Sun[TM] Identity Manager 8.0 Resources Reference |
Red Hat Linux and SuSE LinuxThe Red Hat Linux and SuSE Linux resource adapter are two separate adapters defined in the com.waveset.adapter.RedHatLinuxResourceAdapter and com.waveset.adapter.SUSELinuxResourceAdapter classes, respectively.
Resource Configuration Notes
If you will be using SSH (Secure Shell) for communication between the resource and Identity Manager, set up SSH on the resource before configuring the adapter.
Identity Manager Installation Notes
No additional installation procedures are required on this resource.
Usage Notes
The Linux resource adapters primarily provide support for the following commands:
For more information about supported attributes and files, refer to the Linux manual pages for these commands.
When a rename of a user account is executed on a Linux resource, the group memberships are moved to the new user name. The user's home directory is also renamed if the following conditions are true:
The Bourne-compliant shell (sh, ksh) must be used as the root shell when connecting to a Linux resource.
The administrative account that manages Linux accounts must use the English (en) or C locale. This can be configured in the user's .profile file.
In environments in which NIS is implemented, you can increase performance during bulk provisioning by implementing the following features:
- Add an account attribute named user_make_nis to the schema map and use this attribute in your reconciliation or other bulk provisioning workflow. Specifying this attribute causes the system to bypass the step of connecting to the NIS database after each user update on the resource.
- To write the changes to the NIS database after all provisioning has completed, create a ResourceAction named NIS_password_make in the workflow.
Security Notes
This section provides information about supported connections and privilege requirements.
Supported Connections
Identity Manager can use the following connections to communicate with this adapter:
For SSHPubKey connections, the private key must be specified on the Resource Parameters page. The key must include comment lines such as --- BEGIN PRIVATE KEY --- and --- END PRIVATE KEY --. The public key must be placed in the /.ssh/authorized_keys file on the server.
Required Administrative Privileges
The adapter supports logging in as a standard user, then performing a su command to switch to root (or root-equivalent account) to perform administrative activities. Direct logins as root user are also supported.
The adapter also supports the sudo facility, which allows a system administrator to give users (or groups of users) the ability to run some (or all) commands as root or another user.
In addition, if sudo is enabled for a resource, its settings will override those configured on the resource definition page for the root user.
If you are using sudo, you must set the tty_tickets parameter to true for the commands enabled for the Identity Manager administrator. Refer to the man page for the sudoers file for more information.
The administrator must be granted privileges to run the following commands with sudo:
Note
The adapter does not support NIS commands with sudo, because the yppasswd command requires the root password.
You can use the Test Connection button to test whether
The adapter provides basic sudo initialization and reset functionality. However, if a resource action is defined and contains a command that requires sudo authorization, then you must specify the sudo command along with the UNIX command. (For example, you must specify sudo useradd instead of just useradd.) Commands requiring sudo must be registerd on the native resource. Use visudo to register these commands.
Provisioning Notes
The following table summarizes the provisioning capabilities of these adapters.
You can define resource attributes to control the following tasks for all users on this resource:
Account Attributes
The following table lists the Red Hat Linux and SuSE Linux user account attributes. Attributes are optional unless noted in the description. All attributes are Strings.
Resource Object Management
Identity Manager supports the following native Linux objects:
Resource Object
Features Supported
Attributes Managed
Group
Create, update, delete, rename, save as
groupName, gid, users
Identity Template
$accountId$
Sample Forms
Built-In
Also Available
Troubleshooting
Use the Identity Manager debug pages to set trace options on the following classes: