Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Access rights 

Roles

This section gives an overview of the Indeed PAM system access roles: Administrator, Operator, and Inspector.  To get more information about access rights, please click on the appropriate role.

Global administrators

This section shows the global system administrators for each subgroup. To add an administrator, please follow these steps:

  1. Click Add and select the appropriate role. 
  2. Select the object type − User or Group. 
  3. Specify the location − an entire user folder or a separate container. 
  4. To run a search, please enter the name or its part in the Name field. 
  5. Click Search
  6. Select a user and click on the Add button.
  7. Once the item has been successfully added, it will be displayed in a corresponding section. 

Authenticators

In this section, you can configure settings so that you can automatically lock/unlock authenticators. To do this, please follow these steps:

  1. Select an authenticator. 
  2. Set the Lock provider authentication in case of a series of failed attemps parameter to Yes
  3. Set the permitted number of invalid attempts for the Number of authentication attempts until blocking parameter. Default value: 5 
  4. In the field Reset locking counter in (minutes), set the lockout duration. Default value: 5 
  5. In the field Login method unlocking timeout (minutes), set the timeout duration. Default value: 5 
  6. Click Save.


Access rights table

OperationsAdministratorOperatorSupervisor

Authenticators enrollment

Enroll first authenticatorImage Modified


Image Modified


Enroll any authenticator

Image Modified



Authenticators management

Read user authenticators

Image Modified

Image Modified

Image Modified

Disable user authenticators

Image Modified

Image Modified


Enable user authenticators

Image Modified

Image Modified


Delete user authenticators

Image Modified

Image Modified


Unlock user authentication methods

Image Modified

Image Modified


Get user authentication method

Image Modified

Image Modified

Image Modified

Enable user authentication methods

Image Modified

Image Modified


Disable user authentication methods

Image Modified

Image Modified


Get user authentication method state

Image Modified

Image Modified

Image Modified

Set auth method settings

Image Modified



Get auth method settings

Image Modified


Image Modified

Set user auth method settings

Image Modified

Image Modified


Get user auth method settings

Image Modified

Image Modified

Image Modified

Set module auth method settings

Image Modified

Image Modified


Get module auth method settings

Image Modified

Image Modified

Image Modified

Set authenticator rights

Image Modified

Image Modified


Get authenticator rights

Image Modified

Image Modified

Image Modified

Set auth method settings for policy

Image Modified

Image Modified


Get auth method settings for policy

Image Modified

Image Modified

Image Modified

License management

Register licenses

Image Modified



Unregister licenses

Image Modified



Enumerate registered licenses

Image Modified

Image Modified

Image Modified

Acquire user licenses

Image Modified

Image Modified


Release user licenses

Image Modified

Image Modified


Enumerate user licenses

Image Modified

Image Modified

Image Modified

Access control management

Add catalog object to access group

Image Modified



Remove catalog object from access group

Image Modified



Enumerate access group members

Image Modified

Image Modified

Image Modified

Hardware devices management

Create hardware device

Image Modified



Update hardware device

Image Modified



Enumerate hardware devices

Image Modified

Image Modified

Image Modified

Remove hardware device

Image Modified



Policies management

Create policy

Image Modified



Update policy

Image Modified



Remove policy

Image Modified



Get policies

Image Modified

Image Modified

Image Modified

Get policy users

Image Modified

Image Modified

Image Modified

Set policy users

Image Modified

Image Modified


Get policy applications

Image Modified

Image Modified

Image Modified

Set policy applications

Image Modified



Get policy priority

Image Modified

Image Modified

Image Modified

Set policy priority

Image Modified



User cache management

Enable cache

Image Modified

Image Modified


Disable cache

Image Modified

Image Modified


Check cache enabled

Image Modified

Image Modified


Set cache settings

Image Modified



Get cache settings

Image Modified

Image Modified

Image Modified

User accounts management

Create account

Image Modified



Remove account

Image Modified



Get account

Image Modified

Image Modified

Image Modified

Get account state

Image Modified

Image Modified

Image Modified

Set password

Image Modified



Check for password is set

Image Modified

Image Modified


Set login

Image Modified

Image Modified


Get login

Image Modified

Image Modified

Image Modified

Set account settings

Image Modified

Image Modified


Get account settings

Image Modified

Image Modified

Image Modified

Set custom fields

Image Modified

Image Modified


Get custom fields

Image Modified

Image Modified

Image Modified

Change password random

Image Modified



Change password

Image Modified



Business applications management

Get applications

Image Modified

Image Modified

Image Modified

Create application

Image Modified



Set application

Image Modified

Image Modified


Remove application

Image Modified




Backtotop

Table of Contents
classrightFloat