The Schema tab provides configuration options for mapping directory attributes to the CA ITCM schema.
This tab contains the following fields:
Indicates the schema to be used. A number of predefined schema maps are provided for the most popular schema, including hard-coded maps for the WinNT and UnixL providers. Choose one from the drop-down list.
Displays tips for selecting options or entering information in fields or dialogs.
Authentication identifies members of a trusted computing base, based on the credentials provided. Add the external directories as a security authority for DSM authorization operations. CA ITCM authenticates a security object to the external directory and uses the authenticated identity or group memberships for subsequent authorization calls.
For example, if you wish to allow a Linux DSM manager to authenticate Active Directory users using LDAP, then you ensure that Active Directory is configured for the maximum security available. Use certificate services on the directory and ensure that the Linux installation trusts the certification chain provided in the directories certificate.
Creating a security profile means mapping a new one to either a user account or group provided by the current security providers. You can select the users or groups who can access the system and add them to a security profile.
Follow these steps:
The Security Profiles dialog appears.
Note: You must have sufficient access rights to open this dialog; otherwise, a security error message is displayed. Administrators have these access rights by default.
The Add Security Profiles dialog appears.
You can view the selected security authority and principal in the Container Identifier and Names fields, respectively.
The security principals shown in the Names field are added to the List of security profiles.
To add more profiles, repeat the last two steps on the Add Security Profiles dialog.
The selected user account or group is mapped to the security profile and the Class Permissions dialog is displayed.
Note: If you have added more than one security principal, the Class Permissions dialog is not displayed. You must select the profile in the Security Profiles dialog, and click Class Permissions.
Note: You can select multiple object classes and specify the class permissions for all of them. For continuous selection, press the Shift key and then click the objects; for random selection, press the Ctrl key and then click the objects.
The given permissions are assigned to the new security profile.
The Add Security Profiles dialog displays a list of available security authorities: Windows NT domains, UNIX authentication targets, external directories such as NDS and LDAP, and the X.509 certificate subsystem.
The manager stores the list of available security authorities. When running in a Windows NT domain environment, the manager node will automatically calculate all explicit domain trusts available. You can see the list of available security authorities from the Add Security Profiles dialog.
In some cases you may wish to use an implicitly trusted domain when creating security profiles - a domain that is not in the directly calculated list.
The Security Profiles dialog allows you to add and remove authorities, but only within the Windows NT name-space (winnt).
Note: Conferring trust is enforced by the operating system. You cannot add a domain and have the manager trust this domain unless the underlying operating system already trusts the domain in question.
The following example shows the results of various access rights on the Computer object class:
|
Class Access |
Resulting Permission |
|---|---|
|
View |
Displays all computers under the All Computers folder. |
|
Read |
Lets you view the properties of the computers. |
|
Manage |
Lets you deploy a software package or run a job on a computer. |
|
Change |
Lets you add a new computer or delete a computer. |
|
Full Control |
Gives you full control on the computers. |
To help ensure that the directory integration is successful, verify the directory authentication by logging into CA ITCM.
Follow these steps: on DSM Explorer
Defines the user name to log in.
Default: DN format.
Important! When you want to use UID or SN formats for authentication, configure the value of configuration policy appropriately. For more information, see Modify the Policy to Use a Different Username Format.
Specifies the security provider. As CA ITCM uses the external directories, operating system user account and groups for granting access rights, the operating system acts as the security provider. Select the appropriate security provider, and the corresponding windows domain or directory appears.
Select the domain or the computer in which you have the user account. The configured directory that can access CA ITCM appears in the drop-down list.
Logs in to the system if the login credentials are correct.
Follow these steps: on Web Console Access
Defines the user name to log in. You can use DN format.
Important! When you want to use UID or SN format for authentication, configure the value of configuration policy appropriately. For more information, see Modify the Policy to Use a Different Username Format.
Specifies the security provider. As CA ITCM uses the external directories, operating system user account and groups for granting access rights, the operating system acts as the security provider. Select the appropriate security provider, and the corresponding windows domain or directory appears.
Select the domain or the computer in which you have the user account. The configured directory that can access CA ITCM appears in the drop-down list.
Logs in to the system if the login credentials are correct.
Note: The administrator on the domain manager authenticates the user with access rights to the configured directory.
Configure the value of configuration policy only when you are not using the DN format for authentication. Use the Setting Properties dialog to modify configuration policies to suit your specific requirements and environment.
Note: Before you can modify a policy, you must unseal it.
Follow these steps:
The Setting Properties dialog opens.
Specifies the Short name for Oracle ldap.
Specifies the unique id for Oracle ldap.
The new value specifies whether the user name supplied for authentication is sn or uid.
Note: The sn must be unique for active directory-based ldap.
|
Copyright © 2013 CA.
All rights reserved.
|
|