idm image
Prior to the ForgeOps 2026.1 release, the idm Docker
image contained the IDM configuration. In ForgeOps 2026.1 and later
releases, IDM configuration has been separated from the IDM image
into a BusyBox container that contains the configuration profiles.
This lets you customize configuration changes and build only the
BusyBox images.
Customization overview
-
Customize IDM’s configuration data by using the IDM admin UI and REST APIs.
-
Capture changes to the IDM configuration by exporting them from the IDM service running on Kubernetes to the staging area.
-
Save the modified IDM configuration to a configuration profile in your
forgeopsrepository clone. -
Build a BusyBox container image using the exported configuration profile.
-
Redeploy IDM.
-
Verify that changes you’ve made to the IDM configuration are in the new Docker image.
Detailed steps
-
Verify that:
-
You have access to a single-instance ForgeOps deployment.
-
The namespace where the platform is deployed is set in your Kubernetes context.
-
All required third-party software is installed in your local environment (minikube|GKE|EKS|AKS).
-
You’ve set up your environment to push to your Docker registry.
-
-
Perform version control activities on your
forgeopsrepository clone:-
Run the git status command.
-
Review the state of the docker/idm/config-profiles/my-profile directory.
-
(Optional) Run the git commit command to commit changes to files that have been modified.
-
-
Modify the IDM configuration using the IDM admin UI or the REST APIs.
For information about how to access the IDM admin UI or REST APIs, refer to IDM Services.
Refer to About property value substitution for important information about configuring values that vary at run-time, such as passwords and host names.
-
Export the changes you made to the IDM configuration in the running ForgeOps deployment to a configuration profile:
$ cd /path/to/forgeops/bin $ ./forgeops config export idm my-profile --sort ...If the configuration profile doesn’t exist yet, the forgeops config export command creates it.
The forgeops config export idm my-profile command copies IDM static configuration from the ForgeOps deployment to the configuration profile:
-
Perform version control activities on your
forgeopsrepository clone:-
Review the differences in the files you exported to the configuration profile. For example:
$ git diff diff --git a/docker/idm/config-profiles/my-profile/conf/audit.json b/docker/idm/config-profiles/my-profile/conf/audit.json index 0b3dbeed6..1e5419eeb 100644 --- a/docker/idm/config-profiles/my-profile/conf/audit.json + b/docker/idm/config-profiles/my-profile/conf/audit.json @@ -135,7 +135,9 @@ }, "exceptionFormatter": { "file": "bin/defaults/script/audit/stacktraceFormatter.js", - "globals": {}, + "globals": { + "Test": "Test value" + }, "type": "text/javascript" } }
The first time you export IDM configuration changes to a configuration profile, the git diff command doesn’t show any changes.
-
Run the git status command.
-
If you have new untracked files in your clone, run the git add command.
-
Review the state of the docker/idm/config-profiles/my-profile directory.
-
(Optional) Run the git commit command to commit changes to files that have been modified.
-
-
Identify the repository to which you’ll push the Docker image. You’ll use this location to specify the --push-to argument value in the build idm image step.
-
Decide on the image tag name so you can tag each build of the image. You’ll use this tag name to specify the --tag argument value in the build idm image step.
-
Build a new BusyBox image that includes IDM static configuration changes:
While the forgeops build command uses the Docker engine by default for ForgeOps deployments, it supports Podman as well. If you are using Podman engine instead of Docker in your environment, then set the
CONTAINER_ENGINEenvironment variable topodmanbefore running the forgeops build command, for example:$ export CONTAINER_ENGINE="podman"
$ ./forgeops config build --env-name my-env idm \ --config-profile my-profile --push-to my-repo --tag my-idm-tag ...
-
Redeploy IDM using your new IDM BusyBox image:
-
If you installed the platform using the forgeops command, follow the steps in Redeploy IDM: Kustomize deployments.
-
If you installed the platform using Helm, follow the steps in Redeploy IDM: Helm deployments.
-
Redeploy IDM: Kustomize deployments
The forgeops build command calls Docker to build a new
idm Docker image and to push the image to your Docker
repository. The new image includes your configuration profile. It also updates
the image defaulter file so that the next
time you install IDM, the forgeops apply command gets
IDM static configuration from your new custom Docker image.
-
Perform version control activities on your
forgeopsrepository clone:-
Run the git status command.
-
Review the state of the kustomize/overlay/my-env/image-defaulter/kustomization.yaml file.
-
(Optional) Run the git commit command to commit changes to the image defaulter file.
-
-
Remove IDM from your ForgeOps deployment:
$ ./forgeops delete idm --env-name my-env "cdk" platform detected in namespace: "my-namespace". Uninstalling component(s): ['idm'] from namespace: "my-namespace". OK to delete components? [Y/N] Y service "idm" deleted deployment.apps "idm" deleted
-
Redeploy IDM:
$ ./forgeops apply idm --env-name my-env ... -
Validate that IDM has the expected configuration:
-
Run the kubectl get pods command to monitor the status of the IDM pod. Wait until the pod is ready before proceeding to the next step.
-
Describe the IDM pod. Locate the tag of the Docker image that Kubernetes loaded, and verify that it’s your new custom Docker image’s tag.
-
Start the IDM admin UI and verify that your configuration changes are present.
-
Redeploy IDM: Helm deployments
-
Locate the
Successfully taggedmessage in the forgeops build output, which contains the new IDM Docker image’s repository and tag. -
Redeploy IDM using the new IDM Docker image:
$ helm upgrade identity-platform ./ \ --version 2026.1.0 --namespace my-namespace \ --values /path/to/forgeops/helm/my-env/values.yaml
-
Validate that IDM has the expected configuration:
-
Run the kubectl get pods command to monitor the status of the AM pod. Wait until the pod is ready before proceeding to the next step.
-
Describe the IDM pod. Locate the tag of the Docker image that Kubernetes loaded, and verify that it’s your new custom Docker image’s tag.
-
Start the IDM admin UI and verify that your configuration changes are present.
-