To perform the task described in this section, you must have the following administration role:
Procedure
In the Directory panel, right-click the representative object to delete and select Delete.
A cluster of access points is a set of computers on which the Windows sessions are synchronized by EAM. All the actions that a user performs on the Windows session (opening, closing, locking, unlocking) of a computer that belongs to the cluster are automatically and simultaneously performed on all the other computers that form the cluster.
The number of workstations you can include in a cluster is not limited.
In a cluster of access points, the computer on which the user performs an action is called the master computer. The same action is simultaneously performed on the other computers of the cluster, called slaves.
|
IMPORTANT: An EAM Controller does not work in cluster mode. |
For more details on how the cluster of access points operate, see Authentication Manager Cluster Administrator’s Guide.
When a user performs an action on a computer (opening, closing, locking, unlocking), this computer becomes the master computer and periodically informs the slave computers of the operation performed. This allows the management of slave computer behaviors.
When a user opens a session on a computer of the cluster, all the sessions of other computers of the cluster open with the same user account.
When a user closes the session on a computer of the cluster, all the sessions of other computers of the cluster close.
|
NOTE: A slave computer can only accept an order from the master computer if its current session is compatible with this order. For example: if a user locks a computer of his/her cluster while all the other cluster computer sessions are closed, these sessions will remain closed. |
When the screensaver starts on a computer, the computer is not locked. It locks at the end of the screensaver period and then becomes the master computer and locks all the computers of the cluster.
So, you must configure the screensaver according to the wanted behavior.
In this section:
The following procedure explains how to create and configure a new cluster of access points:
|
NOTE: For more information on administration roles, see Section Managing administrators. |
"Configuration" tab description
If this check box is selected, users allowed to access one of the cluster computer will be able to temporarily exclude a computer from the cluster, from the Authentication Manager module (for more details, see Authentication Manager for Windows User's Guide).
This option allows you to define the period of inactivity after which all the computers of the cluster will be automatically locked.
The computers are locked according to the locking behavior you have defined in the Cluster Lock Mode window: see Option button below.
|
IMPORTANT: For this function to work properly, you must deactivate the Windows locking and screen saving mechanisms on all the computers of the cluster. |
This area displays the list of access points that are part of the cluster and their lock mode (defined using the Option button below).
If you have authorized a list of users to add (or remove) to/from their own cluster, access points of the selected cluster (see Section Managing user permissions on clusters), this area gives information on how authorized users have composed their own cluster, by the use of colored icons:
Gives access to the Cluster Lock Mode window.
For each computer of the cluster, this window allows you to define the computer behavior in the following cases:
The keyboard and mouse of the selected computer are disabled and a logo appears on top of the screen, but the information displayed on screen remains visible.
To modify the logo displayed on the screen, save a WGLock.bmp file corresponding to the wanted logo in the EAM Client installation folder (the default folder is Program Files\
One Identity\Enterprise Access Management).
|
IMPORTANT: The size of the logo must be 420(W)x72(H) pixels. |
Pressing Ctrl+Alt+Del on this computer displays the standard unlock window.
The keyboard and mouse of the selected computer are disabled, but the information displayed on screen remains visible.
Pressing Ctrl+Alt+Del on this computer displays the standard unlock window.
The selected computer is locked.
The standard lock window appears on the screen.
Removes permanently from the cluster the selected computer.
Allows you to select the access point you want to add to the cluster.
Use the Browse tab to browse the directory tree structure or use the Search tab to find the access point by typing its name.
This area displays the name of the last user who connected to the cluster of access points
You can give more autonomy to users of clusters by allowing them to manage their own cluster: you can authorize them to add to their own cluster some access points that are originally part of another cluster.
If a user adds an access point to his/her own cluster, the access point stays linked to the original cluster. When the user decide to release an access point, it is automatically associated back to its original cluster.
For more details on the conditions under which a user can add a new access point to its cluster, see Authentication Manager Cluster Administrator’s Guide.
In this section:
© 2021 One Identity LLC. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy