Sun Identity Manager 8.1 Resources Reference

Adapter Details

Resource Configuration Notes

If you will be using SSH (Secure Shell) for communications between the resource and Identity Manager, set up SSH on the resource before configuring the adapter.

Identity Manager Installation Notes

No additional installation procedures are required on this resource.

Usage Notes

The Linux resource adapters primarily provide support for the following commands:

For more information about supported attributes and files, refer to the Linux manual pages for these commands.

When a rename of a user account is executed on a Linux resource, the group memberships are moved to the new user names. The user's home directory is also renamed if the following conditions are true:

The Bourne-compliant shell (sh, ksh) must be used as the root shell when connecting to a Linux resource.

The administrative account that manages Linux accounts must use the English (en) or C locale. This can be configured in the user's .profile file. Do note use control characters (for example, 0x00, 0x7f) in user passwords.

In environments in which NIS is implemented, you can increase performance during bulk provisioning by implementing the following features:

Security Notes

This section provides information about supported connections and privilege requirements.

Supported Connections

Identity Manager can use the following connections to communicate with this adapter:

For SSHPubKey connections, the private key must be specified on the Resource Parameters page. The key must include comment lines such as --- BEGIN PRIVATE KEY --- and --- END PRIVATE KEY --. The public key must be placed in the /.ssh/authorized_keys file on the server.

Required Administrative Privileges

The adapter supports logging in as a standard user, then performing a su command to switch to root (or root-equivalent account) to perform administrative activities. Direct logins as root user are also supported.

The adapter also supports the sudo facility (version 1.6.6 or later), which can be installed on Solaris 9 from a companion CD. sudo allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root or another user.

In addition, if sudo is enabled for a resource, its settings will override those configured on the resource definition page for the root user.

If you are using sudo, you must set the tty_tickets parameter to true for the commands enabled for the Identity Manager administrator. Refer to the man page for the sudoers file for more information.

The administrator must be granted privileges to run the following commands with sudo:

User and Group Commands  


Miscellaneous Commands  

  • chsh

  • groupadd

  • groupdel

  • groupmod

  • last

  • passwd

  • useradd

  • userdel

  • usermod

  • awk

  • cat

  • chmod

  • chown

  • cp

  • cut

  • diff

  • echo

  • grep

  • ln

  • ls

  • mv

  • ps

  • rm

  • sed

  • sort

  • tail

  • touch

The adapter does not support NIS commands with sudo, because the yppasswd command requires the root password.

You can use a test connection to test whether

A test connection can use different command options than a typical provision run.

The adapter provides basic sudo initialization and reset functionality. However, if a resource action is defined and contains a command that requires sudo authorization, then you must specify the sudo command along with the UNIX command. (For example, you must specify sudo useradd instead of just useradd.) Commands requiring sudo must be registerd on the native resource. Use visudo to register these commands.

Provisioning Notes

The following table summarizes the provisioning capabilities of this adapter.



Enable/disable account 

Linux does not natively support Identity Manager enable and disable actions. Identity Manager simulates enabling and disabling accounts by changing the user password. The changed password is exposed on enable actions, but it is not exposed on disable actions.

As a result, enable and disable actions are processed as update actions. Any before or after actions that have been configured to operate on updates will execute. 

Rename account 


Pass-through authentication 


Before/after actions 


Data loading methods 

  • Import directly from resource

  • Reconcile with resource

You can define resource attributes to control the following tasks for all users on this resource:

Account Attributes

The following table lists the Red Hat Linux and SuSE Linux user account attributes. Attributes are optional unless noted in the description. All attributes are Strings.

Resource User Attribute  

useradd Equivalent  




Required. The user’s login name. 


- c comment

The user’s full name. 


- d dir

The user’s home directory. Any value specified in this account attribute takes precedence over a value specified in the Home Base Directory resource attribute.


- e expiration date

Last date the account can be accessed.  


- g group

The user’s primary group. 


- f days

Number of days the account can be inactive before it is locked.  


- G group

A comma-separated list of the user’s secondary group or groups. 

To enable a role to provision this attribute, you must add ’csv=true’ to the RoleAttribute element in the Role object XML.



The user’s login shell. 

If you are provisioning to an NIS master, the value of the user shell will be checked on the NIS master only. Checks against other machines the user may log on to will not be performed. 


Obtained from the lastlog command. 

The date and time of the last login. This value is read-only. If you do not need to track this attribute, delete it from the schema map, as additional calls to the resource are required to retrieve the last login time. 


- u User ID

The user ID, in digit form. 

Resource Object Management

Identity Manager supports the following native Solaris objects:

Resource Object  

Features Supported  

Attributes Managed  


Create, update, delete, rename, save as 

groupName, gid, users 

Identity Template


Sample Forms


Also Available


Use the Identity Manager debug pages to set trace options on the following classes: