This section details your connector's specific management features, such as how to acquire and explore your endpoint. Also included are account, provisioning roles, account template, and group information specifically for your connector.
You must acquire the RSA ACE server before you can administer it with CA Identity Manager.
To acquire an RSA ACE server using the User Console
Use the Create RSA Endpoint page to register an RSA ACE server. During the registration process, CA Identity Manager identifies the RSA ACE server you want to administer and gathers information about it.
You are now ready to explore and Correlate the endpoint.
The Exploration process finds all RSA accounts and groups. You can correlate the accounts with global users at this time or you can correlate them later.
Click Select Container/Endpoint/Explore Method to click an RSA endpoint to explore.
You may prefer to schedule the task to execute overnight to interfere less with routine access of the system.
Note: This operation requires the client browser to be in the same time zone as the server. For example, if the client time is 10:00 PM on Tuesday when the server time is 7:00 AM, the Explore and Correlate definition will not work.
To use an explore and correlate definition
The user accounts that exist on the endpoint are created or updated in CA Identity Manager based on the explore and correlate definition you created.
You must acquire the RSA ACE/Server machine before you can administer it with CA Identity Manager. When acquiring an RSA ACE/Server machine, perform the following steps.
From the Endpoint type task view
Use the RSA ACE (SecurID) Endpoint property sheet to register an RSA ACE/Server machine. During the registration process, CA Identity Manager identifies the RSA ACE/Server machine you want to administer and gathers information about it.
After registering the machine in CA Identity Manager, you can explore its contents. Use the Explore and Correlate Endpoint dialog. The Exploration process finds all RSA ACE (SecurID) objects. You can correlate the accounts with global users at this time or you can correlate them later.
When you correlate accounts, CA Identity Manager creates or links the accounts on an endpoint with global users, as follows:
RSA Endpoint Property Sheet
The RSA Endpoint Property sheet lets you register or view the properties of an RSA ACE server. From the RSA Endpoint Tab you can specify the endpoint name, host name, account template information, and the password change propagate mode.
Password Change Propagate Mode
The password change propagate mode on the Endpoint Tab of the Endpoint Property Sheet, specifies the way that the Password and PIN changes are handled during a change event. The following scenarios are possible:
Note: For 4, if the user does not have any tokens assigned to them, the request to modify the eTPassword attribute is treated as a request to assign the password to the user using the value provided in the eTPassword attribute.
Note: For 3 and 4, if the user has more than one token assigned, the PIN reset applies to ALL of the tokens that are in possession of the user. The PIN associated with each assigned token is changed to the value provided in the eTPassword attribute.
The RSA DefaultPolicy, provided with the RSA ACE (SecurID) connector, gives a user the minimum security level needed to access an endpoint. You can use it as a model to create new account templates.
Note: You can create RSA account templates that are associated with multiple endpoints. These account templates can only be used to grant privileges to existing accounts.
You can create and maintain RSA ACE (SecurID) groups using the Endpoint type task view. Use the RSA Group property sheet when managing your groups.
|
Copyright © 2014 CA.
All rights reserved.
|
|