This section contains the following topics:
How to Configure Accounts with Out-of-the-Box Settings
Assign a Role to a Global User
How to Manage Referenced User Accounts
Users with access to CA User Activity Reporting Module can change their own passwords and unlock a locked user account if the configured user store is the default, the CA User Activity Reporting Module user store.
When the Administrator creates a new user account, a new password is assigned. The user changes that password during the first login session to a new password that conforms to the password policies for whether a password matching the username is permitted, minimum and maximum length, maximum number of repeating characters, and minimum number of numeric characters. It is the user's responsibility to change passwords within the frequency range specified by the password policies related to minimum and maximum password age.
Individual users administer their own accounts in the following ways:
You can unlock a locked user account regardless of your role, if permitted by the password policy. When your account becomes locked, another user must unlock it so you can have access to the privileges granted to your role.
Locks and unlocks are controlled by the following two password policies:
User accounts can become locked if the password policy is set to lock user accounts after a certain number of failed logins and the user logs in with invalid credentials a number of times that exceeds the specified threshold.
Any user can unlock the account of another user if the password policy to allow users to unlock passwords is set. You need the user's password to unlock that user account.
To unlock a user account
The user account is unlocked.
You can change your own password, regardless of your role. If the password policy for maximum password age is set, you should change your password with a frequency consistent with that policy.
Be sure to change your password as soon as possible in the following cases:
To change your password
Administrators assign roles to users based on the tasks they are to perform. You can assign users the predefined roles of Auditor, Analyst, and Administrator or to custom roles you create. To evaluate the impact of using predefined roles, review the tasks associated with each role.
Internal Auditors can perform tasks such as the following:
You can assign the low-privileged role of Auditor when you create user accounts for third-party personal. For example, when a scheduled alert runs an event/alert output process at the query level, the alert sends a URL to CA User Activity Reporting Module that is appended to the description. For the third-party personnel to be able to browse to CA User Activity Reporting Module, they need user accounts.
Note: Analysts and Administrators can perform all Auditor tasks and their role-specific tasks.
External Auditors who are given temporary access to the CA User Activity Reporting Module for the period of the site audit can verify compliance to standards in areas such as the following:
System analysts monitor the log collection network and then gather and distribute report data.
Administrators assign the Analyst role to users who are responsible for the following tasks:
A report is a graphical or tabular display of event log data that is generated by executing predefined or custom queries with filters. The data can be from hot, warm, and defrosted databases in the event log store of the selected server and, if requested, its federated servers.
An action alert is a scheduled query job, which can be used to detect policy violations, usage trends, logon patterns, and other information that can require near-term attention. Alert data can be viewed in the UI or through an RSS Feed. You can send a scheduled alert to email recipients, an SNMP trap destination, or a CA IT PAM event/alert output process. You can run the process once per row or once per query.
A tag is a term or key phrase that is used to identify queries or reports that belong to the same category. To add a new report to a scheduled job configured to select reports with a specific tag, you add the common tag to the new report. A tag can also be a key phrase associated with a query, thus describing the query content and enabling key phrase-based classification and search.
An RSS event is an event generated by CA User Activity Reporting Module to convey an Action Alert to third-party products and users. The event is a summary of each Action Alert result and a link to the result file. The duration for a given RSS feed item is configurable.
Analysts can take the following approach as they become familiar with working with CA User Activity Reporting Module:
Users assigned the role of Administrator have unlimited access to functionality available from all CA User Activity Reporting Module tabs. Only users assigned the role of Administrator have full access to the Administration tab. From the Administration tab, Administrators configure and maintain all aspects of log collection, all services, and all user access.
Only users with the role of Administrator can configure and maintain features related to log collection. Administrators perform log collection tasks from the Administration tab, Log Collection subtab.
Administrators use the Log Collection Explorer to configure connectors on agents, which is required for log collection. They also apply subscription updates to agents, when applicable.
Working with the event refinement library is optional. The out-of-the-box functionality, which is regularly updated, is designed to meet the needs of most customers.
Administrator tasks involving log collection include the following:
The archive catalog is the record of all databases that have ever been on the CA User Activity Reporting Module server. The archive catalog includes recently created databases, databases that have been backed up and moved, and databases that have been deleted before they were backed up, if any.
Integration is the means by which unclassified events are processed into refined events so that they can be displayed in queries and reports.
A message parsing file (XMP), associated with a specific event source type, applies parsing rules that break down the raw event into name/value pairs.
Data mapping (DM) files are XML files that use the CA Technologies Common Event Grammar (CEG) to transform events from the source format into one that can be stored for reporting and analysis in the Event Log Store.
Summarization rules are rules that combine certain native events of a common type into one refined event.
Suppression rules prevent certain refined events from appearing in your reports.
Event forwarding rules specify that selected events are forwarded to third-party products, such as those that correlate events, after being saved in the event log store.
A profile specifies the set of data filters and tags that appear for selection. Data filters limit the data displayed in query or report; tag filters limit the tags displayed in the query tag list and in the report tag list.
Only users with the role of Administrator can configure and maintain the services accessible from the Administration tab, Services subtab. Configure all services soon after installing CA User Activity Reporting Module.
Administrator tasks involving services include the following:
The event log store on the collection CA User Activity Reporting Module server houses a hot database of new logs. The hot database is compressed into a warm database when it reaches the configured maximum rows.
The report server service handles reports and alerts, including retention policies, the format for printed/emailed reports, and keyed values for reports and alerts. Additionally, it handles integration settings for CA IT PAM processes such as event/alert output and dynamic values and for SNMP trap destinations for alerts.
Subscription updates refer to the binary and non-binary files that are made available by CA Technologies Subscription Server to CA User Activity Reporting Module servers, the CA EEM component on the management server, and agents.
At the management server, you can set a query to extend to federation children and peers. CA User Activity Reporting Module servers can be federated for two purposes:
Note: If you create a restore point CA User Activity Reporting Module for the purpose of restoring archived databases from long-term storage, it is a good practice to leave such a server out of the federation.
Only users with the role of Administrator can configure and maintain user accounts, policies, and other application objects accessible from the Administration tab, User and Access Management subtab. To log on to CA User Activity Reporting Module, users must have a user account configured with a role and credentials for logging in. Predefined roles and policies enable Administrators to set up user access by defining user accounts. Creating custom roles and policies is optional.
Administrator tasks involving users and access include the following:
When you add a new user, you create a global user. Details such as name, location, and telephone number are considered global because they can be shared. A global user is the user account information that excludes application-specific details.
Global user details are stored in the configured user store, which can be an external directory.
Application details are always stored in the repository of the management server. They are the details loaded in read-only format when you configure an external user store.
Creating user roles begins with defining a new application user group and then creating a policy defining the actions are permitted on specified resources. A user role can be a predefined application user group or a user-defined application group. Custom user roles are needed when the predefined application groups (Administrator, Analyst, and Auditor) are not sufficiently fine-grained to reflect work assignments. Custom user roles require custom access policies and modification of predefined policies to include the new role.
The CALM Application Access policy is an access control list type of scoping policy that defines who can access the CA User Activity Reporting Module. By default, the [Group] Administrator, [Group] Analyst and [Group] Auditor are granted access.
An access policy is a rule that grants or denies an identity (user or user group) access rights to an application resource.
An access filter is a filter that the Administrator can set to control what event data non-Administrator users or groups can view. For example, an access filter can restrict the data specified identities can view in a report. Access filters are automatically converted into obligation policies.
If you are setting up a temporary test environment, you can set up user and access management very quickly if you use out-of-the-box settings for User Accounts and configure only required fields. To complete minimal configuration with predefined settings, create user accounts for CA User Activity Reporting Module users as follows:
The ability to create a global group depends on the configuration of the user store. Consider the following:
To create a global group
The Search Groups and User Groups panes appear.
The New Global user Group pane appears.
A confirmation appears.
You can create new users only if the user store is configured as the CA User Activity Reporting Module user store, the default. Only Administrators can create new user accounts.
If referencing an external user store, user accounts are automatically loaded into the default user store as read-only records. If you need to create a new user, you must do so in the external user store. The new record is automatically loaded.
To use the CA User Activity Reporting Module product, a user must have a global user account. The account must be active at the time of login. Accounts can become inactive if suspended by the Administrator, locked due to violation of a password policy, or disabled due to the enabled account time having elapsed.
To create a new global user account
The New User page appears.
Note: If you do not do this now, you can edit the account of a global user later to assign an application user group.
You can search for an existing user account and assign the application user group for the role you want the individual to perform. If you reference an external user store, the search returns global records loaded from that user store. If your configured user store is the CA User Activity Reporting Module user store, the search returns records created for users in CA User Activity Reporting Module.
Only Administrators can edit user accounts.
To assign a role, or application user group, to an existing user
The Search Users and Users panes appear.
If the search is for loaded user accounts, the Users pane shows the path and the path labels reflect the referenced external directory.
Important! Always enter criteria when searching to avoid displaying all entries in an external user store.
The User page displays with the folder name, global user details, and, if applicable, global group membership.
The "CAELM" User Details pane expands.
The selected group appears in the Selected User Groups box.
You can use global user account information when you reference an external user store. Although you cannot update the user record in the external user store from CA User Activity Reporting Module, you can assign application-level details.
Consider the following approaches to managing access for users with accounts stored in an external user store.
Consider the following guidelines when using account activation features:
Only Administrators can create and edit user accounts. You can search for a user and display the selected user account information for any of the following reasons:
Important! Make no entry in the Incorrect Login Count field in the Authentication area. The value displayed in this field is updated by the system.
To edit a user account
The Search Users pane appears.
Note: For search criteria, use the operator LIKE when you specify a wildcard as the value and use the operator EQUAL when you specify the complete string. Examples follow:
The names of users meeting the search criteria appear in the Users pane.
The selected account appears in the right pane.
Note: You can update details only if the using the default user store.
Note: The Incorrect Login Count field is automatically incremented for a failed login attempt and reset to 0 with a successful login attempt. A user account becomes locked if the incremented value reaches or exceeds the password policy value set for lock user account after the specified number of failed logins.
Updates to the user account are saved and in force.
You can reset the password for users that forget their password. If a user gets locked out for exceeding the configured number of attempted logins that fail because of a forgotten password, you can reset the password and then the user can unlock the account, if allowed by the corresponding password policy.
To reset a user password
The selected User account details appear.
The New Password and Confirm Password fields appear.
You can delete any global user account that was created in CA User Activity Reporting Module.
You can inactivate a user account without deleting it in either of the following ways:
To delete a global user
The Search Users and Users panes appear.
The record for the selected user appears in the right pane.
A confirmation to delete this user appears.
The confirmation message: Global User deleted successfully appears.
Note: If you click Go again in the Search Users pane, the displayed list does not contain the name of the deleted user.
|
Copyright © 2014 CA Technologies.
All rights reserved.
|
|