Chat now with support
Chat with Support

Enterprise Single Sign-On 8.0.6 - Quest ESSO Console Administrator Guide

1. Overview 2 Authenticating to Quest ESSO Console and Managing Protection Modes 3 Searching the Directory Tree 4 Managing Administrators 5 Managing Security Profiles
5.1 Managing Time Slices 5.2 Managing Password Format Control Policies 5.3 Managing User Security Profiles 5.4 Managing Access Point Security Profiles 5.5 Managing Application Security Profiles 5.6 Defining Security Profiles Default Values 5.7 Managing User and Access Point Security Profiles Priorities
6 Managing Directory Objects
6.1 Managing Applications 6.2 Managing Users 6.3 Managing Access Points 6.4 Managing Representative Objects 6.5 Managing Clusters of Access Points 6.6 Selecting a Domain Controller
7 Importing/Exporting Security Profiles and Directory Objects 8 Managing Smart Cards
8.1 Assigning Smart Cards to Users 8.2 Formatting Smart Cards 8.3 Forcing a new PIN 8.4 Disabling Temporarily Smart Cards 8.5 Unlocking Smart Cards 8.6 Sending Smart Cards to a Blacklist 8.7 Extending the Validity of a Smart Card 8.8 Allowing Users to Renew their Smart Card Certificates 8.9 Displaying Smart Card Properties 8.10 Displaying the List of Supported Smart Cards 8.11 Managing Smart Card Configuration Profiles 8.12 Managing Loan Cards 8.13 Managing Smart Cards' Authentication Parameters 8.14 Managing Batches of Smart Cards
9 Managing SA Server Devices 10 Managing RFID Tokens 11 Managing Biometric Enrolment 13 Enabling the Public Key Authentication Method 14 Managing the Emergency Plan 15 Managing Audit Events 16 Managing Reports 17 Customizing Configuration Files 18 Creating Scripts Appendix A: Regular Expressions - Basic Syntax Appendix B: Listing Audit Events and Error Codes Appendix C: Correspondence Between Profile and Administration Rights

6.5.2.1 Authorizing Users to Access Workstations of the Cluster

1.
In the tree structure of the Directory panel, click the Cluster of access points that you want to make accessible to users of other clusters.
2.
Click the Administrators tab.
3.
Click the Add button and select the users that you want to authorize to extend their own cluster with the access points included in this cluster.
Use the
Browse tab to browse the directory tree structure or use the Search tab to find the user by typing its name.
4.
Click Apply.

6.5.2.2 Displaying the Cluster Composition Made by Authorized Users

The Configuration tab allows you to visualize the user-made composition of the cluster. You cannot modify this temporary composition.
In this tab, the Members table displays the list of access points composing the cluster, and colored icons give information on their state. For more information on the meaning of colors, see Member in 6.5.1 Creating and Configuring a Cluster of Access Points.

6.5.3 Displaying Cluster Event Logs

The Events tab allows you to display all the events that are directly or indirectly linked to the selected object, for a defined period (the last two days by default). This report contains both user action and administration log entries.
The Events tab appears only if you have at least the following administration role:
1.
In the tree structure of the Directory panel, select the wanted Cluster.
2.
Click the Events tab.
The Events tab appears.

6.5.4 Renaming Clusters

1.
In the tree structure of the Directory panel, right-click the Cluster and select Rename.
2.
In the Configuration tab, type the new name of the object and press Enter.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating