지금 지원 담당자와 채팅
지원 담당자와 채팅

Identity Manager 8.2 - Authorization and Authentication Guide

About this guide One Identity Manager application roles Granting One Identity Manager schema permissions through permissions groups Managing permissions to program features One Identity Manager authentication modules OAuth 2.0 / OpenID Connect configuration Multi-factor authentication in One Identity Manager Authenticating other applications using OAuth 2.0/OpenID Connect Granular permissions for the SQL Server and database Installing One Identity Redistributable STS Program functions for starting the One Identity Manager tools Minimum access levels of One Identity Manager tools

Disabling or enabling authentication modules for applications

NOTE: Use non role-based authentication modules to log in to the Designer. Role-based authentication modules for logging in to the Designer are not supported.

To use an authentication module for login, assignment of the authentication module to the application must be enabled.

To enable an authentication module for an application

  1. In the Designer, select the Base data > Security settings > Authentication modules category.

  2. Select the View > Select table relations menu item and enable the DialogProductHasAuthentifier table.

  3. In List Editor, select the authentication module.

  4. In the Application edit view, select the assigned application.

  5. Disable the Disable option.

  6. Select the Database > Save to database and click Save.

To disable an authentication module for an application

  1. In the Designer, select the Base data > Security settings > Authentication modules category.

  2. Select the View > Select table relations menu item and enable the DialogProductHasAuthentifier table.

  3. In List Editor, select the authentication module.

  4. In the Application edit view, select the assigned application.

  5. Enable the Disable option.

  6. Select the Database > Save to database and click Save.

Related topics

Authentication module properties

Table 32: Authentication module properties
Property Meaning

Enabled

Specifies whether the authentication module can be used.

Display name

Display name for displaying the authentication module in the connection dialog of the administration tools.

Authentication module

Internal name of the authentication module.

Authentication type

Authentication module type. You can choose from Dynamic and Role based.

Processing status

The processing status is used for creating custom configuration packages.

Initial data

Initial data for logging in with this authentication module.

Class

Authentication module class.

Assembly name

Name of the assembly file.

Sort order

Specify the order in which the modules are displayed in the login window.

Single sign-on

Specifies whether the authentication module may be authenticated without a password.

Select in front-end

Specifies whether the authentication module can be selected in the login window.

Related topics

Initial data for authentication modules

The initial data is one part of the authentication string (parameter-value pair). Initial data from the authentication string is preallocated by default for each authentication instance.

The authentication string is formatted as follows:

Module=<name>;<property1>=<value1>;<property2>=<value2>,…

Example:

Module=DialogUser;User=<user name>;Password=<password>

To specify initial data

  1. In the Designer, select the Base data > Security settings > Authentication modules category.

  2. Select the authentication module and enter the data in Initial data.

    Syntax:

    Property1=value1;Property2=value2

    Example:

    User=<user name>;Password=<password>

You can use different initial data depending on the authentication module.

Table 33: Initial data for authentication modules
Module Display Name Authentication module Parameters Meaning/Comment

System users

DialogUser

User

User name.

Password

User password.

Active Directory user account

ADSAccount

 

 

Active Directory user account (dynamic)

DynamicADSAccount

Product

Use case. The system user is determined through the use case configuration data.

Active Directory user account (manual input)

DynamicManualADS

Product

Use case. The system user is determined through the use case configuration data.

User

User name. The user‘s identity is determined from a predefined list of permitted Active Directory domains. In the TargetSystem | ADS | AuthenticationDomains configuration parameter, enter the permitted Active Directory domains.

Password

User password.

Active Directory user account (role-based)

RoleBasedADSAccount

 

No parameters required

Active Directory user account (manual input/role-based)

RoleBasedManualADS

User

User name. The user‘s identity is determined from a predefined list of permitted Active Directory domains. In the TargetSystem | ADS | AuthenticationDomains configuration parameter, enter the permitted Active Directory domains.

Password

User password.

Employee

Employee

User

Employee's central user account.

Password

User password.

Employee (dynamic)

DynamicPerson

Product

Use case. The system user is determined through the use case configuration data.

User

User name.

Password

User password.

Employee (role-based)

RoleBasedPerson

User

User name.

Password

User password.

HTTP header

HTTPHeader

Header

HTTP Header to use.

KeyColumn

Comma delimited list of key columns in the Person table to be searched for user names.

Default: CentralAccount, PersonnelNumber

HTTP header (role-based)

RoleBasedHTTPHeader

 

HTTP header to use.

KeyColumn

Comma delimited list of key columns in the Person table to be searched for user names.

Default: CentralAccount, PersonnelNumber

LDAP user account (dynamic)

DynamicLdap

User

User name.

Default: CN, DistinguishedName, UserID, UIDLDAP

Password

User password.

LDAP user account (role-based)

 

RoleBasedLdap

 

User

User name.

Default: CN, DistinguishedName, UserID, UIDLDAP

Password

User password.

Generic single sign-on (role-based)

RoleBasedGeneric

SearchTable

Table in which to search for the user name of the logged in user. This table must contain a FK named UID_Person that points to the Person table.

SearchColumn

Column from the SearchTable in which to search for the user name of the logged-in user.

DisabledBy

Pipe (|) delimited list of Boolean columns which block a user account from logging in.

EnabledBy

Pipe (|) delimited list of Boolean columns which release a user account for logging in.

OAuth 2.0/OpenID Connect

OAuth

 

Dependent on the authentication method of the secure token service.

OAuth 2.0/OpenID Connect (role-based)

OAuthRoleBased

 

Dependent on the authentication method of the secure token service.

Account based system user

DialogUserAccountBased

 

No parameters required

User account

QERAccount

 

No parameters required

User account (role-based)

RoleBasedQERAccount

 

No parameters required

Password reset

PasswordReset

 

No parameters required

Password reset (role-based)

RoleBasedPasswordReset

 

No parameters required

Decentralized identity

 

DecentralizedId

 

Email

Default email address of the employee (Person.DefaultEmailAddress) or contact email address of the employee (Person.ContactEmail)

Identifier

Decentralized identity of the employee (Person.DecentralizedIdentifier).

Decentralized Identity (role-based)

 

RoleBasedDecentralizedId

 

Email

Default email address of the employee (Person.DefaultEmailAddress) or contact email address of the employee (Person.ContactEmail)

Identifier

Decentralized identity of the employee (Person.DecentralizedIdentifier).

Related topics

Configuration data for system user dynamic authentication

In the case of dynamic authentication modules, the system user assigned to the employee is not used for the log in. The system user which is configured using the user interface special configuration data is taken instead.

To specify configuration data

  1. In the Designer, select the Base data > Security settings > Programs category.

  2. Select the application and adjust the Configuration data.

Use XML syntax for entering the configuration data:

<DialogUserDetect>

<Usermappings>

<Usermapping

DialogUser = "System user name"

Selection = "Selection criterion"

/>

<Usermapping

DialogUser = "System user name"

/>

...

</Usermappings>

</DialogUserDetect>

Enter the system user (DialogUser) in the Usermappings section. Specify which employee the given system user should use with the selection criterion (Selection). You are not obliged to enter a selection criterion for the assignment. The first system user that has the required assignment is used for the log in.

You can assign function groups to permissions groups on order to deal with complex permissions and user interface structures. The function groups allow you to map the functions an employee has in the company, for example, IT controller or branch manager. Assign the function groups to the permissions groups. A function group can refer to several permissions groups and several function groups can refer to one permissions group.

If the FunctionGroupMapping section is in the configuration data, this is evaluated first and the system user that is found is used. The authentication module uses the system user that is the exact member of the permissions group found for the login. If none is found, the Usermapping section is evaluated.

<DialogUserDetect>

<FunctionGroupMapping

PersonToFunction = "View mapping employee to function group"

FunctionToGroup = "View mapping function group to permissions group"

/>

<Usermappings>

<Usermapping

DialogUser = "System user name"

Selection = "Selection criterion"

/>

...

</Usermappings>

</DialogUserDetect>

Related topics
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택