Sun Identity Manager 8.1 Resources Reference

Adapter Details

Resource Configuration Notes

If you will be using SSH (Secure Shell) for communication between the resource and Identity Manager, set up SSH on the resource before configuring the adapter.

If you manage NIS accounts on Solaris, install patch 125549-01 for SPARC systems or patch 125550–01 for x86 systems to improve the performance of the logins command and the Solaris adapter.

Identity Manager Installation Notes

No additional installation procedures are required on this resource.

Usage Notes

The Solaris resource adapter primarily provides support for the following Solaris commands:

For more information about supported attributes and files, refer to the Solaris manual pages for these commands.

The adapter does not support Solaris Trusted Extensions.

When a rename of a user account is executed on a Solaris resource, the group memberships are moved to the new user name. The user’s home directory is also renamed if the following conditions are true:

The Bourne-compliant shell (sh, ksh) must be used as the root shell when connecting to a UNIX resource (AIX, HP-UX, Solaris, or Linux).

The administrative account that manages Solaris accounts must use the English (en) or C locale. This can be configured in the user’s .profile file.

In environments in which NIS is implemented, you can increase performance during bulk provisioning by implementing the following features:

New user accounts on Solaris resources remain locked until the passwd(1) command is executed. After the user account on Solaris has been created, executing passwd -s <user> will show the status as locked(LK). After an account is created natively, the “Locked out Accounts” section of the Solaris Risk Analysis report will report the newly created account. In addition, the “Accounts With No Password” section of the Risk Analysis report will not list the newly created account.

Do not use control characters (for example, 0x00, 0x7f) in user passwords.

Security Notes

This section provides information about supported connections and privilege requirements.

Supported Connections

Identity Manager can use the following connections to communicate with the Solaris adapter:

For SSHPubKey connections, the private key must be specified on the Resource Parameters page. The key must include comment lines such as --- BEGIN PRIVATE KEY --- and --- END PRIVATE KEY --. The public key must be placed in the /.ssh/authorized_keys file on the server.

Required Administrative Privileges

The adapter supports logging in as a standard user, then performing a su command to switch to root (or root-equivalent account) to perform administrative activities. Direct logins as root user are also supported.

The adapter also supports the sudo facility (version 1.6.6 or later), which can be installed on Solaris 9 from a companion CD. sudo allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root or another user.

In addition, if sudo is enabled for a resource, its settings will override those configured on the resource definition page for the root user.

If you are using sudo, you must set the tty_tickets parameter to true for the commands enabled for the Identity Manager administrator. Refer to the man page for the sudoers file for more information.

The administrator must be granted privileges to run the following commands with sudo:

User and Group Commands  


NIS Commands  

Miscellaneous Commands  

  • auths

  • groupadd

  • groupdel

  • groupmod

  • last

  • listusers

  • logins

  • passwd

  • profiles

  • roles

  • useradd

  • userdel

  • usermod

  • make

  • ypcat

  • ypmatch

  • yppasswd

  • awk

  • cat

  • chmod

  • chown

  • cp

  • cut

  • diff

  • echo

  • grep

  • ls

  • mv

  • rm

  • sed

  • sleep

  • sort

  • tail

  • touch

  • which

You can use a test connection to test whether

Note –

A test connection can use different command options than a normal provision run.

The adapter provides basic sudo initialization and reset functionality. However, if a resource action is defined and contains a command that requires sudo authorization, then you must specify the sudo command along with the UNIX command. (For example, you must specify sudo useradd instead of just useradd.) Commands requiring sudo must be registerd on the native resource. Use visudo to register these commands.

Provisioning Notes

The following table summarizes the provisioning capabilities of this adapter.



Enable/disable account 

Solaris does not natively support Identity Manager enable and disable actions. Identity Manager simulates enabling and disabling accounts by changing the user password. The changed password is exposed on enable actions, but it is not exposed on disable actions.

As a result, enable and disable actions are processed as update actions. Any before or after actions that have been configured to operate on updates will execute. 

Rename account 


Pass-through authentication 


Before/after actions 


Data loading methods 

  • Import directly from resource

  • Reconcile with resource

You can define resource attributes to control the following tasks for all users on this resource:

Account Attributes

The following table lists the Solaris user account attributes. Attributes are optional unless noted in the description. All attributes are Strings.

Identity System User Attribute  

Resource User Attribute  




Required. The user’s login name. 



The user’s full name. 

Home directory


The user’s home directory. Any value specified in this account attribute takes precedence over a value specified in the Home Base Directory resource attribute.

Expiration date


Last date the account can be accessed. This attribute is not supported for NIS accounts. 

Primary group


The user’s primary group. 



Number of days the account can be inactive before it is locked. Not supported for NIS accounts. 

Secondary groups


A comma-separated list of the user’s secondary group or groups. 

To enable a role to provision this attribute, you must add ’csv=true’ to the RoleAttribute element in the Role object XML.

Login shell


The user’s login shell. 

If you are provisioning to an NIS master, the value of the user shell will be checked on the NIS master only. Checks against other machines the user may log on to will not be performed. 

Last login time


The date and time of the last login. This value is read-only. 

User ID


The user ID, in digit form. 



A comma-separated list of authorizations. 



A comma-separated list of profiles. 



A comma-separated list of roles. 



Forces the user to supply a new password upon login. This attribute is not listed in the schema map by default. 

Resource Object Management

Identity Manager supports the following native Solaris objects:

Resource Object 

Features Supported 

Attributes Managed 


Create, update, delete, rename, save as 

groupName, gid, users 

Identity Template


Sample Forms


Also Available



Use the Identity Manager debug pages to set trace options on the following classes: