Appliance |
Appliance to which the user account belongs. |
Employee |
Employee that uses this user account. An employee is already entered if the user account was generated by an account definition. If you create the user account manually, you can select an employee in the menu. If you are using automatic employee assignment, an associated employee is found and added to the user account when you save the user account.
You can create a new employee for a user account with an identity of type Organizational identity, Personalized administrator identity, Sponsored identity, Shared identity, or Service identity. To do this, click next to the input field and enter the required employee main data. Which login data is required depends on the selected identity type.
NOTE: To enable working with identities for user accounts, the employees also need identities. You can only link user accounts to which an identity is assigned with employees who have this same identity. |
Account definition |
Account definition through which the user account was created.
Use the account definition to automatically fill user account main data and to specify a manage level for the user account. One Identity Manager finds the IT operating data of the assigned employee and enters it in the corresponding fields in the user account.
NOTE: The account definition cannot be changed once the user account has been saved.
NOTE: Use the user account's Remove account definition task to reset the user account to Linked status. This removes the account definition from both the user account and the employee. The user account remains but is not managed by the account definition anymore. The task only removes account definitions that are directly assigned (XOrigin=1). |
Manage level |
Manage level of the user account. Select a manage level from the menu. You can only specify the manage level can if you have also entered an account definition. All manage levels of the selected account definition are available in the menu. |
Identity provider |
Source from which the user’s personal information is taken from. Permitted values are:
-
Local: Local PAM user account. You can enter contact data for this user account.
-
<Directory name>: External identity provider. Root domain of the respective directory server, for example, Active Directory or LDAP. Contact data are taken from the Active Directory or the LDAP user account.
This variant is only available if the Active Directory domain or the LDAP domain is imported into the One Identity Manager. |
Identity object |
User account in Active Directory or LDAP. |
Authentication provider |
Specifies how the user is authenticated in the Privileged Account Management system. Permitted values are:
-
Certificate: (Only for local identity providers) Authentication is performed using a certificate.
-
Local: (Only for local identity providers) The user is authenticated by a user name and password.
-
<Directory name>: (Only for local identity providers) The identity object’s domain. Authentication takes place through a user account of the relevant directory service, for example Active Directory user account or LDAP user account.
This variant is only available if the Active Directory domain or the LDAP domain is imported into the One Identity Manager.
-
<External federation>: Name of an external organization. The given email address or the name claim used for authentication.
-
<RADIUS server>: Name of the RADIUS server. Authentication through the login name on the RADIUS server. |
User name |
User name of the PAM user account. |
Login name |
PAM user account login name. |
Password |
Password for the user account. The employee’s central password can be mapped to the user account password. For detailed information about an employee’s central password, see One Identity Manager Identity Management Base Module Administration Guide.
If you use a random generated initial password for the user accounts, it is automatically entered when a user account is created.
The password is deleted from the database after publishing to the target system.
NOTE: password policies are taken into account when a user password is being verified. Ensure that the password policy does not violate the target system's requirements. |
Confirmation |
Reconfirm password. |
Password never expires |
Specifies whether the password expires. This option is usually used for service accounts. |
Domain |
User account’s domain. |
Require certificate authentication |
Specifies whether the user can log in only with a domain-issued user certificate or SmartCard. |
Certificate thumbprint (SHA-1) |
Unique hash value (40 hexadecimal numbers) of the hash certificate. |
Email address or name claim |
Email address or name claim of the external organization’s user account. |
Display name |
Display name of the PAM user account. |
Last login |
Time of the last login to the system. |
Time zones |
The user's time zone. The default time zone is UTC (Coordinated Universal Time). |
Risk index (calculated) |
Maximum risk index value of all assigned groups. The property is only visible if the QER | CalculateRiskIndex configuration parameter is set. For detailed information, see the One Identity Manager Risk Assessment Administration Guide. |
Category |
Categories for the inheritance of groups by the user account. Groups can be selectively inherited by user accounts. To do this, groups and user accounts or contacts are divided into categories. Select one or more categories from the menu. |
Identity |
User account's identity type Permitted values are:
-
Primary identity: Employee's default user account.
-
Organizational identity: Secondary user account used for different roles in the organization, for example for subcontracts with other functional areas.
-
Personalized administrator identity: User account with administrative permissions, used by one employee.
-
Sponsored identity: User account to use for a specific purpose. Training, for example.
-
Shared identity: User account with administrative permissions, used by several employees. Assign all employees that use this user account.
-
Service identity: Service account. |
Groups can be inherited |
Specifies whether the user account can inherit groups through the linked employee. If the option is set, the user account inherits groups through hierarchical roles, in which the employee is a member, or through IT Shop requests.
-
If you add an employee with a user account to a department, for example, and you have assigned groups to this department, the user account inherits these groups.
-
If an employee has requested group membership in the IT Shop and the request is granted approval, the employee's user account only inherits the group if the option is set. |
Privileged user account |
Specifies whether this is a privileged user account. |
System object |
Identifies the user as a part of the system. |
User account is disabled |
Specifies whether the user account is disabled. If a user account is not required for a period of time, you can temporarily disable the user account by using the <User account is deactivated> option. |
Account locked |
Specifies whether the user account is locked. Depending on the configuration, the user account in the Privileged Account Management system is locked after multiple incorrect password attempts. |
Created on |
Time at which the user account was created. |
Created by |
User who created the user account. |