Sun Java System Access Manager 7.1 Deployment Planning Guide

Access Manager Administrative Roles

Realm Mode Administrative Roles

In Access Manager Realm mode, the Delegation plug-in works with the Identity Repository plug-in to determine a network administrator's scope of privileges. Default administrator roles are defined in the Identity Repository plug-in. The Delegation plug-in forms rules that describe the scope of privileges for each network administrator, and also specifies the roles to which the rules apply. The following table lists the roles defined in the Identity Repository and the default rule the Delegation plug-in applies to each role.

Table 3–1 Access Manager Roles and Scope of Privileges in Realm Mode

Identity Repository Role 

Delegation Rule 

Realm Administator 

Can access all data in all realms of the Access Manager information tree. 

Subrealm Administrator 

Can access all data within a specific realm of the Access Manager information tree. 

Policy Administrator 

Can access all policies in all realms of the Access Manager information tree. 

Policy Realm Administrator 

Can access policies only within the specific realm of the Access Manager information tree. 

The Authentication service and Policy service use the aggregated data to perform the authentication and authorization processes. The code for the Delegation plug-in and Identity Repository plug-in are not public in Access Manager.

Legacy Mode Administrative Roles

In Access Manager Legacy mode, delegated administration of the LDAP entries (mapped to each identity-related object in Access Manager) are implemented through the use of pre-defined roles and access control instructions (ACIs). Default administrative roles and their defined ACIs are created during Access Manager installation and can be viewed and managed using the Access Manager Console. In Access Manager 7.1 in Realm mode, roles depend on policies rather then ACIs.

When an Access Manager identity-related object is created, the appropriate administrative roles (and thus, corresponding ACIs) are also created and assigned to the LDAP entry for that object. The role can then be assigned to an individual user who maintains control of that object’s node. For example, when Access Manager creates a new organization, several roles are automatically created for it and stored in Directory Server:

The assignation of any of these roles to a user gives that user all the permissions accorded that role.

The following table summarizes the Access Manager administrator roles and the permissions that apply to each one.

Table 3–2 Default and Dynamic Roles and Their Permissions in Legacy Mode

Role 

Administrative Suffix  

Permissions 

Top-level Organization Admin (amadmin) 

Root level 

Read and write access to all entries (such as roles, policy, and groups) under top-level organization. 

Top-level Organization Help Desk Admin 

Root level 

Read and write access to all passwords under top-level organization. 

Top-level Organization Policy Admin 

Root level 

Read and write access to policies at all levels. Used by sub-organizations to delegate referral policy creation. 

Organization Admin 

Organization only 

Read and write access to all entries (such as roles, policy, and groups) under the created sub-organization only. 

Organization Help Desk Admin 

Organization only 

Read and write access to all passwords under the created sub-organization only. 

Organization Policy Admin 

Organization only 

Read and write access to all policies under the created sub-organization only. 

Container Admin 

Container only 

Read and write access to all entries (such as roles, policy, and groups) under the created container only. 

Container Help Desk Admin 

Container only 

Read and write access to all passwords under the created container only. 

Group Admin 

Group only 

Read and write access to all entries (such as roles, policy, and groups) under the created group only. 

People Container Admin 

People Container only 

Read and write access to all entries (such as roles, policy, and groups) under the created people container only. 

User (self-administrator) 

User only 

Read and write access to attributes in the user entry only (except for user attributes such as nsroledn and inetuserstatus).

Using roles instead of group-based ACIs is more efficient and requires less maintenance. Filtered roles are simpler for LDAP clients, because they can just ask for the nsRole attribute of a user. Roles do suffer though from scope limitations, where a role must be a peer of a parent of a member of that role.

For more information about default ACIs, see the Access Manager Console Online Help.