One Identity Management Console for Unix 2.5.2 - Administration Guide

One Identity Privileged Access Suite for Unix Introducing One Identity Management Console for Unix Installing Management Console for Unix Preparing Unix hosts Working with host systems Managing local groups Managing local users Active Directory integration Authentication Services integration Privilege Manager integration
Getting started Configure a primary policy server Configure a secondary policy server Install PM agent or Sudo plugin on a remote host Security policy management
Opening a policy file Edit panel commands Editing PM policy files Reviewing the Access and Privileges by User report Reviewing the Access and Privileges by Host report
Event logs and keystroke logging
Reporting Setting preferences
User preferences System preferences
Security Troubleshooting tips
Auto profiling issues Active Directory Issues Auditing and compliance Cannot create a service connection point Check Authentication Services agent status commands not available CSV or PDF reports do not open Database port number is already in use Elevation is not working Hosts do not display Import file lists fakepath Information does not display in the console License information in report is not accurate Out of memory error Post install configuration fails on Unix or Mac Privilege Manager feature issues Profile task never completes questusr account was deleted Readiness check failed Recovering from a failed upgrade Reports are slow Reset the supervisor password Running on a Windows 2008 R2 domain controller Service account login fails Setting custom configuration settings Single Sign-on (SSO) issues JVM memory tuning suggestions Start/stop/restart Management Console for Unix service Toolbar buttons are not enabled UID or GID conflicts
System maintenance Command line utilities Web services Database maintenance About us

General system settings

Use the general system settings to:

  • Allow duplicate SSH host keys when adding hosts
  • Set the session timeout period
  • Automatically mark system users when profiling hosts the first time

Duplicate SSH Host Keys

To ensure uniqueness of hosts, by default, the mangement console prevents you from adding hosts with the same SSH host key. Since a host can have more than one resolvable DNS name and multiple IP addresses, there should only be one SSH host key returned for whichever DNS name or IP address you use to access the host. However, if you want to add hosts with the same SSH key to the mangement console, you can enable this setting. Enable (or disable) the Duplicate SSH host keys setting in System settings.

Note: If you enable Duplicate SSH Host Keys, you can profile multiple hosts that share the same public key. Once this is enabled there will be no way to validate if a host has been added more than once. You could potentially add a host multiple times under alternate IP addresses or DNS names. If this happens, duplicate users and groups would be visible, and reports will show redundant data. One Identity recommends that you NOT enable this feature to ensure that each host has a unique public key. However, it might be desirable to enable this feature if you want to add multiple hosts that are used for replication where each host shares the same public key.

To add hosts with the same SSH host key

  1. Log onto the mangement console using the supervisor account or an Active Directory account with rights to change System Settings; that is, an account in the Console Administration role.

  2. From the top-level Settings menu, navigate to the General settings.

  3. Select the Allow hosts with the same SSH host keys to be added to the console option.

  4. Click OK to save your selection and close System Settings.

Setting session timeout

By default, after 15 minutes of inactivity in the console, users are logged out. You can extend the session timeout to up to 4 hours.

To extend the session timeout period

  1. From the top-level Settings menu, navigate to the General settings.
  2. Under Session Timeout, select your desired timeout period and click OK.

Automatically marking host system users

You can enable the mangement console to mark local user accounts as "system users" when it profiles hosts.

To mark system users automatically during host profile

  1. From the top-level Settings menu, navigate to the General settings.
  2. Under Host System Users, select Mark system users automatically when profiling. (Set by default)

    Note: This setting is set by default. However, it only marks system users automatically during the initial profile.

  3. Enter a UID number or range of numbers to mark.

    Use a colon (:) to signify a range of numbers; comma delimit multiple numbers or ranges. For example,

    0:499,501,555:600

    Note: Do not add extra spaces.

  4. Enter specific account names you want to mark. For example,
    root,web*,*nobody,ma?k

    Note: Comma delimit multiple names; do not add extra spaces. You can use wildcards in the text string, such as * and ?.

    System users are identified by the icon displayed in the user state column, indicated with the .

Note: You can provide both a UID range and specific user account names.

Related Documents