy Represents the separation of duty policy and the rules that are
configured. You must use this query subject with the following query
subjects to generate the violation and exemption reports:
v Separation of Duty Policy Violation and Exemption History.
v Separation of Duty Policy Violation and Exemption Current
Status.
v Separation of Duty Policy Audit.
Separation of Duty Policy Represents the configuration attributes of a role. The role is a part of
Role the rule that is associated with the separation of duty policy. You
must use this query subject with the Separation of Duty Policy
query subject.
Separation of Duty Policy Provides information about the exemption and violation for a
Violation and Exemption separation of duty policy. You must use this query subject with the
Current Status Separation of Duty Policy query subject.
Separation of Duty Policy Represents the historical information about exemption and violation
Violation and Exemption for a separation of duty policy. You must use this query subject with
History the Separation of Duty Policy query subject.
Separation of Duty Policy Represents the audit history for the separation of duty policy. The
Audit actions that are audited in this query subject are Add, Modify, Delete,
Reconcile, and Revoke. You must use this query subject with the
Separation of Duty Policy query subject to generate an audit history
report.
Separation of Duty Policy Provides information about:
Role Conflict v The roles that are involved in a violation.
v The role on the person that is found to be in violation of the
separation of duty policy rule.
You must use this query subject with the Separation of Duty Policy
Violation and Exemption Current Status query subject to obtain
more information about the violation that is occurred.
Chapter 4. IBM Cognos reporting query subjects and query items 229
Table 267. Query items in the Separation of Duty Audit namespace
Query subject Query items and their description
Separation of Duty Policy
Separation of Duty Policy Name
The name of the separation of duty policy.
Separation of Duty Policy Description
The description of the separation of duty policy.
Separation of Duty Policy Business Unit Name
The name of a business unit to which the separation of duty
policy applies.
Separation of Duty Policy Enabled
Indicates whether or not the policy is enabled. The valid
values are Enabled and Disabled.
230 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 267. Query items in the Separation of Duty Audit namespace (continued)
Query subject Query items and their description
Separation of Duty Policy
Violation and Exemption Audit Status
Current Status The status of the separation of duty policy violation or
exemption. The possible values are:
v Violation - indicates that the violation occurred.
v Approved - indicates that an approver approved the
exempted violation.
Audit Person Name
The name of a person to which the violation refers.
Chapter 4. IBM Cognos reporting query subjects and query items 231
Table 267. Query items in the Separation of Duty Audit namespace (continued)
Query subject Query items and their description
Separation of Duty Policy
Violation and Exemption Audit Status
History The status of the separation of duty policy violation or
exemption. The possible values are:
v Violation - indicates that the violation occurred.
v Approved - indicates that an approver approved the
exempted violation.
Audit Person Name
The name of a person to which the violation refers.
Audit Violation Id
A unique numeric identifier for the violation record.
Audit Policy Global Id
A unique identifier for the separation of duty policy.
Audit Rule Global Id
A unique identifier for the separation of duty policy rule.
Audit Person Global Id
A unique identifier for the person against whom the
violation occurred.
232 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 267. Query items in the Separation of Duty Audit namespace (continued)
Query subject Query items and their description
Separation of Duty Policy
Audit Audit Separation of Duty Policy Name
The name of the separation of duty policy.
Audit Separation of Duty Policy Business Unit
The business unit of the separation of duty policy.
Audit Action
An action that is performed on the separation of duty
policy. For example, Add, Modify, Delete, and Reconcile.
Audit Comments
The comments that are entered by the approver.
Audit Process Subject
The name of the separation of duty policy on which the
audit action occurs.
Audit Process Subject Profile
The profile type of an entity that is associated with the
audit action. This query item contains the value only if the
Audit Process Subject contains a value.
Chapter 4. IBM Cognos reporting query subjects and query items 233
Table 267. Query items in the Separation of Duty Audit namespace (continued)
Query subject Query items and their description
Separation of Duty Policy
Role Conflict User Roles in Conflict
The name of the role on the person that is found in
violation of the separation of duty policy rule.
234 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 268. Query subjects in the Separation of Duty Configuration
namespace (continued)
Query subject Description
Separation of Duty Rule Represents the separation of duty rule that is associated with the
separation of duty policy.
Separation of Duty Policy Represents the role that is a part of the separation of duty rule. You
Role must us this query subject with the Separation of Duty Rule query
subject.
