![Red Hat CERTIFICATE SYSTEM 7.3 - ADMINISTRATION Скачать руководство пользователя страница 414](http://html.mh-extra.com/html/red-hat/certificate-system-7-3-administration/certificate-system-7-3-administration_administration-manual_1427433414.webp)
Chapter 17. User and Group Authorization
392
•
Auditors.
This group is given access to view the signed audit logs. This group does not have any
other privileges.
•
Enterprise administrators.
Each subsystem instance is automatically assigned a subsystem-specific
role as an enterprise administrator when it is joined to a security domain during configuration. These
roles automatically provide trusted relationships among subsystems in the security domain, so that
each subsystem can efficiently carry out interactions with other subsystems.
•
Trusted managers.
A trusted manager is a subsystem that has a trusted relationship with another
subsystem. This group is given access to connect with and submit requests to the subsystem for
which it is a trusted manager.
17.1.2.1. Administrators
Administrators have permissions to perform all administrative tasks. A user is an administrator
by being added to the
Administrators
group. Every member of this group has administrative
privileges for this instance of Certificate System.
At least one administrator must be defined for each Certificate System instance, but there is no limit to
the number of administrators an instance can have. The first administrator entry is created when the
instance is configured.
Administrators are authenticated using their Certificate System user ID and password. It is possible to
change the authentication method to SSL client authentication. See
Section 3.2, “Enabling SSL Client
Authentication for the Certificate System Console”
for more information.
17.1.2.2. Auditors
An auditor can view the signed audit logs and is created to audit the operation of the system. The
auditor cannot administer the server in any way.
An auditor is created by adding a user to the
Auditors
group and storing the auditor's certificate in
the user entry. The auditor's certificate is used to encrypt the private key of the key pair used to sign
the audit log.
The
Auditors
group is set when the subsystem is configured. No auditors are assigned to this group
during configuration.
Auditors are authenticated into the administrative console with their UID and password. The
authentication method can be changed to SSL client authentication. See
Section 3.2, “Enabling SSL
Client Authentication for the Certificate System Console”
for more information. Once authenticated,
auditors can only view the audit logs. They cannot edit other parts of the system.
17.1.2.3. Agents
Agents are users who have been assigned end-entity certificate and key-management privileges.
Agents can access the agent services interface. For a complete list of agent tasks, see the
Certificate
System Agent's Guide
.
Agents are created by assigning a user to the appropriate subsystem agent group and identifying
certificates that the agents must use for SSL client authentication to the subsystem for it to service
requests from the agents. Each subsystem has its own agent group:
• The Certificate Manager Agents group.
Содержание CERTIFICATE SYSTEM 7.3 - ADMINISTRATION
Страница 1: ...Red Hat Certificate System 7 3 Administration Guide Publication date May 2007 updated March 25 2010 ...
Страница 15: ...xv Index 525 ...
Страница 16: ...xvi ...
Страница 38: ...Chapter 1 Overview 16 Figure 1 4 Certificate System Architecture ...
Страница 82: ...Chapter 2 Installation and Configuration 60 rpm ev rhpki manage ...
Страница 154: ...132 ...
Страница 194: ...172 ...
Страница 238: ...216 ...
Страница 244: ...222 ...
Страница 246: ...224 ...
Страница 286: ...264 ...
Страница 292: ...270 ...
Страница 318: ...Chapter 13 Certificate Profiles 296 Parameter IssuerType_n IssuerName_n ...
Страница 321: ...Freshest CRL Extension Default 299 Parameter PointName_n PointIssuerName_n ...
Страница 371: ...Configuring Mappers 349 Figure 15 9 Selecting a New Mapper Type 6 Edit the mapper instance and click OK ...
Страница 398: ...376 ...
Страница 412: ...390 ...
Страница 472: ...450 ...
Страница 500: ...Appendix A Certificate and CRL Extensions 478 Parameter namen Table A 8 IssuerAlternativeName Configuration Parameters ...
Страница 506: ...484 ...
Страница 528: ...506 ...
Страница 546: ...524 ...