Chat now with support
Chat with Support

Enterprise Single Sign-On 9.0.2 - One Identity Enterprise Access Management Console Administration Guide

Preface Overview Authenticating to EAM Console and Managing Protection Modes Searching the Directory Tree Managing administrators Managing Security Profiles
Managing time slices Managing Password Format Control Policies Managing User Security Profiles Managing Access Point Security Profiles Managing Application Security Profiles Defining Security Profiles Default Values Managing User and Access Point Security Profiles Priorities
Managing directory objects
Managing applications Managing users Managing access points Managing representative objects Managing clusters of access points Selecting a domain controller
Importing/Exporting security profiles and directory objects Managing smart cards Managing SA server devices Managing RFID tokens Managing biometrics Managing Mobile Devices Enabling the public key authentication method Managing Emergency Accesses Managing audit events Managing reports Customizing configuration files Creating scripts Basic syntax of regular expressions Listing audit events and error codes Correspondence between profiles and administration rights Report Models and Parameters List Custom Group Files Format

Configuring Time Slices

Configuring Time Slices

Before starting
  • For general information on the time slice security objects, see Section Managing time slices.
  • To perform the task described in this section, you must have at least the following administration role:
    • In classic administration mode: "Security object administrator".
    • In advanced administration mode, your role must contain the following administration right: "Schedule: Creation/Modification".

Window example

Procedure

  1. Type the time slice name.
  2. Define the time slot periods during the days of the week hour by hour, by clicking to validate a time or not.
    • Red: time slot not available.
    • Blue: time slot available.
  3. Define a validity period by selecting a start and an end date. If no period is selected, the object validity is permanent.

Displaying time slice usage logs

Subject

The Applies to tab enables you to display the list of target objects that are directly linked to the selected time slice.

Procedure
  1. In the tree structure of the Directory panel, select the time slice for which you want to display the usage.
  2. Select the Applies to tab.
    • The list of target objects linked to this time slice appears.

Displaying time slice event logs

Displaying time slice event logs

Subject

The Events tab allows you to display all the events that are directly or indirectly linked to the selected object, for a defined period (the last two days by default). This report contains both user actions and administration actions log entries.

Restriction

The Events tab only appears if you have the following administration role:

  • In classic administration mode: "Auditor".
  • In advanced administration mode, your role must contain the following right: "Audit: Visualization".

NOTE: For more information on administration roles, see Section Managing administrators.
Procedure
  1. In the tree structure of the Directory panel, select the time slice to audit.
  2. Click the Events tab.
    • The Events tab appears.
  1. In the Filter area, set a period of time to filter the log entries and click Apply (for more information on event logs see Section Managing audit events).

Renaming representative objects

Before starting

To perform the task described in this section, you must have the following administration role:

  • In classic administration mode: "Security object administrator".
  • In advanced administration mode, your role must contain the following administration right: "Representative: Creation/Modification".
Procedure
  1. In the tree structure of the Directory panel, right-click the representative object to rename and select Rename.
  2. Type the new name of the object and press Enter.
Related Documents