Chat now with support
Chat with Support

Identity Manager 8.1.5 - Administration Guide for Connecting Unix-Based Target Systems

Managing Unix-based systems Setting up synchronization with a Unix-based target system Basic data for Unix-based target systems Unix host Unix user accounts Unix groups Reports about Unix objects Configuration parameters for managing a Unix environment Default project template for Unix-based target systems

Entering master data for Unix user accounts

A user account can be linked to an employee in One Identity Manager. You can also manage user accounts separately from employees.

NOTE: It is recommended to use account definitions to set up user accounts for company employees. In this case, some of the master data described in the following is mapped through templates from employee master data.

NOTE: If employees are to obtain their user accounts through account definitions, the employees must own a central user account and obtain their IT operating data through assignment to a primary department, a primary location, or a primary cost center.

To create a user account

  1. In the Manager, select the Unix | User accounts category.

  2. Click in the result list.

  3. On the master data form, edit the master data for the user account.

  4. Save the changes.

To edit master data for a user account

  1. In the Manager, select the Unix | User accounts category.

  2. Select the user account in the result list and run the Change master data task.

  3. Edit the user account's resource data.

  4. Save the changes.

To manually assign or create a user account for an employee

  1. In the Manager, select the Employees | Employees category.

  2. Select the employee in the result list and run the Assign Unix user accounts task.

  3. Assign a user account.

  4. Save the changes.
Detailed information about this topic
Related topics

General master data of a Unix user account

Enter the following data on the General tab.

Table 21: Additional master data for a user account
Property Description

Host

The user account's host.

Employee

Employee that uses this user account. An employee is already entered if the user account was generated by an account definition. If you create the user account manually, you can select an employee in the menu. If you are using automatic employee assignment, an associated employee is found and added to the user account when you save the user account.

You can create a new employee for a user account with an identity of type Organizational identity, Personalized administrator identity, Sponsored identity, Shared identity, or Service identity. To do this, click next to the input field and enter the required employee master data. Which login data is required depends on the selected identity type.

Account definition

Account definition through which the user account was created.

Use the account definition to automatically fill user account master data and to specify a manage level for the user account. One Identity Manager finds the IT operating data of the assigned employee and enters it in the corresponding fields in the user account.

NOTE: The account definition cannot be changed once the user account has been saved.

Manage level

Manage level of the user account. Select a manage level from the menu. You can only specify the manage level can if you have also entered an account definition. All manage levels of the selected account definition are available in the menu.

Login shell

Shell that is executed if a user logs in to Unix using a terminal-based login.

User name

Name of the user account for logging in to a Unix host. If an account definition is assigned, this field is automatically filled with the employee's central user account depending on the manage level.

User ID

User ID for the user account in the Unix host.

Password

Password for the user account. The employee’s central password can be mapped to the user account password. For detailed information about an employee’s central password, see One Identity Manager Identity Management Base Module Administration Guide.

If you use an initial password for the user accounts, it is automatically entered when a user account is created.

The password is deleted from the database after publishing to the target system.

NOTE: One Identity Manager password policies are taken into account when a user password is being verified. Ensure that the password policy does not violate the target system's requirements.

Password confirmation

Reconfirm password.

Primary group ID Identifier of the user account's primary group.
Primary group

Name of the user account's primary group. This defines the group ownership of files created by the user.

A user account's primary group is determined as follows:

  • If you entered a primary group in the host, the group is used as primary group when a user account is created.
  • If you did not enter a primary group, a new group is created with the display name of the new user account assigned as the primary group.

Home directory

The user's full home directory path. For example, /home/user001.

Risk index (calculated)

Maximum risk index value of all assigned groups. The property is only visible if the QER | CalculateRiskIndex configuration parameter is set. For detailed information, see the One Identity Manager Risk Assessment Administration Guide.

Category

Categories for the inheritance of groups by the user account. Groups can be selectively inherited by user accounts. To do this, groups and user accounts or contacts are divided into categories. Select one or more categories from the menu.

Comment (GECOS)

Text field for additional explanation. Additional information about the user account, which is found in the GECOS in /etc/password. If an account definition is assigned, this field is automatically filled with the employee's internal name depending on the manage level.

Identity

User account's identity type Permitted values are:

  • Primary identity: Employee's default user account.

  • Organizational identity: Secondary user account used for different roles in the organization, for example for subcontracts with other functional areas.

  • Personalized administrator identity: User account with administrative permissions, used by one employee.

  • Sponsored identity: User account that is used for a specific purpose, such as training.

  • Shared identity: User account with administrative permissions, used by several employees. Assign all employees that use this user account.

  • Service identity: Service account.

Groups can be inherited

Specifies whether the user account can inherit groups through the employee. If this option is set, the user account inherits groups through hierarchical roles or IT Shop requests.

  • If you add an employee with a user account to a department, for example, and you have assigned groups to this department, the user account inherits these groups.
  • If an employee has requested group membership in the IT Shop and the request is granted approval, the employee's user account only inherits the group if the option is set.

Privileged user account

Specifies whether this is a privileged user account.

Related topics

User account master data for AIX systems

You can enter additional master data for user accounts in an IBM AIX system, like limits, password data, security data or information about encrypting the file system. This data is shown if the host is labeled with the AIX system option.

Detailed information about this topic

User account limits

On Limits, enter the following limits for resources of the user's processes in an AIX system. This data is mapped in /etc/security/limits.

Table 22: Limits for user accounts in an AIX system

Property

Description

Core size (soft)

Soft limit for the size of the core dump file that can be created by a user process. (Parameter core).

Core size (hart)

Absolute maximum limit for the size of the core dump file that can be created by a user process. (Parameter core_hard).

CPU time (soft)

Soft limit for the time (in seconds) a user process may take. (Parameter cpu).

CPU time (hard)

Maximum amount of time (in seconds) the user process may take. (Parameter cpu_hard).

Data size (soft)

Soft limit for the size of the process' data segment for a user process. (Parameter data).

Data size (hard)

Maximum size of a process' data segment for a user process. (Parameter data_hard).

File size (soft)

Soft limit for the size of a file a user process can create or extend. (Parameter fsize).

File size (hard)

Absolute maximum size of a file a user process can create or extend. (Parameter fsize_hard).

Memory size (soft)

Soft limit for the maximum amount of physical memory a user process can take up. (Parameter rss).

Memory size (hard)

Maximum amount of physical memory a user process can take up. (Parameter rss_hard).

Stack size (soft)

Soft limit for the size of the process' stack segment for a user process. (Parameter stack).

Stack size (hard)

Maximum size of a process' stack segment for a user process. (Parameter stack_hard).

File descriptors (soft)

Soft limit for the number of file descriptors a user process can have open at the same time. (Parameter nofiles).

File descriptors (hard)

Absolute maximum number of file descriptors a user process can have open at the same time. (Parameter nofiles_hard).

Threads (soft)

Soft limit for the number of threads per process. (Parameter threads).

Threads (hard)

Absolute maximum number of threads per process. (Parameter threads_hard).

Processes (soft)

Soft limit for the number of processes per user. (Parameter nproc).

Processes (hard)

Absolute maximum for the number of processes per user. (Parameter nproc_hard).

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating