Database Setup and Management Guide
Database Setup and Management Guide
Management Platform
Go to the RSA corporate website for regional Customer Support telephone and fax numbers:
www.emc.com/domains/rsa/index.htm. For sales information, contact RSA Aveksa, Inc. at [email protected]
For technical support, contact RSA Aveksa, Inc. at [email protected]. For more information about RSA Aveksa, Inc.,
visit http://www.aveksa.com.
Trademarks
RSA, the RSA Logo, Aveksa, and EMC are either registered trademarks or trademarks of EMC Corporation in the United
States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of
EMC trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa.
License Agreement
This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and
may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice
below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available
to any other person.
No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred.
Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal
liability.
This software is subject to change without notice and should not be construed as a commitment by EMC.
Third-Party Licenses
This product may include software developed by parties other than RSA. The text of the license agreements applicable to
third-party software in this product may be viewed by launching the RSA Aveksa product and selecting the About menu.
This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption
technologies, and current use, import, and export regulations should be followed when using, importing or exporting this
product.
Distribution
Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR
A PARTICULAR PURPOSE.
Copyright © 2013 EMC Corporation. All Rights Reserved. Published in the USA.
December 2013
Contents
Preface . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
What Is in This Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Text Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
Related Documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
Chapter 1: Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Database Parameter Values Worksheet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Requirements for Database Deployment (Non-RAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Requirements for Database Deployment (RAC) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Hardware Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
Information Required for Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
Getting Sample Database Configuration Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 33
3
Contents
Purpose
This guide provides instructions on how to set up a remote Oracle database for RSA Identity and
Access Management Platform (RSA IAM Platform).
• Chapter 1, “Introduction,” on page 7 describes hardware and software requirements for the
database.
• Chapter 2, “Set Up the Database,” on page 13 describes database installation components and
requirements and how to set up the database (RAC included) used by RSA IAM Platform.
Text Conventions
The following text conventions are used in this document:
5
Preface
Related Documents
• Installation and Upgrade Guide
• Administrators Guide
• Collectors Guide
Content
• “Overview” on page 8
7
Chapter 1: Introduction
Overview
This chapter describes how to set up a database instance (RAC cluster option included) used by
RSA IAM Platform (application server) in a two-tier installation scenario where you provide and
maintain an Oracle database (also referred to as the “remote database” throughout the remainder
of this guide) in your hardware infrastructure. It provides sample script download instructions and
the steps required to configure or upgrade the remote database. The database must be configured
before you install RSA IAM Platform software.
RSA IAM Platform is designed to use most (but not all) default Oracle database instance
configuration settings and installation options. This guide does not attempt to document every
Oracle configuration setting or installation option for Oracle but instead covers only those settings
or installation requirements over and above a default Oracle installation. Any modifications to the
Oracle installation or configuration beyond the Oracle defaults and what is noted in this guide may
cause functional or performance issues with RSA IAM Platform. Please contact Aveksa Support if
you want to change any installation option or configuration beyond what is documented in this
guide to ensure a supportable configuration. Review “Prepare the Oracle Database Instance” on
page 15 for specific details on RSA IAM Platform requirements.
Important: The SQL commands and configurations documented in this chapter should be
executed using a database account with sysdba privileges in the database.
This guide describes the database objects, tables ,and directories that must be created. These
include three database user schemas that RSA IAM Platform uses:
• RSA IAM Platform reporting engine user. The default name is AVDWUSER.
• RSA IAM Platform public database schema user. The default name is ACMDB.
• RSA IAM Platform Aveksa Statistics Report user. The data source is AVPERF. (This is required
only if Oracle Statspack is installed on the database and you want to include Statspack data in
Aveksa Statistics Reports.) Failure to configure and use Statspack will limit reporting
information for database diagnostics. The default oracle user name is PERFSTAT. See
“Installing Oracle Statspack to Enhance Database Diagnostics Capabilities” on page 26 for
more information.
This guide references the user schemas by their default names. You can use non-default user
schema names; however, that will require additional configuration when installing RSA IAM
Platform.
AVUSER password:
AVDWUSER password:
ACMDB password:
AVPERF username/password:
- Memory: Minimum 16GB, 32GB recommended for production servers, minimum 4GB, 8GB
recommended for development servers
- Disk: Minimum 300GB, 1TB+ recommended based on data load requirements (RAID 5 SAS
drive configuration or better highly recommended for performance)
• An Oracle database (64-bit 11gR2 version 11.2.0.2 or 11.2.0.3 for RAC or non-RAC
implementation) running on a database machine that meets hardware requirements at the
deployment site
• A database account with sysdba privileges to be able to perform the database system
configuration and validation tasks described in this chapter
• A UNIX root user to create appropriate physical directories and users on the server
Hardware Requirements
• Cluster instances: At least two database cluster instances required for load balancing and high
availability
• Memory: Minimum 16GB, 32GB recommended for production servers, minimum 4GB, with 8GB
recommended for development servers
• Processors: Dual Quad Core XEON processors (X3430, 2.4 GHz or higher
• Disk: Minimum 100GB local to each node to house Oracle Home and local files. SAS drive
configuration or better highly recommended for performance.
- LUN configuration: At least three LUNs should be configured and assigned iSCSI initiator
names:
RSA recommends that an ACFS (ASM Clustered File System) share is created on the “FS1”
LUN using “asmca” (Oracle ASM Configuration Assistant) from the “ASM Cluster File
Systems” tab with the following options:
Note: When Oracle CRS starts up, this volume is automatically mounted. No modifications
to the /etc/fstab file are required.
• Private Network:
- Network speed: Minimum 1Gb NIC, with 10Gb recommended for production servers
• Oracle (SCAN) listener Hostname (This is a virtual host address that is served by the cluster as
a whole. It should be located in the DNS.)
• Oracle Database SID template (For example, "avdb_" will result in instances with names
avdb_1, avdb_2, etc.)
• Private hostnames and IP addresses for all nodes on the private interconnect
• The names of the iSCSI initiators for the other LUNs on the SAN
Scripts:
• aveksa_db_check.sql — Includes the required SQL to verify minimum file size requirements.
Note: If you are using an Oracle RAC implementation, ensure that the directories referenced in the
scripts point to clustered file systems.
Content
• “Overview” on page 14
• “Updating the Database for RSA IAM Platform 6.8 Upgrades” on page 27
13
Chapter 2: Set Up the Database
Overview
RSA IAM Platform requires an Oracle database instance pre-configured with the requirements
outlined in this chapter. One requirement is that database users are created with necessary Oracle
grant privileges. RSA IAM Platform creates all of its required database objects such as tables,
views, and packages when it is initially started and fully populates the database schema. Those
objects may also be modified by upgrades of RSA IAM Platform software through the RSA IAM
Platform migration process.
Deployment Summary
The deployment process includes the following steps:
c. Ensuring a minimum memory configuration for both the SGA (system global area) and PGA
(program global area). You can use ASMM to set either SGA/PGA or use AMM to set
memory_target and memory_max_target. The settings are mutually exclusive.
See “Updating the Database for RSA IAM Platform 6.8 Upgrades” on page 27.
2. Ensure that the database instance uses the Unicode (AL32UTF8) character set.
You can validate the character set by simply running the following SQL:
RSA IAM Platform will fail to start of this character set is not set for the database instance.
This character set is not the default when configuring Oracle. NLS_LENGTH_SEMANTICS is
required to be BYTE, do not change this setting to CHAR.
Note: The following steps in this section assume that your database is initialized using an spfile
and not a pfile. To determine if your database is using a pfile or an spfile, you can run the following
commands via SQL*Plus. If the first command returns a value for "ifile", then the this value is the
name and location of the pfile for your system. If an "spfile" value is found, then this is the name
and location of the spfile for your system.
Convert the a pfile into an spfile if your system is using a pfile. For example:
shutdown immediate;
startup pfile=<ORACLE_HOME>/dbs/init<ORACLE_SID>.ora
shutdown immediate;
startup;
ASMM AMM
b.Enter recommended values in the init*.ora file as required using values from the table above:
shutdown immediate;
startup;
shutdown immediate;
startup;
The database server must have /dev/shm configured to support the amount of memory that
Oracle will allocate (memory_max_target). To check the settings, log on to the database server
and run the command:
df -h /dev/shm
4. Configure adequate space for all system tablespaces (see “Configure Undo, Temp, and Redo
Sizes” on page 18).
5. Make sure that the database instance is configured with the XML_DB package. You can verify
that XML DB has been installed by simply running the SQL below:
COMP_NAME
If this package does not exist, it can be installed with the database configuration assistant
(dbca) or manually by executing the instructions found in the Oracle documentation at the
following location:
http://download.oracle.com/docs/cd/B19306_01/appdev.102/b14259/appaman.htm#CACI
BCBA
7. Validate that database requirements are reflected in your base Oracle startup by validating the
spfile used by your database instance. Use this command:
8. Configure the database to accommodate a minimum of 600 sessions and 400 processes by
running the following commands:
Note: If your database will be serving multiple application server nodes, multiply the session
and process numbers by the number of nodes.
9. Configure the log_buffer setting to 200 MB and the log_checkpoint_interval setting to 180 MB:
The default settings for these support online transactional processing (OLTP) systems and not
Data Warehousing systems. The larger settings are required to support data collections (which
are more Data Warehouse style activities) by RSA IAM Platform.
10. Configure the creation of deferred segments for tables to false. This is required for the Oracle
11G R2 Enterprise version.
Create Tablespaces
The standard RSA IAM Platform database setup has eight tablespaces, four for data and four for
indices. RSA IAM Platform uses the well known tablespace names when creating the various
database objects, like tables and views, within the database. The table below reflects the
recommended sizes for the tablespaces. See the aveksa_sample_tablespace_file_scripts.sql script
for an example of creating these tablespaces using the file system, or see the
aveksa_sample_tablespace_ASM_scripts.sql script for an example of creating these tablespaces
using ASM with the recommended sizes. These sample scripts must be edited for your
configuration before you use them.
These tablespaces must be must be configured with adequate storage settings as appropriate for
your installation. The table below provides the initial, extended, and fixed size recommendations
for the tablespaces.
If you do not wish to use auto extend in your database, use the fixed size as a recommended initial
size.
You can configure your database with different tablespace names or fewer tablespaces. However,
because RSA IAM Platform uses the eight known tablespaces names internally, additional
configuration is required when installing or upgrading RSA IAM Platform.
Important: The RSA IAM Platform configuration requires that you map your tablespaces to the
names known to RSA IAM Platform. See the installation guide for you installation scenario
(WebSphere, WebLogic) for more information.
• Temp Logs. The examples in the following table demonstrate how to increase the temp
filespace (default 32GB) to 96GB by adding two additional temp files of 32GB each.
ASM ALTER TABLESPACE "TEMP" ADD TEMPFILE '+DG01' SIZE 128M REUSE AUTOEXTEND ON
NEXT 256M MAXSIZE 32767M;
ALTER TABLESPACE "TEMP" ADD TEMPFILE '+DG01' SIZE 128M REUSE AUTOEXTEND ON
NEXT 256M MAXSIZE 32767M;
• Undo Logs. The examples in the following table demonstrate how to increase the undo
filespace (default 32GB) to 96GB by adding two additional temp files of 32GB each.
ASM ALTER TABLESPACE "UNDOTBS1" ADD DATAFILE '+DG01' SIZE 128M REUSE AUTOEXTEND
ON NEXT 256M MAXSIZE 32767M;
ALTER TABLESPACE "UNDOTBS1" ADD DATAFILE '+DG01' SIZE 128M REUSE AUTOEXTEND
ON NEXT 256M MAXSIZE 32767M;
• Redo Logs. To obtain information about your systems redo files execute the following SQL:
RSA IAM Platform requires sufficient redo space to function properly. It requires six redo logs of
800 MB each at a minimum. By default Oracle database is configured with three redo logs of
50MB each. The examples in the following table demonstrate how to increase the size of each
redo logs to 800MB by dropping the original three redo logs and adding three of 800MB. After
extending the default three oracle redo logs, add an additional three logs of 800MB..
You must create the directory on the database server before you begin database instance
configuration. See “Map the Export/Import Directory” on page 22 or more information. Create the
directory for the following database variable:
Directory Permissions
The database user must be provided Read-Write permissions to the Aveksa Export/Import
directory. It is accessed by the user running the associated backup/restore scripts.
1. Make sure the mount point is owned by oracle (and not root). For example:
2. Set the environment variable on all nodes to the mount point. For example:
export CLUSTERED_FILE_SHARE=/mnt/acfs-fs1
cd ${CLUSTERED_FILE_SHARE}
3. Create the directory on the file share. This is only required from one node. For example:
mkdir AveksaExportImportDir
4. Create symbolic links to the mount point. This creates the expected directory location within
the /home/aveksa root. For example:
ln -s ${CLUSTERED_FILE_SHARE}/AveksaExportImportDir
/home/oracle/AveksaExportImportDir
Map the directory variable to the physical directories previously created as described in “Create the
Aveksa Export/Import Database Directory” on page 21:
Oracle 11g has a default password expiration of 180 days. If an RSA IAM Platform database user
password were to expire, RSA IAM Platform would fail to connect to the database.
Important: If you choose to have a password policy that expires for the RSA IAM Platform users,
you will have to reconfigure database password settings when passwords expire. The sample file
aveksa_db_password_lifetime.sql shows how to obtain the password lifetime information for the
RSA IAM Platform database users.
If you not using the default user schema names (AVUSER and others), substitute your user
schema names in the scripts provided.
Note: Additional configuration is required when installing RSA IAM Platform with non-default
schema names. See the installation guide for you installation scenario (WebSphere and WebLogic
only) for more information.
Command examples:
ALTER USER ACMDB DEFAULT TABLESPACE USERS TEMPORARY TABLESPACE TEMP ACCOUNT
UNLOCK;
Record the passwords in the worksheet provided in “Database Parameter Values Worksheet” on
page 8. The passwords are required for the RSA IAM Platform installation.
Privilege grants:
• AVUSER
grant create table to AVUSER; (Database object used for RSA IAM Platform runtime and
migration)
grant create view to AVUSER; (Database object used for RSA IAM Platform runtime and
migration)
grant create trigger to AVUSER; (Database object used for RSA IAM Platform runtime and
migration)
grant create sequence to AVUSER; (Database object used for RSA IAM Platform runtime
and migration)
grant create synonym to AVUSER; (Database object used for RSA IAM Platform runtime and
migration)
grant create procedure to AVUSER; (Database object used for RSA IAM Platform runtime
and migration)
grant create type to AVUSER; (Database object used for RSA IAM Platform runtime and
migration)
grant create job to AVUSER; (Database object used for RSA IAM Platform runtime and
migration)
grant execute on SYS.UTL_FILE to AVUSER; (Used in the data collection process. By default
an Oracle database gives the SYS.UTL_FILE package execute grant privileges to PUBLIC. If
your database does not have this set for PUBLIC you will need to explicitly give the grant to
AVUSER as indicated. )
grant execute ON SYS.DBMS_XMLGEN TO AVUSER; (Used to process XML data attributes and
documents)
• AVDWUSER
• ACMDB
• Aveksa leverages the SYS.UTL_FILE Oracle package. Permissions to this package must be
granted to AVUSER. The package is used as part of the RSA IAM Platform collection processes.
If permissions are revoked for this package items such as the collections will fail.
• Aveksa Statistics Reports requires grants on some packages to obtain useful diagnostic
information. These are dba_free_space, gv_$parameter, and SYS.UTL_INADDR.
• Grants to execute the packages SYS.UTL_FILE and SYS.DBMS_LOB by the Oracle schema XDB
should also be verified as they are a requirement of the XML Database functionality of Oracle.
On some systems the packages DBMS_XMLPARSER and DBMS_XSLPROCESSOR must be
recompiled following the new grants.
Disable the daily job that gathers schema statistics. The RSA database executes its own database
statistics collections and can conflict with this out-of-box Oracle setting.
CLIENT_NAME STATUS
-------------------------------------------------- --------
Installation of Statspack is optional but highly recommended; it provides diagnostics data that can
indicate the causes of database performance issues that may arise.
You install Statspack on the database using the spcreate.sql script provided by Oracle. This script
is executed as 'sys' on the database. The script prompts you for information and creates the
STATSPACK schema owner, privilege grants, and objects. See Oracle documentation for complete
information on Statspack installation and Statspack capabilities.
Create a “perfstat” table space using the spcreate.sql script for Oracle10g and 11g.
SQL> @?/rdbms/admin/spcreate
The default username is “perfstat.” See the Installation Guide for information on changing the
username and the Statspack user password in RSA IAM Platform.
RSA recommends that the perfstat user is also configured with the same ACMPROFILE as
configured for database users (as described in“Create a Database User Password Profile” on
page 22), to prevent issues regarding password expiration.
Verify that the Aveksa import/export described in “Deployment Summary” on page 14 is defined:
Verify that the tables spaces described in “Create Tablespaces” on page 18 exist:
The aveksa_ora11_asr_report_grants.sql file contains the necessary SQL, which is shown below:
-- this SQL creates the additional privileges to use the UTL_INADDR to obtain host
information
DECLARE
BEGIN
BEGIN
END;
DBMS_NETWORK_ACL_ADMIN.CREATE_ACL(acl_name_if_needed,
acl_description_if_needed, acl_user_name, TRUE, 'resolve');
--DBMS_NETWORK_ACL_ADMIN.CREATE_ACL(acl_name_if_needed,
acl_description_if_needed, acl_user_name, TRUE, 'connect');
DBMS_NETWORK_ACL_ADMIN.ASSIGN_ACL(acl_name_if_needed, acl_host_name);
ELSE
END IF;
END IF;
END IF;
END;
Content
29
Chapter 3: Maintaining the Database
The dump is essentially a snapshot of the database containing all of the application data and some
environment data about a particular system environment. In the case where you intend to import
a dump from one machine to another (which must be runnng the same RSA IAM Platform version
from which the dump was created), you may be required to perform additional configuration on
the target machine.
Shut down the RSA IAM Platform server before you export a database.
Important: The dumps are upwardly compatible between Oracle versions. They are not
backwards compatible when used to import to an older version of Oracle.
Where:
DumpFile is the output file name; here set with a date stamp.
Directory is an internal Oracle directory object mapped to a physical UNIX directory. It would
typically be the AveksaExportImportDir directory created when the customer-provided
database was set up.
Logfile is the name of the log file generated for the export.
For example, the server nodes may need to be updated; this is particularly true when moving
clustered environments. Or directory-specific locations configured for collectors may need to be
changed. After you have imported the database and run commands to update the database as
described in this section, you must validate that the data is compatible with your database. See
“Validate Compatibility of the Database Import” on page 31 for instructions.
Important: The dumps are upwardly compatible between Oracle versions. They are not
backwards compatible when used to import to an older version of Oracle.
4. Specify avuser privilege grants as specified in “Configure the User Schema Privilege Grants” on
page 23.
EXEC authorization_pkg.EXPLODE_USER_ACM_ENTITLEMENTS;
EXEC DBMS_STATS.GATHER_SCHEMA_STATS('AVUSER');
EXEC DATABASE_STATISTICS.AFTER_IMPORT;
If the database does require migration, you will be prompted to migrate the database when you
access RSA IAM Platform.
• isAppliance = No
• isRemoteDB = Yes
• isSoftAppliance = Yes
If the values above are not set to the correct values, run the following SQL to set them to the
correct values:
If the exported database file is from an appliance and it is imported into a remote database, ensure
that the system setting for “RemoteDB” on the target system that uses the remote database is
enabled. See the RSA IAM Platform Administrators Guide for information on managing system
settings. After saving the RemoteDB setting you must restart the RSA IAM Platform application
server.
Note: Drop that user name for your installation if it differs from the default “perfstat” user name
used when statspack package was set up on the database.
You can now proceed to create the database as described in Chapter 2, “Set Up the Database,” on
page 13.
B
backup E
database 30 export AVUSER schema 30
C I
context for report filtering values in customer- import AVUSER schema/data 30
provided database 25
O
D
optimizer settings for database 17
database Oracle memory management settings
restore 30 AMM 15
updating for compatibility with RSA Platform ASMM 15
upgrade 27 Oracle statspack, installing 26
33
Index
P
password
profile for database users 22
privilege grants, user schemas in database 23
R
Real Application Cluster (RAC) database
requirements 9
redo tablespace 18
resource plan for database 25
restore
database 30
S
sample scripts for database configuration 11
T
tablespaces for database
adjusting temp, undo, and redo sizes 18
tablespaces, create in database 18
temp tablespace 18
U
undo tablespace 18
upgrade
update database for RSA Platform version
compatibility 27
user schemas
configure grants 23