Seldom Used Commands
These commands are used by developers for testing and are rarely used in a production environment.
The properties command displays system properties.
|
Syntax |
properties |
|
Examples |
> properties |
|
Result |
Displays Java properties of the server on which IdentityIQ is installed |
The time command reports the duration of another command.
|
Syntax |
time command |
|
Examples |
> time run “refresh risk scores” |
|
Result |
Initiates the run command and then indicates how much time it took to run. Most useful for long-running commands |
The xtimes command repeats a single command as many times as specified in the first argument. This command is used for performance testing purposes. Running a command numerous time provides a more accurate indication of how long a process takes than running it once.
|
Syntax |
xtimes xcommand |
|
Examples |
> xtimes 3 run “refresh risk scores” |
|
Result |
Runs the refresh risk scores task three times in a row |
This command can be combined with the time command to report timing statistics on the performance test. By specifying this command first (for example, xtimes 20 time run taskname), the time taken for each command run is reported. By specifying the time command first (for example, time xtimes 20 run taskname), the total time for all of the sequential runs is reported.
The about command displays IdentityIQ's application configuration information.
|
Syntax |
about |
|
Examples |
> about |
|
Result |
Lists application configuration specifics for the IdentityIQ instance (version, database, host, memory, etc.) |
The threads command displays all active threads in the instance.
|
Syntax |
threads |
|
Examples |
> threads |
|
Result |
Lists all active threads |
The logConfig command reloads the log4j configuration into the instance.
|
Syntax |
logConfig |
|
Examples |
> logConfig |
|
Result |
Reloads the log4j configuration from the log4j2.properties file |
The summary command lists all classes and the count of objects of each class. Changes in these counts for some objects (for example, auditConfig) can indicate potential problems or areas of concern.
|
Syntax |
summary |
|
Examples |
> summary |
|
Result |
Lists class name and count of objects for each class in the system |
The rollback command can undo a change to a role by restoring it from its BundleArchive object. BundleArchive objects are created when role archiving is enabled for IdentityIQ. Role archiving tracks changes made to a role by storing the pre-modification state in a BundleArchive object when the Bundle object is updated. This command only applies to the BundleArchive class.
|
Syntax |
rollback classname <objectname or id> |
|
Examples |
> rollback BundleArchive “Contractor-IT” |
|
Result |
Restores the Contractor-IT role to the pre-modification state stored in its BundleArchive object |
The rename command changes the name of an object from its existing name to the value specified by the newname parameter.
|
Syntax |
rename classname <objectname or ID> newname |
|
Examples |
> rename application ADAM ADAM-Production |
|
Result |
Changes the name of the ADAM application to ADAM-Production |
The object can be found using its old Name or its ID value, but in either case, the newname value is used to update the Name attribute for the object.
The exportJasper command creates a JasperReport XML file from a JasperTemplate object in IdentityIQ. Jasper Report is a third party user interface for report writing. JasperReport XML is not compatible with IdentityIQ's XML so the JasperReport XML is wrapped in a JasperTemplate object when saved in IdentityIQ. The JasperTemplate must be exported to create a file that can be used directly with the Jasper user interface before it can be reformatted.
|
Syntax |
exportJasper filename <JasperTemplateName or ID> |
|
Examples |
> exportJasper c:\data\AggResRpt.xml AggregationResults |
|
Result |
Exports the Jasper XML from the AggregationResults JasperTemplate object into the file c:\data\AggResRpt.xml |
The import command can be used to re-import a JasperReport object into the database. The import wraps the XML in a JasperTemplate.
The identities command lists the Name, Manager, Roles, and Links for each identity in the system. By default, this information prints to the console (stdout) and can be difficult to read due to screen wrapping. If the output is redirected to a file, it is printed in the file in an easy-to-read style.
|
Syntax |
identities |
|
Examples |
> identities > identities > identities.txt |
|
Result |
The first example writes the Name, Manager, Roles, and Links for each identity in the system to the console (stdout). The second example redirects that information to the file identities.txt. |
The snapshot command takes a snapshot of the named identity as it exists at that moment and archives it in the database as an IdentitySnapshot object. This object provides a historical record of the state of Identity objects at various points in time. Automatic snapshotting can be enabled and configured to create IdentitySnapshot objects at specified intervals or based on system activities (weekly, on aggregation change, etc.). The configuration of this feature can negatively impact system performance.
|
Syntax |
snapshot <identityname or ID> |
|
Examples |
> snapshot Alan.Bradley |
|
Result |
Creates an IdentitySnapshot object for the identity Alan.Bradley, capturing his Identity Attributes, Roles (Bundles), Entitlements Outside Roles, Links, and Scorecard information at that moment in time |
The score command refreshes the identity score for the named identity and updates that score in the database. Score updates are more commonly executed through the IdentityIQ user interface.
|
Syntax |
score <identityname or ID> |
|
Examples |
> score Alan.Bradley |
|
Result |
Recalculates the risk scores for Alan.Bradley and updates his Scorecard with the new risk scores |
The tasks command lists the Name, State, Next Execution, and Cron Strings for all currently scheduled tasks in the system.
|
Syntax |
tasks |
|
Examples |
> tasks |
|
Result |
All currently scheduled tasks are written to the console (stdout) |
The terminateOrphans command sets the completion status of any open taskResult objects to Terminated. While tasks are running, their taskResults should be in a pending state, but occasionally task results can become orphaned and remain in this non-completed state when the task has finished (or has otherwise been terminated). This command can be used to clean up those orphaned taskResults but it must only be executed when there are no tasks running on the application server or the taskResults for actively running tasks are terminated along with any orphaned results.
This command requires no arguments for execution but an artificial argument please has been added to prevent accidentally running this command.
|
Syntax |
terminateOrphans please |
|
Examples |
> terminateOrphans please |
|
Result |
Sets all open taskResults for the application server to the Terminated status |
The certify command creates a manager or application certification. The certification is generated using the installation's default settings/parameters. This command is primarily used for testing purposes.
|
Syntax |
certify [managerName | application] |
|
Examples |
> certify Catherine.Simmons |
|
Result |
Generates a manager certification for manager Catherine Simmons |
The command syntax help indicates that this command can generate an application owner certification when an application is specified as a command argument, but this feature has not been updated as the certification components of the product have changed over time. As a result, the application argument for this command is not currently usable.
This command is not recommended. Use the delete command to remove certification objects.
The cancelCertify command can be used to delete a certification object from the system.
|
Syntax |
cancelCertify <certificationName or ID> |
|
Examples |
> cancelCertify “Manager Access Review for William Moore” |
|
Result |
Delete the named certification (the command fails if more than one certification object with the same name exists) |
The archiveCertification command archives the specified certification (creates a certificationArchive object) and deletes it as an active certification.
|
Syntax |
archiveCertification <certificationName or ID> |
|
Examples |
> archiveCertification “Manager Access Review for William Moore” |
|
Result |
Creates a certificationArchive object and delete the certification from the system |
The decompressCertification command retrieves the named certificationArchive object and prints it to the console (stdout) in the Certification object's XML format.
|
Syntax |
decompressCertification <certificationArchiveName or ID> |
|
Examples |
> decompressCertification “Manager Access Review for William Moore” |
|
Result |
Prints the named certification archive to the console (stdout) in certification XML format |
The workItem command displays certain details (Owner, Create Date, Expiration Date) for the specified workItem.
This command requires the workItem ID or name value as an input parameter. The workItem ID value (a long hexadecimal number) is obtained using the IdentityIQ console's list workItem command. The workItem Name is not the descriptive name for the workitem, it is a numeric value assigned when the workItem is created. The value is found in the XML representation of each workItem through the Debug pages.
|
Syntax |
workItem <workItemID or Name> |
|
Examples |
> workItem 40288f0132b155ad0132b58a4e3f018e |
|
Result |
Displays the Owner, Created Date, and Expiration Date for the specified workItem |
The approve command sets the specified workItem to a Finished state (indicating it was approved), adds any specified completion comments to the workItem, and submits the workItem to the workflower to move it to the next appropriate stage.
This command requires the workItem ID or name value as an input parameter. You can obtain the workItem ID value (a long hexadecimal number) using the IdentityIQ console list workItem command. The workItem Name is not the descriptive name for the workitem, it is a numeric value assigned when the workItem is created. The value is found in the XML representation of each workItem through the Debug pages.
|
Syntax |
approve <workItemID or Name> [comments] |
|
Examples |
> approve 40288f0132b155ad0132b58a4e3f018e “Access approved” |
|
Result |
Marks the specified workItem as approved, adds the comment “Access approved” to the workItem's completion comments, and submits the workItem for evaluation of the next appropriate step (another approval, provisioning, etc.) |
The reject command sets the specified workItem to a Rejected state, adds any specified completion comments to the workItem, and submits the workItem to the workflower to move it to the next appropriate stage.
This command requires the workItem ID or name value as an input parameter. The workItem ID value (a long hexadecimal number) is obtained using the IdentityIQ console's list workItem command. The workItem Name is not the descriptive name for the workitem, it is a numeric value assigned when the workItem is created. The value is found in the XML representation of each workItem through the Debug pages.
|
Syntax |
reject <workItemID or name> [comments] |
|
Examples |
> reject 40288f0132b155ad0132b58a4e3f018e “Access conflicts with AP data entry entitlement” |
|
Result |
Marks the specified workItem as rejected, adds the comment “Access conflicts with AP data entry entitlement” to the workItem's completion comments, and submits the workItem for evaluation of the next appropriate step (another approval, etc.) |
The warp command parses an XML file to create an object and then displays the object's XML representation in the console (stdout). If it is not in valid form or its tags do not match the IdentityIQ DTD, a runtimeException is printed to the console describing the error.
|
Syntax |
warp filename |
|
Examples |
> warp c:\data\newWorkflow.xml |
|
Result |
Parses the XML in the file c:\data\newWorkflow.xml and displays the XML representation of the object in the console, or reports any errors to the console |
The notify command sends an email message to the specified identity using the email template specified. This command does not accept any other parameters that can be passed to the template, so it can only be used for templates whose messages do not rely on variable substitutions to build the content. This command is most often used for testing purposes.
The toAddress argument can contain an identity name or ID or an email address. If it contains an identity name or ID, the email address is retrieved from the identity record.
|
Syntax |
notify <emailTemplateName or ID> toAddress |
|
Examples |
> notify Certification Alan.Bradley |
|
Result |
Sends an email to Alan.Bradley's email address using the Certification email template |
The authenticate command authenticates a username and password against the pass-through authentication source or the internal IdentityIQ records. No results are returned if the values are authenticated. If the password is incorrect or the user name cannot be found, an error message is displayed in the console (stdout).
|
Syntax |
authenticate usernamepassword |
|
Examples |
> authenticate Alan.Bradley s53n659#@5a! |
|
Result |
Authenticates username Alan.Bradley and the provided password against the authentication source (pass-through or internal) |
The simulateHistory command is used to generate a fake, randomly-generated group index or identity score history for one or more groups or identities. Used for generating test data in a development environment.
|
Syntax |
simulateHistory Identity|Group <groupName or ID>|<identityName or ID>|all |
|
Examples |
> simulateHistory Identity all > simulateHistory Group Finance |
|
Result |
First example generates fake risk scorecards for all identities in the system Second example generates fake groupIndex information for the Finance group |
The search command looks up an object based on specified criteria, similar to a simplified SQL/HQL interface. A single class name is specified with a list of the attributes to display from that class. Following the where keyword, search filters can be specified in name value sets. All filter values are used in a like comparison. The record is returned if the record's field value contains the specified value string.
|
Syntax |
search className [attributeName…] where [filter…] filter: attributeNamevalue |
|
Examples |
> search identity name manager.name region where name kat |
|
Result |
Returns the name, manager's name, and region for all identities whose name contains the string kat. For example, records for Katherine.Jones, John.Kato, and Tammy.Erkatz are returned by this search |
The certificationPhase command transitions the specified certification to the specified phase. This command fails if the certification is on or past the requested phase.
The certification is advanced to the next enabled phase after the requested phase if the specified phase is not enabled for the certification. For example, if a certification has neither a Challenge nor a Remediation phase enabled but the command requests that it be advanced to the Challenge phase, the certification is advanced to the End phase.
The certification is sequentially advanced through all enabled phases until it reaches or passes the requested phase. Any business logic that should occur during each phase transition (period enter rules, period end rules, etc.) is executed during the phase advancement.
|
Syntax |
certificationPhase <certificationName or ID> [Challenge | Remediation | End] |
|
Examples |
> certificationPhase “Catherine Simmons Access Review” Challenge |
|
Result |
Advances the “Catherine Simmons Access Review” certification from its current phase (Active) to the Challenge phase. If this review is not configured for a Challenge phase, it is transitioned to the Remediation or End phase (depending on configuration). |
The impact command reads an XML file containing a Bundle (role) object and performs role impact analysis for the role. The command parses the XML to its object form. Impact analysis is not performed if that object is not a Bundle.
|
Syntax |
impact filename |
|
Examples |
> impact c:\data\ContractorRole.xml |
|
Result |
Performs role impact analysis for the Bundle object represented by the XML in c:\data\ContractorRole.xml |
The event command schedules a workflow to run, passing in an Identity name as an argument. By default, the workflow is scheduled 1 second after the command is issued, but a delay can be specified in seconds as a command argument.
|
Syntax |
event <identityName or ID> <workflowName or ID> [seconds] |
|
Examples |
> event Catherine.Simmons “Identity Refresh” 60 |
|
Result |
Schedules an Identity Refresh workflow to run for Catherine.Simmons 60 seconds after the command is issued |
The connectorDebug command is used to test a connector or troubleshoot application aggregation issues. Its method parameters determine what is tested and how.
|
Syntax |
connectorDebug <applicationName or ID> <method> [methodArgs…] |
The specific syntax for each of the “methods” is shown below.
|
Method |
test |
|
Purpose |
Test whether a connection can be established with the application through its connector |
|
Syntax |
connectorDebug <applicationName or ID> test |
|
Example |
> connectorDebug ADAM test |
|
Result |
Returns “Test Succeeded” on success, reports an error in the console on failure. |
|
Method |
iterate |
|
Purpose |
Iterate through the application's account or group records |
|
Syntax |
connectorDebug <applicationName or ID> iterate [account|group (default = account)] [-q (for "quiet mode")] |
|
Example |
> connectorDebug ADAM iterate -q |
|
Result |
First example iterates all account records natively in the ADAM application and returns only the count of iterated objects and how many milliseconds it took to run. |
|
Method |
get |
|
Purpose |
Test whether a connection can be established with the application through its connector |
|
Syntax |
connectorDebug <applicationName or ID> get account|group nativeIdentity |
|
Example |
> connectorDebug ADAM get account “CN=Willie.Gomez,DC=sailpoint,DC=com” |
|
Result |
Returns the XML representation of the ResourceObject for that nativeIdentity on the application |
|
Method |
auth |
|
Purpose |
Test pass-through authentication against the specified application (The featuresString in its application definition must contain AUTHENTICATION.) |
|
Syntax |
connectorDebug <applicationName or ID> auth usernamepassword |
|
Example |
> connectorDebug ADAM auth administrator Pa$$w0rd |
|
Result |
Returns “Authentication Successful” when user is authenticated or displays the exception message to the console if authentication fails |
The encrypt command is used to encrypt a string. This command is generally only useful for test purposes. It can generate an encrypted password which can be passed in other console commands, for example, the authenticate command.
|
Syntax |
encrypt string |
|
Examples |
> encrypt MyPa$$w0rd |
|
Result |
Returns the encrypted equivalent for the specified string |
The hql command executes a search based on a Hibernate Query Language statement. The command syntax matches the sql command's syntax, but this command can select but not update data.
|
Syntax |
hql hqlStatement | -f inputFileName |
|
Examples |
> hql “select name, manager.name from Identity” > c:\data\Identities.dat > hql -f c:\hql\SelectIdentities.hql |
|
Result |
The first example executes the specified HQL select statement and writes the results to the file c:\data\Identities.dat. The second example reads the HQL from the file c:\hql\SelectIdentities.hql, prints the HQL to the console (stdout), and displays the query results to the console (stdout). |
The date command shows the current date and time for the application server or the date and time value for a specified utime (universal time) value.
|
Syntax |
date [utime] |
|
Examples |
> date > date 1338820492484 |
|
Result |
The first example displays the command syntax and the current date/time and current UTIME value. The second example returns the date/time value for the specified UTIME value. |
The shell command escapes out to the command line and runs the command specified. (This command does not work properly in a Windows environment but does work in UNIX.
|
Syntax |
shell commandLine |
|
Examples |
> shell ls |
|
Result |
Lists the contents of the UNIX file system directory from which the console was run |
The meter command toggles metering on or off. While metering is on, the console reports some timing statistics for each command executed. Meter information is displayed after the results of each command as it is executed.
|
Syntax |
meter |
|
Examples |
> meter |
|
Result |
Toggles metering on and off. When turned on, all subsequently issued commands report timing statistics. Meter information displayed includes: number of calls, total number of milliseconds, maximum time for one call, minimum time for one call, and average time per call. |
The compress command is designed to compress the contents of a file to a string that can be included within an XML element. It compresses the file and then encodes it to Base64 and writes that text to the specified output file. This resultant file can then be used in an XML element stored in the database. This has limited usefulness within IdentityIQ since no part of the application is designed to read these compressed strings, but custom rules can be used to process them as needed or they can simply be stored in the database to be retrieved and uncompressed for use by an external application at a later time.
|
Syntax |
compress inputFilenameoutputFilename |
|
Examples |
> compress file1.txt file2.txt |
|
Result |
Compresses the contents of file1.txt, encodes that into Base64, and writes the resultant text string to file2.txt |
The uncompress command functions in exactly the opposite way of the compress command, taking a compressed, Base64-encoded file and returning its uncompressed format.
|
Syntax |
uncompress inputFilenameoutputFilename |
|
Examples |
> compress file2.txt file3.txt |
|
Result |
Reverses the compressing process to return the original, uncompressed version of the text, writing that to the file file3.txt |
The clearEmailQueue command deletes all queued but unsent email messages from the IdentityIQ email queue. This includes any new messages that have not yet been sent and messages that have encountered problems that prevented successful delivery.
|
Syntax |
clearEmailQueue |
|
Examples |
> clearEmailQueue |
|
Result |
Deletes all unsent emails from the email queue |
The clearCache command removes objects from the Hibernate object cache. This can be used when debugging Hibernate issues.
|
Syntax |
clearCache |
|
Examples |
> clearCache |
|
Result |
Clears the Hibernate object cache |
The service command provides information about the background services running in the console. The services include:
- Cache – periodically refreshes cached objects
- SMListener – listens for change events from PE2 change interceptors
- ResourceEvent – looks for change events added to a queue and processes them
- Heartbeat – maintains a Server object for each IdentityIQ instance and periodically updates it so you can tell if an instance is still running
- Task – the Quartz task scheduler
- Request – the IdentityIQ request processor - stopping the Request service also stops partitioned tasks
|
Syntax |
service list | start | stop | run |
|
Examples |
> service list |
|
Result |
Lists background services running in the console |