The following service operations are performed at Windows resources on behalf of the domain or local service account:
If you plan to use local built-in administrator account as service account, then no additional configuration is required. Otherwise, proceed as follows:
Registry editing is required due to restrictions on remote WinRM management for all local accounts except for built-in administrator account.
Service operations are performed using WinRM. To use local resource accounts as service one, you must add the resource to the TrustedHosts list of trusted ones on PAM Core server.
C:\>winrm s winrm/config/client @{TrustedHosts="Resource1.domain.local, Resource2.domain.local"} |
The specified resources shall be added to the TrustedHosts list.
When adding new resources to the trusted list, you must specify previously added resources and new ones, since the new value overwrites the old one.
|
The following service operations are performed at *nix resources on behalf of the local service account:
Create a user, for example IPAMService:
adduser IPAMService |
Add the user to SUDO group
usermod -aG sudo IPAMService |
Automatic searching and adding of Access accounts to Indeed Identity PAM is performed based on their permission to execute a SUDO command. To grant the permission to execute SUDO command, you may need to edit the /etc/sudoers file.