User Directory Accounts
Axidian Privilege interacts with end users through a service account that reads directory users and their attributes.
Account to Use with User Directory
- Active Directory
- FreeIPA
- OpenLDAP
- Run the Active Directory Users and Computers snap-in.
- Open the context menu of the organizational unit or container.
- Select Create → User item from the menu.
- Specify the user name, e.g, IPAMADReadOps.
- Fill in the required fields and complete the account creation.
- Run the FreeIPA snap-in as a user with administrator privileges.
- Create a user, for example, IPAMADReadOps.
- Open the IPA Server tab.
- From the Role-Based Access Control drop-down menu, select Permissions.
- Create a permission with the following values:
- Permission name:
pam_attr_read
. - Granted Rights:
read
,search
. - Effective attributes:
entryDn
,entryUUID
,ipaUniqueID
,ipaNTSecurityIdentifier
,memberOf
,uid
,givenName
,krbPrincipalName
,cn
,sn
,photo
(orjpegPhoto
),member
,nsOsVersion
,fqdn
,initials
,krbPasswordExpiration
.
- Permission name:
- From the Role-Based Access Control drop-down menu, select Privileges.
- Create a new privilege (e.g.
pam_privilege_read
) and add the createdpam_attr_read
permission to it. - From the Role-Based Access Control drop-down menu, select Roles.
- Create a new role (for example,
IPAMADReadOps_role
) and add the createdpam_privilege
privilege to it. - Assign the created role to the IPAMADServiceOps user in one of the following ways:
- assign a role to a user;
- assign the role to a user group and add the user to that group.
- Create a user, for example, IPAMADReadOps.
- Grant the user read permissions to the following attributes:
entryUUID
entryDn
uid
cn
osVersion
groupOfUniqueNames
uniqueMember
Account for Service Operations in Active Directory
- Active Directory
- FreeIPA
- OpenLDAP
- Run the Active Directory Users and Computers snap-in.
- Open the context menu of the organizational unit or container.
- Select Create → User item from the menu.
- Specify the user name, e.g, IPAMADServiceOps.
- Fill in the required fields and complete the account creation.
- Open the context menu of organizational unit, container or domain root.
- Select Properties.
- Open Security tab.
- Click Add.
- Select an account IPAMADServiceOps and click Ok.
- Click Advanced.
- Select an account IPAMADServiceOps and click Edit.
- Specify the value of the field Applies to to the Descendant User objects.
- In the Permissions section check the Reset password checkbox.
- Save.
- Run the FreeIPA snap-in as a user with administrator privileges.
- Create a user, for example, IPAMADServiceOps.
- Open IPA Server tab.
- From the Role-Based Access Control drop-down menu, select Permissions.
- Create a permission with the following values:
- Permission name:
pam_attr_read
. - Granted Rights:
read
,search
. - Effective attributes:
entryDn
,entryUUID
,ipaUniqueID
,ipaNTSecurityIdentifier
,memberOf
,uid
,givenName
,krbPrincipalName
,cn
,sn
,photo
(orjpegPhoto
),member
,nsOsVersion
,fqdn
,initials
,krbPasswordExpiration
.
- Permission name:
- Create another permission with the following values:
- Permission name:
pam_attr_write
. - Granted Rights:
write
. - Effective attributes:
userPassword
,krbPasswordExpiration
.
- Permission name:
- From the Role-Based Access Control drop-down menu, select Privileges.
- Create a new privilege (e.g.
pam_privilege_change_pswd
) and add the two permissionspam_attr_read
andpam_attr_write
you just created to it. - From the Role-Based Access Control drop-down menu, select Roles.
- Create a new role (for example,
IPAMADServiceOps_role
) and add the createdpam_privilege_change_pswd
privilege to it. - Assign the created role to the IPAMADServiceOps user in one of the following ways:
- assign a role to a user;
- assign the role to a user group and add the user to that group.
- Create a user, for example, IPAMADServiceOps.
- Grant the user read permissions to the following attributes:
entryUUID
entryDn
uid
cn
osVersion
groupOfUniqueNames
uniqueMember
- Grant the user write permissions for the
userPassword
attribute.