Chat now with support
Tchattez avec un ingénieur du support

One Identity Management Console for Unix 2.5.2 - Administration Guide

One Identity Privileged Access Suite for Unix Introducing One Identity Management Console for Unix Installing Management Console for Unix Preparing Unix hosts Working with host systems Managing local groups Managing local users Active Directory integration Authentication Services integration Privilege Manager integration
Getting started Configure a primary policy server Configure a secondary policy server Install PM agent or Sudo plugin on a remote host Security policy management
Opening a policy file Edit panel commands Editing PM policy files Reviewing the Access and Privileges by User report Reviewing the Access and Privileges by Host report
Event logs and keystroke logging
Reporting Setting preferences
User preferences System preferences
Security Troubleshooting tips
Auto profiling issues Active Directory Issues Auditing and compliance Cannot create a service connection point Check Authentication Services agent status commands not available CSV or PDF reports do not open Database port number is already in use Elevation is not working Hosts do not display Import file lists fakepath Information does not display in the console License information in report is not accurate Out of memory error Post install configuration fails on Unix or Mac Privilege Manager feature issues Profile task never completes questusr account was deleted Readiness check failed Recovering from a failed upgrade Reports are slow Reset the supervisor password Running on a Windows 2008 R2 domain controller Service account login fails Setting custom configuration settings Single Sign-on (SSO) issues JVM memory tuning suggestions Start/stop/restart Management Console for Unix service Toolbar buttons are not enabled UID or GID conflicts
System maintenance Command line utilities Web services Database maintenance About us

Customize auto-task settings

Management Console for Unix uses a heartbeat to verify that the:

  • host system is still properly configured to send updates
  • current QAS status is accurate

You can customize the heartbeat interval for the automatic QAS Status update. However, if you change the heartbeat interval you must reconfigure automatic QAS agent status for all hosts previously configured.

To customize heartbeat interval

  1. Locate the custom.cfg file.

    See Setting custom configuration settings for more information about customizing configuration settings for the mangement console.

  2. Add the following property:

    -Dmcu.QasStatusHeartbeatsPerDay=n

    where n is the number of times per day. (The default is 6 times a day.)

    Valid values are: 1,2,3,4,6,8,12, and 24 times a day.

    The actual time of day that heartbeats are sent vary from host to host.

  3. Save the custom.cfg file.

  4. Restart the Management Console for Unix service.

Enable debug logging

Technical Support may request that you enable and generate some debug logs for troubleshooting purposes.

To enable the debug logging

  1. Stop the Management Console for Unix service

    See Start/stop/restart Management Console for Unix service for details.

  2. Open the custom.cfg file for editing.

    See Setting custom configuration settings for general information about customizing configuration settings for the mangement console.

  3. Add these system properties to the custom.cfg file:
    -Dlog4j.configuration=log4j-debug.xml

    AND

    -Djcsi.kerberos.debug=true
  4. Save the custom.cfg file.
  5. Start the Management Console for Unix service.

    By default, the debug logs are saved in the application data directory at:

    • On Windows platforms:
      %SystemDrive%:\ProgramData\Quest Software\Management Console for Unix\logs
    • On Unix/Linux platforms:
      /var/opt/quest/mcu

Single Sign-on (SSO) issues

Management Console for Unix uses the host computer's Active Directory credentials to publish its address to the Control Center, perform single sign-on, and to validate a user's log on. On a Microsoft Windows server, the host computer's credentials are available by means of the Windows SSPI, but this limits Management Console for Unix to managing hosts in the same forest to which the Windows server is joined.

If you wish to use Management Console for Unix to manage a foreign domain or forest from a Windows server, then you must disable SSPI. See Disable SSPI for Single Sign-on. However disabling SSPI will disable single sign-on capabilities.

Note: To perform single sign-on, you must

  • Configure Management Console for Unix for Active Directory.
  • Join your Management Console for Unix server to an Active Directory domain.

    If your Management Console for Unix server is on a Linux platform, you must have Authentication Services installed to join Active Directory.

  • Join the client host (where the browser is located) to the Active Directory domain.
  • Login to the browser host using an Active Directory account.

On a Unix server, Management Console for Unix looks for the host computer's credentials by searching for a Kerberos keytab file in the following default locations:

  • /etc/opt/quest/vas/HTTP.keytab
  • /etc/opt/quest/vas/host.keytab

To override the default location, set the console.keytab system property in the custom.cfg configuration file, as follows:

-Dconsole.keytab=<PropertyValue>

See Setting custom configuration settings for more information about overriding the default configuration settings.

If Management Console for Unix cannot find host computer credentials, it will run without host credentials by relying on a correctly configured DNS to find foreign domain controllers. This means that Management Console for Unix will be unable to publish its address to the Control Center, perform single sign-on, or fully validate passwords used when logging on.

Configure a Firefox web browser for SSO

In order for SSO to work on Mozilla Firefox on the host where Management Console for Unix is installed, and from a remote browser, you must configure the web browser to use Windows Integrated Authentication to automatically authenticate to the web browser.

To configure a Firefox web browser for SSO

  1. Enter about:config in the URL address field of your web browser.

  2. Enter negotiate in the filter search box.

  3. Locate and configure the following Firefox preferences:

    network.negotiate-auth.delegation-uris = https://
    network.negotiate-auth.trusted-uris = https://
  4. Save your changes and restart the browser for the changes to take effect.

Documents connexes