RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux

Similar documents
RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux

RSA Identity Governance and Lifecycle Connector Data Sheet for IBM Tivoli Identity Manager 5.1

RSA Identity Governance and Lifecycle Connector Data Sheet for OpenLDAP

RSA Identity Governance and Lifecycle Connector Data Sheet for Oracle Internet Directory

RSA Identity Governance and Lifecycle Data Sheet for IBM Tivoli Directory Server Connector

RSA Identity Governance and Lifecycle Collector Data Sheet for Zendesk

RSA Archer GRC Application Guide

RSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database

RSA Identity Governance and Lifecycle Connector Data Sheet for SQL Server

RSA Identity Governance and Lifecycle Collector Data Sheet For Open LDAP

RSA Identity Governance and Lifecycle Collector Data Sheet for IBM Notes

RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server

RSA Via L&G Collector Data Sheet for Office365

Lieberman Software Rapid Enterprise Defense Identity Management Application Guide

Dell EMC Ready System for VDI on XC Series

RSA Identity Governance and Lifecycle Microsoft Exchange Connector Application Guide. Microsoft Exchange Connector Application Guide

RSA NetWitness Logs. ManageEngine NetFlow Analyzer. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

Lab 2A> ADDING USERS in Linux

RSA Identity Governance and Lifecycle Collector Data Sheet for Workday

SailPoint IdentityIQ 6.4

Dell EMC Ready Architectures for VDI

Dell EMC Ready System for VDI on VxRail

RSA Identity Governance and Lifecycle Generic SOAP Web Service Connector Application Guide. Generic SOAP Web Service Connector Application Guide

Changing default password of root user for idrac9 by using Dell EMC License Manager

OneGate Linux Client. Release Notes. Version Thinspace Technology Ltd Published: 03 JULY Updated:

MIS Week 10. Operating System Security. Unix/Linux basics

Changing unique password of root user for idrac9 by using Dell EMC License Manager

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

DELL EMC UNITY: DR ACCESS AND TESTING. Dell EMC Unity OE 4.3

Side-by-side comparison of the features of Dell EMC idrac9 and idrac8

RSA NetWitness Logs SQUID. Event Source Log Configuration Guide. Last Modified: Thursday, October 12, 2017

DELL EMC UNITY: DR ACCESS AND TESTING. Dell EMC Unity OE 4.5

MANAGING THE NONUNIFORM BEHAVIOUR OF TERMINALS AND KEYBOARDS. : WHEN THINGS GO WRONG

Dell EMC Ready Solution for VMware vcloud NFV 3.0 OpenStack Edition Platform

RSA NetWitness Logs. GlobalSCAPE Enhanced File Transfer (EFT) Server. Event Source Log Configuration Guide. Last Modified: Thursday, May 25, 2017

Siemens PLM Software. HEEDS MDO Setting up a Windows-to- Linux Compute Resource.

Jackson State University Department of Computer Science CSC / Computer Security Fall 2013 Instructor: Dr. Natarajan Meghanathan

RSA NetWitness Logs. EMC Ionix Unified Infrastructure Manager. Event Source Log Configuration Guide

Installing and Patching Oracle

Downloading and installing Db2 Developer Community Edition on Red Hat Enterprise Linux Roger E. Sanders Yujing Ke Published on October 24, 2018

Dell EMC vsan Ready Nodes for VDI

CST8207: GNU/Linux Operating Systems I Lab Seven Linux User and Group Management. Linux User and Group Management

Dell EMC Ready Architectures for VDI

BIG-IP Virtual Edition and Cloud-Init. Version 13.0

Handling the Firmware Update Dependency by using Lifecycle Controller in the 14th generation Dell EMC PowerEdge servers

RSA Via L&G Collector Data Sheet for Oracle Identity Manager (OIM) Version (Release 1)

Barracuda Networks SSL VPN

RSA NetWitness Logs. EMC Isilon. Event Source Log Configuration Guide. Last Modified: Tuesday, October 31, 2017

RSA NetWitness Logs. EMC Data Domain. Event Source Log Configuration Guide

Simplifying Blade Server Update with Dell Repository Manager

RSA NetWitness Logs. IBM Tivoli Identity Manager. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

RSA NetWitness Logs. Oracle Directory Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 29, 2017

RSA NetWitness Logs. Symantec DLP Last Modified: Thursday, April 12, Event Source Log Configuration Guide

10 userdel: deleting a user account 9. 1 Context Tune the user environment and system environment variables [3]

Project #3: Implementing NIS

OpenSSL Software Foundation, Inc.

Dell Storage Compellent Integration Tools for VMware

Dell FluidFS 6.0 FS8600 Appliance CLI Reference Guide

MITEL PERFORMANCE ANALYTICS

Configuring SAP Targets and Runtime Users

Application Layer Capture and Assignment

RSA NetWitness Logs. Microsoft Network Access Protection. Event Source Log Configuration Guide. Last Modified: Thursday, May 18, 2017

ECDS MDE 100XVB Installation Guide on ISR G2 UCS-E and VMWare vsphere Hypervisor (ESXi)

Adobe Marketing Cloud Using FTP and sftp with the Adobe Marketing Cloud

Downloading and installing Db2 Developer Community Edition on Ubuntu Linux Roger E. Sanders Yujing Ke Published on October 24, 2018

RSA NetWitness Logs IBM DB2. Event Source Log Configuration Guide. Last Modified: Friday, November 17, 2017

Dell Storage Integration Tools for VMware

ENIGMA functional processing script

Installing SeisComP3

Using RDP with Azure Linux Virtual Machines

RSA NetWitness Logs. McAfee Data Loss Prevention Endpoint. Event Source Log Configuration Guide. Last Modified: Thursday, May 25, 2017

RSA NetWitness Logs. Tripwire Enterprise. Event Source Log Configuration Guide. Last Modified: Friday, November 3, 2017

Dell Storage Compellent Integration Tools for VMware

TechDirect User's Guide for ProSupport Plus Reporting

One Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems

Console Redirection on VMware ESX Server Software and Dell PowerEdge Servers

Dell EMC Repository Manager Version 3.1. User s Guide

Chapter 5: User Management. Chapter 5 User Management

RSA NetWitness Logs. Oracle Audit Vault and Database Firewall. Event Source Log Configuration Guide

AltaVault Cloud Integrated Storage Installation and Service Guide for Virtual Appliances

RSA NetWitness Platform

Red Hat Ceph Storage 3

TCPWave DDI Virtual Machine Installation Guide

NovTech User Guide Chameleon96

Linux Essentials Objectives Topics:

RSA NetWitness Logs. Citrix XenApp. Event Source Log Configuration Guide

Lab Authentication, Authorization, and Accounting

Redhat Basic. Need. Your. What. Operation G U I D E. Technical Hand Note template version

RSA NetWitness Logs. Microsoft Network Policy Server. Event Source Log Configuration Guide. Last Modified: Thursday, June 08, 2017

Oracle Exadata Healthchecks Plug-in Contents

EMC Ionix Network Configuration Manager Version 4.1.1

Product Version 1.1 Document Version 1.0-A

SSH Extension and Terminal Widget User Guide. Version 1.0

Migration from Dell Lifecycle Controller Integration Version 3.3 for Microsoft System Center Configuration Manager to OpenManage Integration Version

CST Lab 2 Review #1

Backup and Restore of the vcenter Server using the Avamar VMware Image Protection Solution

User Accounts. The Passwd, Group, and Shadow Files

Dell Provisioning for VMware Workspace ONE. VMware Workspace ONE UEM 1902

TechDirect User's Guide for ProSupport Plus Reporting

Red Hat Ceph Storage 3

Transcription:

RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux Version 1.1 October 2017 1

Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 5 Configuration... 5 General... 5 Settings... 6 Capabilities... 6 Command... 6 Create an account... 7 Update an account... 8 Reset account s password... 10 Add an account to a group... 11 Remove an account from a group... 12 Enable an account... 14 Disable an account... 15 Create a group... 16 Delete a group... 17 RSA Identity Governance and Lifecycle 2

Revision History Revision Number Version 1.0 Version 1.1 Ubuntu Linux and added instructions for configuring the RSA Identity Governance and Lifecycle Ubuntu Linux Connector. Updated document with minimum version support. RSA Identity Governance and Lifecycle 3

Purpose This data sheet provides the configuration information required to create a new Ubuntu Linux Connector. Supported Software RSA Identity Management and Governance 6.9.1 and later RSA Via Lifecycle and Governance 7.0.0 and later RSA Identity Governance and Lifecycle 7.0.1 and later. Application: Ubuntu Linux 13.04 Prerequisites SSH (sshd) server should be running on the host Ubuntu Linux machine. te: By default this server is up and running on Linux machine. RSA Identity Governance and Lifecycle 4

Configuration The Connector creation is made up of three sections: General General details about the Connector; such as the name, type etc. Settings The connection settings required to connect the RSA-IMG and the End-point Application in consideration. Capabilities These are the list of verbs or capabilities that the RSA-IMG Connector supports; such as Create, Update, Delete, etc. General The following table helps you with the Parameters asked on the General screen while creating the Connector. Name Ubuntu Linux Connector Ubuntu Linux Connector Server AFX Server Connector Template Linux State Test Export As Template N/A te: When you are satisfied your connector is configured properly change the state to Active. automated provisioning will occur while in the Test state. It is recommended that you test all enabled commands using the Test Connector Settings and Test Connector Capabilities prior to changing to the Active state. RSA Identity Governance and Lifecycle 5

Settings The following table helps you with the Parameters asked on the Settings screen while creating the Connector. Host <Hostname or an IP address of the Linux machine>(e.g. m/c name mymachine or localhost or IP like 192.30.30.124) Port <SSH Port Number to the Linux machine>(e.g. 22) Timeout (milliseconds) <Connection timeout(milliseconds)> (Default 5000) Login Name Login name for the Linux machine Password Password to login to the Linux machine Capabilities The following table(s) helps you with the Parameters asked when enabling the commands (verbs) on the Capabilities screen; while creating the Connector. Following commands are supported by Linux Ubuntu AFX adapter: Command Create an account Update an account Reset account s password Add an account to a group Remove an account from a group Enable an account Disable an account Create a group Delete a group Command Input Parameters 1. Create an account RSA Identity Governance and Lifecycle 6

While defining the Create an Account verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Account Default Account Name ${Account.Name} <Name of the account> Password Default Password RSA Identity Governance and Lifecycle 7

${AccountTemplate.Password} <Password for account to be created> Command Code Shell Command useradd ${Account} -p `perl -e 'print crypt('${password}','salt')'` 2>&1 te : Password containing ` or $ will work only if \ is appended before it. e.g To use Abc$%^ as password, add it as Abc\$%^. 2. Update an account While defining the Update an Account verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Command Input Parameters Account Default Account Name RSA Identity Governance and Lifecycle 8

${Account.Name} <Name of the account> Home Default Home Directory <Home directory> Shell Default RSA Identity Governance and Lifecycle 9

Login Shell <Login Shell> Command Code Shell Command usermod -d ${Home} -s ${Shell} ${Account} 2>&1 3. Reset account s password While defining the Reset an Account s password verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Command Input Parameters Account Default Account Name ${Account.Name} RSA Identity Governance and Lifecycle 10

<Name of the account> Password Default Password <Initial password to reset to> Command Code Shell Command echo -e '${Password}\n${Password}' passwd ${Account} 2>&1 4. Add an account to a group While defining the Add an Account to group verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Command Input Parameters RSA Identity Governance and Lifecycle 11

Account Default Account Name ${Account.Name} <Name of the account> Command Code Shell Command gpasswd -a ${Account} ${Group} 2>&1 5. Remove an account from a group While defining the Remove an Account from group verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Command Input Parameters RSA Identity Governance and Lifecycle 12

Account Default Account Name ${Account.Name} <Name of the account> Group Default Group Name ${Group.Name} <Name of the group> RSA Identity Governance and Lifecycle 13

Command Code Shell Command gpasswd -d ${Account} ${Group} 2>&1 6. Enable an account While defining the Enable an Account verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Command Input Parameters Account Default Account Name ${Account.Name} <Name of the account> Command Code RSA Identity Governance and Lifecycle 14

Shell Command passwd -u ${Account} 2>&1 7. Disable an account While defining the Disable an Account verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Command Input Parameters Account Default Account Name ${Account.Name} <Name of the account> Command Code Shell Command passwd -l ${Account} 2>&1 RSA Identity Governance and Lifecycle 15

8. Create a group While defining the Create a Group verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. Command Input Parameters Group Default Group Name ${Group.Name} <Name of the group> Command Code Shell Command groupadd ${Group} 2>&1 9. Delete a group While defining the delete a Group verb, certain parameters need to be defined. The following tables will help you define these parameters. Each table is dedicated to one parameter. RSA Identity Governance and Lifecycle 16

Command Input Parameters Group Default Group Name ${Group.Name} <Name of the group> Command Code Shell Command groupdel ${Group} 2>&1 RSA Identity Governance and Lifecycle 17

Copyrights Copyright 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Trademarks Dell, RSA, the RSA Logo, EMC and other trademarks, are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. For a list of RSA trademarks, go to www.emc.com/legal/emc-corporation-trademarks.htm#rsa. RSA Identity Governance and Lifecycle 18