Preparing for disaster recovery with Identity Management

Red Hat Enterprise Linux 8

Documentation for mitigating disasters affecting an Identity Management deployment

Red Hat Customer Content Services

Abstract

This document describes common disaster scenarios that threaten an IdM deployment, along with methods to mitigate those situations through replication, Virtual Machine snapshots, and backups.