- Created by Pavel Golubnichiy on Apr 10, 2023
Active Directory
Indeed Identity PAM interacts with end users through an account that will read directory users and their attributes.
Account to use with user directory
- Run the Active Directory Users and Computers snap-in
- Open the context menu of organizational unit or container
- Select Create - User item from the menu
- Specify the user name, say, IPAMManager
- Fill in the mandatory fields and complete the account creation
Alternatively, you can use an existing account.
Storage of video, screenshots and transferred files
File storages are necessary for aggregation and long-term storage of videos, screenshots and files transferred in sessions.
File storage account
A domain account is required to work with file storage, recommended to use the already created IPAMStorageOps account.
Create and configure file storage
- Log in to the server, which will act as a file storage
- Create folders, for example MediaData, ShadowCopy, Screencasts
- Right click on the folder you created, select the item Share with > Specific people
- Enter the username, for example IPAMStorageOps and click Add
- In the "Permission level" column, click the Read value next to the IPAMStorageOps user and select Read/Write from the menu.
- Finish by clicking Share
Data storage
Indeed Identity PAM uses Microsoft SQL Server or PostgreSQL Pro to store data. The following components require databases:
- IPAMCore - PAM Core component database is used to store Indeed Identity PAM privileged accounts, resources, permissions, and other service data
- IPAMCoreJobs - PAM Core component database is used to store scheduled jobs
- IPAMIdp - IdP component database is used to store authenticators of Indeed Identity PAM users and administrators
- IPAMIdpJobs - IdP component database is used to store scheduled jobs
- ILS - Log Server component database is used to store the Indeed Identity PAM event
Database creation
Microsoft SQL Server
- Launch Microsoft SQL Management Studio (SSMS) and connect to Microsoft SQL Server instance
- Open the context menu of Databases item
- Select the New Database item
- Specify a database name, for example IPAMCore, IPAMCoreJobs, IPAMIdP, IPAMIdpJobs, ILS
- Click ОK
PostgreSQL, PostgreSQL Pro
- Launch pgAdmin and connect to the PostgreSQL Pro server
- Open the context menu of the Databases item
- Select Create, Database
- Specify a database name, for example: IPAMCore, IPAMCoreJobs, IPAMIdP, IPAMIdPJobs, ILS
- Click Save
Creating a service account to work with data storage
Microsoft SQL Server
- Start Microsoft SQL Management Studio (SSMS) and connect to the Microsoft SQL Server instance
- Expand the Security item
- Open the context menu of Logins item
- Select the Create login item
- Enter the name, for example IPAMSQLServiceOps
- Select SQL Server authentication item and fill in the required fields
- Switch to User Mapping item
- Check IPAMCore, IPAMCoreJobs, IPAMIdP, IPAMIdPJobs and ILS databases
- Check database roles db_owner, db_datareader and db_datawriter
- Click ОK
PostgreSQL, PostgreSQL Pro
- Launch pgAdmin and connect to the PostgreSQL Pro server
- Open the context menu of the Login/Group Roles item
- Select Create, Login/Group Role
- Specify a Name, for example IPAMSQLServiceOps
- Go to Definition tab, enter the new password for account
- Go to Privileges tab, check Yes for Can Login? and Superuser? items
- Click Save, repeat for the rest of the databases.
The grants db_owner for Microsoft SQL Server and Superuser for PostgreSQL are required only for the first access to the database.
- No labels