
About Authorization
Chapter 9
Authorization
315
Administrators.
This group is given full access to all of the tasks available in the
administrative interface.
Agents.
This group is given full access to all of the tasks available in the agent services
interface.
Note: There is more than one agent group. A separate agent group is created for each of the
subsystem with a different name. Be careful to use the correct agent group name when
modifying ACLs. See “Groups for Agents,” on page 316.
Auditors.
This group is given access to view the signed audit logs. This group does not
have any other privileges.
Trusted Managers.
A trusted manager is a subsystem that has a trusted relationship with
another subsystem. This group is given access to connect with and submit requests to the
subsystem in which it is a trusted manager.
Administrators
Administrators have permissions to perform all the administrative tasks. You create
administrators by creating a user entry for the administrator and adding them to the group
called
Administrators
, every member of this group has administrative privileges for this
instance of CS.
At least one administrator must be defined for each CS instance, there is no limit to the
number of administrators an instance can have. You specify the user ID and password of the
first administrator during installation.
Authentication of Administrators
Administrators are authenticated using their CS user ID and password.
You can change the method of authentication for an administrator to SSL client
authentication. See “Setting up Certificate Authentication for the CS Console,” on page 241
for complete details.
Auditors
An auditor can view the signed audit logs. An auditor is set up to audit the operation of the
system. The auditor cannot administer the server in any way except to view the audit logs.
You set up an auditor by creating a user, adding them to the
Auditors
group, and storing
the auditors certificate. The auditors certificate is used to encrypt the private key of the key
pair used to sign the audit log.
An auditor group is set up when you configure a subsystem. No auditors are assigned to this
group during configuration.
Содержание CERTIFICATE 7.1 ADMINISTRATOR
Страница 1: ...Administrator s Guide Red Hat Certificate System Version7 1 September 2005 ...
Страница 22: ...22 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 128: ...Cloning a CA 128 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 230: ...Configuring Key Archival and Recovery Process 230 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 234: ...Enterprise Security Client 234 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 368: ...ACL Reference 368 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 460: ...Constraints Reference 460 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 592: ...CRL Extension Reference 592 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 676: ...Cloning the Data Recovery Manager 676 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 688: ...Security Requirements for the IT Environment 688 Red Hat Certificate System Administrator s Guide September 2005 ...
Страница 720: ...1 3 Organization Security Policies 720 Red Hat Certificate System Administrator s Guide September 2005 ...