Chat now with support
Chat with Support

Privilege Manager for Unix 6.1 Common Documents - Administration Guide

One Identity Privileged Access Suite for Unix Introducing Privilege Manager for Unix Planning Deployment Installation and Configuration Upgrade Privilege Manager for Unix System Administration Managing Security Policy The Privilege Manager for Unix Security Policy Advanced Privilege Manager for Unix Configuration Administering Log and Keystroke Files InTrust Plug-in for Privilege Manager Troubleshooting Privilege Manager for Unix Policy File Components Privilege Manager Variables Privilege Manager for Unix Flow Control Statements Privilege Manager for Unix Built-in Functions and Procedures Privilege Manager programs Installation Packages

pmpolicy server configuration settings

When you run pmsrvconfig with the -i (interactive) option, the configuration script gathers information from you by asking you a series of questions. During this interview, you are allowed to either accept a default setting or set an alternate setting.

The configuration script first asks you to read and accept the End User License Agreement (EULA). The second question asks if you want to configure the server as a sudo or a pmpolicy type server; the default is sudo. See Security policy types for more information about policy types. Depending on which type of server you are configuring the interview asks different questions.

The following table lists the default and alternative configuration settings when configuring a pmpolicy server. See PM settings variables for more information about the policy server configuration settings.

Table 3: pmpolicy server configuration settings
Configuration setting Default Alternate
Configure Privilege Manager Policy Mode
Configure host as primary or secondary policy group server: primary

Enter secondary, then supply the primary server host name.

Set Policy Group Name: <FQDN name of policy server> Enter Policy Group Name of your choice.
Policy mode:

See Security policy types for more information about policy types.

NOTE: Sets policymode in pm.settings. (Policy "modes" are the same as policy "types" in the console.)


Enter pmpolicy

Configure Security Policy
Initialize the security policy? YES

Enter No

Configure Privilege Manager Daemon Settings

Policy server command line options:

NOTE: Sets pmmasterdopts in pm.settings.



  • -a to send job acceptance messages to syslog.
  • -e <logfile> to use the error log file identified by <logfile>.
  • -r to send job rejection messages to syslog.
  • -s to send error messages to syslog. none to assign no options.

NOTE: -a, -r, and -s override syslog no option; -e <logfile> overrides the pmmasterdlog <logfile> option.

Enable remote access functions?

NOTE: Sets clients in pm.settings.


Does not make system information on this host available to policy servers located on other hosts.

Enter Yes to allow remote policy servers to connect to this primary policy server for remote I/O logging, or to access functions in the policy file.

Entering Yes allows you to list remote hosts.

If Yes, list of remote hosts allowed to connect to this policy server? NO Enter Yes, then add remote hosts to list.
Configure host as a PM Agent? NO Enter Yes, then configure command line options.
If Yes, configure command line options for the agent daemon? pmlocaldopts is not set


  • -s to send error messages to syslog.
  • -e <logfile> to use the error log file identified by <logfile>.
  • -m to only accept connections from the policy server daemon on the specified host. (Use Multiple -m options to specify more than one host.)
  • none to assign no options.

NOTE: These command-line options override the syslog and pmmasterdlog options configured in the pm.settings file.

Configure pmlocald on this host? NO Enter Yes
Configure policy server host components to communicate with remote hosts through firewall? NO Enter Yes
Configure pmtunneld on this host? NO Enter Yes

Define host services?

NOTE: You must add service entries to either the /etc/services file or the NIS services map.


Adds services entries to the /etc/services file.

Enter No
Communications Settings for Privilege Manager

Policy server daemon port number:

NOTE: Sets masterport in pm.settings.

12345 Enter a port number for the policy server to communicate with agents and clients.

Specify a range of reserved port numbers for this host to connect to other defined Privilege Manager hosts across a firewall?

NOTE: Sets setreserveportrange in pm.settings.

NO Enter Yes, then enter a value between 600 and 1023:
  1. Minimum reserved port. (Default is 600.)
  2. Maximum reserved port. (Default is 1023.)

Specify a range of non-reserved port numbers for this host to connect to other defined Privilege Manager hosts across a firewall?

NOTE: Sets setnonreserveportrange in pm.settings.

NO Enter Yes, then enter a value between 1024 and 65535:
  1. Minimum non-reserved port. (Default is 1024.)
  2. Maximum non-reserved port. (Default is 31024.)

Allow short host names?

NOTE: Sets shortnames in pm.settings.

YES Enter No to use fully-qualified host names instead.

Configure Kerberos on your network?

NOTE: Sets kerberos in pm.settings.

NO Enter Yes, then enter:
  1. Policy server principal name. (Default is host.)
  2. Local principal name. (Default is host.)
  3. Directory for replay cache. (Default is /var/tmp.)
  4. Path for the Kerberos configuration files [krbconf setting]. (Default is /etc/opt/quest/vas/vas.conf.)
  5. Full pathname of the Kerberos keytab file [keytab setting]. (Default is /etc/opt/quest/vas/host.keytab.)
Encryption level:

See Encryption for details.

NOTE: Sets encryption in pm.settings.

AES Enter one of these encryption options:
  • DES
  • AES

Enable certificates?

NOTE: Sets certificates in pm.settings.


Enter Yes, then answer:

Generate a certificate on this host? (Default is NO.)

Enter Yes and specify a passphrase for the certificate.

NOTE: Once configuration of this host is complete, swap and install keys for each host in your system that need to communicate with this host. See Swap and install keys for details.

Activate the failover timeout? YES Enter Yes, then assign the failover timeout in seconds: (Default is 10.)

Failover timeout in seconds:

NOTE: Sets failovertimeout in pm.settings.

10 Enter timeout interval.
Configure Privilege Manager Logging Settings
Send errors reported by the policy server and local daemons to syslog? YES Enter No

Policy server log location:

NOTE: Sets pmmasterdlog in pm.settings.

/var/log/pmmasterd.log Enter a location.
Install Privilege Manager Licenses
XML license file to apply: (use the freeware product license)

Enter enter location of the .xml license file.

Enter Done when finished.

Password for pmpolicy user:

See Configuring the primary policy server for Privilege Manager for Unix for more information about pmpolicy service account.


Enter <password>

NOTE: This password is also called the "Join" password. You will use this password when you add secondary policy servers or join remote hosts to this policy group.

NOTE: You can find an installation log file at: /opt/quest/qpm4u/install/pmsrvconfig_output_<Date>.log

Verifying the primary policy server configuration

To verify the policy server configuration

  1. From the command line of the primary policy server, run:
    # pmsrvinfo

    The pmsrvinfo command displays the current configuration settings. For example:

    Policy Server Configuration: 
    Privilege Manager version                     : 6.0.0 
    Listening port for pmmasterd daemon           : 12345 
    Comms failover method                         : random 
    Comms timeout(in seconds)                     : 10 
    Policy type in use                            : pmpolicy 
    Group ownership of logs                       : pmlog 
    Group ownership of policy repository          : pmpolicy 
    Policy server type                            : primary 
    Primary policy server for this group          : <polsrv> 
    Group name for this group                     : <polsrv> 
    Location of the repository
     : file:////var/opt/quest/<polsrv>/.<polsrv>/.repository/pmpolicy_repos/trunk 
    Hosts in the group                            : <polsrv>

NOTE: Note the entries for policy type (pmpolicy) and policy server type (primary). See Security policy types for more information about security policy types.

Recompile the whatis database

If you are using the whatis database and you chose to install the man pages, you may wish to recompile the database to allow users to search the documentation using keywords.

Join hosts to policy group

Once you have installed and configured the primary policy server, you are ready to join it to a policy group. When you join a policy server to a policy group, it enables that host to validate security privileges against a single common policy file located on the primary policy server, instead of on the host.

For Unix agents (qpm-agent), you must "join" your policy servers to the policy group using the pmjoin command.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating