Chat now with support
Chat with Support

Safeguard Authentication Services 5.0.3 - Administration Guide

Privileged Access Suite for Unix Introducing One Identity Safeguard Authentication Services Unix administration and configuration Identity management Migrating from NIS Managing access control Managing local file permissions Certificate Autoenrollment Integrating with other applications Managing Unix hosts with Group Policy
Safeguard Authentication Services Group Policy
Group Policy Concepts Unix policies One Identity policies
Display specifiers Troubleshooting Glossary

Client-Side Extensions policy

The Client-Side Extensions policy determines which Client-Side Extensions (CSEs) apply policy and in what order.

To determine policy processing order, check the Define this policy option in the Client-side Extensions Properties dialog. Click Add, Edit, Remove, Move Up, Move Down, or Reset to change the policy processing configuration.

For security reasons the following extensions cannot be removed from policy processing:

  • Licensing Extension
  • Safeguard Authentication Services Configuration Extension
  • Microsoft Security Extension
  • Macintosh Settings Extension

Safeguard Authentication Services policies

One goal of Group Policy is to simplify and centralize Safeguard Authentication Services configuration data. Use Safeguard Authentication Services Policies to configure everything from basic settings to advanced host access control and account override information.

Configuration policy

The Safeguard Authentication Services Configuration policy manages runtime configuration settings stored in the Safeguard Authentication Services configuration file (vas.conf) located in /etc/opt/quest/vas/.

Safeguard Authentication Services Configuration policies support non-tattooing, block inheritance, ACL filtering, and enforced settings. Policies applied later do not override enforced settings. When you unlink all Safeguard Authentication Services Configuration policies, the next GPO processing event restores the Safeguard Authentication Services configuration file to its previous state.

Mapped User policy

The Mapped User policy controls the mapping between local users and Active Directory users. The Mapped User policy is under Unix Settings | Quest Safeguard Authentication Services | Identity Mapping in the Group Policy Object Editor (GPOE). When a local user is mapped to an Active Directory user, that user specifies his local account user name but is prompted for the Active Directory password of the mapped account. The local account password is no longer used. Unix identity for the local user comes from the /etc/passwd file as usual.

The Mapped User policy allows you to manage user mappings. You can load a list of users from a file in /etc/passwd format. You can load files from the local machine or from a remote Unix host over SSH. When you specify a mapping you can browse Active Directory for a user object.

Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating