Chat now with support
Chat with Support

Safeguard Authentication Services 4.1.5 - Management Console for Unix Administration Guide

One Identity Privileged Access Suite for Unix Introducing One Identity Management Console for Unix Installing Management Console for Unix Preparing Unix Hosts Working with Host Systems Managing Local Groups Managing Local Users Active Directory Integration Authentication Services Integration Privilege Manager Integration Reporting Setting Preferences Security Troubleshooting Tips
Auto Profile Issues Active Directory Issues Auditing and Compliance Cannot Create a Service Connection Point Check Authentication Services Agent Status Commands Not Available CSV or PDF Reports Do Not Open Database Port Number Is Already in Use Elevation Is Not Working Hosts Do Not Display Import File Lists Fakepath Information Does Not Display in the Console Java Applet Failures License Info in Report is not Accurate Out of Memory Error Post Install Configuration Fails on Unix or Mac Privilege Manager Feature Issues Profile Task Never Completes questusr Account was Deleted Readiness Check Failed Recovering From a Failed Upgrade Reports Are Slow Reset the Supervisor Password Running on a Windows 2008 R2 Domain Controller Service Account Login Fails Setting Custom Configuration Settings Single Sign-on (SSO) Issues JVM Memory Tuning Suggestions Start/Stop/Restart Management Console for Unix Service Tool Bar Buttons Are Not Enabled UID or GID Conflicts
System Maintenance Command Line Utilities Web Services Database Maintenance

Manage Role Defaults

You can set global policy defaults for Privilege Manager roles and restricted shell roles. When you set a global default for a property, it applies to all roles unless you have set a specific property in an individual role to override the global policy default. See Override Role Property Defaults for more information about specifying role-specific overrides for a specific property.

To manage role defaults

  1. From the PM Policy Editor view, click Manage Defaults.

    The Role Defaults dialog displays allowing you to specify the following settings:

    • Role General Settings
      • General Settings
      • Authentication Settings
      • User Defined Variables
    • Role What Settings
      • Pre-authorized Commands
    • Role When Settings
      • Time Restrictions Settings
    • Role How Settings
      • Shell Settings

    Note: Not all variables can be set as global defaults using the Manage Defaults button on the GUI editor; however, you can set any variable as a global default using the text editor. See Role Property Variables for a list of variables.

  2. For example, to set a global default for the Enable role property you must use the text editor.
    1. From the PM Policy Editor view, click the Text Editor button in the top-right corner of the PM Policy Editor view.
    2. Double-click the global_profile.conf configuration policy name or right-click it and choose Open as text.
    3. Add the following line to the global_profile.conf file:
      pf_enableprofile = true;
    4. Click Save, enter a commit description, and click OK.

Modifying PM Policy Files With the Text Editor

When you open a policy from a policy group that is configured to use a pmpolicy rather than a sudo policy type, the mangement console allows you to edit the policy files that pertain to that policy using either a GUI editor or a text editor, however there are certain variables that you can only modify by means of the text editor.

To modify policy files using the text editor

  1. From the Policy tab, navigate to the PM Policy Editor view.

  2. Click the Text Editor button in the top-right corner of the PM Policy Editor view.

  3. From the Open menu, select either:

    1. Current version to open the latest saved version of the policy that is currently in use by the mangement console for a policy group.
    2. Version to open the Open Version dialog from which you select a policy group and a version of a policy and click OK to open the file.

    When you open a policy-based policy file in the text editor, the mangement console lists the policies in the policy group in the left navigation tree:

    • Under the Configuration folder, it lists the .conf files from the policy group and opens the default Privilege Manager policy configuration file, pm.conf.
    • Under the Restricted Shell Roles folder, it lists the .shellprofile files from the policy group.
    • Under the Roles folder, it lists the .profile files from the policy group.

    NoteS:

    • "Roles" in the mangement console's GUI editor are "profiles" in the policy.
    • You can switch back and forth between the GUI editor and the text editor. To switch back to the GUI editor once in the text editor, click the GUI Editor button in the top-right corner of the PM Policy Editor view.
    • If it does not open, see Java Applet Failures for information about troubleshooting policy editor issues.

  4. To open a specific policy in the text editor, either double-click the policy or right-click it and choose Open as text from the context menu.

    When using the text editor:

    1. Boolean values are represented by check boxes in the GUI Editor.

      For example, 'pf_enableprofile = false' is represented as an unchecked check box.

    2. String values are represented by a text field with a field label in the GUI Editor.

      For example, 'pf_profiledescription= "Some Descriptive Text"' is represented as 'Description:[ template ]'.

    3. Arrays or lists are represented as text boxes in the GUI Editor.

      For example, 'pf_authgroups = {"admins", "dbas"}; is represented as a text box where the user can enter multiple values.

  5. Click the Add button in the Policy panel to add a new policy file.

    The Add Policy File dialog opens.

    1. Select the type of policy file you want to add.

      Choose

      • Privilege Manager Configuration File
      • Privilege Manager Role
      • Privilege Manager Restricted Shell Role
    2. Enter a name for the new policy file.

      Note that the file type changes according to the type of policy file you selected.

    3. Optionally, select the Use an existing file as a template option.

      The list of files to choose changes according to the type of policy file you selected.

    4. When you click OK on the Add Policy File dialog, it adds the new file to the left navigation tree.

  6. Click the Save button to save the current policy file; click Save All to save all modified policy files.

  7. Click the Close button in the Policy panel to close all modified policy files. If you have made changes, you are prompted to save them.

    Note: You can also click the (close) icon in the upper-right of the text editor window to close the policy. When you close a modified policy file without saving changes, the policy name in the left-hand navigation panel is italicized. Later, you can click the Save All button to save any changes you have made to that policy.

  8. To delete a policy, click the Delete button in the Policy panel and confirm your request.

  9. To discard you changes, right-click the policy name and choose the Revert option from the context menu. You are prompted to confirm your request to revert the changes to the selected file.

Note: See Edit Panel Commands for more information about editing the policy in the text editor.

Review the Access & Privileges by User Report

The Access & Privileges by User report identifies the hosts where the selected user can login, the commands that user can run on each host, as well as the "runas aliases" information for that user.

To create the Access & Privileges by User report

  1. From the mangement console, navigate to Reporting.
  2. From the Reports view, double-click the Access and Privileges by User report name.

    The report opens a new Access & Privileges by User tab on the Reporting view.

  3. Choose the type of user to include in the report: a local user or Active Directory user.
  4. Click Browse to select the user name.
  5. Select the Show detailed report option.
  6. Open the Export drop-down menu and select the format you want to use for the report: PDF or CVS.

    It launches a new browser or application page and displays the report in the selected format.

Note: When generating multiple reports simultaneously or generating a single report that contains a large amount of data, One Identity recommends that you increase the JVM memory. (See JVM Memory Tuning Suggestions for details.)

Review the Access & Privileges by Host Report

The Access & Privileges by Host report identifies all users with logon access to a host and the commands users can run on the host. To run this report you must have an active policy group; you can only include hosts that are joined to a policy group in the report.

To create the Access & Privileges by Host report

  1. From the mangement console, navigate to Reporting.
  2. From the Reports view, double-click the Access and Privileges by Host report name.

    The report opens a new Access & Privileges by Host tab on the Reporting view.

  3. Browse to select the host for which you want to create the report.
  4. Select the Show detailed report option.
  5. Open the Export drop-down menu and select the format you want to use for the report: PDF or CSV.

    It launches a new browser or application page and displays the report in the selected format.

Note: When generating multiple reports simultaneously or generating a single report that contains a large amount of data, One Identity recommends that you increase the JVM memory. (See JVM Memory Tuning Suggestions for details.)

Related Documents