立即与支持人员聊天
与支持团队交流

Identity Manager 9.2 - Administration Guide for Connecting Unix-Based Target Systems

Managing Unix-based systems Synchronizing Unix-based target systems Managing Unix user accounts and identities Managing memberships in Unix groups Login credentials for Unix user accounts Mapping Unix objects in One Identity Manager Handling of Unix objects in the Web Portal Basic data for Unix-based target systems Configuration parameters for managing Unix-based target systems Default project template for Unix-based target systems Unix connector settings

Creating and editing Unix user accounts

A user account can be linked to an identity in One Identity Manager. You can also manage user accounts separately from identities.

NOTE: It is recommended to use account definitions to set up user accounts for company identities. In this case, some of the main data described in the following is mapped through templates from identity main data.

NOTE: If identities are to obtain their user accounts through account definitions, the identities must own a central user account and obtain their IT operating data through assignment to a primary department, a primary location, or a primary cost center.

To create a user account

  1. In the Manager, select the Unix > User accounts category.

  2. Click in the result list.

  3. On the main data form, edit the main data of the user account.

  4. Save the changes.

To edit main data of a user account

  1. In the Manager, select the Unix > User accounts category.

  2. Select the user account in the result list.

  3. Select the Change main data task.

  4. Edit the user account's resource data.

  5. Save the changes.

To manually assign a user account for an identity

  1. In the Manager, select the Identities > Identities category.

  2. Select the identity in the result list.

  3. Select the Assign Unix user accounts task.

  4. Assign a user account.

  5. Save the changes.
Detailed information about this topic
Related topics

General main data of Unix user accounts

Enter the following general main data.

Table 21: Additional main data of a user account
Property Description

Host

The user account's host.

Identity

Identity that uses this user account.

  • An identity is already entered if the user account was generated by an account definition.

  • If you are using automatic identity assignment, an associated identity is found and added to the user account when you save the user account.

  • If you create the user account manually, you can select an identity in the menu.

    The menu displays activated and deactivated identities by default. If you do not want to see any deactivated identities, set the QER | Person| HideDeactivatedIdentities configuration parameter.

NOTE: If you assign a deactivated identity to a user account, it might be locked or deleted depending on the configuration.

You can create a new identity for a user account with an identity of type Organizational identity, Personalized administrator identity, Sponsored identity, Shared identity, or Service identity. To do this, click next to the input field and enter the required identity main data. Which login data is required depends on the selected identity type.

No link to an identity required

Specifies whether the user account is intentionally not assigned an identity. The option is automatically set if a user account is included in the exclusion list for automatic identity assignment or a corresponding attestation is carried out. You can set the option manually. Enable the option if the user account does not need to be linked with an identity (for example, if several identities use the user account).

If attestation approves these user accounts, these user accounts will not be submitted for attestation in the future. In the Web Portal, user accounts that are not linked to an identity can be filtered according to various criteria.

Not linked to an identity

Indicates why the No link to an identity required option is enabled for this user account. Possible values:

  • By administrator: The option was set manually by the administrator.

  • By attestation: The user account was attested.

  • By exclusion criterion: The user account is not associated with an identity due to an exclusion criterion. For example, the user account is included in the exclude list for automatic identity assignment (configuration parameter PersonExcludeList).

Account definition

Account definition through which the user account was created.

Use the account definition to automatically fill user account main data and to specify a manage level for the user account. One Identity Manager finds the IT operating data of the assigned identity and enters it in the corresponding fields in the user account.

NOTE: The account definition cannot be changed once the user account has been saved.

NOTE: Use the user account's Remove account definition task to reset the user account to Linked status. This removes the account definition from both the user account and the identity. The user account remains but is not managed by the account definition anymore. The task only removes account definitions that are directly assigned (XOrigin=1).

Manage level

Manage level of the user account. Select a manage level from the menu. You can only specify the manage level can if you have also entered an account definition. All manage levels of the selected account definition are available in the menu.

Login shell

Shell that is run if a user logs in to Unix using a terminal-based login.

User name

Name of the user account for logging in to a Unix host. If an account definition is assigned, this field is automatically filled with the identity's central user account depending on the manage level.

User ID

User ID for the user account in the Unix host.

Last login

Time of the last log in. The time is calculated taking the host time zone and the target system specific string for the login (Last login (Unix value)) into account.

Last login (Unix value)

Character string specified in the target system for logging in that is converted depending on the system in the value of the Last login property.

Password

Password for the user account. The identity’s central password can be mapped to the user account password. For more information about an identity’s central password, see One Identity Manager Identity Management Base Module Administration Guide.

If you use a random generated initial password for the user accounts, it is automatically entered when a user account is created.

The password is deleted from the database after publishing to the target system.

NOTE: One Identity Manager password policies are taken into account when a user password is being verified. Ensure that the password policy does not violate the target system's requirements.

Password confirmation

Reconfirm password.

Password last changed

Date of last password change. The date is read in from the Unix system and cannot be changed.

Primary group ID Identifier of the user account's primary group.
Primary group

Name of the user account's primary group. This defines the group ownership of files created by the user.

A user account's primary group is determined as follows:

  • If you entered a primary group in the host, the group is used as primary group when a user account is created.

  • If you did not enter a primary group, a new group is created with the display name of the new user account assigned as the primary group.

Home directory

The user's full home directory path. For example, /home/user001.

Risk index (calculated)

Maximum risk index value of all assigned groups. The property is only visible if the QER | CalculateRiskIndex configuration parameter is set. For more information, see the One Identity Manager Risk Assessment Administration Guide.

Category

Categories for the inheritance of groups by the user account. Groups can be selectively inherited by user accounts. To do this, groups and user accounts or contacts are divided into categories. Select one or more categories from the menu.

Comment (GECOS)

Text field for additional explanation. Additional information about the user account, which is found in the GECOS in /etc/password. If an account definition is assigned, this field is automatically filled with the identity's internal name depending on the manage level.

Identity type

User account's identity type Permitted values are:

  • Primary identity: Identity's default user account.

  • Organizational identity: Secondary user account used for different roles in the organization, for example for subcontracts with other functional areas.

  • Personalized administrator identity: User account with administrative permissions, used by one identity.

  • Sponsored identity: User account to use for a specific purpose. Training, for example.

  • Shared identity: User account with administrative permissions, used by several identities. Assign all identities that use this user account.

  • Service identity: Service account.

Groups can be inherited

Specifies whether the user account can inherit groups through the linked identity. If the option is set, the user account inherits groups through hierarchical roles, in which the identity is a member, or through IT Shop requests.

  • If you add an identity with a user account to a department, for example, and you have assigned groups to this department, the user account inherits these groups.

  • If an identity has requested group membership in the IT Shop and the request is granted approval, the identity's user account only inherits the group if the option is set.

Privileged user account

Specifies whether this is a privileged user account.

Related topics

User account main data for AIX systems

You can enter additional main data of user accounts in an IBM AIX system, like limits, password data, security data or information about encrypting the file system. This data is shown if the host is labeled with the AIX system option.

Detailed information about this topic

Limits for user accounts

Enter the following limits for resources of the user's processes in an AIX system. This data is mapped in /etc/security/limits.

Table 22: Limits for user accounts in an AIX system

Property

Description

Core size (soft)

Soft limit for the size of the core dump file that can be created by a user process. (Parameter core).

Core size (hart)

Absolute maximum limit for the size of the core dump file that can be created by a user process. (Parameter core_hard).

CPU time (soft)

Soft limit for the time (in seconds) a user process may take. (Parameter cpu).

CPU time (hard)

Maximum amount of time (in seconds) the user process may take. (Parameter cpu_hard).

Data size (soft)

Soft limit for the size of the process' data segment for a user process. (Parameter data).

Data size (hard)

Maximum size of a process' data segment for a user process. (Parameter data_hard).

File size (soft)

Soft limit for the size of a file a user process can create or extend. (Parameter fsize).

File size (hard)

Absolute maximum size of a file a user process can create or extend. (Parameter fsize_hard).

Memory size (soft)

Soft limit for the maximum amount of physical memory a user process can take up. (Parameter rss).

Memory size (hard)

Maximum amount of physical memory a user process can take up. (Parameter rss_hard).

Stack size (soft)

Soft limit for the size of the process' stack segment for a user process. (Parameter stack).

Stack size (hard)

Maximum size of a process' stack segment for a user process. (Parameter stack_hard).

File descriptors (soft)

Soft limit for the number of file descriptors a user process can have open at the same time. (Parameter nofiles).

File descriptors (hard)

Absolute maximum number of file descriptors a user process can have open at the same time. (Parameter nofiles_hard).

Threads (soft)

Soft limit for the number of threads per process. (Parameter threads).

Threads (hard)

Absolute maximum number of threads per process. (Parameter threads_hard).

Processes (soft)

Soft limit for the number of processes per user. (Parameter nproc).

Processes (hard)

Absolute maximum for the number of processes per user. (Parameter nproc_hard).

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级