Chapter 4. IBM Cognos reporting query subjects and query items 235
Table 269. Query items in the Separation of Duty Configuration namespace (continued)
Query subject Query items and their description
Separation of Duty
Policy Role Separation of Duty Policy Role Name
The name of the role that is a part of the separation of duty rule.
Separation of Duty Policy Role Description
Describes the separation of duty policy role.
Separation of Duty Policy Business Unit Name
The name of a business unit to which the separation of duty
policy role applies.
Separation of Duty Policy Role Dn
An LDAP distinguished name for the role that is a part of the
separation of duty policy.
236 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Query items for User Audit namespace
The following table lists the query items in the User Audit namespace.
Table 271. List of query items in the User Audit namespace
Query subject Query items and their description
Person
Person Full Name
The full name of a user.
Person Last Name
The surname of a user.
Person Supervisor
An LDAP distinguished name for the supervisor of a user.
Person Status
The status of a user entity. The valid values are Active and
Inactive.
Person Dn
An LDAP distinguished name for a user.
Person Business Unit Dn
An LDAP distinguished name for the business unit to which
a user belongs.
Chapter 4. IBM Cognos reporting query subjects and query items 237
Table 271. List of query items in the User Audit namespace (continued)
Query subject Query items and their description
User Audit
Audit Person Name
The name of a person on which the audit action is
performed.
Audit Action
An action that is performed on a person or the business
partner person. For example, Add, Delete, Modify, Transfer,
Restore, Add Delegate, and Suspend.
Audit Initiator Name
The name of a user who initiates an action on a person or
the business partner person.
Audit Comments
The comments that are entered by the audit workflow
approver. Along with the audit comments, this query item
might contain the operational data.
Audit Person Dn
An LDAP distinguished name for a user.
Audit Person Container Dn
An LDAP distinguished name for the parent business unit to
which a user belongs.
238 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 271. List of query items in the User Audit namespace (continued)
Query subject Query items and their description
Person Business Unit
Business Unit Name
The name of a business unit.
Business Unit Supervisor
A user who is the supervisor of a business unit.
Business Unit Dn
An LDAP distinguished name for the business unit to which
a user belongs.
Business Unit Container Dn
An LDAP distinguished name for the parent business unit of
an organization entity.
Person Roles
Role Name
The name of a role.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for the role.
Role Container Dn
An LDAP distinguished name for the parent business unit of
the role.
Business Partner Person
Business Partner Person Full Name
The full name of a user.
Chapter 4. IBM Cognos reporting query subjects and query items 239
Table 271. List of query items in the User Audit namespace (continued)
Query subject Query items and their description
Business Partner Roles
Role Name
The name of a role.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for the role.
Role Container Dn
An LDAP distinguished name for the parent business unit of
the role.
240 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 272. Query subjects in the User Configuration namespace (continued)
Query subject Description
Group Ownership Represents the group entities that a user own. You must use this
query subject with the Person query subject to obtain information
about the groups that the user owns.
Credential Pool Ownership Represents the credential pool that a user owns. You must use this
query subject with the Person query subject to obtain information
about the credential pool that the user owns.
Separation of Duty Policy Represents the separation of duty policies that a user own. You must
Ownership use this query subject with the Person query subject to obtain
information about the separation of duty policies that the user own.
Person Status
The status of the user entity. The valid values are Active and
Inactive.
Person Business Unit Name
The name of the business unit to which a user belongs.
Chapter 4. IBM Cognos reporting query subjects and query items 241
Table 273. List of query items in the User Configuration namespace (continued)
Query subject Query items and their description
Person Manager
Person Full Name
The full name of the manager.
Person Last Name
The surname of the manager.
Person Status
The status of the manager entity. The valid values are Active
and Inactive.
Person Dn
An LDAP distinguished name for the manager.
Person Business Unit Dn
An LDAP distinguished name for the business unit to which
a manager belongs.
Person Supervisor
The user supervisor of the manager.
242 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 273. List of query items in the User Configuration namespace (continued)
Query subject Query items and their description
Account
Account Name
The name of an account.
Account Status
The status of an account. The valid values are Active and
Inactive.
Account Compliance
The compliance status of an account. The valid values are
Unknown, Compliant, Disallowed, and Non Compliant.
Account Service Dn
An LDAP distinguished name for the service on which an
account is provisioned.
Account Service Business Unit Dn
An LDAP distinguished name for the business unit to which
a service belongs.
