MicroStrategy ONE
Install and Configure the Identity Agent for JDBC
You must download the JDBC connectivity driver file.
For Oracle, if you download ojdbc8-12.2.0.1.jar, you must rename it to ojdbc8.jar and copy the file to \ProvisioningTool\lib and \Agent\lib.
- On the machine where you want to install the Identity Agent for JDBC, open and run the Identity Agent installation file as an administrator by right-clicking on the JDBC agent installer to select Run as administrator.
- Review the information on the Welcome screen and click Next.
- After you accept the license agreement, click Next.
- Click Finish to close the installation wizard. The Identity Agent Provisioning Tool (APT) opens.
If the APT does not open automatically when you finish installing the Identity Agent, you can open it by navigating to its file location.
- In the APT, select Register new agent and click Next.
- In the first dialog window, to register the initial connection between MicroStrategy Identity Server and the Identity Agent, do the following:
- In the MicroStrategy Identity Server URL (One-way SSL) field, enter the URL provided by Identity Manager, as described in To Register your Identity Agent in MicroStrategy Identity Manager.
- If the Agent will be installed within a network protected by a proxy, you must add the proxy information to the Agent.
- Click the drop-down menu next to Is the network protected by proxy or firewall? and choose Proxy.
- Provide the proxy host, port, username, and password.
- If MicroStrategy Identity Server is installed in your IT infrastructure, you must add its Certificate Authority (CA) chain to the Identity Agent's CA trust store. If the chain contains more than one certificate, each one must be imported individually.
- Click the drop-down menu next to Is MicroStrategy Identity Server CA included in truststore? and choose No.
- Click Add CA to truststore.
- Enter an Alias for the CA certificate. Existing CA names should not be used.
- In the Certificate Path field, enter the path to the CA certificate, or click Browse to navigate to the file.
- Click Add to import the certificate into the trust store.
- In the CSR file path field, enter the path to the CSR, or click Browse to navigate to the file.
- In the Registration code field, enter the code provided by Identity Manager, as described in Create a CSR in JDBC. If the registration code has expired, click the refresh icon in Identity Manager to acquire a new code.
- Click Submit to go to the next dialog window.
- In the second dialog window, set up the connection between MicroStrategy Identity Gateway and the Identity Agent:
- The Organization ID and Application ID are prepopulated from the initial connection to MicroStrategy Identity Server. The Application ID should match the Agent ID provided by Identity Manager, as described in To register your Identity Agent in MicroStrategy Identity Manager.
- In the Private key path field, enter the path to the private key, or click Browse to navigate to the file.
- The Gateway URL is prepopulated from the initial connection to MicroStrategy Identity Server.
- If MicroStrategy Identity Gateway is installed in your IT infrastructure and uses a different CA than MicroStrategy Identity Server, you must add its CA chain to the Identity Agent's CA trust store. If the chain contains more than one certificate, each one must be imported individually. See step 3c for instructions.
- Ensure that the drop-down menu next to Please choose the agent adapter type has selected JDBC Agent.
- Click Next to go to the next dialog window.
- In the third dialog window, enter your Database host, Port, Database name, Username, and Password.
SSL is not currently supported.
- Click Submit. The Identity Agent tests the connection and completes its configuration.
- In the confirmation pop-up, click OK. The APT will close automatically.
Next, Add JDBC Information to Identity and Synchronize Users.
