A Service Connection Point (SCP) enables a service to publish service-specific data in Active Directory which can then be used by network clients to locate, connect, and authenticate to an instance of the service. Management Console for Unix can create and register an SCP with Active Directory so that client applications (such as Control Center) can locate and browse to instances of the mangement console running on the network.
To publish an SCP with Active Directory, enable the setting in Console Information settings. When you enable this setting, Management Console for Unix creates an SCP as a child of the Active Directory computer object of the computer where Management Console for Unix server is running. Once created, the SCP contains the keywords and service binding information that allows clients to browse to the initial screen of the mangement console. That is, a client application searches the Global Catalog (GC) for the SCP containing the Management Console for Unix keywords and then uses the service URL to browse to the mangement console. Please keep in mind, that the ServiceConnectionPoint object will appear in the GC based on the replication policy (usually every 5 minutes); therefore, the client application (such as, Control Center) may not find it immediately after the SCP is published to Active Directory.
Note: You can only register an SCP if the mangement console is installed on a computer that is joined to Active Directory.
To publish the mangement console to Active Directory
- Log onto the mangement console using the supervisor account or an Active Directory account with rights to change System Settings; that is, an account in the Console Administration role.
- From the top-level Settings menu, navigate to System settings | General | Console Information.
The Management Console for Unix service uses the information displayed on this dialog to create and register the SCP with Active Directory.
- Under Publish console to Active Directory, select the Register a Service Connection Point with Active Directory option to publish the mangement console to Active Directory.
You can change your supervisor account password in System settings when you are logged in as supervisor.
To change supervisor account password
-
Log onto the mangement console using the supervisor account.
-
From the top-level Settings menu, navigate to System settings | General | Change Password.
-
Enter your current supervisor account password and the new password.
-
Click OK to save your changes and close System Settings.
Note: If you have forgotten the current supervisor account see Reset the supervisor password for more information on resetting your supervisor password.
You can specify up to three custom privilege elevation commands to use when performing tasks on hosts that require elevated privileges.
To set custom privilege elevation commands
-
From the top-level Settings menu, navigate to System Settings | General | Custom Privilege Elevation.
-
In the Custom Elevation box, enter the elevation command and any optional parameters required by the command. For example:
/opt/quest/bin/pmrun
Note: Enter the full path to the command if the command is not in the system's path.
-
Optionally, select the Use single quotes for command arguments option if the command requires arguments in quotes.
For example, the sudo command does not require arguments in quotes, like this:
# sudo echo bob
Whereas the su command does require arguments in quotes, like this:
# su root -c "echo bob"
-
To specify another user instead of root when performing tasks on hosts that require elevated privileges, replace root with "%s" as in:
# su %s -c "echo bob"
Enter "%s" to specify a user name other than root to use elevated credentials. In the Log On To Host dialog, when you select the Use elevated credentials option, you can replace root with another account in the User name field.
-
Optionally, click Test to validate that the command works.
On the Test Privileged Elevation Command dialog,
-
Enter or select a host where the command exists.
-
Enter user credentials and click Test.
A message displays to explain whether the test was successful or not.
-
Click OK to save the changes.
When a test for a command completes successfully, it becomes available on the Log On To Host dialog. (Search for Log On To Host in the online help for details.)
What a user sees in the mangement console is based on the rules that pertain to the console role the user is assigned. A user can only access and perform tasks specified for his roles. The default supervisor account is a member of all roles, however, that account is blocked from performing Active Directory tasks because the supervisor does not have Active Directory credentials.
Note: While all console roles, except supervisor, have permission to view the Active Directory tab, to perform certain Active Directory tasks, such as Unix-enabling an Active Directory user or group, the AD user assigned to the role must have the appropriate rights in Active Directory.
To access and perform tasks within the mangement console, assign users to one or more of the following console roles:
Note: All roles run reports. See Reports for more information about the reports that are available for each role.
Table 17: Console roles and permissions
Manage Hosts |
Members can add, view, and manage hosts, as well as run reports. |
|
- Hosts tab
- All Local Users tab
- Active Directory tab
- Reporting tab
|
Manage Sudo Policy |
Members can view and edit the sudoers policy file, run reports, and access a read-only view of all hosts. |
- View hosts
- Edit Sudoers Policy
|
- Hosts tab (view hosts only)
- Policy | Sudo Policy Editor view
- Policy | Event Logs view
- Policy | Replay Log view
- Active Directory tab
- Reports tab to access the Access and Privileges and Policy Changes reports
|
Audit Sudo Policy |
Members can audit sudo policy through reports, replay keystroke logs, and access a read-only view of all hosts. |
- View hosts (read-only)
- View and replay keystroke logs
|
- Hosts tab (view hosts only)
- Policy | PM Policy Editor view
- Policy | Event Logs view
- Policy | Replay Log view
- Active Directory tab
- Reports tab to access the Access and Privileges and Policy Changes reports
|
Console Administration |
Members can modify console System Settings and access a read-only view of all hosts. |
- View hosts (read-only)
- Manage console System Settings
|
- Hosts tab (view hosts only)
- Active Directory tab
- Settings | System settings view
- General settings
- Console Information settings
- Privilege Manager settings
- Active Directory settings
- Licenses settings
|
Manage Console Access |
Members can add and remove members of console roles, run reports, and access a read-only view of all hosts. |
- View hosts (read-only)
- Set console permissions (Roles and Permissions)
|
- Hosts tab (view hosts only)
- Active Directory tab
- Reports tab to access only the Console Access and Permissions report
- Settings | System settings view
- Console Roles and Permissions settings
|
Manage PM Policy |
Members can view and edit the Privilege Manager policy, run reports, and access a read-only view of all hosts. |
- View hosts
- Edit PM Policy
|
- Hosts tab (view hosts only)
- Policy | Edit Policy view
- Policy | Event Logs view
- Active Directory tab
- Reports tab to access the Access and Privileges and Policy Changes reports
|
Audit PM Policy |
Members can audit Privilege Manager policy through reports, replay keystroke logs, and access a read-only view of all hosts. |
- View hosts (read-only)
- View and replay keystroke logs
|
- Hosts tab (view hosts only)
- Policy | Event Logs view
- Policy | Replay Log view
- Active Directory tab
- Reports tab to access the Access and Privileges and Policy Changes reports
|
Reporting |
Members can run and view all reports and access a read-only view of all hosts. |
- View hosts (read-only)
- View and produce any report
|
- Hosts tab (view hosts only)
- Active Directory tab
- Reports tab to access reports
|
Note: Management Console for Unix does not allow you to add domain-local Active Directory groups to roles; you can only add security-enabled global and universal groups.