The following procedure explains how to create a new cluster of access points, and configure it:
|
NOTE: For more information on administration modes, see One Identity EAM Console Administrator's Guide. |
The Configuration tab appears.
The Cluster object is created and configured.
Figure 3: Configuration Tab
If this check box is selected, users allowed to access one of the cluster computer will be able to temporarily exclude a computer from the cluster, from the Authentication Manager application module: see Removing Temporarily a Workstation from the Cluster for more details.
This option allows you to define the period of inactivity after which all the computers of the cluster will be automatically locked.
The computers are locked according to the locking behavior you have defined in the Cluster Lock Mode window: see Option button below.
|
IMPORTANT: For this function to work properly, you must deactivate the Windows locking and screensaving mechanisms on all the computers of the cluster. |
Check box selected: users allowed to access one of the cluster computer can simultaneously restart all the computers of the cluster by launching a command menu from the Authentication Manager application module: see Managing the Cluster Composition.
Check box cleared: users are not allowed to reboot all the computers of the cluster.
Check box selected: if a user restarts a computer of the cluster, the sessions of the other computers remain in the state their were before the reboot operation.
Check box cleared: if a user restarts a computer of the cluster, the sessions of the other computers are closed.
This area displays the list of access points that are part of the current cluster and their defined lock mode (see the following Option button).
If you have authorized a list of users to add/remove access point of the current cluster to/from their own cluster (see Authorizing Users to Access Workstations of the Cluster), this area gives information on how authorized users have composed their own cluster (for more details, see Managing the Cluster Composition), by the use of colored icons:
Gives access to the Cluster Lock Mode window.
Figure 4: Cluster Lock Mode
For each computer of the cluster, this button allows you to define its behavior as a slave in the following cases:
The keyboard and mouse of the selected computer are disabled and a logo appears on top of the screen.
Information displayed on screen remains visible.
To modify the logo displayed on screen, save a WGLock.bmp file (500x72px) corresponding to the wanted logo in the EAM Client installation folder (the default folder is Program Files\One Identity\Enterprise Access Management).
Pressing Ctrl+Alt+Del on this computer displays the standard unlock window.
Transparent lock
The keyboard and mouse of the selected computer are disabled.
Information displayed on screen remains visible.
Pressing Ctrl+Alt+Del on this computer displays the standard unlock window.
The selected computer is locked. The standard lock window appears on the screen.
Removes the selected computer from the cluster.
Allows you to select the access points you want to add to the cluster.
The Browse tab allows you to browse the directory tree structure and the Search tab allows you to find the access point by typing its name.
This area displays the name of the last user who connected to the cluster of access points.
This section explains how to give more autonomy to users of clusters by allowing them to manage their own cluster: you can authorize them to add to their own cluster some access points that are originally part of another cluster.
If a user adds an access point to his/her own cluster, the access point stays linked to the original cluster. When the user decide to release the access point, it is automatically associated back to its original cluster.
For more details on the conditions under which a user can attach a new access point to its cluster, see Attaching a Workstation to Your Cluster
You can authorize some users to add (and remove) access points to their own cluster (see Managing the Cluster Composition).
For that, you need to define the list of users allowed to appropriate access points of the cluster.
Figure 5: Administrators tab
The list of users displayed in the tab is allowed to add the access points contained in the cluster into their own cluster.
Once you have authorized some users of other clusters to access workstations of the selected cluster, they are free to add or remove available access points to their own cluster (as described in Managing the Cluster Composition).
The Configuration tab allows you to visualize the user-made composition of the cluster. You cannot modify this temporary composition.
In this tab, the Members table displays the list of access points composing the cluster, and colored icons give information on their state. For more information on the meaning of colors, see Members table in Creating and Configuring a Cluster of Access Points.
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy