Chatta subito con l'assistenza
Chat con il supporto

Safeguard Authentication Services 6.0 LTS - Administration Guide

Privileged Access Suite for UNIX Introducing One Identity Safeguard Authentication Services UNIX administration and configuration Identity management Migrating from NIS Managing access control Managing local file permissions Certificate Autoenrollment Integrating with other applications Managing UNIX hosts with Group Policy
Safeguard Authentication Services Group Policy
Group Policy Concepts UNIX policies One Identity policies
Display specifiers Troubleshooting Glossary

Managing user accounts from the UNIX command line

NOTE: In the following examples, it is assumed that you have already logged in with a user that has sufficient permissions in Active Directory to perform the intended command. See Permissions matrix. If your present account is lacking necessary permissions, you may use either of the following methods to perform the desired administrative command:

  1. Use vastool kinit <elevated-permission-user> to obtain elevated permissions. For example, execute vastool kinit admin-user, then perform the command as outlined in the examples.

    -OR-

  2. Use vastool -u <elevated-permission-user>. For example, vastool create user test-account becomes vastool -u admin-user create user test-account.

You can use the vastool command from the command line to create and delete users, as well as list user information.

To create a user, use the vastool create command. The following command creates a non-UNIX-enabled user, bsmith, in Active Directory:

vastool create bsmith

To create a user that has its UNIX account enabled, pass in an /etc/passwd formatted string using the -i option, as follows:

vastool create -i "bsmith:x:1003:1000:Bob:/home/bsmith:/bin/bash" bsmith

By default, all users created with vastool create are created in the Users container. To create a user in a different organizational unit, use the -c command line option.

The following command creates a UNIX-enabled user, bsmith, in the OU=sales,DC=example,DC=com Organizational Unit:

vastool create -i \ 
"bsmith:x:1003:1000:Bob:/home/bsmith:/bin/bash" \ 
-c "OU=sales,DC=example,DC=com" bsmith

To delete a user, use vastool delete. The following command deletes the bsmith user:

vastool delete bsmith

To list users, use vastool list users. The vastool list users command returns information from the local account cache. The following command lists all the users with UNIX accounts enabled:

vastool list users

This command produces output similar to the following:

pspencer:VAS:1000:1000:Pat Spencer:/home/pspencer:/bin/bash 
djones:VAS:1001:1000:Dave Jones:/home/djones:/bin/bash 
molsen:VAS:1002:1000:Mary Olsen:/home/molsen/bin/bash 
bsmith:VAS:1003:1000:Bob Smith:/home/bsmith:/bin/bash

Managing users with Windows PowerShell

Safeguard Authentication Services includes PowerShell modules that provide a "scriptable" interface to many Safeguard Authentication Services management tasks.

Using Safeguard Authentication Services PowerShell commands you can UNIX-enable, UNIX-disable, modify, report on, and clear UNIX attributes of Active Directory users.

NOTE: You can access a customized PowerShell console from Control Center > Tools. To add Safeguard Authentication Services cmdlets to an existing PowerShell session, run Import-Module Quest.AuthenticationServices. For a complete list of available commands, see PowerShell Cmdlets.

To UNIX-enable a user, use the Enable-QasUnixUser command. The following command UNIX-enables the user bsmith in Active Directory:

Enable-QasUnixUser -Identity <domain>\bsmith

To disable a user for UNIX access use the Disable-QasUnixUser command:

Disable-QasUnixUser -Identity <domain>\bsmith

To set a particular UNIX attribute use the Set-QasUnixUser command. The following command sets the Comment (GECOS) field of the bsmith user to Bob Smith:

Set-QasUnixUser -Identity <domain>\bsmith -Gecos "Bob Smith"

To report on a user, use the Get-QASUnixUser command. The following command shows all users that start with "bsm".

Get-QasUnixUser -Identity bsm

The Safeguard Authentication Services PowerShell commands are designed to work with the Active Directory commands from Microsoft (Get-ADUser) and One Identity (Get-QADUser). You can pipe the output of these commands to any of the Safeguard Authentication Services PowerShell commands that operate on users. For example, the following command clears the UNIX attributes from the bsmith user.

Get-QADUser -Identity <domain>\bsmith | Clear-QasUnixUser

The Safeguard Authentication Services PowerShell commands are aware of the options and schema settings configured in Control Center. Scripts written using the Safeguard Authentication Services PowerShell commands work without modification in any Safeguard Authentication Services environment.

PowerShell cmdlets

Safeguard Authentication Services supports the flexible scripting capabilities of PowerShell to automate administrative, installation, and configuration tasks. A wide range of new PowerShell cmdlets are included in Safeguard Authentication Services.

Table 13: PowerShell cmdlets
cmdlet name Description

Add-QasLicense

Installs an Safeguard Authentication Services license file in Active Directory. Licenses installed this way are downloaded by all UNIX clients.

Clear-QasUnixGroup

Clears the UNIX identity information from group object in Active Directory. The group is no longer UNIX-enabled and will be removed from the cache on the Safeguard Authentication Services UNIX clients.

Clear-QasUnixUser

Clears the UNIX identity information from a user object in Active Directory. The user is no longer UNIX-enabled will be removed from the cache on the Safeguard Authentication Services UNIX clients.

Disable-QasUnixGroup

UNIX-disables a group and will be removed from the cache on the Safeguard Authentication Services UNIX clients. Similar to Clear-QasUnixGroup except the UNIX group name is retained.

Disable-QasUnixUser

Removes an Active Directory user‘s ability to log in on UNIX hosts. (The user will still be cached on the Safeguard Authentication Services UNIX clients.)

Enable-QasUnixGroup

Enables an Active Directory group for UNIX by giving a UNIX GID number. The GID number is automatically generated.

Enable-QasUnixUser

Enables an Active Directory user for UNIX. The required account attributes UID number, primary GID number, GECOS, login shell, and home directory are generated automatically.

Get-QasConfiguration

Returns an object representing the Safeguard Authentication Services application configuration data stored in Active Directory.

Get-QasGpo

Returns a set of objects representing GPOs with UNIX and/or macOS settings configured. This cmdlet is in the Quest.AuthenticationServices.GroupPolicy module.

Get-QasLicense

Returns objects representing the Safeguard Authentication Services product licenses stored in Active Directory.

Get-QasOption

Returns a set of configurable global options stored in Active Directory that affect the behavior of Safeguard Authentication Services.

Get-QasSchema

Returns the currently configured schema definition from the Safeguard Authentication Services application configuration.

Get-QasSchemaDefinition

Returns a set of schema templates that are supported by the current Active Directory forest.

Get-QasUnixGroup

Returns an object that represents an Active Directory group as a UNIX group. The returned object can be piped into other cmdlets such as Clear-QasUnixGroup or Enable-QasUnixGroup.

Get-QasUnixUser

Returns an object that represents an Active Directory user as a UNIX user. The returned object can be piped into other cmdlets such as Clear-QasUnixUser or Enable-QasUnixUser.

Get-QasVersion

Returns the version of Safeguard Authentication Services currently installed on the local host.

Move-QasConfiguration

Moves the Safeguard Authentication Services application configuration information from one container to another in Active Directory.

New-QasAdConnection

Creates an object that represents a connection to Active Directory using specified credentials. You can pass a connection object to most Safeguard Authentication Services cmdlets to execute commands using different credentials.

New-QasArsConnection

Creates an object that represents a connection to an Active Roles Server using the specified credentials. You can pass a connection object to most Safeguard Authentication Services cmdlets to execute commands using different credentials.

New-QasConfiguration

Creates a default Safeguard Authentication Services application configuration in Active Directory and returns an object representing the newly created configuration.

Remove-QasConfiguration

Accepts a Safeguard Authentication Services application configuration object as input and removes it from Active Directory. This cmdlet produces no output.

Remove-QasLicense

Accepts an Safeguard Authentication Services product license object as input and removes the license from Active Directory. This cmdlet produces no output.

Set-QasOption

Accepts an Safeguard Authentication Services options set as input and saves it to Active Directory.

Set-QasSchema

Accepts an Safeguard Authentication Services schema template as input and saves it to Active Directory as the schema template that will be used by all Safeguard Authentication Services UNIX clients.

Set-QasUnixGroup

Accepts a UNIX group object as input and saves it to Active Directory. You can also set specific attributes using command line options.

Set-QasUnixUser

Accepts a UNIX user object as input and saves it to Active Directory. You can also set specific attributes using command line options.

Safeguard Authentication Services PowerShell cmdlets are contained in PowerShell modules named Quest.AuthenticationServices and Quest.AuthenticationServices.GroupPolicy. Use the Import-Module command to import the Safeguard Authentication Services commands into an existing PowerShell session.

Password management

Safeguard Authentication Services supports and enforces all the Active Directory password policy concepts including minimum password length, age, complexity, lockout requirements and history. It also supports the fine grained password policies introduced in Windows 2008.

Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione