SlideShare uma empresa Scribd logo
1 de 21
Baixar para ler offline
Technical White Paper - Oracle Identity Manager 11gR2PS1 Sizing Guide
An Oracle Technical White Paper
July 2013
Oracle Identity Manager 11gR2PS1 Sizing Guide
Technical White Paper - Oracle Identity Manager 11gR2PS1 Sizing Guide
Introduction ..................................................................................... 3
Deployment Architecture Overview ............................................... 4
Sizing Guidelines............................................................................. 5
Sizing Considerations for OIM........................................................ 6
UI Operations ................................................................................ 6
Provisioning................................................................................... 6
Reconciliation ................................................................................ 7
Certification ................................................................................... 7
Request......................................................................................... 8
OIM Middle Tier Sizing Internals..................................................... 8
Sizing Considerations for Database Tier ....................................... 9
Sizing Guidelines for DB Storage Capacity.................................... 9
Sizing Guidelines for Workload Capacity – H/W Resources ........ 10
OIM DB Sizing internals ................................................................ 10
Factors impacting OIM DB growth ............................................... 11
Sizing Calculator ........................................................................... 12
Usage Parameters....................................................................... 12
Test System Configuration........................................................... 16
Deployment Size............................................................................ 17
Small, Medium and Large Size Deployments .............................. 17
Very Large Size Deployments ..................................................... 18
Sizing for Non Production Environments ..................................... 18
Deployment Types......................................................................... 19
Identity Administration Only Installations ..................................... 19
Identity Administration & Provisioning Installations ...................... 19
Identity Administration & Certification Installations....................... 19
Identity Administration, Provisioning and Certification Installations19
Sizing for Connector Server ......................................................... 20
Recommendations ........................................................................ 20
INTRODUCTION
This document is designed to provide capacity planning and environment sizing estimates based on the computing
power required for deploying Oracle Identity Manager (OIM) 11gR2PS1 components. The document is based on
the reference deployment provided in the Deployment Architecture Overview section. A simplified version of the
architecture described in the Oracle Identity Management Enterprise Deployment guide. The document focuses on
the Oracle Identity Manager components that are significant for sizing.
The Sizing Considerations section explains the various factors that can affect the hardware required for your OIM
installation.
The Sizing Calculator section explains the various variables that are used in calculations. It is important to
understand these variables and their interpretation in the context of Oracle Identity Manager.
The Deployment Templates and Deployment Type section provides recommendations for the most common
deployments. It allows you to extend sizing for special considerations using sizing parameters.
These sizing guidelines are based on the in-house sizing tests and are intended to be used as a starting point in
determining the configuration for a given deployment.
LEGAL DISCLAIMER - Expected performance characteristics are based on laboratory test implementations and are provided as is without warranty of
any kind. The entire risk of the use of information provided herein remains with the recipient and in no event shall Oracle be liable for any direct,
consequential, incidental, special, punitive or other damages including without limitation, damages for loss of business profits, business interruption or
loss of business information.
DEPLOYMENT ARCHITECTURE OVERVIEW
The Diagram below shows simplified deployment architecture of Oracle Identity Manager. Emphasis is on the
essential processes to be sized for an OIM deployment.
Fig1: Simplified OIM Deployment Architecture
From a sizing perspective OIM and the Database are the most important processes. OIM and SOA are
recommended to be installed in clustered deployments. This document helps determine how much computational
capacity is required for a specific installation to meet its usage. Capacity may be materialized using multiple
physical servers, virtual servers, and clusters.
Other administrative processes that are also part of OIM deployment are: Weblogic Admin Server, Oracle
Entitlement Server, Enterprise Manager and BI Publisher etc, are considered as fixed cost processes and not
addressed by this sizing guide. Minimum hardware requirement for these processes is given in their respective
document. These processes may be deployed alongside OIM/SOA processes after augmenting hardware with
recommended capacity.
High-availability, disaster recovery and peak load variation requirements are subjective topics. These are not
considered in base-line sizing recommended by this document. Hardware should be augmented to meet these
requirements. Disaster recovery typically means that the production configuration is duplicated in a different
location
High availability can be configured with various levels of service assurance. Depending on acceptable response
time and throughput requirements, the customer should decide how many additional nodes are required in the
topology.
SIZING GUIDELINES
There is no single guideline in infrastructure sizing. Many factors influence the ultimate outcome including
Network performance,
Deployment complexity,
Number and type of resources, and
Database performance.
Customers should also note that additional tuning may be required, depending upon the selected hardware, to
get optimal performance.
Fig2: OIM Sizing Engineering
OIM Sizing
Engineering
Plan
for usecases to
be executed
Perfom
planned OIM
usecases in
customer
simulated env.
Gather
data/results for
resource
consumtion & DB
growth
Estimate
H/W capacity and
DB Size require to
perform targeted
usecase
SIZING CONSIDERATIONS FOR OIM
Fig3: Factors Effecting Sizing in OIM
There are 5 main functional areas of OIM which affect sizing in OIM.
• UI Operations
• Provisioning
• Reconciliation
• Certification
• Request
We need to size the deployment to handle maximum load in any of these areas at a given point of time.
UI OPERATIONS
Users needs to log into OIM to perform most of the operations like User Life Cycle Management, Role Life Cycle
Management, Organization Life Cycle Management, Self Service Operations, Admin Operations, Searches and
Requesting/Approving/Certifying Access.
Impact of UI operations on sizing depends upon these factors:
• Number of concurrent users logged into the system at a same time
• No of screens navigated by the user
• Think time – Average Time spend on a single screen
PROVISIONING
Provisioning is the process by which operations such as user creation, modification, or deletions initiated by OIM
are communicated to a target system.
Following operations will generate load on the provisioning engine:
• Self Service Operation – Self Profile Update, Self Password Change, Catalog Based Request for
Account, Role or Entitlement
Functional Factors
UI Operation
Provisioning
Reconciliation
Certificaiton
Request
Deployment
OIM
SOA
DB
Non Functional
Factors
CPU
Memory
Network Bandwidth
Disk
• Admin/Help Desk Operation –
o User Profile Update
o Password Reset
o Account , Role and Entitlement provisioning operation
• Access Policy driven provisioning operations
• Changes coming into a system via Trusted reconciliation will generate downstream provisioning
• Closed-loop remediation
RECONCILIATION
Reconciliation is the process by which operations such as user creation, modification, or deletions started on the
target system are communicated to Oracle Identity Manager. The reconciliation process compares the entries in
Oracle Identity Manager and the target system repository, determines the difference between the two
repositories, and applies the latest changes to Oracle Identity Manager.
Impact of reconciliation on sizing depends upon these factors:
• Number of authoritative sources
• Number of target resources
• Number of accounts per resource
• Frequency of reconciliation
• Degree of change in all resources (authoritative and target)
• Amount of pre- or post-processing of data involved
CERTIFICATION
Access Certification is an on-going process that allows organizations to manage risk by identifying, certifying, and
modifying user access to vital corporate resources, and demonstrate compliance with corporate policies and key
industry and government regulations. This is a new feature introduced in the OIM 11gR2 PS1 release. Certification
feature affects the following areas in the system:
•••• Increase in Backend Operations
Certification creation is a backend schedule job, so it will increase the load on the server when the
certification campaign is initiated.
•••• Increase in User Concurrency
The number of users concurrently logged into the system will increase towards the end of the campaign.
As most of the people will tend to complete their certification campaign only at the last moment,
customers will see maximum concurrency in the system during the end of certification campaign cycle.
•••• Increased Load on SOA Server
The Certification campaign will increase the load on the SOA server as every certification action generates
a SOA task.
•••• Increased Load on Provisioning Engine
There will be some load on the provisioning engine when a certification request will get translated into
closed-loop remediation.
•••• Growth in Database Size
There will be substantial data growth due to certification generations, user actions and audit.
Impact of Certification on sizing depends upon these factors:
• Frequency of Certification
• Type and Complexity of certification
• Number of Managers, Data Owners and Total Number of Users in the System
• Total number of resources (Application Instance, Business Roles, Entitlements) in the system
• Average Number of resources (Application Instance, Business Roles, Entitlements) per user
REQUEST
Oracle Identity Manager leverages the rich workflow capabilities of BPEL and Human Workflow components of the
Oracle SOA Suite, referred to as SOA hereafter, to carry out approvals and workflow routing. End users can request
access to resources, roles and entitlements using OIM catalog. There are two areas in the Middle Tier which will be
impacted by request operations:
OIM Server – OIM processing is required to generate request payload and send it to the SOA server
SOA Server - Handles the incoming payload through the BPEL process and calls appropriate human tasks and
business logic.
Following areas will impact the sizing considerations at both layers:
• Number of request generated during the maximum usage time
• Size of the payload data generated in OIM and processed by SOA
• Number of workflows/BPEL processes deployed in SOA
• Complexity of workflows – serial, parallel, notification, escalation, external calls etc.
• Number of people concurrently accessing SOA directly to perform an action
OIM MIDDLE TIER SIZING INTERNALS
Every OIM operation mentioned above consumes system resources in terms of CPU cycles and Memory.
CPU
We estimated the CPU requirements for each functional area in OIM by putting maximum load in the system that
can meet our SLA and recorded the units of CPU required for performing high load operations.
The formula used to calculate CPU Core required for each functional area is as follows:
Middle Tier Cores = ∑ [(CPU unit cycle required for per unit operation) * (Total number of operations)*(CPU Load factor)]
Where – The total number of transactions per feature is a derived value based on the inputs to the question in the Sizing calculator; The CPU
load factor is based on input variables in our sizing calculator.
UI concurrency, requests and certifications also factor in dependent components such as SOA for CPU usage.
MEMORY
Memory requirements are primarily driven from two factors:
- Type of Deployment
- Concurrency
DISK SPACE
Middle tier generally requires static configuration data and binaries which need static allocation of disk space.
SIZING CONSIDERATIONS FOR
A key challenge for Oracle Database administrators is to effectively design and manage system storage,
to accommodate performance, capacity and future growth requirements.
The goal of this paper is to present the sizing/capacity planning for a
based on the tests conducted in-house
made during internal benchmarking runs.
There are two focus areas for DB Sizing:
• Storage—Database size
• Workload—CPU, memory, and storage performance (IOPS/MBPS)
SIZING GUIDELINES FOR DB STORAGE
When sizing storage capacity for OIM DB
• Database files
• Online REDO log files
• UNDO data
• Archive log files
• Backup/flash data
Fig4: DB Sizing Factors
•Space for crucial
structure for
recovery
operations i.e. redo
log
•Disk space for
datafiles of application
•OIM
•SOA
•OPSS
•ORASDPM
•MDS
ONSIDERATIONS FOR DATABASE TIER
atabase administrators is to effectively design and manage system storage,
to accommodate performance, capacity and future growth requirements.
er is to present the sizing/capacity planning for an Oracle Identity Management deployment
house, and provide sizing guidelines and best practices based on the observations
internal benchmarking runs.
There are two focus areas for DB Sizing:
emory, and storage performance (IOPS/MBPS)
TORAGE CAPACITY
OIM DB, you need to consider the following components:
tors
•Space to avoid any
fatal data loss from
DB in case of
failures
•UNDO space for
managing undo and
uncommited
information and space
•System space for DB's
internal processing.
Datafiles UNDO/System
Archive LogsREDO LOG
atabase administrators is to effectively design and manage system storage, especially
Management deployment
ed on the observations
System space for DB's
DB components Space Requirements Remarks
Database Files (Datafiles) As per OIM Sizing calculator Space required for datafiles
associated with its tablespaces.
Temporary Table space IDM’s Repository Creation Utility
creates TEMP tablespace for every
component by default.
Based on database workload.
If application operations involve
Sequential I/O then you may need a
larger allocation.
UNDO/ SYSTEM
Space
As per DBA’s recommendation The customer’s DBA should review
the application nature/load.
REDO Logs As per FMW Tuning Guide’s
recommendation for OIM
OOTB size is 50 MB per REDO Group
OIM recommends 500M to 1G
depending on the loads.
Archive Logs DB_Size * 1.0 The customer’s DBA should review
this and alter based on the
environment.
Backup DB_Size * 2.0 The customer’s DBA should review
this and alter as per the
environment.
*DB_Size = Datafiles + Temp Table Space + UNDO/SYSTEM Space + REDO LOGS
SIZING GUIDELINES FOR WORKLOAD CAPACITY – H/W RESOURCES
There are other significant factors at DB layer which also contribute in DB sizing like CPU, memory, and storage
performance (IOPS/MBPS). OIM is an enterprise product which relies heavily on a database as primary repository.
Oracle is a database with rich features providing strong RDBMS capabilities so it needs high resources from a
CPU/memory perspective. The following functional areas have a high impact on the database resources:
• Reconciliation
• Certification
• Provisioning
OIM DB SIZING INTERNALS
Every OIM operation contributes to DB growth. We started loading the system until it reaches the maximum stress
level where it can support defined SLAs and recorded the DB size trending for each functional area.
The formula used to calculate DB Size is as follows:
OIM DB = [(∑ Sum of DB objects space consuming high space) + (∑ Sum of space consumed by rest of DB objects)]
All the operations impact disk space consumed by dependent components such as SOA, MDS, and OPSS.
Below is the DB growth trending we noticed in our sizing runs.
• Trusted reconciliation
• Target reconciliation
FACTORS IMPACTING OIM DB GROWTH
1. Data load on system - As the number of users, roles, accounts and entitlements in the system grow, it
influences the response time and resource requirements.
2. Audit Level – is one of the significant factors in the DB growth. If we make audit level more granular, the
DB growth/size will be high. This document provides guidelines based on the default audit setting, i.e.,
resource-form.
Customers can control auditing granularity by setting the relevant auditing level parameters.
At its finest level, the auditing engine will audit the following:
• User profile changes
• User configuration changes
60
65
70
75
80
85
50k 100k 150k 200k 250k
Size (in GB)
Size (in GB)
77.7
84.6 86.6 89.2 91.1 94.6
0
20
40
60
80
100
0k 50k 100k 150k 200k 250k
Size (in GB)
Size (in GB)
• Role profile change
• Account definition changes
• Account data changes
From a sizing perspective, customers must consider the impact to performance and data growth when
setting audit levels.
3. Reconciliation/Certification Frequency – The higher the reconciliation/certification frequency, the
greater the data growth.
4. Archival/Purge policy - It is important to follow OIM’s archival and/or purge recommendations for all the
entities whose purge solution is available like reconciliation, request, provisioning tasks, audit, and
orchestration.
SIZING CALCULATOR
An Interactive sizing calculator based on Microsoft Excel spreadsheet has been build based on the formulas
defined from the analysis of the test environment results. The calculator is available at the following location:
http://content.oracle.com/site/pd/fmw/products/idm/oim/cnt2044185.xlsx
The end user needs to supply answers to the business questions related to their environment to calculate the
sizing results.
USAGE PARAMETERS
The end user is expected to fill the following business questions in the calculator:
Section1: User
• Total number of active users in the system
Consider External and Internal Population before filling the sheet
External Users will not be there in all target systems. We do not need to reconcile them.
For Example, if your total user base is 10M and out of it only 500K users are internal users like employees,
contractors and rest of the users are consumers or external users who do not have access to internal
corporate resources then we need to supply following parameters in the calculator as a sample:
Number of users = 10000000
Maximum number of users per target = 400000
Average number of users per target = 50000
• Concurrent logins at peak usage time
• Average number of resource / account /app instance per user
This is the average number of target system a user is provisioned to.
• Average number of roles per user
• Average number of entitlements per user
This is the average number of entitlements a user has in the target systems.
For Example, if there are two target systems like AD and LDAP, each user in the system has 4 AD groups, 2
LDAP roles on an average then the value of this field is 6.
Section2: Resource/Targets
Illustration –
Following is an example to understand how to fill data in this section:
Five target systems with the following data:
Target System1 = {10K entitlements, 20K users, 100 changes in target per day}
Target System2 = {20K entitlements, 30K users, 200 changes in target per day}
Target System3 = {30K entitlements, 50K users, 300 changes in target per day}
Target System4 = {40K entitlements, 70K users, 400 changes in target per day}
Target System5 = {50K entitlements, 90K users, 500 changes in target per day}
The following inputs should be provided to the calculator:
• Total number of targets = 5
• Maximum active users in a target = 90000
This is the maximum population of active users in any given target.
• Average number of entitlements per target = 30000
• Average active user population per target = 52000
• % Changes per day on each target system to be consumed by OIM = 10
This is average change in percentage which directly occurs on a single target which needs to be consumed
by OIM every day.
Section 3: Roles
Let’s take an example to understand how to fill data in this section:
If there are 20 access policies in the system and each policy has an average 2 IT resources and 5 child data
associated with it then the following inputs should be provided to the calculator:
• Total number of business roles defined in OIM = 20
This is the total no of roles which will be used to define access policies.
• Average resource and entitlement associated per business Role = 7
This is the number of Application Instance and Entitlements associated per access policy.
Section4: Organization
• Total number of Organizations
This is total number of Organizations in OIM.
Sectio5: Self Service/Admin/Help Desk Operations
• Number of admin operations per day
This is average number of Admin Operations like Create/Update/Enable/Disable User/Role/Organization,
Password Reset etc.
• Number of self service operations per day
This is average number of self service operations like Self Registration, Profile Modify and Password Mgt.
Section6: Request
• Average number of requests and approvals per day
This is total number of access requests and request approval generated by the system in a day.
• Maximum number of requests per hour during peak time
This is the maximum number of access requests generated in one hour during worst case situation.
Section7: Certification
• Certification feature is enabled or disable (Y for Enabled and N for Disabled)
• Frequency of certification campaign in a Year
Number of times certification campaign is triggered.
If an organization runs quarterly certifications then the value of this filed will be 3.
If an organization runs half yearly certifications then the value of this filed will be 2.
If an organization runs yearly certifications then the value of this filed will be 1.
• Do you do manager certification?
• Number of managers in the system
• Do you do data owner certification?
• How many data owners are there in the system?
Section8: System SLAs
Average acceptable memory utilization (in %)
Average acceptable CPU utilization (in %)
Under a steady load of transactions what percentage of CPU/Memory usage is acceptable is stated as
CPU/Memory load factor.
Section9: Data Retention Policy
• Number of days after which request data will be purged
• Number of days after which task data will be purged
• Number of days after which recon data will be purged
• Number of days after which certification data will be purged
Customer’s data retention policies play a very important role to predict the data volume.
Section10: Business Growth Pattern
• Business growth per year in percentage
This is the percentage increase in active users per year.
• No of years you want to predict DB growth?
This is not a complete list of variables. Some installations include use cases with a very high volume of self-
service operations, while other may contain full user reconciliation that runs very often. For such extreme use-
cases the recommended option is to estimate hardware requirements based on the relevant performance
testing and measurements for the solution.
TEST SYSTEM CONFIGURATION
Below Table provide details for the major hardware and software system components used in the test system
configuration.
Test Configuration – Hardware Components
OIM/SOA Servers • 2 Intel machines
• Intel(R) Xeon(R) CPU 5148 @ 2.33GHz
processors
• 32 GB RAM, 4M Cache, 2.33 GHz
• 2 Dual core CPU per machine i.e. 4 CPU
• NIC Card - 2 Broadcom NetXtreme II BCM5708
1000Base-T PCI-X 64-bit 133MHz
Database server • 1 Intel machines
• Intel(R) Xeon(R) CPU E5410 @ 2.33GHz
• 16 GB 6 4M Cache, 2.33 GHz
• 4 Dual core CPU per machine i.e. 8 CPU
• NIC Card - 2 Broadcom NetXtreme II BCM5708
1000Base-T PCI-X 64-bit 133MHz
Storage • SAS disks
• scsi0 Channel
• Vendor: FUJITSU Model: MBB2147RC
Test Configuration – Software Components
OIM/SOA Servers • Oracle Enterprise Linux 5
• Weblogic 10.3.6.0
• Oracle HTTP Server 11.1.1.6.0
Database server • Oracle Enterprise Linux 5
• Oracle RDBMS 11.2.0.3.0
• Single instance
Monitoring Tools • JVM utilities like JConsole
• JProfiler
• FMW Enterprise manager
• Oracle Database Enterprise manager
• OS utilities like vmstat etc
• DMS (Dynamic monitoring service)
• AWR (Automatic workload repository)
• JRockit utilities like JMRC/JFR
• Custom made data collection tools
• Custom made DB sizing framework
DEPLOYMENT SIZE
SMALL, MEDIUM AND LARGE SIZE DEPLOYMENTS
Metric Small
Size
Medium
Size
Large Size
(All Internal)
Large Size
(Internal + External)
Total Number of Active users in the system 50K 150K 500K 500K
(150K Internal + 350K
External)
Concurrent logins at peak usage time 25 100 250 250
Average number of Resource per user 2 5 10 10
Average number of Roles per user 2 5 10 2
Average number of Entitlements per user 5 10 20 5
Total Number of target resources 5 15 30 30
Average no of Entitlements per resource 10K 20K 30K 30K
Maximum active users in a Single Target 10K 100K 300K 100K
Average active user population per target 5K 50K 100K 50K
% Changes per day on each target system 1 1 1 1
Total Number of Business Roles defined in
OIM
5 20 40 40
Average Resource/Entitlement Associated
per Business Role
5 5 5 5
Total Number of Organizations 1 5 20 20
Self Service Operations per day 100 500 1000 2500
Number of Admin Operations Per day 40 200 400 400
Number of requests per day 50 200 1000 200
Number of Approvals per day 20 100 300 100
Certification Feature is Enabled or Disable No Yes Yes Yes
Frequency of Certification Campaign in a
Year
N/A 2 3 3
Do you do manager certification? N/A Y Yes Yes
Number of Managers in the system N/A 20K 50K 20K
Do you do data owner certification? N/A No Yes Yes
How many Data Owners are there in the
system?
N/A N/A 20K 5K
Sizing Recommendations
Small
Size
Medium
Size
Large Size
(All Internal)
Large Size
(Internal + External)
OIM/SOA
CPU 4 Core 8 Core 20 Core 20 Core
OIM Heap 4 GB 4 GB 4 GB 4 GB
SOA Heap 1 GB 4 GB 8 GB 8 GB
OIM/SOA Nodes 1Node /
2 Node
2 Nodes 5 Nodes 5 Nodes
Database
CPU 2 Core 6 Core 12 12
Memory 4 GB 6 GB 6 GB 6 GB
OIM Disk Space
[1
st
Year]
20 GB 103 GB ~3 TB ~ 692 GB
OIM Disk Space
[3
rd
Year,
With 5% Y2Y
Growth]
~30GB ~150GB ~4.9 TB ~ 1 TB
Database Nodes 1 Node 1 Node 3 Node RAC 3 Node RAC
VERY LARGE SIZE DEPLOYMENTS
The results are based on the lab results to calculate the hardware requirements. However, when you
have a very large deployment, the formulas may not work. Installation with multi-million users or very
high number of active users should be considered as a large deployment.
Use of CPU is mostly a faction of the number of operations performed in the system. As such an
installation may need special considerations if it expects very high concurrency, very complex pre-/post-
processing logic or very high frequency / volume of reconciliation events.
One way to size such a deployment is to execute performance tests and derive recommendations from
it. These systems also need to be monitored for any unusual resource usages.
SIZING FOR NON PRODUCTION ENVIRONMENTS
Following table provide minimum sizing recommendations for Non-Production environments:
Type OIM/SOA DB
DEVELOPMENT Single Node, 2 Core CPU, 4 GB Heap OIM, 1
GB Heap SOA
Single Node, 4 GB RAM
QA Two Node, 2 Core CPU, 4 GB Heap OIM Per
Node, 1 GB Heap SOA Per Node
Single Node, 4 GB RAM
UAT (User Acceptance
/Performance and Load
Testing Environments)
Replica of Production Replica of Production
DEPLOYMENT TYPES
IDENTITY ADMINISTRATION ONLY INSTALLATIONS
When a deployment is only addressing identity Administration use-cases, it has less overhead for integrating with
other applications. Also, the number of screens used by a logged in user will be limited to only user, role and
organization management. Also, there may be less reconciliation post processing requirements. Such Deployments
are mostly common in a deployment where OIM is deployed for external users. In such deployments self
registration, self profile update and password reset/forgot password operations are very high.
IDENTITY ADMINISTRATION & PROVISIONING INSTALLATIONS
When a deployment is addressing both identity Administration use-cases, and provisioning use-cases it includes
more back-office processing to integrate with other applications. Also, the number of screens used by a logged in
user will depend on supported target system types.
IDENTITY ADMINISTRATION & CERTIFICATION INSTALLATIONS
When a deployment is addressing identity Administration and certification use-cases but not provisioning use
cases, it has less overhead for integrating with other applications because most of the applications are modeled as
disconnected resources. But certification creation puts a substantial load on the back-office processing.
IDENTITY ADMINISTRATION, PROVISIONING AND CERTIFICATION INSTALLATIONS
When a deployment is addressing all use-cases including identity Administration, provisioning and certification
then it requires maximum resources. In such deployment, the number of screens used by a logged in user will be
maximum to include user, role, organization management, request and certification. There will be a substantial
load on back-office processing for certification creation and reconciliation.
Follow the table below to fill the calculator for various installation types:
Metric Section
/Deployment Type
IDM Only IDM and
Provisioning
IDM and
Certification
IDM, Provisioning
and Certification
Users Yes Yes Yes Yes
Resource/Targets No Yes Yes Yes
Roles Yes Yes Yes Yes
Organization Yes Yes Yes Yes
Self Service
/Admin/Help Desk
Operations
Yes Yes Yes Yes
Request No Yes No Yes
Certification No No Yes Yes
Minimum Memory Recommendations
OIM (in GB) 4 4 4 4
SOA (in GB) 1 2 3 4
SIZING FOR CONNECTOR SERVER
An identity connector server is required when an identity connector bundle is not directly executed within your
application. By using one or more identity connector servers, the ICF architecture permits your application to
communicate with externally deployed identity connector bundles. Identity connector servers are available for
Java™ and Microsoft .NET Framework applications.
A single connector server can support multiple ICF connectors, and these ICF connectors may be of different
connector types. A single ICF connector can be used to communicate with multiple targets.
Following table provide minimum sizing recommendations for Java and .NET Connector Server in production:
Java Connector Server .NET Connector Server
CPU 2 Core CPU 4 GB
RAM 2 Core CPU 4 GB
RECOMMENDATIONS
1. It is recommended that customers keep a 10-20% spare capacity to allow the deployment to handle
out-of-bound situations, rather than operating the deployment at capacity.
2. Admin Server contains Weblogic admin applications, Enterprise Manager and Diagnostic Monitoring
Services (DMS). Some additional capacity is required for it in each deployment. Typically Admin Sever
requires minimum 1GB Heap but it is recommended to allocate 2 Core CPU with 2GB heap for medium
and large scale deployments.
3. Deployments should factor in Disaster Recovery scenarios where the cluster node(s) may be required
to handle the load of the failed nodes.
4. Core sizing given in this document is based on hardware component specification given in the Test
System Configuration section. You should adjust the output by comparing the Test System Configuration
with the actual H/W used for the following factors:
• Processor Chipset
• Network Bandwidth
• RAM Type
• DISK TYPE
5. For Performance Tuning recommendations please see Oracle® Fusion Middleware Performance and
Tuning Guide.
6. For DB and Archival Policy recommendations please see Oracle® Fusion Middleware Administrator's
Guide for Oracle Identity Manager.
7. For High Availability and EDG recommendations please see Oracle® Fusion Middleware High Availability
Guide.
Oracle Identity Manager Sizing Guide11gR2PS1
July 2013
Authors: Atul Goyal, Lokesh Gupta
Oracle Corporation
World Headquarters
500 Oracle Parkway
Redwood Shores, CA 94065
U.S.A.
Copyright © 2013, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the
contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other
warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or
fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are
formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any
means, electronic or mechanical, for any purpose, without our prior written permission.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective
owners.

Mais conteúdo relacionado

Mais procurados

4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
aungyekhant1
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Siddharth Rao
 

Mais procurados (20)

Developer Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for AndroidDeveloper Tutorial: WebAuthn for Web & FIDO2 for Android
Developer Tutorial: WebAuthn for Web & FIDO2 for Android
 
4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx4_Session 1- Universal ZTNA.pptx
4_Session 1- Universal ZTNA.pptx
 
Android Security
Android SecurityAndroid Security
Android Security
 
Réussir son projet de sécurisation des Identités en 5 commandements (parce qu...
Réussir son projet de sécurisation des Identités en 5 commandements (parce qu...Réussir son projet de sécurisation des Identités en 5 commandements (parce qu...
Réussir son projet de sécurisation des Identités en 5 commandements (parce qu...
 
安全なID連携のハウツー
安全なID連携のハウツー安全なID連携のハウツー
安全なID連携のハウツー
 
Home Automation using IOT
Home Automation using IOTHome Automation using IOT
Home Automation using IOT
 
NIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO AuthenticationNIST 800-63 Guidance & FIDO Authentication
NIST 800-63 Guidance & FIDO Authentication
 
SEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdfSEC301 - New AWS security services for container threat detection - final.pdf
SEC301 - New AWS security services for container threat detection - final.pdf
 
Mastering Secrets Management in Rundeck
Mastering Secrets Management in RundeckMastering Secrets Management in Rundeck
Mastering Secrets Management in Rundeck
 
Pentesting Android Applications
Pentesting Android ApplicationsPentesting Android Applications
Pentesting Android Applications
 
10 Unknown Facts About Arjuna
10 Unknown Facts About Arjuna10 Unknown Facts About Arjuna
10 Unknown Facts About Arjuna
 
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
Unblocking Stollen Mobile Phones using SS7-MaP vulnerabilities
 
NGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLANNGFW RFP TEMPLATE - TEST PLAN
NGFW RFP TEMPLATE - TEST PLAN
 
Windows Service Hardening
Windows Service HardeningWindows Service Hardening
Windows Service Hardening
 
Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1Azure AD B2C Webinar Series: Custom Policies Part 1
Azure AD B2C Webinar Series: Custom Policies Part 1
 
Security and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) DevicesSecurity and Authentication of Internet of Things (IoT) Devices
Security and Authentication of Internet of Things (IoT) Devices
 
新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向新しい認証技術FIDOの最新動向
新しい認証技術FIDOの最新動向
 
Wireguard VPN
Wireguard VPNWireguard VPN
Wireguard VPN
 
Alan M. Turing and the Enigma Machine
Alan M. Turing and the Enigma MachineAlan M. Turing and the Enigma Machine
Alan M. Turing and the Enigma Machine
 
Android security
Android securityAndroid security
Android security
 

Destaque

Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
OracleIDM
 

Destaque (15)

OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Federal Architecture in the 1950s, 1960s, and 1970s
Federal Architecture in the 1950s, 1960s, and 1970sFederal Architecture in the 1950s, 1960s, and 1970s
Federal Architecture in the 1950s, 1960s, and 1970s
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Identity and Access Management Deployment using Lifecycle Management (LCM)
Identity and Access Management Deployment using Lifecycle Management (LCM)Identity and Access Management Deployment using Lifecycle Management (LCM)
Identity and Access Management Deployment using Lifecycle Management (LCM)
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Ca siteminder
Ca siteminderCa siteminder
Ca siteminder
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
OOW16 - Oracle Enterprise Manager 13c Cloud Control for Managing Oracle E-Bus...
OOW16 - Oracle Enterprise Manager 13c Cloud Control for Managing Oracle E-Bus...OOW16 - Oracle Enterprise Manager 13c Cloud Control for Managing Oracle E-Bus...
OOW16 - Oracle Enterprise Manager 13c Cloud Control for Managing Oracle E-Bus...
 
OOW15 - Advanced Architectures for Oracle E-Business Suite
OOW15 - Advanced Architectures for Oracle E-Business SuiteOOW15 - Advanced Architectures for Oracle E-Business Suite
OOW15 - Advanced Architectures for Oracle E-Business Suite
 
11g R2 Live Part 1
11g R2 Live Part 111g R2 Live Part 1
11g R2 Live Part 1
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2High Availability And Oracle Data Guard 11g R2
High Availability And Oracle Data Guard 11g R2
 

Semelhante a OIM Sizing Guide 11gR2PS1

Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
Oracle
 
Oracle Insurance ERP.ppt
Oracle Insurance ERP.pptOracle Insurance ERP.ppt
Oracle Insurance ERP.ppt
Jd Ash
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Management
elliando dias
 
Oracle epm 11_1_2_1_tuning_guide_v4
Oracle epm 11_1_2_1_tuning_guide_v4Oracle epm 11_1_2_1_tuning_guide_v4
Oracle epm 11_1_2_1_tuning_guide_v4
asifanw911
 

Semelhante a OIM Sizing Guide 11gR2PS1 (20)

ING webcast platform
ING webcast platformING webcast platform
ING webcast platform
 
Neev Load Testing Services
Neev Load Testing ServicesNeev Load Testing Services
Neev Load Testing Services
 
Open iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-aOpen iam technicalarchitecture-v3-a
Open iam technicalarchitecture-v3-a
 
Aim crisp handout
Aim crisp handoutAim crisp handout
Aim crisp handout
 
Understanding saa s
Understanding saa sUnderstanding saa s
Understanding saa s
 
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & ImplementationsThousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
Thousands of Hours Saved and Risk Reduced for EBS Upgrades & Implementations
 
M.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.comM.S. Dissertation in Salesforce on Force.com
M.S. Dissertation in Salesforce on Force.com
 
Impact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top PracticesImpact 2013 2963 - IBM Business Process Manager Top Practices
Impact 2013 2963 - IBM Business Process Manager Top Practices
 
Migrating from a monolith to microservices – is it worth it?
Migrating from a monolith to microservices – is it worth it?Migrating from a monolith to microservices – is it worth it?
Migrating from a monolith to microservices – is it worth it?
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
Con8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controlsCon8154 controlling for multiple erp systems with oracle advanced controls
Con8154 controlling for multiple erp systems with oracle advanced controls
 
Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...Customers talk about controlling access for multiple erp systems with oracle ...
Customers talk about controlling access for multiple erp systems with oracle ...
 
Oracle Insurance ERP.ppt
Oracle Insurance ERP.pptOracle Insurance ERP.ppt
Oracle Insurance ERP.ppt
 
0.3 aim phases_and_documentations
0.3 aim phases_and_documentations0.3 aim phases_and_documentations
0.3 aim phases_and_documentations
 
Presentation application change management and data masking strategies for ...
Presentation   application change management and data masking strategies for ...Presentation   application change management and data masking strategies for ...
Presentation application change management and data masking strategies for ...
 
Oracle cloud-multi-pillar-implementation-best-practices-wp
Oracle cloud-multi-pillar-implementation-best-practices-wpOracle cloud-multi-pillar-implementation-best-practices-wp
Oracle cloud-multi-pillar-implementation-best-practices-wp
 
Yapp methodology anjo-kolk
Yapp methodology anjo-kolkYapp methodology anjo-kolk
Yapp methodology anjo-kolk
 
Jon shende fbcs citp q&a
Jon shende fbcs citp q&aJon shende fbcs citp q&a
Jon shende fbcs citp q&a
 
Environment & Release Management
Environment & Release ManagementEnvironment & Release Management
Environment & Release Management
 
Oracle epm 11_1_2_1_tuning_guide_v4
Oracle epm 11_1_2_1_tuning_guide_v4Oracle epm 11_1_2_1_tuning_guide_v4
Oracle epm 11_1_2_1_tuning_guide_v4
 

Último

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Último (20)

Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verifiedSector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
Sector 18, Noida Call girls :8448380779 Model Escorts | 100% verified
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

OIM Sizing Guide 11gR2PS1

  • 1. Technical White Paper - Oracle Identity Manager 11gR2PS1 Sizing Guide An Oracle Technical White Paper July 2013 Oracle Identity Manager 11gR2PS1 Sizing Guide
  • 2. Technical White Paper - Oracle Identity Manager 11gR2PS1 Sizing Guide Introduction ..................................................................................... 3 Deployment Architecture Overview ............................................... 4 Sizing Guidelines............................................................................. 5 Sizing Considerations for OIM........................................................ 6 UI Operations ................................................................................ 6 Provisioning................................................................................... 6 Reconciliation ................................................................................ 7 Certification ................................................................................... 7 Request......................................................................................... 8 OIM Middle Tier Sizing Internals..................................................... 8 Sizing Considerations for Database Tier ....................................... 9 Sizing Guidelines for DB Storage Capacity.................................... 9 Sizing Guidelines for Workload Capacity – H/W Resources ........ 10 OIM DB Sizing internals ................................................................ 10 Factors impacting OIM DB growth ............................................... 11 Sizing Calculator ........................................................................... 12 Usage Parameters....................................................................... 12 Test System Configuration........................................................... 16 Deployment Size............................................................................ 17 Small, Medium and Large Size Deployments .............................. 17 Very Large Size Deployments ..................................................... 18 Sizing for Non Production Environments ..................................... 18 Deployment Types......................................................................... 19 Identity Administration Only Installations ..................................... 19 Identity Administration & Provisioning Installations ...................... 19 Identity Administration & Certification Installations....................... 19 Identity Administration, Provisioning and Certification Installations19 Sizing for Connector Server ......................................................... 20 Recommendations ........................................................................ 20
  • 3. INTRODUCTION This document is designed to provide capacity planning and environment sizing estimates based on the computing power required for deploying Oracle Identity Manager (OIM) 11gR2PS1 components. The document is based on the reference deployment provided in the Deployment Architecture Overview section. A simplified version of the architecture described in the Oracle Identity Management Enterprise Deployment guide. The document focuses on the Oracle Identity Manager components that are significant for sizing. The Sizing Considerations section explains the various factors that can affect the hardware required for your OIM installation. The Sizing Calculator section explains the various variables that are used in calculations. It is important to understand these variables and their interpretation in the context of Oracle Identity Manager. The Deployment Templates and Deployment Type section provides recommendations for the most common deployments. It allows you to extend sizing for special considerations using sizing parameters. These sizing guidelines are based on the in-house sizing tests and are intended to be used as a starting point in determining the configuration for a given deployment. LEGAL DISCLAIMER - Expected performance characteristics are based on laboratory test implementations and are provided as is without warranty of any kind. The entire risk of the use of information provided herein remains with the recipient and in no event shall Oracle be liable for any direct, consequential, incidental, special, punitive or other damages including without limitation, damages for loss of business profits, business interruption or loss of business information.
  • 4. DEPLOYMENT ARCHITECTURE OVERVIEW The Diagram below shows simplified deployment architecture of Oracle Identity Manager. Emphasis is on the essential processes to be sized for an OIM deployment. Fig1: Simplified OIM Deployment Architecture From a sizing perspective OIM and the Database are the most important processes. OIM and SOA are recommended to be installed in clustered deployments. This document helps determine how much computational capacity is required for a specific installation to meet its usage. Capacity may be materialized using multiple physical servers, virtual servers, and clusters. Other administrative processes that are also part of OIM deployment are: Weblogic Admin Server, Oracle Entitlement Server, Enterprise Manager and BI Publisher etc, are considered as fixed cost processes and not addressed by this sizing guide. Minimum hardware requirement for these processes is given in their respective document. These processes may be deployed alongside OIM/SOA processes after augmenting hardware with recommended capacity. High-availability, disaster recovery and peak load variation requirements are subjective topics. These are not considered in base-line sizing recommended by this document. Hardware should be augmented to meet these requirements. Disaster recovery typically means that the production configuration is duplicated in a different location High availability can be configured with various levels of service assurance. Depending on acceptable response time and throughput requirements, the customer should decide how many additional nodes are required in the topology.
  • 5. SIZING GUIDELINES There is no single guideline in infrastructure sizing. Many factors influence the ultimate outcome including Network performance, Deployment complexity, Number and type of resources, and Database performance. Customers should also note that additional tuning may be required, depending upon the selected hardware, to get optimal performance. Fig2: OIM Sizing Engineering OIM Sizing Engineering Plan for usecases to be executed Perfom planned OIM usecases in customer simulated env. Gather data/results for resource consumtion & DB growth Estimate H/W capacity and DB Size require to perform targeted usecase
  • 6. SIZING CONSIDERATIONS FOR OIM Fig3: Factors Effecting Sizing in OIM There are 5 main functional areas of OIM which affect sizing in OIM. • UI Operations • Provisioning • Reconciliation • Certification • Request We need to size the deployment to handle maximum load in any of these areas at a given point of time. UI OPERATIONS Users needs to log into OIM to perform most of the operations like User Life Cycle Management, Role Life Cycle Management, Organization Life Cycle Management, Self Service Operations, Admin Operations, Searches and Requesting/Approving/Certifying Access. Impact of UI operations on sizing depends upon these factors: • Number of concurrent users logged into the system at a same time • No of screens navigated by the user • Think time – Average Time spend on a single screen PROVISIONING Provisioning is the process by which operations such as user creation, modification, or deletions initiated by OIM are communicated to a target system. Following operations will generate load on the provisioning engine: • Self Service Operation – Self Profile Update, Self Password Change, Catalog Based Request for Account, Role or Entitlement Functional Factors UI Operation Provisioning Reconciliation Certificaiton Request Deployment OIM SOA DB Non Functional Factors CPU Memory Network Bandwidth Disk
  • 7. • Admin/Help Desk Operation – o User Profile Update o Password Reset o Account , Role and Entitlement provisioning operation • Access Policy driven provisioning operations • Changes coming into a system via Trusted reconciliation will generate downstream provisioning • Closed-loop remediation RECONCILIATION Reconciliation is the process by which operations such as user creation, modification, or deletions started on the target system are communicated to Oracle Identity Manager. The reconciliation process compares the entries in Oracle Identity Manager and the target system repository, determines the difference between the two repositories, and applies the latest changes to Oracle Identity Manager. Impact of reconciliation on sizing depends upon these factors: • Number of authoritative sources • Number of target resources • Number of accounts per resource • Frequency of reconciliation • Degree of change in all resources (authoritative and target) • Amount of pre- or post-processing of data involved CERTIFICATION Access Certification is an on-going process that allows organizations to manage risk by identifying, certifying, and modifying user access to vital corporate resources, and demonstrate compliance with corporate policies and key industry and government regulations. This is a new feature introduced in the OIM 11gR2 PS1 release. Certification feature affects the following areas in the system: •••• Increase in Backend Operations Certification creation is a backend schedule job, so it will increase the load on the server when the certification campaign is initiated. •••• Increase in User Concurrency The number of users concurrently logged into the system will increase towards the end of the campaign. As most of the people will tend to complete their certification campaign only at the last moment, customers will see maximum concurrency in the system during the end of certification campaign cycle. •••• Increased Load on SOA Server The Certification campaign will increase the load on the SOA server as every certification action generates a SOA task. •••• Increased Load on Provisioning Engine There will be some load on the provisioning engine when a certification request will get translated into closed-loop remediation. •••• Growth in Database Size There will be substantial data growth due to certification generations, user actions and audit. Impact of Certification on sizing depends upon these factors:
  • 8. • Frequency of Certification • Type and Complexity of certification • Number of Managers, Data Owners and Total Number of Users in the System • Total number of resources (Application Instance, Business Roles, Entitlements) in the system • Average Number of resources (Application Instance, Business Roles, Entitlements) per user REQUEST Oracle Identity Manager leverages the rich workflow capabilities of BPEL and Human Workflow components of the Oracle SOA Suite, referred to as SOA hereafter, to carry out approvals and workflow routing. End users can request access to resources, roles and entitlements using OIM catalog. There are two areas in the Middle Tier which will be impacted by request operations: OIM Server – OIM processing is required to generate request payload and send it to the SOA server SOA Server - Handles the incoming payload through the BPEL process and calls appropriate human tasks and business logic. Following areas will impact the sizing considerations at both layers: • Number of request generated during the maximum usage time • Size of the payload data generated in OIM and processed by SOA • Number of workflows/BPEL processes deployed in SOA • Complexity of workflows – serial, parallel, notification, escalation, external calls etc. • Number of people concurrently accessing SOA directly to perform an action OIM MIDDLE TIER SIZING INTERNALS Every OIM operation mentioned above consumes system resources in terms of CPU cycles and Memory. CPU We estimated the CPU requirements for each functional area in OIM by putting maximum load in the system that can meet our SLA and recorded the units of CPU required for performing high load operations. The formula used to calculate CPU Core required for each functional area is as follows: Middle Tier Cores = ∑ [(CPU unit cycle required for per unit operation) * (Total number of operations)*(CPU Load factor)] Where – The total number of transactions per feature is a derived value based on the inputs to the question in the Sizing calculator; The CPU load factor is based on input variables in our sizing calculator. UI concurrency, requests and certifications also factor in dependent components such as SOA for CPU usage. MEMORY Memory requirements are primarily driven from two factors: - Type of Deployment - Concurrency DISK SPACE Middle tier generally requires static configuration data and binaries which need static allocation of disk space.
  • 9. SIZING CONSIDERATIONS FOR A key challenge for Oracle Database administrators is to effectively design and manage system storage, to accommodate performance, capacity and future growth requirements. The goal of this paper is to present the sizing/capacity planning for a based on the tests conducted in-house made during internal benchmarking runs. There are two focus areas for DB Sizing: • Storage—Database size • Workload—CPU, memory, and storage performance (IOPS/MBPS) SIZING GUIDELINES FOR DB STORAGE When sizing storage capacity for OIM DB • Database files • Online REDO log files • UNDO data • Archive log files • Backup/flash data Fig4: DB Sizing Factors •Space for crucial structure for recovery operations i.e. redo log •Disk space for datafiles of application •OIM •SOA •OPSS •ORASDPM •MDS ONSIDERATIONS FOR DATABASE TIER atabase administrators is to effectively design and manage system storage, to accommodate performance, capacity and future growth requirements. er is to present the sizing/capacity planning for an Oracle Identity Management deployment house, and provide sizing guidelines and best practices based on the observations internal benchmarking runs. There are two focus areas for DB Sizing: emory, and storage performance (IOPS/MBPS) TORAGE CAPACITY OIM DB, you need to consider the following components: tors •Space to avoid any fatal data loss from DB in case of failures •UNDO space for managing undo and uncommited information and space •System space for DB's internal processing. Datafiles UNDO/System Archive LogsREDO LOG atabase administrators is to effectively design and manage system storage, especially Management deployment ed on the observations System space for DB's
  • 10. DB components Space Requirements Remarks Database Files (Datafiles) As per OIM Sizing calculator Space required for datafiles associated with its tablespaces. Temporary Table space IDM’s Repository Creation Utility creates TEMP tablespace for every component by default. Based on database workload. If application operations involve Sequential I/O then you may need a larger allocation. UNDO/ SYSTEM Space As per DBA’s recommendation The customer’s DBA should review the application nature/load. REDO Logs As per FMW Tuning Guide’s recommendation for OIM OOTB size is 50 MB per REDO Group OIM recommends 500M to 1G depending on the loads. Archive Logs DB_Size * 1.0 The customer’s DBA should review this and alter based on the environment. Backup DB_Size * 2.0 The customer’s DBA should review this and alter as per the environment. *DB_Size = Datafiles + Temp Table Space + UNDO/SYSTEM Space + REDO LOGS SIZING GUIDELINES FOR WORKLOAD CAPACITY – H/W RESOURCES There are other significant factors at DB layer which also contribute in DB sizing like CPU, memory, and storage performance (IOPS/MBPS). OIM is an enterprise product which relies heavily on a database as primary repository. Oracle is a database with rich features providing strong RDBMS capabilities so it needs high resources from a CPU/memory perspective. The following functional areas have a high impact on the database resources: • Reconciliation • Certification • Provisioning OIM DB SIZING INTERNALS Every OIM operation contributes to DB growth. We started loading the system until it reaches the maximum stress level where it can support defined SLAs and recorded the DB size trending for each functional area. The formula used to calculate DB Size is as follows: OIM DB = [(∑ Sum of DB objects space consuming high space) + (∑ Sum of space consumed by rest of DB objects)] All the operations impact disk space consumed by dependent components such as SOA, MDS, and OPSS.
  • 11. Below is the DB growth trending we noticed in our sizing runs. • Trusted reconciliation • Target reconciliation FACTORS IMPACTING OIM DB GROWTH 1. Data load on system - As the number of users, roles, accounts and entitlements in the system grow, it influences the response time and resource requirements. 2. Audit Level – is one of the significant factors in the DB growth. If we make audit level more granular, the DB growth/size will be high. This document provides guidelines based on the default audit setting, i.e., resource-form. Customers can control auditing granularity by setting the relevant auditing level parameters. At its finest level, the auditing engine will audit the following: • User profile changes • User configuration changes 60 65 70 75 80 85 50k 100k 150k 200k 250k Size (in GB) Size (in GB) 77.7 84.6 86.6 89.2 91.1 94.6 0 20 40 60 80 100 0k 50k 100k 150k 200k 250k Size (in GB) Size (in GB)
  • 12. • Role profile change • Account definition changes • Account data changes From a sizing perspective, customers must consider the impact to performance and data growth when setting audit levels. 3. Reconciliation/Certification Frequency – The higher the reconciliation/certification frequency, the greater the data growth. 4. Archival/Purge policy - It is important to follow OIM’s archival and/or purge recommendations for all the entities whose purge solution is available like reconciliation, request, provisioning tasks, audit, and orchestration. SIZING CALCULATOR An Interactive sizing calculator based on Microsoft Excel spreadsheet has been build based on the formulas defined from the analysis of the test environment results. The calculator is available at the following location: http://content.oracle.com/site/pd/fmw/products/idm/oim/cnt2044185.xlsx The end user needs to supply answers to the business questions related to their environment to calculate the sizing results. USAGE PARAMETERS The end user is expected to fill the following business questions in the calculator: Section1: User • Total number of active users in the system Consider External and Internal Population before filling the sheet External Users will not be there in all target systems. We do not need to reconcile them. For Example, if your total user base is 10M and out of it only 500K users are internal users like employees, contractors and rest of the users are consumers or external users who do not have access to internal corporate resources then we need to supply following parameters in the calculator as a sample: Number of users = 10000000 Maximum number of users per target = 400000 Average number of users per target = 50000 • Concurrent logins at peak usage time • Average number of resource / account /app instance per user
  • 13. This is the average number of target system a user is provisioned to. • Average number of roles per user • Average number of entitlements per user This is the average number of entitlements a user has in the target systems. For Example, if there are two target systems like AD and LDAP, each user in the system has 4 AD groups, 2 LDAP roles on an average then the value of this field is 6. Section2: Resource/Targets Illustration – Following is an example to understand how to fill data in this section: Five target systems with the following data: Target System1 = {10K entitlements, 20K users, 100 changes in target per day} Target System2 = {20K entitlements, 30K users, 200 changes in target per day} Target System3 = {30K entitlements, 50K users, 300 changes in target per day} Target System4 = {40K entitlements, 70K users, 400 changes in target per day} Target System5 = {50K entitlements, 90K users, 500 changes in target per day} The following inputs should be provided to the calculator: • Total number of targets = 5 • Maximum active users in a target = 90000 This is the maximum population of active users in any given target. • Average number of entitlements per target = 30000 • Average active user population per target = 52000 • % Changes per day on each target system to be consumed by OIM = 10 This is average change in percentage which directly occurs on a single target which needs to be consumed by OIM every day. Section 3: Roles Let’s take an example to understand how to fill data in this section: If there are 20 access policies in the system and each policy has an average 2 IT resources and 5 child data associated with it then the following inputs should be provided to the calculator:
  • 14. • Total number of business roles defined in OIM = 20 This is the total no of roles which will be used to define access policies. • Average resource and entitlement associated per business Role = 7 This is the number of Application Instance and Entitlements associated per access policy. Section4: Organization • Total number of Organizations This is total number of Organizations in OIM. Sectio5: Self Service/Admin/Help Desk Operations • Number of admin operations per day This is average number of Admin Operations like Create/Update/Enable/Disable User/Role/Organization, Password Reset etc. • Number of self service operations per day This is average number of self service operations like Self Registration, Profile Modify and Password Mgt. Section6: Request • Average number of requests and approvals per day This is total number of access requests and request approval generated by the system in a day. • Maximum number of requests per hour during peak time This is the maximum number of access requests generated in one hour during worst case situation. Section7: Certification • Certification feature is enabled or disable (Y for Enabled and N for Disabled) • Frequency of certification campaign in a Year Number of times certification campaign is triggered. If an organization runs quarterly certifications then the value of this filed will be 3. If an organization runs half yearly certifications then the value of this filed will be 2. If an organization runs yearly certifications then the value of this filed will be 1. • Do you do manager certification? • Number of managers in the system
