Identity Console Administration Guide
Total Page:16
File Type:pdf, Size:1020Kb
Identity Console Administration Guide May 2021 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/. Copyright © 2019 NetIQ Corporation. All Rights Reserved. Contents About this Book and the Library 9 About NetIQ Corporation 11 1 What Is Identity Console? 13 Features of Identity Console . 13 2 How to Access Identity Console? 15 Accessing Identity Console. 15 3 Navigating the Identity Console Interface 17 Part I Managing eDirectory Using Identity Console 21 4 Performing Searches 23 5 Managing Users 25 Creating a User. 25 Deleting a User . 26 Modifying Users . 27 Searching for a User . 27 Setting Password Restrictions . 28 Disabling and Enabling a User Account . 29 Setting the Account Expiration Date . 29 Checking and Clearing the Intruder Lockout. 30 6 Managing Groups 33 Creating a Group . 33 Deleting Groups . 34 Modifying Groups . 35 Adding or Modifying Group Members . 35 Searching for Groups . 36 7 Managing Objects 39 Creating an Object . 39 Deleting Objects . 40 Modifying Objects . 40 Searching for an Object . 41 Moving an Object . 42 Renaming an Object . 42 Contents 3 8 Managing Rights 45 Modifying the Inherited Rights Filter . 45 Modifying the Trustee Rights . 46 Viewing the Effective Rights . 47 9 Tree View 49 Tree View Navigation Frame. 49 Tree View Content Frame . 49 10 Managing Schema 53 Creating an Attribute . 53 Creating a Class . 54 Assigning Attributes to a Class . 55 Viewing Attribute Information . 55 Deleting an Attribute . 56 Deleting a Class . 57 Extending an Object . 58 11 Managing Audit Events 61 Configuring CEF Audit Events . 61 Understanding the CEF Event Types . 62 Configuring the CEF Audit Filtering. 64 Filtering eDirectory Events With Exclusion Filter . 65 Filtering CEF Object Events. 65 Filtering CEF Attribute Events . 65 12 Managing Encrypted Attributes 67 Creating a Policy for Encrypted Attributes . 67 Deleting an Encrypted Attributes Policy . 68 Modifying an Encrypted Attributes Policy . 68 13 Managing Encrypted Replication 71 Enabling Encrypted Replication for Partitions. 71 14 Managing Partitions and Replicas 73 Creating Partition . 73 Merge Partitions . 74 Modifying Partitions. 74 Moving a Partition . 75 15 Managing Indexes 77 Creating Index. 77 Deleting an Index . 78 Copying an Index . 79 Changing State of an Index . 80 4 Contents 16 Configuring LDAP Objects 81 Creating LDAP Objects. ..