Tchater maintenant avec le support
Tchattez avec un ingénieur du support

Defender 6.5.1 - Administration Guide

Getting started Managing Defender objects in Active Directory Configuring security tokens Securing VPN access Securing Web sites Securing Windows-based computers Defender Management Portal (Web interface) Securing PAM-enabled services Delegating Defender roles, tasks, and functions Automating administrative tasks Administrative templates Integration with Active Roles Push Notifications Appendices
Appendix A: Enabling diagnostic logging Appendix B: Troubleshooting common authentication issues Appendix C: Troubleshooting DIGIPASS token issues Appendix D: Defender classes and attributes in Active Directory Appendix E: Defender Event Log messages Appendix F: Defender Client SDK Appendix G: Defender Web Service API

Service accounts

You can delegate permissions to specific user accounts so that they act as service accounts for the Defender components you want.

 

Table 32:

Options related to service accounts

Role

Description

Defender Security Server

The user account to which you assign this role gets the sufficient permissions to act as the Defender Security Server service account.

To specify the user account as the Defender Security Server service account, use the Defender Security Server Configuration tool.

For more information, see Defender Security Server Configuration tool reference.

Defender Management Portal

The user account to which you assign this role gets the sufficient permissions to act as the Defender Management Portal service account.

The user account to which you assign this role must be a member of the local Administrators group on the computer where the Defender Management Portal is installed.

After assigning this role to a user account, enter the account credentials in the Defender Management Portal. For more information, see Specifying a service account for the portal.

Advanced control

You can delegate permissions to perform one or several specific Defender tasks to the user accounts you want. You can delegate the following tasks:

  • Assign Defender token
  • Program Defender token
  • Recover Defender token
  • Reset Defender token
  • Set and clear Defender token’s PIN
  • Assign Defender token temporary response
  • Set Defender password
  • Test Defender token
  • Unassign Defender token
  • Reset Defender token violation Count
  • Modify Defender ID
  • Select Policy
  • Select RADIUS Payload

Full control

You can delegate permissions to manage specific Defender objects, including the permissions to view or modify any of the object properties and the permissions to create, delete, rename or move objects on a user or group.

The available options are:

  • Defender access node full control
  • Defender Security Server full control
  • Defender License full control
  • Defender Security Policy full control
  • Defender RADIUS Payload full control
  • Defender Token full Control

Using control access rights

Control access rights are provided as an optional setting during the installation of the Defender Administration Console. Control access rights can be combined with the delegated administration privileges assigned to security groups or users.

The Defender control access rights act as an additional layer of administration security, allowing you to enable or disable the token-related buttons provided below the Tokens list on the Defender tab in the Properties dialog for a Defender user:

 

 

With control access rights, you can enable or disable the following buttons:

  • Program  Allows you to program the selected token for the user.
  • Recover  Unlocks the selected token.
  • Test  Starts a non-intrusive test to verify the token’s response.
  • Helpdesk  Allows you to reset the token or assign a temporary token response to the user.
  • Unassign  Unassigns the selected token from the user.
  • Add  Assigns a new token to the user.
  • Set PIN  Sets a PIN for the selected token.
  • Password  Allows you set up a new or change the existing Defender password for the user.

To assign control access rights to users

  1. Use the Defender Administration Console to enable the Security tab for the Defender users. By default, the Security tab is disabled.

    Do the following:

    1. On the computer where the Defender Administration Console is installed, open the Active Directory Users and Computers tool (dsa.msc).
    2. In the left pane, expand the appropriate domain node, and then click to select the Defender container.
    3. On the menu bar, click View, and then click Advanced Features.
  2. In the left pane (console), locate the organizational unit that holds the Defender users to whom you want to assign control access rights.
  3. Right-click the OU, and then on the shortcut menu click Properties.
  4. In the dialog box that opens, click the Security tab, and then click Advanced.
  5. Click Add to add the security group or user account.
  6. In the Permission Entry for Users dialog box, use the following elements:
    • Apply on  Select the target for the permissions you are going to select (user objects or descendant user objects).
    • Permissions list  Select the check boxes next to the permissions you want to assign.
  7. Click OK to apply your changes.

To remove control access rights from a group of users

  1. In the Advanced Security Settings dialog box, click to select the appropriate entry in the Permission entries list.
  2. Click the Remove button below the list, and then click OK.
Documents connexes

The document was helpful.

Sélectionner une évaluation

I easily found the information I needed.

Sélectionner une évaluation