Subject |
This guide describes how to administer the One Identity Enterprise Access Management (EAM) solution using One Identity EAM Console, the centralized administration and audit consultation tool. | ||
Audience |
This guide is intended for:
| ||
Required Software |
EAM 9.0 evolution 2 and later versions. For more information about the versions of the required operating systems and software solutions quoted in this guide, please refer to One Identity EAM Release Notes. | ||
Typographical Conventions |
Bold Indicates:
| ||
|
Italics - Indicates references to other guides. | ||
|
Code - Indicates portions of program codes, command lines or messages displayed in command windows. | ||
|
CAPITALIZATI ON Indicates specific objects within the application (in addition to standard capitalization rules). | ||
|
< > Identifies parameters to be supplied by the user. | ||
|
| ||
|
| ||
|
| ||
Documentation support |
The information contained in this document is subject to change without notice. As our products are continuously enhanced, certain pieces of information in this guide can be incorrect. Send us your comments or suggestions regarding the documentation on the One Identity support website. |
This guide describes how to use the One Identity Enterprise Access Management administration console (EAM Console). This administration tool allows you to configure your company Single Sign-On (SSO) secure authentication. It covers all the phases, from the setting up of the basic security objects to the definition of access rights for users, workstations and applications.
In this guide, One Identity EAM refers to One Identity Enterprise Access Management.
In this section:
EAM is the module of the IAM solution that provides centralized management of application, network access strategies and security data. For this purpose, User Access is based on the management of three types of objects:
One Identity EAM offers two access point functional modes. The wanted mode is selected at installation time (see One Identity EAM Installation Guide):
The main administration tasks consist in implementing the relations between these three types of objects, as shown in the following diagram:
|
IMPORTANT: In this guide, the term "user" refers to the user himself, a group of users or an organizational unit that contains users. Likewise, the term "access point" refers to the access point itself (which is a computer), a group of computers or an organizational unit that contains computers. |
In this section:
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy