Chat now with support
Tchattez avec un ingénieur du support

Authentication Services 4.2 - Administration Guide

One Identity Privileged Access Suite for Unix Introducing One Identity Authentication Services Unix administration and configuration Identity management Migrating from NIS Managing access control Managing local file permissions Certificate Autoenrollment Integrating with other applications Managing Unix hosts with Group Policy
Authentication Services Group Policy
Group Policy Concepts Unix policies One Identity policies
Display specifiers Troubleshooting

Configure a User Allow Entry policy

The Configure a User Allow Entry policy manages the Authentication Services users.allow file. This file controls which users are allowed to log in to the host machine. If any allow rules are set, then a user must be allowed access through one of the configured allow rules or the user is denied.

To set up an allow entry

  1. Navigate to the Unix Settings | Quest Authentication Services | Access Control | node.
  2. Double-click users.allow Configuration in the result pane to open the users.allow Configuration Properties dialog:
    • Click Browse AD to add a container. All users under the specified container are allowed to log in unless a deny rule prevents it. All other users are denied login access unless another allow rule allows it.
    • Click Add Group to add a group. All group members are allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
    • Click Add User to add a specific user. The specified user is allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
    • Click Add Domain to add a domain. All users in the domain are allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
    • Click Add Custom to add an item manually. You must specify the correct type for the item. All users associated with the specified item are allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
  3. Click OK to save settings and close the dialog.

Configure a User Deny Entry policy

The Configure a User Deny Entry policy manages the Authentication Services users.deny file. This file dictates users and groups that are explicitly denied access to the machine. Deny rules take precedence over allow rules.

To setup a users deny policy

  1. Navigate to the Unix Settings | Quest Authentication Services | Access Control | node.
  2. Double-click users.deny Configuration in the result pane to open the users.deny Configuration Properties dialog.
    • Click Browse AD to add a container. All users under this container are denied access.
    • Click Add Group to add a group. All members of the specified group are denied access.
    • Click Add User to add a specific user. The specified user is denied access.
    • Click Add Domain to add a domain. All users in the specified domain are denied access.
    • Click Add Custom to add an item manually. You must specify the correct type for the item. All users associated with the item are denied access.
  3. Click OK to save settings and close the dialog.

Display specifiers

Display specifiers are Active Directory objects that provide information about how other objects in the directory display in client applications.

Register display specifiers

Because it is common to use the Find dialog in ADUC to manage users and groups, One Identity recommends that you register display specifiers with Active Directory. Registering display specifiers provides the following benefits:

  • Unix Account properties appear in ADUC Find dialog results.
  • Unix Personality objects are displayed correctly in ADUC. This only applies if the Unix Personality schema has been installed.

Note: You must have Enterprise Administrator rights to register display specifiers.

You can inspect exactly which changes are made during the display specifier registration process by viewing the DsReg.vbs script found in the Authentication Services installation directory. You can use this script to unregister display specifiers at a later time.

To register display specifiers with Active Directory

  1. From a Windows management workstation with Authentication Services installed, navigate to Start | Quest Software | Authentication Services | Control Center.
  2. Click Preferences on the left navigation panel.
  3. Expand the Display Specifiers section.

    Note: The Register Display Specifiers link displays only when display specifiers are not already registered with Active Directory. If the display specifiers are registered, Control Center does not display the link.

  4. Click the Register Display Specifiers link to register display specifiers with Active Directory.

    While it is registering the display specifiers with Active Directory, Control Center displays a progress indicator. When the process is complete, Control Center indicates that display specifiers are registered.

    Alternatively, you can register display specifiers from the command line, as follows:

    1. Log in as a user with Enterprise Administrator rights.
    2. Open a command prompt, navigate to the Authentication Services installation directory, and run this command:
      DsReg.vbs /add

    Note: To register One Identity Active Roles Server display specifiers with One Identity Active Roles Server, navigate to the installed location for Authentication Services and run the following command:

    DsReg.vbs /add /provider:EDMS

    You must install the One Identity Active Roles Server management package locally or DsReg.vbs returns an "Invalid Syntax" error.

    To see all the DsReg.vbs options, run the following command:

    DsReg.vbs /help

Documents connexes