立即与支持人员聊天
与支持团队交流

Identity Manager 9.2.1 - Administration Guide for Privileged Account Governance

About this guide Managing a Privileged Account Management system in One Identity Manager Synchronizing a Privileged Account Management system
Setting up the initial synchronization of a One Identity Safeguard Customizing the synchronization configuration for One Identity Safeguard Running synchronization Tasks following synchronization Troubleshooting Ignoring data error in synchronization Pausing handling of target system specific processes (Offline mode)
Managing PAM user accounts and identities Managing assignments of PAM user groups Login credentials for PAM user accounts Mapping PAM objects in One Identity Manager
PAM appliances PAM user accounts PAM user groups PAM assets PAM asset groups PAM asset accounts PAM directory accounts PAM account groups PAM directories PAM partitions PAM entitlements PAM access request policies Reports about PAM objects
PAM access requests Handling of PAM objects in the Web Portal Basic data for managing a Privileged Account Management system Configuration parameters for managing a Privileged Account Management system Default project template for One Identity Safeguard Editing One Identity Safeguard system objects One Identity Safeguard connector settings Known issues about connecting One Identity Safeguard appliances

Editing search criteria for automatic identity assignment

NOTE: One Identity Manager supplies a default mapping for identity assignment. Only carry out the following steps when you want to customize the default mapping.

The criteria for identity assignments are defined for the appliance. You specify which user account properties must match the identity’s properties such that the identity can be assigned to the user account. You can limit search criteria further by using format definitions.

The search criterion is written in XML notation to the Search criteria for automatic identity assignment column (AccountToPersonMatchingRule) in the PAGUser table.

Search criteria are evaluated when identities are automatically assigned to user accounts. Furthermore, you can create a suggestion list for assignments of identities to user accounts based on the search criteria and make the assignment directly.

NOTE: Object definitions for user accounts that can have search criteria applied to them are predefined. For example, if you require other objects definitions that limit a preselection of user accounts, set up the respective custom object definitions in the Designer. For more information, see the One Identity Manager Configuration Guide.

To specify criteria for identity assignment

  1. In the Manager, select the Privileged Account Management > Appliances category.
  2. Select the appliance in the result list.
  3. Select the Define search criteria for identity assignment task.
  4. Specify which user account properties must match with which identity so that the identity is linked to the user account.
    Table 9: Standard search criteria for user accounts

    Apply to

    Column for identity

    Column for user account

    PAM user accounts (local users)

    Central user account (CentralAccount) User name (UserName)
  5. Save the changes.

For more information about defining search criteria, see the One Identity Manager Target System Base Module Administration Guide.

Related topics

Finding identities and directly assigning them to user accounts

Based on the search criteria, you can create a suggestion list for the assignment of identities to user accounts and make the assignment directly. User accounts are grouped in different views for this.

  • Suggested assignments: This view lists all user accounts to which One Identity Manager can assign an identity. All identities are shown that were found using the search criteria and can be assigned.

  • Assigned user accounts: This view lists all user accounts to which an identity is assigned.

  • No identity assignment: This view lists all user accounts to which no identity is assigned and for which no identity was found using the search criteria.

NOTE: To display disabled user accounts or deactivated identities in the view, enable the Even locked accounts are mapped option.

If you assign a deactivated identity to a user account, it might be locked or deleted depending on the configuration.

To apply search criteria to user accounts

  1. In the Manager, select the Privileged Account Management > Appliances category.

  2. Select the appliance in the result list.

  3. Select the Define search criteria for identity assignment task.

  4. At the bottom of the form, click Reload.

    All possible assignments based on the search criteria are found in the target system for all user accounts. The three views are updated.

TIP: By double-clicking on an entry in the view, you can view the user account and identity main data.

The assignment of identities to user accounts creates connected user accounts (Linked state). To create managed user accounts (Linked configured state), you can assign an account definition at the same time.

To assign identities directly to user accounts

  • Click Suggested assignments.

    1. Click the Selection box of all user accounts to which you want to assign the suggested identities. Multi-select is possible.

    2. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    3. Click Assign selected.

    4. Confirm the security prompt with Yes.

      The identities determined using the search criteria are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

    - OR -

  • Click No identity assignment.

    1. Click Select identity for the user account to which you want to assign an identity. Select an identity from the menu.

    2. Click the Selection box of all user accounts to which you want to assign the selected identities. Multi-select is possible.

    3. (Optional) Select an account definition in the Assign this account definition menu, and select a manage level in the Assign this account manage level menu.

    4. Click Assign selected.

    5. Confirm the security prompt with Yes.

      The identities displayed in the Identity column are assigned to the selected user accounts. If an account definition was selected, this is assigned to all selected user accounts.

To remove assignments

  • Click Assigned user accounts.

    1. Click the Selection box of all the user accounts with the identity assignment you want to delete. Multi-select is possible.

    2. Click Remove selected.

    3. Confirm the security prompt with Yes.

      The assigned identities are removed from the selected user accounts.

Changing manage levels for PAM user accounts

The default manage level is applied if you create user accounts using automatic identity assignment. You can change a user account manage level later.

To change the manage level for a user account

  1. In the Manager, select the Privileged Account Management > User accounts category.

  2. Select the user account in the result list.

  3. Select the Change main data task.

  4. Select the manage level in the Manage level list on the General tab.

  5. Save the changes.
Related topics

Assigning account definitions to linked PAM user accounts

An account definition can be subsequently assigned to user accounts with Linked status. This may be necessary, for example, if:

  • Identities and user accounts have been linked manually.

  • Automatic identity assignment is configured, but when a user account is inserted, no account definition is assigned in the appliance.

To manage user accounts through account definitions

  1. Create an account definition.

  2. Assign an account definition to the appliance.

  3. Assign a user account in the Linked state to the account definition. The account definition's default manage level is applied to the user account.

    1. In the Manager, select the Privileged Account Management > User accounts > Linked but not configured > <appliance> category.

    2. Select the Assign account definition to linked accounts task.

    3. In the Account definition menu, select the account definition.

    4. Select the user accounts that contain the account definition.

    5. Save the changes.

Detailed information about this topic
相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级