立即与支持人员聊天
与支持团队交流

Safeguard Authentication Services 5.1 - Administration Guide

Privileged Access Suite for Unix Introducing One Identity Safeguard Authentication Services Unix administration and configuration Identity management Migrating from NIS Managing access control Managing local file permissions Certificate Autoenrollment [[[Missing Linked File System.LinkedTitle]]] Managing Unix hosts with Group Policy
Safeguard Authentication Services Group Policy
Group Policy Concepts Unix policies One Identity policies
Display specifiers Troubleshooting Glossary

Group Account Override policy

By using Group Account Override, you can add local users to Active Directory groups. The Group Account Override policy allows administrators to append a group membership list to the list stored in Active Directory. You can also override the group name and GID (group ID) fields.

To add a group override entry

  1. Start Group Policy Editor.
  2. Navigate to the Unix Settings | Authentication Services | Identity Mapping node.
  3. Double-click Group Account Override to open the Group Account Override Properties dialog.
  4. Click the ... button next to the Windows Group box.

    The Select Group dialog displays.

  5. Enter a group name and click OK.
  6. Enter a new Unix Group Name. The group will have this name on all Unix agents linked to this policy. Leave this field blank if you do not want to override the group name.
  7. Under Members, type a user name in the User field and click Insert.

    Group Policy adds the local user name you specify to the group membership list.

  8. Click OK to return to the Group Account Override Properties dialog.
  9. Click OK to save settings and close the dialog.

Host Access Control policy

The Host Access Control policies give you fine-grained control over which users are allowed to log into the Unix host.

Safeguard Authentication Services supports host access control through the users.allow and users.deny files. Safeguard Authentication Services consults these files to determine whether or not to allow access to a particular user. This is an effective way to restrict access to sensitive computers on the network when using decentralized user accounts such as Active Directory. Group Policy defines policies for management of the access control files.

Host access control entries are "append only" and cannot be overridden. However, if there is a duplicate entry, the entry is only added once to the access control files.

Configuring a User Allow Entry policy

The Configure a User Allow Entry policy manages the Safeguard Authentication Services users.allow file. This file controls which users are allowed to log in to the host machine. If any allow rules are set, then a user must be allowed access through one of the configured allow rules or the user is denied.

To set up an allow entry

  1. Navigate to the Unix Settings | Authentication Services | Access Control | node.
  2. Double-click users.allow Configuration in the result pane to open the users.allow Configuration Properties dialog:
    • Click Browse AD to add a container. All users under the specified container are allowed to log in unless a deny rule prevents it. All other users are denied login access unless another allow rule allows it.
    • Click Add Group to add a group. All group members are allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
    • Click Add User to add a specific user. The specified user is allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
    • Click Add Domain to add a domain. All users in the domain are allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
    • Click Add Custom to add an item manually. You must specify the correct type for the item. All users associated with the specified item are allowed to log in unless a deny rule prevents it. All other users are denied log in unless another allow rule allows it.
  3. Click OK to save settings and close the dialog.

Configure a User Deny Entry policy

The Configure a User Deny Entry policy manages the Safeguard Authentication Services users.deny file. This file dictates users and groups that are explicitly denied access to the machine. Deny rules take precedence over allow rules.

To setup a users deny policy

  1. Navigate to the Unix Settings > Authentication Services > Access Control node.

  2. Double-click users.deny Configuration in the result pane to open the users.deny Configuration Properties dialog.

    • Click Browse AD to add a container. All users under this container are denied access.

    • Click Add Group to add a group. All members of the specified group are denied access.

    • Click Add User to add a specific user. The specified user is denied access.

    • Click Add Domain to add a domain. All users in the specified domain are denied access.

    • Click Add Custom to add an item manually. You must specify the correct type for the item. All users associated with the item are denied access.

  3. Click OK to save settings and close the dialog.

相关文档

The document was helpful.

选择评级

I easily found the information I needed.

选择评级