지금 지원 담당자와 채팅
지원 담당자와 채팅

Identity Manager 8.2 - Administration Guide for Connecting Unix-Based Target Systems

Managing Unix-based systems Synchronizing Unix-based target systems Managing Unix user accounts and employees Managing memberships in Unix groups Login information for Unix user accounts Mapping of Unix objects in One Identity Manager Handling of Unix objects in the Web Portal Basic data for Unix-based target systems Configuration parameters for managing Unix-based target systems Default project template for Unix-based target systems Unix connector settings

General main data of Unix user accounts

Enter the following data on the General tab.

Table 22: Additional main data of a user account
Property Description

Host

The user account's host.

Employee

Employee that uses this user account. An employee is already entered if the user account was generated by an account definition. If you create the user account manually, you can select an employee in the menu. If you are using automatic employee assignment, an associated employee is found and added to the user account when you save the user account.

You can create a new employee for a user account with an identity of type Organizational identity, Personalized administrator identity, Sponsored identity, Shared identity, or Service identity. To do this, click next to the input field and enter the required employee main data. Which login data is required depends on the selected identity type.

Account definition

Account definition through which the user account was created.

Use the account definition to automatically fill user account main data and to specify a manage level for the user account. One Identity Manager finds the IT operating data of the assigned employee and enters it in the corresponding fields in the user account.

NOTE: The account definition cannot be changed once the user account has been saved.

NOTE: Use the user account's Remove account definition task to reset the user account to Linked status. This removes the account definition from both the user account and the employee. The user account remains but is not managed by the account definition anymore. The task only removes account definitions that are directly assigned (XOrigin=1).

Manage level

Manage level of the user account. Select a manage level from the menu. You can only specify the manage level can if you have also entered an account definition. All manage levels of the selected account definition are available in the menu.

Login shell

Shell that is run if a user logs in to Unix using a terminal-based login.

User name

Name of the user account for logging in to a Unix host. If an account definition is assigned, this field is automatically filled with the employee's central user account depending on the manage level.

User ID

User ID for the user account in the Unix host.

Password

Password for the user account. The employee’s central password can be mapped to the user account password. For detailed information about an employee’s central password, see One Identity Manager Identity Management Base Module Administration Guide.

If you use a random generated initial password for the user accounts, it is automatically entered when a user account is created.

The password is deleted from the database after publishing to the target system.

NOTE: One Identity Manager password policies are taken into account when a user password is being verified. Ensure that the password policy does not violate the target system's requirements.

Password confirmation

Reconfirm password.

Primary group ID Identifier of the user account's primary group.
Primary group

Name of the user account's primary group. This defines the group ownership of files created by the user.

A user account's primary group is determined as follows:

  • If you entered a primary group in the host, the group is used as primary group when a user account is created.

  • If you did not enter a primary group, a new group is created with the display name of the new user account assigned as the primary group.

Home directory

The user's full home directory path. For example, /home/user001.

Risk index (calculated)

Maximum risk index value of all assigned groups. The property is only visible if the QER | CalculateRiskIndex configuration parameter is set. For detailed information, see the One Identity Manager Risk Assessment Administration Guide.

Category

Categories for the inheritance of groups by the user account. Groups can be selectively inherited by user accounts. To do this, groups and user accounts or contacts are divided into categories. Select one or more categories from the menu.

Comment (GECOS)

Text field for additional explanation. Additional information about the user account, which is found in the GECOS in /etc/password. If an account definition is assigned, this field is automatically filled with the employee's internal name depending on the manage level.

Identity

User account's identity type Permitted values are:

  • Primary identity: Employee's default user account.

  • Organizational identity: Secondary user account used for different roles in the organization, for example for subcontracts with other functional areas.

  • Personalized administrator identity: User account with administrative permissions, used by one employee.

  • Sponsored identity: User account to use for a specific purpose. Training, for example.

  • Shared identity: User account with administrative permissions, used by several employees. Assign all employees that use this user account.

  • Service identity: Service account.

Groups can be inherited

Specifies whether the user account can inherit groups through the linked employee. If the option is set, the user account inherits groups through hierarchical roles, in which the employee is a member, or through IT Shop requests.

  • If you add an employee with a user account to a department, for example, and you have assigned groups to this department, the user account inherits these groups.

  • If an employee has requested group membership in the IT Shop and the request is granted approval, the employee's user account only inherits the group if the option is set.

Privileged user account

Specifies whether this is a privileged user account.

Related topics

User account main data for AIX systems

You can enter additional main data of user accounts in an IBM AIX system, like limits, password data, security data or information about encrypting the file system. This data is shown if the host is labeled with the AIX system option.

Detailed information about this topic

Limits for user accounts

On Limits, enter the following limits for resources of the user's processes in an AIX system. This data is mapped in /etc/security/limits.

Table 23: Limits for user accounts in an AIX system

Property

Description

Core size (soft)

Soft limit for the size of the core dump file that can be created by a user process. (Parameter core).

Core size (hart)

Absolute maximum limit for the size of the core dump file that can be created by a user process. (Parameter core_hard).

CPU time (soft)

Soft limit for the time (in seconds) a user process may take. (Parameter cpu).

CPU time (hard)

Maximum amount of time (in seconds) the user process may take. (Parameter cpu_hard).

Data size (soft)

Soft limit for the size of the process' data segment for a user process. (Parameter data).

Data size (hard)

Maximum size of a process' data segment for a user process. (Parameter data_hard).

File size (soft)

Soft limit for the size of a file a user process can create or extend. (Parameter fsize).

File size (hard)

Absolute maximum size of a file a user process can create or extend. (Parameter fsize_hard).

Memory size (soft)

Soft limit for the maximum amount of physical memory a user process can take up. (Parameter rss).

Memory size (hard)

Maximum amount of physical memory a user process can take up. (Parameter rss_hard).

Stack size (soft)

Soft limit for the size of the process' stack segment for a user process. (Parameter stack).

Stack size (hard)

Maximum size of a process' stack segment for a user process. (Parameter stack_hard).

File descriptors (soft)

Soft limit for the number of file descriptors a user process can have open at the same time. (Parameter nofiles).

File descriptors (hard)

Absolute maximum number of file descriptors a user process can have open at the same time. (Parameter nofiles_hard).

Threads (soft)

Soft limit for the number of threads per process. (Parameter threads).

Threads (hard)

Absolute maximum number of threads per process. (Parameter threads_hard).

Processes (soft)

Soft limit for the number of processes per user. (Parameter nproc).

Processes (hard)

Absolute maximum for the number of processes per user. (Parameter nproc_hard).

Password data for user accounts

On Password, enter the following additional information about a user account in the AIX system. This data is mapped in /etc/security/user.

Table 24: Password data for user accounts in an AIX system

Property

Description

minlen

Minimum number of characters a password must have. (Parameter minlen).

maxrepeats

Maximum number of characters that can be repeated in passwords. The default value 8 specifies that a maximum has not been fixed. (Parameter maxrepeats).

mindiff

Minimum number of unique characters that passwords must contain. (Parameter mindiff).

minalpha

Specifies the minimum number of alphabetical characters the password must contain. (Parameter minalpha).

minloweralpha

Specifies the minimum number of lowercase letters the password must contain. (Parameter minloweralpha).

minupperalpha

Specifies the minimum number of uppercase letters the password must contain. (Parameter minupperalpha).

mindigit

Specifies the minimum number of digits the password must contain. (Parameter mindigit).

minspecialchar

Specifies the minimum number of special characters the password must contain. (Parameter minspecialchar).

minother

Specifies the minimum number of non-alphabetical characters a new password must contain. (Parameter minother).

dictionlist

Dictionary file of passwords that are not allowed. (Parameter dictionlist).

histexpire

Number of weeks before a password can be reused. (Parameter histexpire).

histsize

Number of password iterations allowed before an old password can be used again. (Parameter histsize).

minage

Minimum number of weeks before a password can be changed. (Parameter minage).

maxage

Maximum number of weeks before a password must be changed. (Parameter maxage).

maxexpired

Maximum number of weeks beyond maxage that an expired password can be changed by the user. (Parameter maxexpired).

pwdchecks

Methods to apply to new passwords that check the password quality. The value contains a comma delimited list of method names. (Parameter pwdchecks).

pwdwarntime

Number of days before the system issues a warning that a password change is required. (Parameter pwdwarntime).

관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택