Chat now with support
Chat with Support

Safeguard Authentication Services 4.1.5 - Evaluation Guide

One Identity Privileged Access Suite for Unix Introducing One Identity Authentication Services Installing and configuring Authentication Services Getting started with Authentication Services

Register display specifiers

Because it is common to use the Find dialog in ADUC to manage users and groups, One Identity recommends that you register display specifiers with Active Directory. Registering display specifiers provides the following benefits:

  • Unix Account properties appear in ADUC Find dialog results.
  • Unix Personality objects are displayed correctly in ADUC. This only applies if the Unix Personality schema has been installed.

Note: You must have Enterprise Administrator rights to register display specifiers.

You can inspect exactly what changes are made during the display specifier registration process by viewing the DsReg.vbs script found in the Authentication Services installation directory. You can use this script to unregister display specifiers at a later time.

To register display specifiers with Active Directory

  1. From a Windows management workstation with Authentication Services installed, navigate to Start | Quest Software | Authentication Services | Control Center.
  2. Click Preferences on the left navigation panel.
  3. Expand the Display Specifiers section.

    Note: The Register Display Specifiers link displays only when display specifiers are not already registered with Active Directory. If the display specifiers are registered, Control Center does not display the link.

  4. Click the Register Display Specifiers link to register display specifiers with Active Directory.

    While it is registering the display specifiers with Active Directory, Control Center displays a progress indicator. When the process is complete Control Center indicates that display specifiers are registered.

    Alternatively, you can register display specifiers from the command line, as follows:

    1. Log in as a user with Enterprise Administrator rights.
    2. Open a command prompt, navigate to the Authentication Services installation directory, and run this command:
      DsReg.vbs /add

    Note: To register One Identity Active Roles Server display specifiers with One Identity Active Roles Server, navigate to the installed location for Authentication Services and run the following command:

    DsReg.vbs /add /provider:EDMS

    You must install the One Identity Active Roles Server management package locally or DsReg.vbs returns an "Invalid Syntax" error.

    To see all the DsReg.vbs options, run the following command:

    DsReg.vbs /help

Unregistering display specifiers

Note: You must have Enterprise Administrator rights to unregister display specifiers.

To unregister display specifiers in Active Directory

  1. Log in as a user with Enterprise Administrator rights.
  2. Open a command prompt and navigate to the Authentication Services installation directory.
  3. Run the DsReg.vbs script with the /remove option:
     DsReg.vbs /remove

    Note: To unregister display specifiers with One Identity Active Role, run the following command:

    DsReg.vbs /remove /provider:EDMS 

    To see all the DsReg.vbs options, run the following command:

    DsReg.vbs /help

    A SUCCESS message appears indicating that the display specifiers were removed successfully.

Global Unix Options

The Global Unix Options section displays the currently configured options for Unix-enabling users and groups.

Click Modify Global Unix Options to change these settings.

Note: Authentication Services uses the Global Unix Options when enabling users and groups for Unix log in.

Table 12: Unix User Defaults
Option Description

Require unique user login names

Select to require a unique user login name attribute within the forest.

Require unique UID on users

Select to require a unique user's Unix ID (UID) number within the forest.

Minimum UID Number

Enter a minimum value for the Unix User ID (UID) number. Typically you set this to a value higher than the highest UID among local Unix users to avoid conflicts with users in Active Directory and local user accounts.

Maximum UID Number

Enter a maximum value for the Unix User ID (UID) number. Typically you would not change this value unless you have a legacy Unix platform that does not support the full 32-bit integer range for UID number.

Primary GID Number

Enter the default value for the Primary GID number when Unix-enabling a user.

Set primary GID to UID

Select to set the primary GID number to the User ID number.

Default Comments (GECOS)

Enter any text in this box.

Login Shell

Enter the default value for the login shell used when Unix-enabling a user.

Home Directory

Enter the default prefix used when generating the home directory attribute when Unix-enabling a user. The default value is /home/; use a different value if your Unix user home directories are stored in another location on the file system. Authentication Services uses the user's effective Unix name when generating the full home directory path.

Use lowercase user name for home directory

Select to use a lower-case representation of the user's effective Unix name when generating the full home directory path as a user is Unix-enabled.

Table 13: Unix Group Defaults
Option Description
Require unique Group Names Select to require a unique Unix group name attribute within the forest.
Require unique GID Number Select to require a unique Unix Group ID (GID) attribute within the forest.
Minimum GID Number Enter the minimum value for the Unix Group ID (GID). Typically this is set to a value higher than the highest GID among local Unix groups to avoid conflicts with groups in Active Directory and local group accounts.
Maximum GID Number Enter the maximum value for the Unix Group ID (GID). Typically you would not change this value unless you have a legacy Unix platform that does not support the full 32-bit integer range for GID.

These options control the algorithms used to generate unique user and group IDs.

Table 14: Unique IDs
Option Description
Object GUID Hash An ID generated from a hash of the user or group object GUID attribute. This is a fast way to generate an ID which is usually unique. If the generated value conflicts with an existing value, the ID is re-generated by searching the forest.
Samba Algorithm An ID generated from the SID of the domain and the RID of the user or group object. This method works well when there are few domains in the forest. If the generated value conflicts with an existing value, the ID is re-generated by searching the forest.
Legacy Search Algorithm An ID generated by searching for existing ID values in the forest. This method generates an ID that is not currently in use.

Modifications you make to these Global Unix Options take effect after you restart the Microsoft Management Console (MMC).

BEST PRACTICE: It is a best practice to either use the generated default IDs or set the ID manually. Mixing the two methods can lead to ID conflicts.

Logging options

The Logging Options section allows you to enable logging for all Authentication Services Windows components. This setting only applies to the local computer. Logging can be helpful when trying to troubleshoot a particular problem. Because logging causes components to run slower and use more disk space, you should set the Log Level to disabled when you are finished troubleshooting.

Related Documents