ibm tivoli security compliance manager: tivoli risk manager
TRANSCRIPT
Tivoli® Security
Compliance
Manager
Tivoli
Risk
Manager
Adapter
Guide
Version
5.1
���
Tivoli® Security
Compliance
Manager
Tivoli
Risk
Manager
Adapter
Guide
Version
5.1
���
Note
Before
using
this
information
and
the
product
it
supports,
read
the
information
in
“Notices,”
on
page
7.
First
Edition
(July
2004)
This
edition
applies
to
version
5,
release
1,
modification
0
of
IBM
Tivoli
Security
Compliance
Manager
(product
number
5724-F82)
and
to
all
subsequent
releases
and
modifications
until
otherwise
indicated
in
new
editions.
©
Copyright
International
Business
Machines
Corporation
2004.
All
rights
reserved.
US
Government
Users
Restricted
Rights
–
Use,
duplication
or
disclosure
restricted
by
GSA
ADP
Schedule
Contract
with
IBM
Corp.
Contents
Preface
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. v
Who
should
read
this
book
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. v
What
this
book
contains
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. v
Publications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. v
IBM
Tivoli
Security
Compliance
Manager
library
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. v
Related
publications
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vi
Accessing
publications
online
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vi
Accessibility
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vii
Contacting
software
support
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vii
Conventions
used
in
this
book
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vii
Typeface
conventions
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vii
Operating
system
differences
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. vii
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
.
.
.
.
.
.
.
.
. 1
Adapter
overview
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 1
Adapter
distribution
package
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 1
Installation
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 2
Software
requirements
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 2
Before
you
install
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 2
Installation
steps
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 2
Checking
the
installation
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 4
Uninstalling
the
adapter
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 4
Appendix.
Notices
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 7
Trademarks
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. 9
©
Copyright
IBM
Corp.
2004
iii
iv
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
Preface
The
IBM
Tivoli
Security
Compliance
Manager
Tivoli
Risk
Manager
Adapter
Guide
explains
how
to
route
compliance
violation
information
detected
by
IBM®
Tivoli®
Security
Compliance
Manager
to
IBM
Tivoli
Risk
Manager.
Tivoli
Risk
Manager
can
be
used
to
monitor
your
systems
or
to
route
violation
information
to
IBM
Tivoli
Data
Warehouse.
Tivoli
Security
Compliance
Manager
is
a
data
collection
service
that
gathers
and
stores
a
wide
variety
of
information
from
multiple
participating
systems.
Information
types
can
include
any
data
stored
on
a
system,
such
as
operating
system
versions,
software
patch
levels,
and
security-related
data.
System
and
security
administrators
can
use
the
Tivoli
Security
Compliance
Manager
service
to
monitor
specific
data
checkpoints
on
any
given
machine
(or
group
of
machines).
Who
should
read
this
book
The
target
audience
for
this
insert-book-type-here
guide
includes:
v
System
administrators
v
Application
specialists
v
Security
analysts
v
IT
planners
v
Auditors
What
this
book
contains
This
document
contains
the
following
chapters:
v
“Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager,”
on
page
1
This
chapter
provides
information
on
installing,
configuring,
and
uninstalling
the
Tivoli
Risk
Manager
adapter
for
Tivoli
Security
Compliance
Manager.
v
“Notices,”
on
page
7
This
appendix
contains
the
legal
notices
and
copyright
information.
Publications
Read
the
descriptions
of
the
IBM
Tivoli
Security
Compliance
Manager
library,
the
prerequisite
publications,
and
the
related
publications
to
determine
which
publications
you
might
find
helpful.
After
you
determine
the
publications
you
need,
refer
to
the
instructions
for
accessing
publications
online.
IBM
Tivoli
Security
Compliance
Manager
library
The
publications
in
the
IBM
Tivoli
Security
Compliance
Manager
library
are:
v
IBM
Tivoli
Security
Compliance
Manager
Installation
Guide:
All
Components
(GC32-1592-00)
Explains
how
to
install
and
configure
Tivoli
Security
Compliance
Manager
software.
v
IBM
Tivoli
Security
Compliance
Manager
Installation
Guide:
Client
Component
(GC32-1593-00)
©
Copyright
IBM
Corp.
2004
v
Explains
how
to
install
and
configure
the
Tivoli
Security
Compliance
Manager
client
component
software.
v
IBM
Tivoli
Security
Compliance
Manager
Administration
Guide
(SC32-1594-00)
Explains
how
to
manage
and
configure
Tivoli
Security
Compliance
Manager
services
using
the
administration
console.
v
IBM
Tivoli
Security
Compliance
Manager
Collector
Development
Guide
(SC32-1595-00)
Explains
how
to
design
and
implement
custom
Tivoli
Security
Compliance
Manager
collectors.
v
IBM
Tivoli
Security
Compliance
Manager
Warehouse
Enablement
Pack,
Version
1.1
Implementation
Guide
for
Tivoli
Data
Warehouse,
Version
1.2
(SC32-1596-00)
Explains
how
to
integrate
Tivoli
Security
Compliance
Manager
with
Tivoli
Data
Warehouse.
v
IBM
Tivoli
Security
Compliance
Manager
Release
Notes
(GI11-4695-00)
Provides
late-breaking
information,
such
as
software
limitations,
workarounds,
and
documentation
updates.
Related
publications
This
section
lists
publications
related
to
the
Tivoli
Security
Compliance
Manager
library.
The
Tivoli
Software
Library
provides
a
variety
of
Tivoli
publications
such
as
white
papers,
datasheets,
demonstrations,
redbooks,
and
announcement
letters.
The
Tivoli
Software
Library
is
available
on
the
Web
at:
http://www.ibm.com/software/tivoli/library/
The
Tivoli
Software
Glossary
includes
definitions
for
many
of
the
technical
terms
related
to
Tivoli
software.
The
Tivoli
Software
Glossary
is
available,
in
English
only,
from
the
Glossary
link
on
the
left
side
of
the
Tivoli
Software
Library
Web
page
http://www.ibm.com/software/tivoli/library/
IBM
DB2
Universal
Database
IBM
DB2
Universal
Database™
is
required
when
using
Tivoli
Security
Compliance
Manager.
Additional
information
about
DB2®
can
be
found
at:
http://www.ibm.com/software/data/db2/
Accessing
publications
online
The
publications
for
this
product
are
available
online
in
Portable
Document
Format
(PDF)
or
Hypertext
Markup
Language
(HTML)
format,
or
both
in
the
Tivoli
software
library:
http://www.ibm.com/software/tivoli/library
To
locate
product
publications
in
the
library,
click
the
Product
manuals
link
on
the
left
side
of
the
library
page.
Then,
locate
and
click
the
name
of
the
product
on
the
Tivoli
software
information
center
page.
Product
publications
include
release
notes,
installation
guides,
user’s
guides,
administrator’s
guides,
and
developer’s
references.
Note:
To
ensure
proper
printing
of
publications,
select
the
Fit
to
page
check
box
in
the
Adobe
Acrobat
window
(which
is
available
when
you
click
File
→
Print).
vi
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
Accessibility
Accessibility
features
help
a
user
who
has
a
physical
disability,
such
as
restricted
mobility
or
limited
vision,
to
use
software
products
successfully.
With
this
product,
you
can
use
assistive
technologies
to
hear
and
navigate
the
interface.
You
also
can
use
the
keyboard
instead
of
the
mouse
to
operate
all
features
of
the
graphical
user
interface.
Contacting
software
support
Before
contacting
IBM
Tivoli
Software
Support
with
a
problem,
refer
to
the
IBM
Tivoli
Software
Support
site
by
clicking
the
Tivoli
support
link
at
the
following
Web
site:
http://www.ibm.com/software/support/
If
you
need
additional
help,
contact
software
support
by
using
the
methods
described
in
the
IBM
Software
Support
Guide
at
the
following
Web
site:
http://techsupport.services.ibm.com/guides/handbook.html
The
guide
provides
the
following
information:
v
Registration
and
eligibility
requirements
for
receiving
support
v
Telephone
numbers,
depending
on
the
country
in
which
you
are
located
v
A
list
of
information
you
should
gather
before
contacting
customer
support
Conventions
used
in
this
book
This
reference
uses
several
conventions
for
special
terms
and
actions
and
for
operating
system-dependent
commands
and
paths.
Typeface
conventions
The
following
typeface
conventions
are
used
in
this
reference:
Bold
Lowercase
commands
or
mixed
case
commands
that
are
difficult
to
distinguish
from
surrounding
text,
keywords,
parameters,
options,
names
of
Java™
classes,
and
objects
are
in
bold.
Italic
Variables,
titles
of
publications,
and
special
words
or
phrases
that
are
emphasized
are
in
italic.
Monospace
Code
examples,
command
lines,
screen
output,
file
and
directory
names
that
are
difficult
to
distinguish
from
surrounding
text,
system
messages,
text
that
the
user
must
type,
and
values
for
arguments
or
command
options
are
in
monospace.
Operating
system
differences
This
book
uses
the
UNIX®
convention
for
specifying
environment
variables
and
for
directory
notation.
When
using
the
Windows®
command
line,
replace
$variable
with
%variable%
for
environment
variables
and
replace
each
forward
slash
(/)
with
a
backslash
(\)
in
directory
paths.
If
you
are
using
the
bash
shell
on
a
Windows
system,
you
can
use
the
UNIX
conventions.
Preface
vii
viii
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
This
chapter
describes
the
Tivoli
Risk
Manager
adapter
for
IBM
Tivoli
Security
Compliance
Manager,
including
installation
and
configuration
instructions.
Adapter
overview
The
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
uses
the
JDBC
type
provided
by
the
Tivoli
Risk
Manager
event
monitor
to
monitor
a
Tivoli
Security
Compliance
Manager
database
for
policy
snapshot
violations.
To
provide
a
simple
table
for
this
purpose,
a
new
database
table
view
called
scm_rma.vio_alert
is
created.
This
table
view
is
based
on
tables
in
the
jac_sys
schema.
This
view
provides
a
record
of
unsuppressed
violations
for
policy
snapshots.
The
adapter
is
comprised
of
three
parts:
v
The
database
changes
needed
to
create
the
new
scm_rma.vio_alert
view
on
the
database
server
v
The
configuration
file
changes
and
additions
on
the
Tivoli
Risk
Manager
servers
where
alerts
are
received
and
correlated
v
The
configuration
file
changes
and
additions
on
the
systems
where
the
adapter
runs
Adapter
distribution
package
The
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
is
distributed
as
an
archive
file
in
both
zip
and
tar
format.
The
archive
file
contains
the
files
listed
in
Table
1.
Table
1.
Files
provided
in
the
adapter
archive
file
File
name
Description
client/itscmrma.zip
Contains
the
following
two
files:
eventmonitor.properties
Customized
properties
file
used
by
the
Tivoli
Risk
Manager
Event
Monitor
Configuration
Wizard
to
configure
an
instance
of
the
event
manager
to
monitor
the
Tivoli
Security
Compliance
Manager
database
table
scm_rma.vio_alert.
itscm.xml
The
Tivoli
Security
Compliance
Manager
event
definition
file.
server/itscm.baroc
The
baroc
file
that
defines
the
ITSCM_PolViolation
event
class
to
the
Tivoli
Risk
Manager
server.
server/itscm_stanzas_categories.xml
The
file
that
defines
the
SECPOLVIOLATION
category.
The
stanza
contained
in
this
file
is
added
to
the
categories.xml
file
during
installation
and
configuration.
sql/scmrma.sql
The
file
that
contains
the
SQL
statements
needed
to
modify
the
database
used
by
Tivoli
Security
Compliance
Manager
to
create
the
scm_rma.vio_alert
view.
©
Copyright
IBM
Corp.
2004
1
Installation
This
section
describes
the
steps
required
to
install,
configure,
check,
and
uninstall
the
adapter.
Software
requirements
The
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
is
supported
on
the
same
platforms
as
the
Tivoli
Risk
Manager
client.
A
Tivoli
Risk
Manager
Version
4.2
server
or
distributed
correlation
server
must
be
available.
Before
you
install
The
following
software
must
be
installed
on
the
system
where
the
adapter
is
to
be
installed:
v
The
Tivoli
Risk
Manager
Version
4.2
client
v
A
suitable
JDBC
driver
for
the
IBM
DB2
database
product
being
used
by
Tivoli
Security
Compliance
Manager
v
The
Tivoli
Risk
Manager
Event
Monitor
Configuration
Wizard
The
wizard
can
be
downloaded
from
the
Tivoli
Risk
Manager
Adapter
Web
site.
Installation
steps
Installation
of
the
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
requires:
1.
“Modifying
the
Tivoli
Security
Compliance
Manager
database”
2.
“Configuring
the
Tivoli
Risk
Manager
server”
3.
“Configuring
the
Tivoli
Risk
Manager
client”
on
page
3
Modifying
the
Tivoli
Security
Compliance
Manager
database
On
the
system
where
the
DB2
database
server
used
by
Tivoli
Security
Compliance
Manager
is
installed,
or
from
a
system
that
has
access
to
the
DB2
database
server,
perform
the
following
steps:
1.
Copy
the
sql/scmrma.sql
file
from
the
adapter
archive
file
to
the
system.
2.
Log
in
using
the
user
ID
and
password
associated
with
the
DB2
instance
that
owns
the
Tivoli
Security
Compliance
Manager
tables.
3.
Run
the
following
command
as
the
DB2
user:
db2
-tvf
scmrma.sql
Running
the
SQL
script
creates
the
scm_rma.vio_alert
database
view
used
by
the
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager.
Note:
If
changes
are
made
to
the
definitions
of
any
of
the
jac_sys
tables
used
by
the
scm_rma.vio_alert
view,
the
view
must
be
dropped
and
then
created
again.
Configuring
the
Tivoli
Risk
Manager
server
On
each
Tivoli
Risk
Manager
server
that
is
to
receive
alerts
from
the
adapter:
1.
On
UNIX
systems,
source
the
Tivoli
Risk
Manager
environment
file:
.
/etc/Tivoli/rma_eif_env.sh
2.
Copy
the
server/itscm.baroc
file
from
the
adapter
archive
file
to
the
$RMHOME/RISKMGR/etc/baroc
directory
on
the
Tivoli
Risk
Manager
server
system.
3.
Make
a
backup
copy
of
the
$RMHOME/RISKMGR/etc/categories.xml
file.
2
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
4.
Using
a
text
editor,
insert
the
lines
contained
in
the
server/itscm_stanzas_categories.xml
file
from
the
adapter
archive
file
into
the
$RMHOME/RISKMGR/etc/categories.xml
file.
The
lines
that
are
added
must
be
within
the
<categories>
stanza
before
the
</categories>
tag.
5.
Make
a
backup
copy
of
the
$RMHOME/RISKMGR/etc/riskmgr_baroc.lst
file.
6.
Using
a
text
editor,
add
the
following
line
to
the
$RMHOME/RISKMGR/etc/riskmgr_baroc.lst
file:
itscm.baroc
7.
If
you
are
configuring
the
Tivoli
Risk
Manager
event
server
to
receive
Tivoli
Security
Compliance
Manager
alerts,
then
configure
the
Tivoli
Enterprise
Console®
rule
base
using
the
instructions
provided
in
the
Tivoli
Risk
Manager
documentation.
8.
Restart
the
Tivoli
Risk
Manager
agent.
Configuring
the
Tivoli
Risk
Manager
client
Before
installing
the
adapter,
perform
the
following
steps.
1.
On
UNIX
systems,
source
the
Tivoli
Risk
Manager
environment
file:
.
/etc/Tivoli/rma_eif_env.sh
2.
Run
the
following
command
to
store
an
obfuscated
version
of
your
database
password
in
a
file:
$RMHOME/RISKMGR/bin/wrmstashpw
$RMHOME/RISKMGR/etc/itscmDB.pwd
your_password
This
prevents
the
password
from
being
stored
in
the
Tivoli
Risk
Manager
configuration
files
in
clear
text.
If
you
omit
this
step,
you
must
specify
the
password
later
when
using
the
Tivoli
Risk
Manager
Event
Monitor
Configuration
Wizard.
The
password
that
is
entered
in
the
wizard
is
stored
in
clear
text
in
the
configuration
files.
To
install
the
adapter:
1.
Stop
the
Tivoli
Risk
Manager
agent.
2.
Run
the
Tivoli
Risk
Manager
Event
Monitor
Configuration
Wizard.
Windows
launch.bat
UNIX
and
Linux™
launch.sh
3.
On
the
Select
Manual
Configuration
or
Import
from
Archive
panel,
select
Typical
Configuration.
4.
On
the
Typical
Configuration
–
Import
from
Archive
panel,
enter
the
location
of
the
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
ZIP
file
in
the
Archive
File
field
and
click
Next.
This
is
the
client/itscmrma.zip
file
from
the
adapter
archive
file.
5.
Enter
the
appropriate
data
for
the
JDBC
configuration
on
the
JDBC
Table
panel.
This
includes
modifying
the
JDBC
Driver
and
JDBC
URL
fields
as
needed,
replacing
HOSTNAME
with
the
fully
qualified
name
of
the
database
server
used
by
Tivoli
Security
Compliance
Manager.
Specify
the
DB2
instance
ID
in
the
JDBC
Username
field.
Specify
the
name
of
the
password
file
(itscmDB.pwd
in
the
example
previously)
in
the
JDBC
Password
File
field.
Click
Next.
Note:
Specifying
an
actual
password
on
this
panel
results
in
the
password
being
stored
in
the
configuration
files
in
clear
text.
6.
After
the
wizard
installs
the
adapter
files
and
updates
the
Tivoli
Risk
Manager
agent
configuration,
click
Finish.
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
3
7.
Modify
the
$RMHOME/RISKMGR/etc/rmclasspath.conf
file
to
add
the
library
files
needed
by
your
JDBC
driver.
The
JDBC
Driver
provided
by
DB2
requires
the
following
files:
DB2
Version
8.1
DB2INSTDIR/java/db2java.zip
DB2INSTDIR/java/db2jcc.jar
DB2
Version
7.2
DB2INSTDIR/java12/db2java.zip
8.
Verify
that
the
$RMHOME/RISKMGR/etc/itscmjdbc.xml
file
that
was
created
by
the
Tivoli
Risk
Manager
Event
Monitor
Configuration
Wizard
has
the
correct
host
name,
user
ID,
and
password
file
for
your
DB2
database
server,
and
that
the
URL
connection
string
is
correct
for
the
JDBC
driver
that
is
being
used.
Correct
any
problems.
9.
Restart
the
Tivoli
Risk
Manager
agent.
Checking
the
installation
To
verify
that
the
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
has
been
properly
installed
and
configured:
1.
Check
that
the
Tivoli
Risk
Manager
agent
is
running.
2.
Create
a
snapshot
with
one
or
more
violations.
3.
Verify
that
the
correct
events
were
registered
on
the
Tivoli
Risk
Manager
server.
Uninstalling
the
adapter
To
uninstall
the
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager:
1.
Stop
the
Tivoli
Risk
Manager
agent.
2.
Open
a
command
prompt
and
change
to
the
following
directory:
RM_INST_DIR/RISKMGR/etc
3.
Replace
the
rmagent.xml
file
with
the
previously
saved
version.
If
multiple
changes
have
been
made
to
the
file
since
the
adapter
was
originally
added,
you
can
simply
remove
the
connector
and
source
stanzas
associated
with
this
adapter.
Those
stanzas
are
similar
to
the
following:
<connector>
<from
name="itscm"/>
<to
name="summarization"/>
</connector>
<source
name="itscm"
class="com.tivoli.RiskManager.Agent.Transports.Receivers.rmaMonitorReceiver">
<set
key="RMA_conf"
value="/opt/RISKMGR/etc/itscm.conf"/>
</source>
4.
Remove
the
other
files
used
by
the
adapter.
UNIX
and
Linux
rm
itscm*
Windows
del
itscm*
This
command
removes
the
following
files:
4
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
itscm.conf
itscm.pos
itscm.xml
itscmjdbc.xml
itscmDB.pwd
5.
Optionally,
if
no
other
Tivoli
Risk
Manager
adapters
are
using
JDBC,
remove
the
JDBC
library
file
path
names
from
the
$RMHOME/RISKMGR/rmclasspath.conf
file.
If
you
are
uncertain,
do
not
modify
the
file.
6.
Restart
the
Tivoli
Risk
Manager
agent.
Tivoli
Risk
Manager
Adapter
for
Tivoli
Security
Compliance
Manager
5
6
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
Appendix.
Notices
This
information
was
developed
for
products
and
services
offered
in
the
U.S.A.
IBM
may
not
offer
the
products,
services,
or
features
discussed
in
this
document
in
other
countries.
Consult
your
local
IBM
representative
for
information
on
the
products
and
services
currently
available
in
your
area.
Any
reference
to
an
IBM
product,
program,
or
service
is
not
intended
to
state
or
imply
that
only
that
IBM
product,
program,
or
service
may
be
used.
Any
functionally
equivalent
product,
program,
or
service
that
does
not
infringe
any
IBM
intellectual
property
right
may
be
used
instead.
However,
it
is
the
user’s
responsibility
to
evaluate
and
verify
the
operation
of
any
non-IBM
product,
program,
or
service.
IBM
may
have
patents
or
pending
patent
applications
covering
subject
matter
described
in
this
document.
The
furnishing
of
this
document
does
not
give
you
any
license
to
these
patents.
You
can
send
license
inquiries,
in
writing,
to:
IBM
Director
of
Licensing
IBM
Corporation
500
Columbus
Avenue
Thornwood,
NY
10594
U.S.A
For
license
inquiries
regarding
double-byte
(DBCS)
information,
contact
the
IBM
Intellectual
Property
Department
in
your
country
or
send
inquiries,
in
writing,
to:
IBM
World
Trade
Asia
Corporation
Licensing
2-31
Roppongi
3-chome,
Minato-ku
Tokyo
106,
Japan
The
following
paragraph
does
not
apply
to
the
United
Kingdom
or
any
other
country
where
such
provisions
are
inconsistent
with
local
law:
INTERNATIONAL
BUSINESS
MACHINES
CORPORATION
PROVIDES
THIS
PUBLICATION
“AS
IS”
WITHOUT
WARRANTY
OF
ANY
KIND,
EITHER
EXPRESS
OR
IMPLIED,
INCLUDING,
BUT
NOT
LIMITED
TO,
THE
IMPLIED
WARRANTIES
OF
NON-INFRINGEMENT,
MERCHANTABILITY
OR
FITNESS
FOR
A
PARTICULAR
PURPOSE.
Some
states
do
not
allow
disclaimer
of
express
or
implied
warranties
in
certain
transactions,
therefore,
this
statement
may
not
apply
to
you.
This
information
could
include
technical
inaccuracies
or
typographical
errors.
Changes
are
periodically
made
to
the
information
herein;
these
changes
will
be
incorporated
in
new
editions
of
the
publication.
IBM
may
make
improvements
and/or
changes
in
the
product(s)
and/or
the
program(s)
described
in
this
publication
at
any
time
without
notice.
Any
references
in
this
information
to
non-IBM
Web
sites
are
provided
for
convenience
only
and
do
not
in
any
manner
serve
as
an
endorsement
of
those
Web
sites.
The
materials
at
those
Web
sites
are
not
part
of
the
materials
for
this
IBM
product
and
use
of
those
Web
sites
is
at
your
own
risk.
IBM
may
use
or
distribute
any
of
the
information
you
supply
in
any
way
it
believes
appropriate
without
incurring
any
obligation
to
you.
©
Copyright
IBM
Corp.
2004
7
Licensees
of
this
program
who
wish
to
have
information
about
it
for
the
purpose
of
enabling:
(i)
the
exchange
of
information
between
independently
created
programs
and
other
programs
(including
this
one)
and
(ii)
the
mutual
use
of
the
information
which
has
been
exchanged,
should
contact:
IBM
Corporation
2Z4A/101
11400
Burnet
Road
Austin,
TX
78758
USA
Such
information
may
be
available,
subject
to
appropriate
terms
and
conditions,
including
in
some
cases,
payment
of
a
fee.
The
licensed
program
described
in
this
information
and
all
licensed
material
available
for
it
are
provided
by
IBM
under
terms
of
the
IBM
Customer
Agreement,
IBM
International
Program
License
Agreement,
or
any
equivalent
agreement
between
us.
Customers
are
responsible
for
ensuring
their
own
compliance
with
various
laws
such
as
the
Graham-Leach-Bliley
Act,
the
Sarbanes-Oxley
Act,
and
the
Health
Insurance
Portability
and
Accountability
Act.
It
is
the
customer’s
sole
responsibility
to
obtain
advice
of
competent
legal
counsel
as
to
the
identification
and
interpretation
of
any
relevant
laws
that
may
affect
the
customer’s
business
and
any
actions
the
customer
may
need
to
take
to
comply
with
such
laws.
IBM
does
not
provide
legal,
accounting
or
auditing
advice,
or
represent
or
warrant
that
its
products
or
services
will
ensure
that
customer
is
in
compliance
with
any
law.
Any
performance
data
contained
herein
was
determined
in
a
controlled
environment.
Therefore,
the
results
obtained
in
other
operating
environments
may
vary
significantly.
Some
measurements
may
have
been
made
on
development-level
systems
and
there
is
no
guarantee
that
these
measurements
will
be
the
same
on
generally
available
systems.
Furthermore,
some
measurement
may
have
been
estimated
through
extrapolation.
Actual
results
may
vary.
Users
of
this
document
should
verify
the
applicable
data
for
their
specific
environment.
Information
concerning
non-IBM
products
was
obtained
from
the
suppliers
of
those
products,
their
published
announcements
or
other
publicly
available
sources.
IBM
has
not
tested
those
products
and
cannot
confirm
the
accuracy
of
performance,
compatibility
or
any
other
claims
related
to
non-IBM
products.
Questions
on
the
capabilities
of
non-IBM
products
should
be
addressed
to
the
suppliers
of
those
products.
All
statements
regarding
IBM’s
future
direction
or
intent
are
subject
to
change
or
withdrawal
without
notice,
and
represent
goals
and
objectives
only.
This
information
contains
examples
of
data
and
reports
used
in
daily
business
operations.
To
illustrate
them
as
completely
as
possible,
the
examples
include
the
names
of
individuals,
companies,
brands,
and
products.
All
of
these
names
are
fictitious
and
any
similarity
to
the
names
and
addresses
used
by
an
actual
business
enterprise
is
entirely
coincidental.
If
you
are
viewing
this
information
softcopy,
the
photographs
and
color
illustrations
may
not
appear.
8
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
Trademarks
The
following
terms
are
trademarks
or
registered
trademarks
of
International
Business
Machines
Corporation
in
the
United
States,
other
countries,
or
both:
DB2
DB2
Universal
Database
IBM
IBM
logo
Tivoli
Tivoli
logo
Tivoli
Enterprise
Console
Microsoft®,
Windows,
Windows
NT®,
and
the
Windows
logo
are
trademarks
of
Microsoft
Corporation
in
the
United
States,
other
countries,
or
both.
Java
and
all
Java-based
trademarks
and
logos
are
trademarks
or
registered
trademarks
of
Sun
Microsystems,
Inc.
in
the
United
States
and
other
countries.
Linux
is
a
trademark
of
Linus
Torvalds
in
the
United
States,
other
countries,
or
both.
UNIX
is
a
registered
trademark
of
The
Open
Group
in
the
United
States
and
other
countries.
Other
company,
product,
and
service
names
may
be
trademarks
or
service
marks
of
others.
Appendix.
Notices
9
10
IBM
Tivoli
Security
Compliance
Manager:
Tivoli
Risk
Manager
Adapter
Guide
����
Printed
in
USA