Previous Topic: RSA Authentication Manager SecurID 7 ConnectorNext Topic: How You Acquire and Manage RSA 7.1 Endpoints


Connector Specific Features

This section details your connector's specific management features, such as how to acquire and explore your endpoint. Also included are account, account template, and group information specifically for your connector.

Note: For a general overview of the Provisioning Manager and its main features, see Managing the Connectors. For more detailed information about the Provisioning Manager, see the Provisioning Guide.

RSA 6.x Connector Data Migration

You can use the RSA SecurID 7.1 migration utility, RSA7Migrate, to migrate existing RSA 6.1 account templates to the new RSA 7.1 connector data. The migration utility creates new RSA 7.1 account templates; RSA 6 templates are preserved during the migration process.

The migration utility does not migrate RSA 6.1 endpoint data because such migration requires retrieval of all accounts from an RSA 6.1 endpoint. Instead, reexplore the RSA 7.1 endpoint that contains the RSA 6.1 migrated data. Or, to be precise, perform subtree exploration only on an RSA 7.1 security domain where you migrated the RSA 6.1 data.

RSA only supports data migration from RSA Authentication Manager 6.1. As a result, the RSA7Migrate utility only supports the migration of RSA 6.1 endpoint data. The utility cannot differentiate between acquired RSA 5.x, 6.0 and 6.1 endpoints.

Important! Verify that all relevant RSA data has been successfully migrated before running the RSA7Migrate utility,

RSA7Migrate Command

Valid on Windows and Solaris

Use the RSA7Migrate command to migrate existing RSA 6.1 account templates to the new RSA 7.1 connector data, or migrates tokens from RSA 6.1 endpoints to RSA 7.1 endpoints.

This command has the following format:

(Windows and UNIX) RSA7Migrate [-tokens]

-tokens

(Optional) Migrates tokens from RSA 6.1 endpoints to RSA 7.1 endpoints and populates the CA Identity Manager Provisioning Directory with RSA 7.1 tokens.

RSA7Migrate Processing Modes

When you run the RSA7Migrate utility to migrate account templates, you are prompted to run the utility in one of the following modes:

Migration Utility Prerequisites

Before you run the RSA7Migrate utility, do the following:

You are required to supply the following information during the migration process:

What the Migration Utility Does

The migration utility does the following:

Account Template Migration Limitations

Account template migration limits are mostly related to RSA6 templates associated with more than one namespace. Observe the following limitations during account template migration.

All namespaces associated with the same template must:

If any of the objects described previously have different names (or DNs) in different namespaces, such namespaces must have a separate set of templates. If necessary, run the migration utility several times to create the templates correctly.

Migrate RSA 6.1 Account Templates to RSA 7.1 Connector Data

To migrate RSA 6.1 account templates to the RSA 7.1 connector data, run the RSA7Migrate utility.

To migrate RSA 6.1 account templates to the RSA 7.1 connector data

  1. Verify that the Provisioning Server is running.

    Note: The Provisioning server must be running when you migrate templates.

  2. Open a command prompt window and navigate to the \bin directory where you installed the Connector Server.
  3. Enter the following command:
    RSA7Migrate
    

    The RSA7Migrate utility starts and prompts you for the Provisioning Server connection details.

  4. Enter the information requested.

    The RSA7Migrate utility creates an RSA7 template and associates it with the RSA 7.1 namespace.

What the Token Migration Utility Does

The token migration utility does the following:

Token Migration Prerequisites

Before you run the RSA7Migrate token migration utility, do the following:

You are required to supply the following information during the migration process:

Migrate Tokens

To migrate tokens to populate the CA Identity Manager Provisioning Directory with RSA 7.1 tokens, run the RSA7Migrate utility with the -token command-line parameter.

To migrate tokens

  1. Stop the CA Identity Manager Provisioning Server.
  2. Open a command prompt window and navigate to one of the following directories where you installed the Connector Server.
  3. Enter the following command:
    RSA7Migrate -tokens
    

    The RSA7Migrate utility starts and prompts you for the Provisioning Server connection details.

  4. Enter the information requested.

    The migration utility writes the RSA 7 token object into the provided security domain in the RSA 7 explored data for each token.

  5. Start the CA Identity Manager Provisioning Server.
Local and Remote User Support

The RSA SecurID 7.1 Connector supports both remote users and local users, through the one account object class. Remote users are users that exist in other realms but to whom you want to grant certain rights within the current realm. Local users and remote users (also known as trusted users) can have the same login names within one security domain.

The different account types are distinguished by appending a suffix to the associated RSA user ID and using the percent sign as delimiter. For example, " % ".

Note: There is a space before and after the delimiter.

Remote users have special LDAP names with the following format:

Remote_username< delimiter >Realm_name

An example of a remote user name is UserName01% CA

Using a delimiter to distinguish local and remote users has implications on global user correlation and the use of account templates. During correlation, the delimiter becomes part of the global user name. However global users with the delimiter as part of their name cannot be used to create endpoint users using account templates as the delimiter is treated as a special character.

To allow for some alternatives for correlation, you can use the following hidden attributes:

More information:

Create a Trusted User

Windows Password Integration

If Windows password integration enabled in RSA, the RSA server caches the Windows password of each user in the security domain. When a user logs in, they are only required to enter their RSA passcode.

When you select the Clear cached copy of Windows credentials check box on the General 1 Tab (User Account Dialog) or General 1 Tab (Account Template Dialog), the connector removes the user's Windows credentials from the cache. The next time the user logs in, the user is prompted for their Windows password in addition to their RSA passcode.

The check box does not show the status of the cache, or whether the check box has been set on a prior transaction.

Date and Time Considerations

All dates and times that the RSA SecurID 7.1 Connector receives should be in UTC. All dates and time values that specify time zone information other that +00:00, -00:00 or Z, are invalid and any date or time values received without time zone information are treated as UTC.

In Account screens, values are in Provisioning Manager local time. The Provisioning Manager converts these values to UTC then passes them to endpoint. The endpoint then converts the values to the time zone it is in. For example, if the Provisioning Manager is in Perth (UTC + 8) and the endpoint is in Melbourne (UTC + 10), to set an endpoint-based time of Sept 1, 2009 10 am, set the value in the Provisioning Manager to September 1, 2009 8 am. (Provisioning Manager local time).

In Account template screens, although you can enter any value, the valid values are:

Group Access Times

The RSA7.1 endpoint stores group access times as UTC but displays them using the RSA7 Server local time. To make it easier for group administrators to set the access times relevant to other time zones, the RSA Security Console provides the ability to select a time zone and displays the group access times relevant to the select time zone. However, the selected time zone is not stored. Each time the page is displayed the time zone control defaults to the RSA server local time.

Due to limitations in the RSA API, the RSA SecurID 7.1 Connector cannot return the RSA server local time. To resolve this limitation, a time zone attribute has been added to the RSA7.1 endpoint dialog, General 1 tab. You can use this attribute to specify the time zone to use for group access times. This attribute defaults to UTC. All times displayed or entered for group access are assumed to be for this time zone.

This solution is also applicable to time zones specified for trusted user groups.

Multi-value Assignment Dialogs

The multi-value assignment dialogs let you search for a specific object in a selected system domain, then assign those values to a specific object. For example, you can search all administrative roles in a specific system domain, then assign the administrative roles to a user account.

The multi-assignment dialog contains the following fields:

Available List Search

Displays the containers in the namespace you can search.

Class

Specifies the object class you want to search.

Classes that use the attribute displayed in the Attribute list are displayed in the list.

Attribute

Specifies the attribute you want to search for.

Value

Specifies the value you want to restrict the search to.

Default: Wildcard character (*). The wildcard causes the search to return all entries.

Note: If you perform an advanced search for an attribute, this field is not available.

Search one level only

Restricts the search to only the level selected in the Available List Search.

Advanced

Displays the Advanced Search Attributes dialog. Use this dialog to set more advanced search criteria.

Note: Specifying advanced search criteria is useful if you want to narrow the list of objects in the class.

Assign Multivalues to an Object

To assign multiple values to an RSA object, search for the object you want to assign then select the values you want assign to the RSA object.

To assign multivalues to an object

  1. On the multivalue assignment dialog, select a class from the class list.

    Selecting a class list specifies the object class you want to search. Classes that use the attribute displayed in the Attribute list appear in the list.

  2. In the Attribute list, select an attribute.

    Selecting an attribute specifies the attribute you want to search for.

  3. Type a value in the Value field.

    The value that you want to restrict the search is specified.

    Note: The default is the wildcard character (*). The wildcard causes the search to return all entries.

    Note: If you perform an advanced search for an attribute, this field is not available.

  4. Select the Search one level only check box.

    Selecting the check box restricts the search to only the level selected in the Available List Search tree.

  5. Click Advanced.

    The Advanced Search Attributes dialog appears.

  6. If necessary, specify more advanced search criteria.

    Note: Specifying advanced search criteria is useful if you want to narrow the list of objects in the class.

  7. Click Search.

    The objects you can assign appear in the Available list.

  8. Select the objects you want to assign, then move the objects to the Assigned list, then click OK.

    You have assigned the objects to the RSA object you are working with.