This section details your connector's specific management features, such as how to acquire and explore your endpoint. Also included are account, provisioning roles, account template, and group information specifically for your connector.
You must acquire the CA Single Sign-On server before you can administer it with CA Identity Manager. When acquiring an CA Single Sign-On server, perform the following steps from the Endpoint Type task view:
Use the PLS Endpoint property sheet to register an CA Single Sign-On server. During the registration process, CA Identity Manager identifies the CA Single Sign-On server you want to administer and gathers information about it.
Note: Ping the node name from the Provisioning Server. If the ping is successful, then you know that CA Identity Manager will find the PLS node.
After registering the server in CA Identity Manager, you can explore its contents. Use the Explore and Correlate Endpoint dialog. The Exploration process finds all accounts and groups in the SSO server.. You can correlate the accounts with global users at this time or you can correlate them later.
When you correlate accounts, CA Identity Manager creates or links the accounts on an endpoint with global users, as follows:
In addition to defining privileges for users, you can also set login information for applications associated with account templates. Once this information is set, users have access to the applications if they provide the correct login information.
The PLS Default Policy, provided with the CA SSO Connector for Advanced Policy Server, gives a user the minimum security level needed to access an endpoint. You can use it as a model to create new account templates.
You can view certain basic properties of an application on the PLS Application property sheet. You are not allowed to add, delete, or modify an application.
You can view certain basic properties of an application group on the PLS Application Group property sheet. You are not allowed to add, delete, or modify an application group.
You can assign accounts and groups to access the current terminal objects. Use the PLS Terminal property sheet to set the profile, day/time restrictions, and account and group access to terminals.
You can assign accounts and groups to access the current authorization host objects. Use the PLS Authhost property sheet to set the profile, and account and group access to authorization hosts.
|
Copyright © 2014 CA.
All rights reserved.
|
|