  • 15. • Do you do data owner certification? • How many data owners are there in the system? Section8: System SLAs Average acceptable memory utilization (in %) Average acceptable CPU utilization (in %) Under a steady load of transactions what percentage of CPU/Memory usage is acceptable is stated as CPU/Memory load factor. Section9: Data Retention Policy • Number of days after which request data will be purged • Number of days after which task data will be purged • Number of days after which recon data will be purged • Number of days after which certification data will be purged Customer’s data retention policies play a very important role to predict the data volume. Section10: Business Growth Pattern • Business growth per year in percentage This is the percentage increase in active users per year. • No of years you want to predict DB growth? This is not a complete list of variables. Some installations include use cases with a very high volume of self- service operations, while other may contain full user reconciliation that runs very often. For such extreme use- cases the recommended option is to estimate hardware requirements based on the relevant performance testing and measurements for the solution.
  • 16. TEST SYSTEM CONFIGURATION Below Table provide details for the major hardware and software system components used in the test system configuration. Test Configuration – Hardware Components OIM/SOA Servers • 2 Intel machines • Intel(R) Xeon(R) CPU 5148 @ 2.33GHz processors • 32 GB RAM, 4M Cache, 2.33 GHz • 2 Dual core CPU per machine i.e. 4 CPU • NIC Card - 2 Broadcom NetXtreme II BCM5708 1000Base-T PCI-X 64-bit 133MHz Database server • 1 Intel machines • Intel(R) Xeon(R) CPU E5410 @ 2.33GHz • 16 GB 6 4M Cache, 2.33 GHz • 4 Dual core CPU per machine i.e. 8 CPU • NIC Card - 2 Broadcom NetXtreme II BCM5708 1000Base-T PCI-X 64-bit 133MHz Storage • SAS disks • scsi0 Channel • Vendor: FUJITSU Model: MBB2147RC Test Configuration – Software Components OIM/SOA Servers • Oracle Enterprise Linux 5 • Weblogic 10.3.6.0 • Oracle HTTP Server 11.1.1.6.0 Database server • Oracle Enterprise Linux 5 • Oracle RDBMS 11.2.0.3.0 • Single instance Monitoring Tools • JVM utilities like JConsole • JProfiler • FMW Enterprise manager • Oracle Database Enterprise manager • OS utilities like vmstat etc • DMS (Dynamic monitoring service) • AWR (Automatic workload repository) • JRockit utilities like JMRC/JFR • Custom made data collection tools • Custom made DB sizing framework
  • 17. DEPLOYMENT SIZE SMALL, MEDIUM AND LARGE SIZE DEPLOYMENTS Metric Small Size Medium Size Large Size (All Internal) Large Size (Internal + External) Total Number of Active users in the system 50K 150K 500K 500K (150K Internal + 350K External) Concurrent logins at peak usage time 25 100 250 250 Average number of Resource per user 2 5 10 10 Average number of Roles per user 2 5 10 2 Average number of Entitlements per user 5 10 20 5 Total Number of target resources 5 15 30 30 Average no of Entitlements per resource 10K 20K 30K 30K Maximum active users in a Single Target 10K 100K 300K 100K Average active user population per target 5K 50K 100K 50K % Changes per day on each target system 1 1 1 1 Total Number of Business Roles defined in OIM 5 20 40 40 Average Resource/Entitlement Associated per Business Role 5 5 5 5 Total Number of Organizations 1 5 20 20 Self Service Operations per day 100 500 1000 2500 Number of Admin Operations Per day 40 200 400 400 Number of requests per day 50 200 1000 200 Number of Approvals per day 20 100 300 100 Certification Feature is Enabled or Disable No Yes Yes Yes Frequency of Certification Campaign in a Year N/A 2 3 3 Do you do manager certification? N/A Y Yes Yes Number of Managers in the system N/A 20K 50K 20K Do you do data owner certification? N/A No Yes Yes How many Data Owners are there in the system? N/A N/A 20K 5K Sizing Recommendations Small Size Medium Size Large Size (All Internal) Large Size (Internal + External) OIM/SOA CPU 4 Core 8 Core 20 Core 20 Core OIM Heap 4 GB 4 GB 4 GB 4 GB
  • 18. SOA Heap 1 GB 4 GB 8 GB 8 GB OIM/SOA Nodes 1Node / 2 Node 2 Nodes 5 Nodes 5 Nodes Database CPU 2 Core 6 Core 12 12 Memory 4 GB 6 GB 6 GB 6 GB OIM Disk Space [1 st Year] 20 GB 103 GB ~3 TB ~ 692 GB OIM Disk Space [3 rd Year, With 5% Y2Y Growth] ~30GB ~150GB ~4.9 TB ~ 1 TB Database Nodes 1 Node 1 Node 3 Node RAC 3 Node RAC VERY LARGE SIZE DEPLOYMENTS The results are based on the lab results to calculate the hardware requirements. However, when you have a very large deployment, the formulas may not work. Installation with multi-million users or very high number of active users should be considered as a large deployment. Use of CPU is mostly a faction of the number of operations performed in the system. As such an installation may need special considerations if it expects very high concurrency, very complex pre-/post- processing logic or very high frequency / volume of reconciliation events. One way to size such a deployment is to execute performance tests and derive recommendations from it. These systems also need to be monitored for any unusual resource usages. SIZING FOR NON PRODUCTION ENVIRONMENTS Following table provide minimum sizing recommendations for Non-Production environments: Type OIM/SOA DB DEVELOPMENT Single Node, 2 Core CPU, 4 GB Heap OIM, 1 GB Heap SOA Single Node, 4 GB RAM QA Two Node, 2 Core CPU, 4 GB Heap OIM Per Node, 1 GB Heap SOA Per Node Single Node, 4 GB RAM UAT (User Acceptance /Performance and Load Testing Environments) Replica of Production Replica of Production
  • 19. DEPLOYMENT TYPES IDENTITY ADMINISTRATION ONLY INSTALLATIONS When a deployment is only addressing identity Administration use-cases, it has less overhead for integrating with other applications. Also, the number of screens used by a logged in user will be limited to only user, role and organization management. Also, there may be less reconciliation post processing requirements. Such Deployments are mostly common in a deployment where OIM is deployed for external users. In such deployments self registration, self profile update and password reset/forgot password operations are very high. IDENTITY ADMINISTRATION & PROVISIONING INSTALLATIONS When a deployment is addressing both identity Administration use-cases, and provisioning use-cases it includes more back-office processing to integrate with other applications. Also, the number of screens used by a logged in user will depend on supported target system types. IDENTITY ADMINISTRATION & CERTIFICATION INSTALLATIONS When a deployment is addressing identity Administration and certification use-cases but not provisioning use cases, it has less overhead for integrating with other applications because most of the applications are modeled as disconnected resources. But certification creation puts a substantial load on the back-office processing. IDENTITY ADMINISTRATION, PROVISIONING AND CERTIFICATION INSTALLATIONS When a deployment is addressing all use-cases including identity Administration, provisioning and certification then it requires maximum resources. In such deployment, the number of screens used by a logged in user will be maximum to include user, role, organization management, request and certification. There will be a substantial load on back-office processing for certification creation and reconciliation. Follow the table below to fill the calculator for various installation types: Metric Section /Deployment Type IDM Only IDM and Provisioning IDM and Certification IDM, Provisioning and Certification Users Yes Yes Yes Yes Resource/Targets No Yes Yes Yes Roles Yes Yes Yes Yes Organization Yes Yes Yes Yes Self Service /Admin/Help Desk Operations Yes Yes Yes Yes Request No Yes No Yes Certification No No Yes Yes Minimum Memory Recommendations OIM (in GB) 4 4 4 4 SOA (in GB) 1 2 3 4
  • 20. SIZING FOR CONNECTOR SERVER An identity connector server is required when an identity connector bundle is not directly executed within your application. By using one or more identity connector servers, the ICF architecture permits your application to communicate with externally deployed identity connector bundles. Identity connector servers are available for Java™ and Microsoft .NET Framework applications. A single connector server can support multiple ICF connectors, and these ICF connectors may be of different connector types. A single ICF connector can be used to communicate with multiple targets. Following table provide minimum sizing recommendations for Java and .NET Connector Server in production: Java Connector Server .NET Connector Server CPU 2 Core CPU 4 GB RAM 2 Core CPU 4 GB RECOMMENDATIONS 1. It is recommended that customers keep a 10-20% spare capacity to allow the deployment to handle out-of-bound situations, rather than operating the deployment at capacity. 2. Admin Server contains Weblogic admin applications, Enterprise Manager and Diagnostic Monitoring Services (DMS). Some additional capacity is required for it in each deployment. Typically Admin Sever requires minimum 1GB Heap but it is recommended to allocate 2 Core CPU with 2GB heap for medium and large scale deployments. 3. Deployments should factor in Disaster Recovery scenarios where the cluster node(s) may be required to handle the load of the failed nodes. 4. Core sizing given in this document is based on hardware component specification given in the Test System Configuration section. You should adjust the output by comparing the Test System Configuration with the actual H/W used for the following factors: • Processor Chipset • Network Bandwidth • RAM Type • DISK TYPE 5. For Performance Tuning recommendations please see Oracle® Fusion Middleware Performance and Tuning Guide. 6. For DB and Archival Policy recommendations please see Oracle® Fusion Middleware Administrator's Guide for Oracle Identity Manager. 7. For High Availability and EDG recommendations please see Oracle® Fusion Middleware High Availability Guide.
  • 21. Oracle Identity Manager Sizing Guide11gR2PS1 July 2013 Authors: Atul Goyal, Lokesh Gupta Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA 94065 U.S.A. Copyright © 2013, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.