Previous Topic: Information Stored on the UNAB EndpointNext Topic: Manage UNAB Login Authorization


How You Control Host Access and Configure UNAB

You can control users and groups access to the UNIX hosts and configure your UNAB hosts all from CA ControlMinder Enterprise Management. You control user and group access to the UNIX host by granting access to only those users and groups that are permitted to log into that host.

You configure the UNAB hosts in the same manner that you configure control access to the host. You use CA ControlMinder Enterprise Management to control the functionality of the UNAB hosts in the enterprise once and apply it to all the hosts.

After you assigned user and group login authorizations or defined the configuration token values, CA ControlMinder Enterprise Management formulates the information into a policy and does the following:

  1. CA ControlMinder Enterprise Management creates a deployment package containing the list of users and groups or the configuration parameters and assigns the package to the host or host group to which the policy applies.
  2. CA ControlMinder Enterprise Management forwards the package to the distribution server for distribution to the host.
  3. UNAB retrieves the package from the distribution server, installs the policy and sends a confirmation message back to CA ControlMinder Enterprise Management.

Note: If you deployed both an enterprise login policy and a UNAB login policy to the host, then the enterprise login policy takes precedence over the UNAB login policy.