サポートと今すぐチャット
サポートとのチャット

Safeguard Authentication Services 6.0.1 - Administration Guide

Privileged Access Suite for UNIX Introducing One Identity Safeguard Authentication Services UNIX administration and configuration Identity management Migrating from NIS Managing access control Managing local file permissions Certificate Autoenrollment Integrating with other applications Managing UNIX hosts with Group Policy
Safeguard Authentication Services Group Policy
Group Policy Concepts UNIX policies One Identity policies
Display specifiers Troubleshooting Glossary

Samba Configuration policy

Samba is a UNIX implementation of the Microsoft Windows network file system protocol (CIFS/SMB). Samba allows you to access UNIX file systems from Windows and vice versa. The Samba Configuration policy allows you to set the options in the smb.conf file using Group Policy.

Samba Configuration policy settings are organized into four sections: global, homes, printers, and shares. A setting is either a global setting or a service setting.

Global settings are only specified in the global section. Global settings affect the general operation of Samba.

Service settings are specified in all sections. Only service settings can be specified in the homes, printers and shares sections. Service settings specified in the global group act as defaults for all sections.

For details on how to integrate Samba and Safeguard Authentication Services, see Knowledge Base article 316264.

Symbolic Link policy

A symbolic link is a pointer to another file or directory. This policy manages symbolic links (symlinks) on UNIX. Administrators can configure a set of symlinks that are created when policy is applied. Symbolic link entries are append only and cannot be overridden. However, if there is more than one of the exact same entry, the link will be created only once.

Symbolic links can be used to simplify other policies where file locations may differ from system to system. You can use the Symbolic Link policy to create a more uniform file system environment for running commands or modifying files. Be sure that the UNIX Settings Extension is processed before any other CSEs that might need symlink functionality. You can control this with the Client-Side Extensions policy.

Setting a new symbolic link

You can set a new symbolic link (a pointer to another file or directory) by performing the following steps.

To set a new symbolic link

  1. Start Group Policy Editor.

  2. Select UNIX Settings > Safeguard Authentication Services > Client Configuration in the scope view.

  3. Double click Symbolic Links.

    The Symbolic Links Properties dialog opens.

  4. Click Add.

    The Symbolic Link dialog opens.

  5. In the Existing File field, type the full UNIX path to the file or directory to link to.

  6. In the Symbolic Link field, type the full UNIX path where you want to create the link.

    NOTE: If the link target does not exist on the UNIX host, it does not create the symbolic link.

  7. Click OK.

Custom Service Configuration

The Custom Service Configuration policy lets you define services that will be set up by Group Policy agents.

The Custom Service Configuration policy lets the administrator define services with a list of files that will be uploaded to the SYSVOL, then downloaded on the client side. You can specify the target path, ownership, and permissions for each file. You can also specify two special scripts. The verification script is used for verifying that a configuration will work properly with the given service. The restart script restarts the service if the verification script was successful.

To configure a service, complete the following steps:

  1. Create the files you want to distribute through Safeguard Authentication Services. Ensure that the file is accessible from your Windows computer.
  2. Start the Group Policy Editor and navigate to UNIX Settings > Safeguard Authentication Services > Client Configuration.

  3. Select Custom Service Configuration.

  4. To create the new service, enter the service name into the text field, then click Add.

  5. Next to Files, click Add.

  6. In Target File Path, enter the full path for the target file in UNIX path format. The path must start with a /, for example /etc/hosts.

  7. In User Name, enter the name of the user that will own this file. If the user does not exist on the UNIX host, the default user will be root.

  8. In Group Name, enter the name of the group that will own this file. If the group does not exist on the UNIX host, the default group will be root (or system on AIX).

  9. Click Set User Rights to indicate that you want to explicitly specify the permissions for the user that owns the file.

  10. Click Set Group Rights option to indicate that you would like to explicitly specify the permissions for the group that owns the file.

  11. Click Set Other Rights option to indicate that you want to explicitly specify the permissions for everyone.

  12. Click Browse and select the file you created in Step 1.

  13. Select Copy File Permanently to permanently copy the file. By default, Safeguard Authentication Services removes copied files when the policy no longer applies. If the policy overwrote an existing file, it will be restored when the policy is no longer applied.

  14. Click OK.

  15. Repeat the previous steps to add all the files for the service.

  16. Click Verification to select the verification script file.

  17. Click Restart to select the restart script file.

  18. Click OK to save the service configuration.

After configuring the services, the Group Policy agent will download every file for each service. Then, for each service, it will run the verification script. If it returns with success, the files are copied and kept and the restart script is run. If the verification script fails, every file in that specific service is restored to their original version and the restart script will not run.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択