Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Access rights
Roles
This section gives an overview of the Indeed PAM system access roles: Administrator, Operator, and Inspector. To get more information about access rights, please click on the appropriate role.
Global administrators
This section shows the global system administrators for each subgroup. To add an administrator, please follow these steps:
- Click Add and select the appropriate role.
- Select the object type − User or Group.
- Specify the location − an entire user folder or a separate container.
- To run a search, please enter the name or its part in the Name field.
- Click Search.
- Select a user and click on the Add button.
- Once the item has been successfully added, it will be displayed in a corresponding section.
Authenticators
In this section, you can configure settings so that you can automatically lock/unlock authenticators. To do this, please follow these steps:
- Select an authenticator.
- Set the Lock provider authentication in case of a series of failed attemps parameter to Yes.
- Set the permitted number of invalid attempts for the Number of authentication attempts until blocking parameter. Default value: 5
- In the field Reset locking counter in (minutes), set the lockout duration. Default value: 5
- In the field Login method unlocking timeout (minutes), set the timeout duration. Default value: 5
- Click Save.
Access rights table
Operations | Administrator | Operator | Supervisor |
---|---|---|---|
Authenticators enrollment | |||
Enroll first authenticator | Image Modified | Image Modified | |
Enroll any authenticator | Image Modified | ||
Authenticators management | |||
Read user authenticators | Image Modified | Image Modified | Image Modified |
Disable user authenticators | Image Modified | Image Modified | |
Enable user authenticators | Image Modified | Image Modified | |
Delete user authenticators | Image Modified | Image Modified | |
Unlock user authentication methods | Image Modified | Image Modified | |
Get user authentication method | Image Modified | Image Modified | Image Modified |
Enable user authentication methods | Image Modified | Image Modified | |
Disable user authentication methods | Image Modified | Image Modified | |
Get user authentication method state | Image Modified | Image Modified | Image Modified |
Set auth method settings | Image Modified | ||
Get auth method settings | Image Modified | Image Modified | |
Set user auth method settings | Image Modified | Image Modified | |
Get user auth method settings | Image Modified | Image Modified | Image Modified |
Set module auth method settings | Image Modified | Image Modified | |
Get module auth method settings | Image Modified | Image Modified | Image Modified |
Set authenticator rights | Image Modified | Image Modified | |
Get authenticator rights | Image Modified | Image Modified | Image Modified |
Set auth method settings for policy | Image Modified | Image Modified | |
Get auth method settings for policy | Image Modified | Image Modified | Image Modified |
License management | |||
Register licenses | Image Modified | ||
Unregister licenses | Image Modified | ||
Enumerate registered licenses | Image Modified | Image Modified | Image Modified |
Acquire user licenses | Image Modified | Image Modified | |
Release user licenses | Image Modified | Image Modified | |
Enumerate user licenses | Image Modified | Image Modified | Image Modified |
Access control management | |||
Add catalog object to access group | Image Modified | ||
Remove catalog object from access group | Image Modified | ||
Enumerate access group members | Image Modified | Image Modified | Image Modified |
Hardware devices management | |||
Create hardware device | Image Modified | ||
Update hardware device | Image Modified | ||
Enumerate hardware devices | Image Modified | Image Modified | Image Modified |
Remove hardware device | Image Modified | ||
Policies management | |||
Create policy | Image Modified | ||
Update policy | Image Modified | ||
Remove policy | Image Modified | ||
Get policies | Image Modified | Image Modified | Image Modified |
Get policy users | Image Modified | Image Modified | Image Modified |
Set policy users | Image Modified | Image Modified | |
Get policy applications | Image Modified | Image Modified | Image Modified |
Set policy applications | Image Modified | ||
Get policy priority | Image Modified | Image Modified | Image Modified |
Set policy priority | Image Modified | ||
User cache management | |||
Enable cache | Image Modified | Image Modified | |
Disable cache | Image Modified | Image Modified | |
Check cache enabled | Image Modified | Image Modified | |
Set cache settings | Image Modified | ||
Get cache settings | Image Modified | Image Modified | Image Modified |
User accounts management | |||
Create account | Image Modified | ||
Remove account | Image Modified | ||
Get account | Image Modified | Image Modified | Image Modified |
Get account state | Image Modified | Image Modified | Image Modified |
Set password | Image Modified | ||
Check for password is set | Image Modified | Image Modified | |
Set login | Image Modified | Image Modified | |
Get login | Image Modified | Image Modified | Image Modified |
Set account settings | Image Modified | Image Modified | |
Get account settings | Image Modified | Image Modified | Image Modified |
Set custom fields | Image Modified | Image Modified | |
Get custom fields | Image Modified | Image Modified | Image Modified |
Change password random | Image Modified | ||
Change password | Image Modified | ||
Business applications management | |||
Get applications | Image Modified | Image Modified | Image Modified |
Create application | Image Modified | ||
Set application | Image Modified | Image Modified | |
Remove application | Image Modified |
Backtotop
Table of Contents | ||
---|---|---|
|