An Active Directory user object is considered to be Unix-enabled when it has the following Unix user attributes assigned: UID Number, Primary GID Number, Home Directory and Login Shell.
|
Note: This feature is only available if:
|
To Unix-enable an Active Directory user
It populates the Properties with default Unix attribute values.
|
Note: You can use PowerShell to apply additional settings. PowerShell allows you to validate entries for the GECOS, Home Directory and Login Shell attributes. Please refer to the Authentication Services user documentation for more information on defining these additional settings using PowerShell cmdlets. |
Once enabled for Unix, you can log on to the host with that Active Directory user's log on name and password.
You can also Unix-enable Active Directory users from the Require AD Logon pane on the All Local Users tab.
To Unix-Enable an Active Directory user
(Click the Directory button to search in a specific folder.)
The Unix-enabled AD Users report identifies all Active Directory users with Unix user attributes.
To create the Unix-enabled AD Users report
The report opens a new Unix-enabled AD Users tab on the Reports view.
|
Note: This report is only available if you have configured the mangement console to recognize Active Directory objects (see Configuring the Console to Recognize Unix Attributes in AD), and you are logged on as an Active Directory account in the Manage Hosts role. |
It launches a new browser or application page and displays the report in the selected format.
|
Note: When generating multiple reports simultaneously or generating a single report that contains a large amount of data, One Identity recommends that you increase the JVM memory. (See JVM Memory Tuning Suggestions for details.) |
Now that you have Unix-enabled an Active Directory user, you can log into a local Unix host using your Active Directory user name and password.
To test the Active Directory login
and click Login to log onto the Unix host with your Active Directory user account.
/opt/quest/bin/vastool klist
The vastool klist command lists the Kerberos tickets stored in a user's credentials cache. This proves the local user is using the Active Directory user credentials.
You just learned how to manage Active Directory users and groups from the mangement console by Unix-enabling an Active Directory group and user account. You tested this out by logging into the Unix host with your Active Directory user name and password. Optionally, you can expand on this tutorial by creating and Unix-enabling additional Active Directory users and groups and by testing different Active Directory settings such as account disabled and password expired.
Management Console for Unix allows you to install the Privilege Manager Policy Server as well as the Privilege Manager Agent and the Sudo Plugin software to remote hosts; it also allows you to join hosts to a policy group activated in the Privilege Manager System Settings. (See Configure a Service Account for details.)
The policy management and keystroke logging features are available when the mangement console is configured in System Settings for one or more policy groups.
|
Note: To use the policy editor, you must log in either as the supervisor or an Active Directory account with rights to manage policy; that is, an account in the Manage Sudo Policy or Manage PM Policy roles. To replay keystroke logs, you must log in either as the supervisor or an Active Directory account with rights to audit policy; that is, an account in the Audit Sudo Policy or Audit PM Policy console roles. |
After you install Management Console for Unix, you are ready to enable the Privilege Manager features.
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy