Sun Identity Manager 8.1 Resources Reference

Chapter 43 Solaris

The Solaris resource adapter is defined in the com.waveset.adapter.SolarisResourceAdapter class.

Adapter Details

Resource Configuration Notes

If you will be using SSH (Secure Shell) for communication between the resource and Identity Manager, set up SSH on the resource before configuring the adapter.

If you manage NIS accounts on Solaris, install patch 125549-01 for SPARC systems or patch 125550–01 for x86 systems to improve the performance of the logins command and the Solaris adapter.

Identity Manager Installation Notes

No additional installation procedures are required on this resource.

Usage Notes

The Solaris resource adapter primarily provides support for the following Solaris commands:

For more information about supported attributes and files, refer to the Solaris manual pages for these commands.

The adapter does not support Solaris Trusted Extensions.

When a rename of a user account is executed on a Solaris resource, the group memberships are moved to the new user name. The user’s home directory is also renamed if the following conditions are true:

The Bourne-compliant shell (sh, ksh) must be used as the root shell when connecting to a UNIX resource (AIX, HP-UX, Solaris, or Linux).

The administrative account that manages Solaris accounts must use the English (en) or C locale. This can be configured in the user’s .profile file.

In environments in which NIS is implemented, you can increase performance during bulk provisioning by implementing the following features:

New user accounts on Solaris resources remain locked until the passwd(1) command is executed. After the user account on Solaris has been created, executing passwd -s <user> will show the status as locked(LK). After an account is created natively, the “Locked out Accounts” section of the Solaris Risk Analysis report will report the newly created account. In addition, the “Accounts With No Password” section of the Risk Analysis report will not list the newly created account.

Do not use control characters (for example, 0x00, 0x7f) in user passwords.

Security Notes

This section provides information about supported connections and privilege requirements.

Supported Connections

Identity Manager can use the following connections to communicate with the Solaris adapter:

For SSHPubKey connections, the private key must be specified on the Resource Parameters page. The key must include comment lines such as --- BEGIN PRIVATE KEY --- and --- END PRIVATE KEY --. The public key must be placed in the /.ssh/authorized_keys file on the server.

Required Administrative Privileges

The adapter supports logging in as a standard user, then performing a su command to switch to root (or root-equivalent account) to perform administrative activities. Direct logins as root user are also supported.

The adapter also supports the sudo facility (version 1.6.6 or later), which can be installed on Solaris 9 from a companion CD. sudo allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root or another user.

In addition, if sudo is enabled for a resource, its settings will override those configured on the resource definition page for the root user.

If you are using sudo, you must set the tty_tickets parameter to true for the commands enabled for the Identity Manager administrator. Refer to the man page for the sudoers file for more information.

The administrator must be granted privileges to run the following commands with sudo:

User and Group Commands  

 

NIS Commands  

Miscellaneous Commands  

 
  • auths

  • groupadd

  • groupdel

  • groupmod

  • last

  • listusers

  • logins

  • passwd

  • profiles

  • roles

  • useradd

  • userdel

  • usermod

  • make

  • ypcat

  • ypmatch

  • yppasswd

  • awk

  • cat

  • chmod

  • chown

  • cp

  • cut

  • diff

  • echo

  • grep

  • ls

  • mv

  • rm

  • sed

  • sleep

  • sort

  • tail

  • touch

  • which

You can use a test connection to test whether


Note –

A test connection can use different command options than a normal provision run.


The adapter provides basic sudo initialization and reset functionality. However, if a resource action is defined and contains a command that requires sudo authorization, then you must specify the sudo command along with the UNIX command. (For example, you must specify sudo useradd instead of just useradd.) Commands requiring sudo must be registerd on the native resource. Use visudo to register these commands.

Provisioning Notes

The following table summarizes the provisioning capabilities of this adapter.

Feature  

Supported?  

Enable/disable account 

Solaris does not natively support Identity Manager enable and disable actions. Identity Manager simulates enabling and disabling accounts by changing the user password. The changed password is exposed on enable actions, but it is not exposed on disable actions.

As a result, enable and disable actions are processed as update actions. Any before or after actions that have been configured to operate on updates will execute. 

Rename account 

Yes 

Pass-through authentication 

Yes 

Before/after actions 

Yes 

Data loading methods 

  • Import directly from resource

  • Reconcile with resource

You can define resource attributes to control the following tasks for all users on this resource:

Account Attributes

The following table lists the Solaris user account attributes. Attributes are optional unless noted in the description. All attributes are Strings.

Identity System User Attribute  

Resource User Attribute  

Description  

accountId

accountId

Required. The user’s login name. 

Description

comment

The user’s full name. 

Home directory

dir

The user’s home directory. Any value specified in this account attribute takes precedence over a value specified in the Home Base Directory resource attribute.

Expiration date

expire

Last date the account can be accessed. This attribute is not supported for NIS accounts. 

Primary group

group

The user’s primary group. 

Inactive

inactive

Number of days the account can be inactive before it is locked. Not supported for NIS accounts. 

Secondary groups

secondary_group

A comma-separated list of the user’s secondary group or groups. 

To enable a role to provision this attribute, you must add ’csv=true’ to the RoleAttribute element in the Role object XML.

Login shell

shell

The user’s login shell. 

If you are provisioning to an NIS master, the value of the user shell will be checked on the NIS master only. Checks against other machines the user may log on to will not be performed. 

Last login time

time_last_login

The date and time of the last login. This value is read-only. 

User ID

uid

The user ID, in digit form. 

Authorizations

authorization

A comma-separated list of authorizations. 

Profiles

profile

A comma-separated list of profiles. 

Roles

role

A comma-separated list of roles. 

expirePassword

force_change

Forces the user to supply a new password upon login. This attribute is not listed in the schema map by default. 

Resource Object Management

Identity Manager supports the following native Solaris objects:

Resource Object 

Features Supported 

Attributes Managed 

Group 

Create, update, delete, rename, save as 

groupName, gid, users 

Identity Template

$accountId$

Sample Forms

Built-In

Also Available

SolarisUserForm.xml

Troubleshooting

Use the Identity Manager debug pages to set trace options on the following classes: