立即与支持人员聊天
与支持团队交流

Identity Manager 8.1.4 - Administration Guide for Privileged Account Governance

Mapping a Privileged Account Management system in One Identity Manager Synchronizing a Privileged Account Management system
Setting up the initial synchronization of a One Identity Safeguard Customizing the synchronization configuration for One Identity Safeguard Executing synchronization Tasks after a synchronization Troubleshooting
Managing PAM user accounts and employees Managing the assignments of PAM user groups Provision of login information for PAM user accounts Mapping of PAM objects in One Identity Manager PAM access requests Handling of PAM objects in the Web Portal Basic data for managing a Privileged Account Management system Configuration parameters for the management of a Privileged Account Management system Default project template for One Identity Safeguard Editing One Identity Safeguard system objects Known issues about connecting One Identity Safeguard appliances About us

Basic data for managing a Privileged Account Management system

To manage a Privileged Account Management system in One Identity Manager, the following basic data is relevant.

  • Account definitions

    One Identity Manager has account definitions for automatically allocating user accounts to employees during working hours. You can create account definitions for every target system. If an employee does not yet have a user account in a target system, a new user account is created. This is done by assigning account definitions to an employee.

    For more information, see Account definitions for PAM user accounts.

  • Password policy

    One Identity Manager provides you with support for creating complex password policies, for example, for system user passwords, the employees' central password as well as passwords for individual target systems. Password polices apply not only when the user enters a password but also when random passwords are generated.

    Predefined password policies are supplied with the default installation that you can use or customize if required. You can also define your own password policies.

    For more information, see Password policies for PAM users.

  • Target system types

    Target system types are required for configuring target system comparisons. Tables containing outstanding objects are maintained on target system types.

    For more information, see Post-processing outstanding objects.

  • Server

    In order to handle Target system-specific processes in One Identity Manager, the synchronization server and its server functions must be declared.

    For more information, see Job server for PAM-specific process handling.

  • Target system managers

    A default application role exists for the target system manager in One Identity Manager. Assign employees to this application role who are permitted to edit all appliances in One Identity Manager.

    Define additional application roles if you want to limit the edit permissions for target system managers to individual appliances. The application roles must be added under the default application role.

    For more information, see Target system managers for PAM systems.

  • Owners of privileged objects

    One Identity Manager includes a standard application role for the owners of privileged objects such as PAM assets, PAM asset accounts or PAM directory accounts. The owners are included in the standard approval workflows as approvers and attestors.

    For more information, see PAM object owners.

Job server for PAM-specific process handling

In order to handle Target system-specific processes in One Identity Manager, the synchronization server and its server functions must be declared. You have several options for defining a server's functionality:

  • In the Designer, create an entry for the Job server in the Base Data | Installation | Job server category. For detailed information, see One Identity Manager Configuration Guide.

  • In the Manager, select an entry for the Job server in the Privileged Account Management | Basic configuration data | Server category and edit the Job server’s master data.

    Use this task if the Job server has already been declared in One Identity Manager and you want to configure special functions for the Job server.

Related topics

Editing PAM Job servers

To edit a Job server and its functions

  1. In the Manager, select the Privileged Account Management | Basic configuration data | Server category.

  2. Select the Job server entry in the result list.

  3. Select the Change master data task.

  4. Edit the Job server's master data.

  5. Select the Assign server functions task and specify server functionality.

  6. Save the changes.
Detailed information about this topic

General master data for Job servers

NOTE: All editing options are also available in the Designer under Base Data | Installation | Job server.

NOTE: More properties may be available depending on which modules are installed.
Table 33: Job server properties

Property

Meaning

Server Job server name.
Full server name Full server name in accordance with DNS syntax.

Example:

<Name of server>.<Fully qualified domain name>

Target system Computer account target system.
Language Language of the server.
Server is cluster Specifies whether the server maps a cluster.
Server belongs to cluster

Cluster to which the server belongs.

NOTE: The Server is cluster and Server belongs to cluster properties are mutually exclusive.
IP address (IPv6) Internet protocol version 6 (IPv6) server address.
IP address (IPv4) Internet protocol version 4 (IPv4) server address.
Copy process (source server) Permitted copying methods that can be used when this server is the source of a copy action. At present, only copy methods that support the Robocopy and rsync programs are supported.

If no method is given, the One Identity Manager Service determines the operating system of the server during runtime. Replication is then performed with the Robocopy program between servers with a Windows operating system or with the rsync program between servers with a Linux operating system. If the operating systems of the source and destination servers differ, it is important that the right copy method is applied for successful replication. A copy method is chosen that supports both servers.

Copy process (target server) Permitted copying methods that can be used when this server is the destination of a copy action.
Coding Character set coding that is used to write files to the server.
Parent Job server Name of the parent Job server.
Executing server Name of the executing server. The name of the server that exists physically and where the processes are handled.

This input is evaluated when the One Identity Manager Service is automatically updated. If the server is handling several queues, the process steps are not supplied until all the queues that are being processed on the same server have completed their automatic update.

Queue Name of the queue to handle the process steps. Each One Identity Manager Service within the network must have a unique queue identifier. The process steps are requested by the Job queue using this exact queue name. The queue identifier is entered in the One Identity Manager Service configuration file.
Server operating system Operating system of the server. This input is required to resolve the path name for replicating software profiles. The values Win32, Windows, Linux, and Unix are permitted. If no value is specified, Win32 is used.
Service account data One Identity Manager Service user account information. In order to replicate between non-trusted systems (non-trusted domains, Linux server), the One Identity Manager Service user information has to be declared for the servers in the database. This means that the service account, the service account domain, and the service account password have to be entered for the server.
One Identity Manager Service installed Specifies whether a One Identity Manager Service is installed on this server. This option is enabled by the QBM_PJobQueueLoad procedure the moment the queue is called for the first time.

The option is not automatically removed. If necessary, you can reset this option manually for servers whose queue is no longer enabled.

Stop One Identity Manager Service Specifies whether the One Identity Manager Service has stopped. If this option is set for the Job server, the One Identity Manager Service does not process any more tasks.

You can make the service start and stop with the appropriate administrative permissions in the Job Queue Info program. For more detailed information, see the One Identity Manager Process Monitoring and Troubleshooting Guide.

No automatic software update

Specifies whether to exclude the server from automatic software updating.

NOTE: Servers must be manually updated if this option is set.
Software update running Specifies whether a software update is currently running.

Last fetch time

Last time the process was collected.

Last timeout check

The time of the last check for loaded process steps with a dispatch value that exceeds the one in the Common | Jobservice | LoadedJobsTimeOut configuration parameter.

Server function Server functionality in One Identity Manager. One Identity Manager processes are handled with respect to the server function.
Related topics
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级