Versions Compared
Key
- This line was added.
- This line was removed.
- Formatting was changed.
Access rights
Roles
This section gives an overview of the Indeed PAM system access roles: Administrator, Operator, and Inspector. To get more information about access rights, please click on the appropriate role.
Image AddedImage AddedGlobal administrators
This section shows the global system administrators for each subgroup. To add an administrator, please follow these steps:
- Click Add and select the appropriate role.
- Select the object type − User or Group.
- Specify the location − an entire user folder or a separate container.
- To run a search, please enter the name or its part in the Name field.
- Click Search.
- Select a user and click on the Add button.Image Added
- Once the item has been successfully added, it will be displayed in a corresponding section. Image Added
Authenticators
In this section, you can configure settings so that you can automatically lock/unlock authenticators. To do this, please follow these steps:
- Select an authenticator.
- Set the Lock provider authentication in case of a series of failed attemps parameter to Yes.
- Set the permitted number of invalid attempts for the Number of authentication attempts until blocking parameter. Default value: 5
- In the field Reset locking counter in (minutes), set the lockout duration. Default value: 5
- In the field Login method unlocking timeout (minutes), set the timeout duration. Default value: 5
- Click Save.
Image Added
Access rights table
Operations | Administrator | Operator | Supervisor |
---|---|---|---|
Authenticators enrollment | |||
Enroll first authenticator | Image Added | Image Added | |
Enroll any authenticator | Image Added | ||
Authenticators management | |||
Read user authenticators | Image Added | Image Added | Image Added |
Disable user authenticators | Image Added | Image Added | |
Enable user authenticators | Image Added | Image Added | |
Delete user authenticators | Image Added | Image Added | |
Unlock user authentication methods | Image Added | Image Added | |
Get user authentication method | Image Added | Image Added | Image Added |
Enable user authentication methods | Image Added | Image Added | |
Disable user authentication methods | Image Added | Image Added | |
Get user authentication method state | Image Added | Image Added | Image Added |
Set auth method settings | Image Added | ||
Get auth method settings | Image Added | Image Added | |
Set user auth method settings | Image Added | Image Added | |
Get user auth method settings | Image Added | Image Added | Image Added |
Set module auth method settings | Image Added | Image Added | |
Get module auth method settings | Image Added | Image Added | Image Added |
Set authenticator rights | Image Added | Image Added | |
Get authenticator rights | Image Added | Image Added | Image Added |
Set auth method settings for policy | Image Added | Image Added | |
Get auth method settings for policy | Image Added | Image Added | Image Added |
License management | |||
Register licenses | Image Added | ||
Unregister licenses | Image Added | ||
Enumerate registered licenses | Image Added | Image Added | Image Added |
Acquire user licenses | Image Added | Image Added | |
Release user licenses | Image Added | Image Added | |
Enumerate user licenses | Image Added | Image Added | Image Added |
Access control management | |||
Add catalog object to access group | Image Added | ||
Remove catalog object from access group | Image Added | ||
Enumerate access group members | Image Added | Image Added | Image Added |
Hardware devices management | |||
Create hardware device | Image Added | ||
Update hardware device | Image Added | ||
Enumerate hardware devices | Image Added | Image Added | Image Added |
Remove hardware device | Image Added | ||
Policies management | |||
Create policy | Image Added | ||
Update policy | Image Added | ||
Remove policy | Image Added | ||
Get policies | Image Added | Image Added | Image Added |
Get policy users | Image Added | Image Added | Image Added |
Set policy users | Image Added | Image Added | |
Get policy applications | Image Added | Image Added | Image Added |
Set policy applications | Image Added | ||
Get policy priority | Image Added | Image Added | Image Added |
Set policy priority | Image Added | ||
User cache management | |||
Enable cache | Image Added | Image Added | |
Disable cache | Image Added | Image Added | |
Check cache enabled | Image Added | Image Added | |
Set cache settings | Image Added | ||
Get cache settings | Image Added | Image Added | Image Added |
User accounts management | |||
Create account | Image Added | ||
Remove account | Image Added | ||
Get account | Image Added | Image Added | Image Added |
Get account state | Image Added | Image Added | Image Added |
Set password | Image Added | ||
Check for password is set | Image Added | Image Added | |
Set login | Image Added | Image Added | |
Get login | Image Added | Image Added | Image Added |
Set account settings | Image Added | Image Added | |
Get account settings | Image Added | Image Added | Image Added |
Set custom fields | Image Added | Image Added | |
Get custom fields | Image Added | Image Added | Image Added |
Change password random | Image Added | ||
Change password | Image Added | ||
Business applications management | |||
Get applications | Image Added | Image Added | Image Added |
Create application | Image Added | ||
Set application | Image Added | Image Added | |
Remove application | Image Added |
Backtotop
Table of Contents | ||
---|---|---|
|