ADMIN Class
Each record in the ADMIN class contains definitions that allow non-ADMIN users to administer specific classes. You create an ADMIN record to represent each class that delegated users administer. The record contains a list of accessors with the access authorities of each, and also supports Conditional Access Control Lists (CACLs). The key of the ADMIN class record is the name of the class being protected.
capamsc141
Each record in the ADMIN class contains definitions that allow non-ADMIN users to administer specific classes. You create an ADMIN record to represent each
Privileged Access Manager
class that delegated users administer. The record contains a list of accessors with the access authorities of each, and also supports Conditional Access Control Lists (CACLs). The key of the ADMIN class record is the name of the class being protected.The following definitions describe the properties contained in this class record. Most properties are modifiable and can be manipulated using Selang or the administration interfaces. Non-modifiable properties are marked as
informational
.- AAUDIT(Informational) Displays the type of activity thatPrivileged Access Manageraudits.
- ACLDefines a list of accessors (users and groups) permitted to access the resource, and the accessors access types. Each element in the Access Control List (ACL) contains the following information:
- AccessorDefines an accessor.
- AccessDefines the access authority that the accessor has to the resource.
- CALACLDefines a list of the accessors (users and groups) that are permitted to access the resource, and their access types according to the Unicenter NSM calendar status.Each element in the calendar access control list (CALACL) contains the following information:
- AccessorDefines an accessor.
- CalendarDefines a reference to a calendar in Unicenter TNG.
- AccessDefines the access authority that the accessor has to the resource.
Use the calendar parameter with the authorize command to permit user or group access to the resource according to the access defined in the calendar ACL. - CALENDARRepresents a Unicenter TNG calendar object for user, group, and resource restrictions.Privileged Access Managerfetches Unicenter TNG active calendars at specified time intervals.
- CATEGORYDefines one or more security categories assigned to a user or a resource.
- COMMENTDefines additional information that you want to include in the record.Privileged Access Managerdoes not use this information for authorization.Limit:255 characters
- CREATE_TIME(Informational) Displays the date and time when the record was created.
- DAYTIMEDefines the day and time restrictions that govern when an accessor can access a resource.Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.The resolution of daytime restrictions is one minute.
- NACLTheNACLproperty of a resource is an access control list that defines accessors with authorization denied to a resource, together with the type of access that they are denied (example, write). See also ACL, CALACL, PACL. Each entry in the NACL contains the following information:
- AccessorDefines an accessor.
- AccessDefines the type of access that is denied to the accessor.Use the authorize deniedaccess command, or the authorize- deniedaccess- command, to modify this property.
- NOTIFYDefines the user to be notified when a resource or user generates an audit event.Privileged Access Managercan email the audit record to the specified user.Limit:30 characters
- OWNERDefines the user or group that owns the record.
- PACLDefines a list of accessors that are permitted to access the resource when the access request is made by a specific program (or a program that matches a name-pattern) and their access types. Each element in the program Access Control List (PACL) contains the following information:
- AccessorDefines an accessor.
- ProgramDefines a reference to a record in the PROGRAM class, either specifically or by wildcard pattern matching.
- AccessDefines the access authority that the accessor has to the resource.You can use wildcard characters to specify the resource in a PACL.Use the via(pgm) parameter with the Selang authorize command to add programs, accessors, and their access types to a PACL, You can use the authorize- command to remove accessors from a PACL.
- RAUDITDefines the types of access events thatPrivileged Access Managerrecords in the audit log. RAUDIT derives its name fromResourceAUDIT. Valid values are:
- allAll access requests
- successGranted access requests
- failureDenied access requests (default)
- noneNo access requests
Privileged Access Managerrecords events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.Use the audit parameter of thechresandchfilecommands to modify the audit mode. - SECLABELDefines the security label of a user or resource.The SECLABEL property corresponds to the label[-] parameter of the
andchres
commands.ch[x]usr - SECLEVELDefines the security level of an accessor or resource.This property corresponds to the level[-] parameter of the
andch[x]usr
commands.chres - UACCDefines the default access authority for the resource, which indicates the access that is granted to accessors who are not defined toPrivileged Access Manageror who do not appear in the ACL of the resource.Use thedefaccessparameter with thechres,editres, ornewrescommand to modify this property.
- UPDATE_TIME(Informational) Displays the date and time when the record was last modified.
- UPDATE_WHO(Informational) Displays the administrator who performed the update.
- WARNINGSpecifies whether Warning mode is enabled. If the Warning mode is enabled on a resource, then access requests to the resource are granted. If an access request violates an access rule, then a record is written to the audit log.
Example:
This example shows how to assign "Password Change" privileges to a user "John" by using the ADMIN class in UNIX/Linux endpoint.Step 1:
Create a user "John".PAMSC> eu John password(John_Pwd)
Step 2
: Use the ADMIN class to authorize "John" with the administrative privileges to change the password of any other user. The user can be any other user (including Admin user) but not the superuser (example, root).PAMSC> authorize ADMIN USER uid(John) access(password)
Step 3
: View all the Admin users with administrative privileges.PAMSC> showres ADMIN USER (localhost)Data for ADMIN 'USER'-----------------------------------------------------------Defaccess : NoneACLs :Accessor AccessJohn (USER ) PWPeter (USER ) R, Modify, Cre, Del, JoinAudit mode : FailureUpdate time : 16-Feb-2017 15:06Updated by : root (USER )
Step 4
: John tries to perform operations such as create a user (Louis), view other users in the database but fails as he is not authorize to do so.PAMSC> nu Louis(localhost)ERROR: Operation not allowedPAMSC> su * (localhost)ERROR: Operation not allowed
Step 5
: John tries to modify the password of another Admin user (Peter) and succeeds as he is authorized to do so.PAMSC> eu Peter password(Peter_Pwd) (localhost)Successfully updated USER Peter(localhost)Native:===Successfully updated USER Peter