Account Service Owner Dn
An LDAP distinguished name for a user who is the owner of
the service.
Chapter 4. IBM Cognos reporting query subjects and query items 243
Table 273. List of query items in the User Configuration namespace (continued)
Query subject Query items and their description
Role
Role Name
The name of a role.
Role Description
The description of a role.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for the role.
244 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 273. List of query items in the User Configuration namespace (continued)
Query subject Query items and their description
ACI Attribute Permissions
ACI Attribute Name
The name of an attribute for which an ACI controls the
permissions.
Business Unit Dn
An LDAP distinguished name for the business unit to which
a user belongs.
Business Unit Container Dn
An LDAP distinguished name for the parent business unit of
an organization entity.
Chapter 4. IBM Cognos reporting query subjects and query items 245
Table 273. List of query items in the User Configuration namespace (continued)
Query subject Query items and their description
Service Ownership
Service Name
The name of a service to which the accounts are provisioned.
Service Dn
An LDAP distinguished name for the service.
Service Container Dn
An LDAP distinguished name for the business unit of a
service.
Service Owner Dn
An LDAP distinguished name for a user who owns the
service.
Service Url
A URL that connects to the managed resource.
Service Type
The service profile type.
Roles Ownership
Role Name
The name of a role.
Role Description
The description of a role.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for a role.
Role Business Unit Dn
An LDAP distinguished name for the business unit of a role.
246 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 273. List of query items in the User Configuration namespace (continued)
Query subject Query items and their description
Group Ownership
Group Name
The name of a group for which an access is defined.
Group Type
The profile type of a group.
Group Access Name
The name of an access that is defined for a group.
Group Service Dn
An LDAP distinguished name for the service that is
associated to a group.
Group Service Business Unit Dn
An LDAP distinguished name for the business unit to which
a service belongs.
Group Service Owner Dn
An LDAP distinguished name for a user who owns the
service.
Chapter 4. IBM Cognos reporting query subjects and query items 247
Table 273. List of query items in the User Configuration namespace (continued)
Query subject Query items and their description
Separation of Duty Policy
Ownership Separation of Duty Policy Name
The name of the separation of duty policy.
Separation of Duty Policy Description
The description of the separation of duty policy.
Separation of Duty Policy Enabled
Indicates whether or not the policy is enabled. True
represents Enabled, and False represents Disabled.
Separation of Duty Policy Business Unit Name
The name of a business unit to which the separation of duty
policy applies.
248 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Query items for Service Audit namespace
The following table lists the query items in the Service Audit namespace.
Table 275. List of query items in the Service Audit namespace
Query subject Query items and their description
Service
Service Name
The name of a service.
Service Type
The type of a service. For example, PosixLinuxProfile.
Service Description
The description of the service that is entered during the
service creation or modification.
Service Business Unit Name
The business unit to which a service belongs.
Service Url
The IP address of the resource on which the service is
created.
Service Tag
A tag that logically groups the services. If a service is tagged
during creation or modification, this query item represents
the name of the tag.
Service Dn
An LDAP distinguished name for a service.
Chapter 4. IBM Cognos reporting query subjects and query items 249
Table 275. List of query items in the Service Audit namespace (continued)
Query subject Query items and their description
Service Audit
Audit Service Name
The name of a service on which the audit action is run.
Audit Service Business Unit
The business unit of a service.
Audit Action
Represents an action that is run on the service. The possible
values are:
v Add.
v Delete.
v Modify.
v EnforcePolicyForService.
v UseGlobalSetting.
v CorrectNonCompliant.
v SuspendNonCompliant.
v AlertNonCompliant.
v MarkNonCompliant.
Audit Comments
The comments that are entered by the audit workflow
approver. Along with the audit comments, this query item
might contain the operational data.
250 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 275. List of query items in the Service Audit namespace (continued)
Query subject Query items and their description
Service Health
Resource Dn
An LDAP distinguished name for the service.
Resource Status
Indicates whether or not resource that is represented by the
service is available. The valid values are Success and Failed.
Resource Test Status
Indicates whether or not resource that is represented by the
service is connectable. The valid values are Success and
Failed.
Last Response Time
The date and time of the last received response from the
resource that is represented by the service.
Lock Service
Shows if a service is locked. For example, Service is locked
for the reconciliation.
Provisioning Policy Dn
An LDAP distinguished name for the provisioning policy.
Chapter 4. IBM Cognos reporting query subjects and query items 251
Query subjects for Access Audit namespace
The following table lists the query subjects in the Access Audit namespace.
Table 276. Query subjects in the Access Audit namespace
Query subject Description
Access Audit Represents the audit history of the access entity. You must use this
query subject with the Access query subject.
Access Represents the access entity on which the audit actions are performed.
This query subject also contains the configuration attributes of an
access.
Access Owner Represents a user who owns the access.
Access Owner Business Unit Represents the business unit to which an access owner belongs. You
must use this query subject with the Access Owner query subject to
obtain the configuration information about the business unit that is
associated with an owner.
Access Service Represents the service on which the access is provisioned. You must
use this query subject with the Access query subject to obtain the
configuration information about the access service.
Access Service Business Unit Represents the business unit to which a service belongs. You must use
this query subject with the Access Service query subject to obtain the
configuration information about the business unit that is associated
with the service.
Access Members Provides information about the accounts that are the members of an
access.
Access Member Owner Provides information about the users who own the accounts that are
members of an access.
Access Member Owner Represents the business unit to which the access member owner
Business Unit belongs.
252 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Query items for Access Audit namespace
The following table lists the query items in the Access Audit namespace.
Table 277. List of query items in the Access Audit namespace
Query subject Query items and their description
Access Audit
Audit Access Name
The name of an access on which the audit operation is run.
Audit Access Service Name
The name of a service for which the access is defined.
Audit Action
An action that is run on the access. The valid values are:
v Add.
v Modify.
v Delete.
v AddMember.
v RemoveMember.
Audit Initiator Name
The name of a user who initiates the audit action. For the
audit actions such as AddMember and RemoveMember, the
initiator name represents the name of IBM Security Identity
Manager account.
Audit Account Name
The name of an account for which the access is either
requested or deleted. This query item applies to only
AddMember and RemoveMember audit actions.
Audit Process Requestee Name
The name of a user whose account is added to the access.
This query item applies to only AddMember and RemoveMember
audit actions.
Audit Comments
The comments that are entered by the audit workflow
approver.
Chapter 4. IBM Result
Audit Process CognosSummary
reporting query subjects and query items 253
The result of the access audit process.
Table 277. List of query items in the Access Audit namespace (continued)
Query subject Query items and their description
Access
Group Name
The name of a group for which the access is defined.
Group Type
The profile type of a group.
Group Access Name
The name of an access that is defined for a group.
Group Container Dn
An LDAP distinguished name for the business unit that is
associated with a group.
Group Owner Dn
An LDAP distinguished name for a group owner.
Group Service Dn
An LDAP distinguished name for the service that is
associated with a group.
Access Owner Dn
An LDAP distinguished name for an account owner.
Access Owner Business Unit Dn
An LDAP distinguished name for the business unit to which
an account owner belongs.
254 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 277. List of query items in the Access Audit namespace (continued)
Query subject Query items and their description
Access Owner Business Unit
Business Unit Name
The name of a business unit.
Business Unit Supervisor
The business unit of a user who is the supervisor.
Business Unit Dn
An LDAP distinguished name for the business unit.
Service Dn
An LDAP distinguished name for a service to which the
access belongs.
Service Container Dn
An LDAP distinguished name for a business unit of a service
that is associated with the access.
Service Owner Dn
An LDAP distinguished name for a user owner of the
service.
Service URL
A URL that connects to the managed resource.
Service Type
The service profile type.
Access Service Business Unit
Business Unit Name
The name of a business unit.
Business Unit Supervisor
A user who is the supervisor of a business unit.
Business Unit Dn
An LDAP distinguished name for a business unit.
Chapter 4. IBM Cognos reporting query subjects and query items 255
Table 277. List of query items in the Access Audit namespace (continued)
Query subject Query items and their description
Access Members
Account Name
The name of an account that is a member of an access.
Account Ownership Type
The type of the account ownership. The valid values are:
v Device.
v Individual.
v System.
v Vendor.
Account Status
The status of an account. The valid values are Active and
Inactive.
Account Compliance
Indicates whether an account is compliant or not. The valid
values are:
v Unknown.
v Compliant.
v Non Compliant.
v Disallowed.
Account Last Access Date
The last accessed date and time of an account.
Account Dn
An LDAP distinguished name for an account.
Account Service Dn
An LDAP distinguished name for a service to which the
account belongs.
Access Member Owner
Person Full Name
The full name of an account owner.
Person Last Name
The surname of an account owner.
Person Dn
An LDAP distinguished name for an account owner.
Business Unit Dn
An LDAP distinguished name for a business unit.
Business Unit Container Dn
An LDAP distinguished name for the parent business unit of
an organization entity.
256 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Access Configuration namespace
Use the Access Configuration namespace to view access configuration and its
business metadata for the access entities.
Chapter 4. IBM Cognos reporting query subjects and query items 257
Query items for Access Configuration namespace
The following table lists the query items in the Access Configuration namespace.
Table 279. List of query items in the Access Configuration namespace
Query subject Query items and their description
Access
Entity Name
The name of a role, service, or group that is defined as an
access.
Access Name
The name of the access that is defined in an organization.
Access Category
The category of the access application, email group, role,
shared folder, or any other custom category that is defined.
Access Type
The type of an access. The type of an access can be a role,
group, or service.
Access Dn
An LDAP distinguished name for an access.
Service Business Meta Data
Access ID
A unique identifier that represents the business metadata for
a service that is defined as an access.
Access Description
The description of a service that is defined as an access.
Access Icon Url
A uniform resource identifier (URL) string for the icon that
represents an access.
Access Additional Information
Displays information about the access card by default. It is
an extra information about the access item that an
administrator can use.
Access Badge Style
Represents the class that applies the formatting to the badge
text such as, font type, size, or color.
Access Badge Text
Provides the details about the badge that is defined for an
access.
Group
Group Name
The name of the group that is defined in an organization.
Group Type
The profile type of a group.
Group Dn
An LDAP distinguished name for a group.
Group Owner Dn
An LDAP distinguished name of an owner that owns the
group.
Group Service Dn
An LDAP distinguished name of a service to which the
group belongs.
258 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 279. List of query items in the Access Configuration namespace (continued)
Query subject Query items and their description
Group Business Meta Data
Access Name
The name of an access of a type as group.
Access Description
The description of a group that is defined as an access.
Access Icon Url
A uniform resource identifier (URL) string for the icon that
represents an access.
Access Additional Information
Displays information about the access card by default. It is
an extra information about the access item that an
administrator can use.
Service Type
The type of a service. For example, PosixLinuxProfile.
Service Dn
An LDAP distinguished name for a service.
Service ID
A unique identifier that represents the service.
Role
Role Name
The name of a role.
Role Type
The type of a role. The valid values are Static and Dynamic.
Role Dn
An LDAP distinguished name for a role.
Role Business Unit Dn
An LDAP distinguished name for the business unit of a role.
Role Supervisor
The supervisor of a user for the business unit of a role.
Role Owner Dn
An LDAP distinguished name for the role owner.
Role Parent Dn
An LDAP distinguished name for the parent role.
Chapter 4. IBM Cognos reporting query subjects and query items 259
Table 279. List of query items in the Access Configuration namespace (continued)
Query subject Query items and their description
Role Business Meta Data
Access Name
The name of an access of a type as role.
Access Description
The description of a role that is defined as an access.
Access Icon Url
A uniform resource identifier (URL) string for the icon that
represents an access.
Access Additional Information
Displays information about the access card by default. It is
an extra information about the access item that an
administrator can use.
Person Dn
An LDAP distinguished name for a person.
Person Business Unit Dn
An LDAP distinguished name for the business unit to which
a person belongs.
260 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Table 279. List of query items in the Access Configuration namespace (continued)
Query subject Query items and their description
Group Access Owner
Full Name
The full name of a user.
Last Name
The surname of a user.
Type The type of a user. For example, Person or Business Partner
Person.
User Name
The full name of the user with defined access on Role,
Group, or Service.
Chapter 4. IBM Cognos reporting query subjects and query items 261
262 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Notices
This information was developed for products and services offered in the U.S.A.
IBM may not offer the products, services, or features discussed in this document in
other countries. Consult your local IBM representative for information on the
products and services currently available in your area. Any reference to an IBM
product, program, or service is not intended to state or imply that only that IBM
product, program, or service may be used. Any functionally equivalent product,
program, or service that does not infringe any IBM intellectual property right may
be used instead. However, it is the user's responsibility to evaluate and verify the
operation of any non-IBM product, program, or service.
IBM may have patents or pending patent applications covering subject matter
described in this document. The furnishing of this document does not give you
any license to these patents. You can send license inquiries, in writing, to:
For license inquiries regarding double-byte (DBCS) information, contact the IBM
Intellectual Property Department in your country or send inquiries, in writing, to:
The following paragraph does not apply to the United Kingdom or any other
country where such provisions are inconsistent with local law :
Any references in this information to non-IBM Web sites are provided for
convenience only and do not in any manner serve as an endorsement of those Web
sites. The materials at those Web sites are not part of the materials for this IBM
product and use of those Web sites is at your own risk.
Licensees of this program who wish to have information about it for the purpose
of enabling: (i) the exchange of information between independently created
programs and other programs (including this one) and (ii) the mutual use of the
information which has been exchanged, should contact:
IBM Corporation
2Z4A/101
11400 Burnet Road
Austin, TX 78758 U.S.A.
The licensed program described in this document and all licensed material
available for it are provided by IBM under terms of the IBM Customer Agreement,
IBM International Program License Agreement or any equivalent agreement
between us.
All statements regarding IBM's future direction or intent are subject to change or
withdrawal without notice, and represent goals and objectives only.
This information contains examples of data and reports used in daily business
operations. To illustrate them as completely as possible, the examples include the
names of individuals, companies, brands, and products. All of these names are
fictitious and any similarity to the names and addresses used by an actual business
enterprise is entirely coincidental.
COPYRIGHT LICENSE:
264 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
IBM for the purposes of developing, using, marketing, or distributing application
programs conforming to IBM's application programming interfaces.
Each copy or any portion of these sample programs or any derivative work, must
include a copyright notice as follows:
If you are viewing this information softcopy, the photographs and color
illustrations might not appear.
© (your company name) (year). Portions of this code are derived from IBM Corp.
Sample Programs. © Copyright IBM Corp. _enter the year or years_. All rights
reserved.
If you are viewing this information in softcopy form, the photographs and color
illustrations might not be displayed.
Trademarks
IBM, the IBM logo, and ibm.com® are trademarks or registered trademarks of
International Business Machines Corp., registered in many jurisdictions worldwide.
Other product and service names might be trademarks of IBM or other companies.
A current list of IBM trademarks is available on the Web at "Copyright and
trademark information" at http://www.ibm.com/legal/copytrade.shtml.
Adobe, Acrobat, PostScript and all Adobe-based trademarks are either registered
trademarks or trademarks of Adobe Systems Incorporated in the United States,
other countries, or both.
Intel, Intel logo, Intel Inside, Intel Inside logo, Intel Centrino, Intel Centrino logo,
Celeron, Intel Xeon, Intel SpeedStep, Itanium, and Pentium are trademarks or
registered trademarks of Intel Corporation or its subsidiaries in the United States
and other countries.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of
Microsoft Corporation in the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other
countries.
Notices 265
Java and all Java-based trademarks and logos are trademarks or registered
trademarks of Oracle and/or its affiliates.
This information was developed for products and services that are offered in the
US and the European Union.
This Software Offering does not use cookies or other technologies to collect
personally identifiable information.
If the configurations deployed for this Software Offering provide you as customer
the ability to collect personally identifiable information from end users via cookies
and other technologies, you should seek your own legal advice about any laws
applicable to such data collection, including any requirements for notice and
consent.
For more information about the use of various technologies, including cookies, for
these purposes, See IBM’s Privacy Policy at http://www.ibm.com/privacy and
IBM’s Online Privacy Statement at http://www.ibm.com/privacy/details/us/en
sections entitled “Cookies, Web Beacons and Other Technologies” and “Software
Products and Software-as-a Service”.
266 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Index
A AUDIT_MGMT_ACCESS_REQUEST
access request management 129
D
access AUDIT_MGMT_ACTIVITY database tables 1
configuration, namespace 257 create manual activity event 134 database view tables 69
configuration, query items 258 escalate manual activity event 138 DB_REPLICATION_CONFIG table 43
configuration, query subjects 257 AUDIT_MGMT_DELEGATE 122 delegate authority 122
access audit AUDIT_MGMT_MESSAGE directory tree 81
namespace 252 access request management 132
query items 253 AUDIT_MGMT_OBLIGATION
query subjects 252
Access catalog tables 56
access request management 130 E
AUDIT_MGMT_OBLIGATION_ATTRIB education xii
access request management 128 access request management 131 entities 167
AUDIT_EVENT values 132 AUDIT_MGMT_OBLIGATION_RESOURCE mapping 167
AUDIT_MGMT_ACCESS_REQUEST access request management 131 ENTITLEMENT table 28
values 129 AUDIT_MGMT_PARTICIPANT Entitlement workflow management 16,
AUDIT_MGMT_MESSAGE create manual activity 137 150, 154
values 132 escalate manual activity 139 ENTITLEMENT_PROVISIONING
AUDIT_MGMT_OBLIGATION AUDIT_MGMT_PROVISIONING PARAMS table 28
values 130 table 142 entity operation management 155
AUDIT_MGMT_OBLIGATION_ATTRIB AUDIT_MGMT_TARGET 120
ENTITY_COLUMN table 24
values 131 AUDIT_MGMT_TARGET table 127, 146, entity_name column values 157
AUDIT_MGMT_OBLIGATION_RESOURCE148, 151
erAccessItem 97
values 131 AUDIT_MGNT_TARGET table 150 erAccessType 98
accessibility xii auditing schema tables 117 erAccountItem 98
account AUTH_KEY table 77 erAccountTemplate 111
audit, namespace 198 authentication 119 erADJNDIFeed 100
audit, query items 199 AUTHORIZATION_OWNERS table 26 erAdoptionPolicy 111
audit, query subjects 198
erAttributeConstraint 101
configuration, namespace 202
erBPOrg 84
configuration, query items 204
account management 142 B erBPOrgItem 85
BULK_DATA_INDEX table 21 erBPPersonItem 83
ACCT_CHANGE table 35
BULK_DATA_SERVICE table 21 erChallenges 101
ACI
BULK_DATA_STORE table 21 erComplianceIssue 102
management 127
erCredential 94
management events 127
erCredentialComponent 94
table 26
erCredentialLease 95
ACI_CATEGORIES table 77 C ERCREDENTIALLEASE table 42
ACI_PERMISSION_ATTRIBUTERIGHT CHANGELOG table 30 erCredentialPool 95
table 27 COLUMN_REPORT table 25 erCSVFeed 102
ACI_PERMISSION_CLASSRIGHT COMMON_TASKS table 77 erCVService 96
table 27 COMPLIANCE_ALERT table 37 erDictionary 85
ACI_PRINCIPALS table 27 container management 145 erDictionaryItem 85
ACI_ROLEDNS table 26 create manual activity 133 erDSML2Service 103
ACTIVITY table 8 AUDIT_MGMT_PARTICIPANT erDSMLInfoService 103
ACTIVITY_LOCK table 15 values 137 erDSMLInfoService attributes
ATTR_CHANGE table 36 create manual activity event erDSMLFileName 103
attributes 167 AUDIT_EVENT values 138 erEvaluateSoD 103
mapping 167 AUDIT_MGMT_ACTIVITY erPassword 103
AUDIT_EVENT 118 values 134 erPlacementRule 103
access request management 132 Credential Lease management erproperties 103
create manual activity event 138 AUDIT_MGMT_LEASE 163 erprotocolmappings 103
escalate manual activity event 141 column values 163, 165 erServiceName 103
lifecycle rule 141 table columns 164 erserviceproviderfactory 103
AUDIT_EVENT table 128, 143, 145, 152, Credential management 161 erUid 103
160 column values 161 erUseWorkflow 103
column values 119, 120, 123, 127, table columns 161 erxforms 103
143, 145, 146, 148, 150, 152, 153, 154, Credential Pool management 162, 163 erDynamicRole 85
155, 156, 158, 159 column values 162 erFormTemplate 86
table columns 119, 121, 123, 124, 128, table columns 162 erGroupItem 104
133, 141, 142, 143, 145, 147, 149, 150,
erHostedAccountItem 104
152, 153, 154, 155, 156, 157, 159, 160,
erHostedService 105
165
268 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
recertification configuration schema (continued) T_Role table 58
namespace 191 create manual activity 133 T_ServiceEntitlement table 59
query items 192 escalate manual activity 133, 138 T_ServiceTags table 61
query subjects 191 lifecycle rule 141 TASK_TREE table 79
recertification policy tables 38 schema mapping 167 TASKS_VIEWABLE table 79
RECERTIFICATIONLOG table 38 SCRIPT table 20 terminology xi
RECERTIFIER_DETAILS_INFO table 31 SecurityDomain 90 TMP_HostSEByPerson table 61
Reconciliation 154 self-password change 159 TMP_JSAEByPerson table 62
RECONCILIATION table 30 separation of duty audit training xii
RECONCILIATION_INFO table 31 namespace 228 troubleshooting xii
REMOTE_RESOURCES_RECON query items 230
QUERIES table 19 query subjects 229
REMOTE_RESOURCES_RECONS
table 18
separation of duty configuration
namespace 234
U
user audit
REMOTE_SERVICES_REQUESTS query items 235
namespace 236
table 17 query subjects 234
query items 237
Report table 25 separation of duty policy tables 72
query subjects 236
reports 24 service audit
user configuration
RESOURCE_PROVIDERS table 16 namespace 248
namespace 240
RESOURCES_SYNCHRONIZATIONS query items 249
query items 241
table 29 query subjects 248
query subjects 240
role assignment attribute tables 32 service classes 97
USERRECERT_ACCOUNT table 41
role audit service policy enforcement 153
USERRECERT_GROUP table 42
namespace 218 SERVICE_ACCOUNT_MAPPING
USERRECERT_HISTORY table 40
query items 219 table 31
USERRECERT_ROLE table 40
query subjects 218 shared access audit
role configuration namespace 169
namespace 221 query items 170
query items 223 query subjects 169 V
query subjects 221 shared access configuration V_AUTHORIZED_CREDENTIALPOOLS
ROLE_ASSIGNMENT_ATTRIBUTES namespace 175 view 54
table 33 query items 176 V_AUTHORIZED_CREDENTIALS
ROLE_INHERITANCE table 78 query subjects 175 view 54
ROOTPROCESSVIEW 70 Shared Access module classes 93 V_DYNAMIC_ENTITLEMENT view 66
runtime events 158 Shared Access Policy management 165 V_GC_CUSTOM view 68
Shared Access tables 42 V_GC_INTERSECT view 67
SOD_OWNER table 72 V_GROUP_PROFILE view 66
S SOD_POLICY table 73
SOD_RULE table 73
V_GroupCatalog view 63, 64
V_SA_EVALUATION_SERVICE view 55
SA_BULK_LOAD table 44
SOD_RULE_ROLE table 74 V_SAPOLICY_ENTITLEMENT_DETAIL
SA_CREDPOOL_DESCRIPTION
SOD_VIOLATION_HISTORY table 74 view 55
table 44
SOD_VIOLATION_ROLE_MAP table 76 V_ServiceCatalog view 65
SA_CREDPOOL_GROUP table 44
SOD_VIOLATION_STATUS table 75 V_ServiceEntitlementByRole view 66
SA_CREDPOOL_OWNER table 45
SUBPROCESSVIEW 70 VIEW_DEFINITION table 79
SA_EVAL_CRED_DESCRIPTION
SUSPENDED_ACCOUNT_OPERATIONS
table 47
view 72
SA_EVALUATION_BU table 45
SA_EVALUATION_BU_HIERARCHY
SUSPENDED_USERS view 71
SYNCH_OBJECT_LOCK table 53
W
table 45 WI_PARTICIPANT table 12
SYNCH_POINT table 14
SA_EVALUATION_CREDENTIAL workflow tables 1
SYNCHRONIZATION_HISTORY
table 46 WORKFLOW_CALLBACK table 14
table 29
SA_EVALUATION_CREDENTIAL_POOL WORKITEM table 10
SYNCHRONIZATION_LOCK table 29
table 47
system configuration 156
SA_EVALUATION_SERVICE table 48
SA_EVALUATION_SERVICE_TAG
table 49
SA_GLOBAL_CONFIGURATION T
table 49 T_AccessCatalog table 56
SA_POLICY table 50 T_AccessCatalogTags table 57
SA_POLICY_DESCRIPTION table 51 T_AttributeEntitlement table 60
SA_POLICY_ENTITLEMENT table 51 T_BADGES table 57
SA_POLICY_ERURI table 52 T_Global_Settings table 62
SA_POLICY_MEMBERSHIP table 52 T_GROUP table 58
SA_VAULT_SERVICE table 53 T_GROUP_PROFILE table 62
SA_VAULT_SERVICE_ALIAS table 53 T_Joindirective table 63
SCHEDULED_MESSAGE table 78 T_Owner table 57
schema T_PolicyMembership table 59
access request management 128 T_ProvisioningPolicy table 59
Index 269
270 IBM Security Identity Manager Version 6.0: Database and Directory Server Schema Reference
Printed in USA
SC14-7395-02