Identity Console Administration Guide

Identity Console Administration Guide

Identity Console Administration Guide May 2021 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy, and FIPS compliance, see https://www.netiq.com/company/legal/. Copyright © 2019 NetIQ Corporation. All Rights Reserved. Contents About this Book and the Library 9 About NetIQ Corporation 11 1 What Is Identity Console? 13 Features of Identity Console . 13 2 How to Access Identity Console? 15 Accessing Identity Console. 15 3 Navigating the Identity Console Interface 17 Part I Managing eDirectory Using Identity Console 21 4 Performing Searches 23 5 Managing Users 25 Creating a User. 25 Deleting a User . 26 Modifying Users . 27 Searching for a User . 27 Setting Password Restrictions . 28 Disabling and Enabling a User Account . 29 Setting the Account Expiration Date . 29 Checking and Clearing the Intruder Lockout. 30 6 Managing Groups 33 Creating a Group . 33 Deleting Groups . 34 Modifying Groups . 35 Adding or Modifying Group Members . 35 Searching for Groups . 36 7 Managing Objects 39 Creating an Object . 39 Deleting Objects . 40 Modifying Objects . 40 Searching for an Object . 41 Moving an Object . 42 Renaming an Object . 42 Contents 3 8 Managing Rights 45 Modifying the Inherited Rights Filter . 45 Modifying the Trustee Rights . 46 Viewing the Effective Rights . 47 9 Tree View 49 Tree View Navigation Frame. 49 Tree View Content Frame . 49 10 Managing Schema 53 Creating an Attribute . 53 Creating a Class . 54 Assigning Attributes to a Class . 55 Viewing Attribute Information . 55 Deleting an Attribute . 56 Deleting a Class . 57 Extending an Object . 58 11 Managing Audit Events 61 Configuring CEF Audit Events . 61 Understanding the CEF Event Types . 62 Configuring the CEF Audit Filtering. 64 Filtering eDirectory Events With Exclusion Filter . 65 Filtering CEF Object Events. 65 Filtering CEF Attribute Events . 65 12 Managing Encrypted Attributes 67 Creating a Policy for Encrypted Attributes . 67 Deleting an Encrypted Attributes Policy . 68 Modifying an Encrypted Attributes Policy . 68 13 Managing Encrypted Replication 71 Enabling Encrypted Replication for Partitions. 71 14 Managing Partitions and Replicas 73 Creating Partition . 73 Merge Partitions . 74 Modifying Partitions. 74 Moving a Partition . 75 15 Managing Indexes 77 Creating Index. 77 Deleting an Index . 78 Copying an Index . 79 Changing State of an Index . 80 4 Contents 16 Configuring LDAP Objects 81 Creating LDAP Objects. ..

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    182 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us