Skip to end of metadata
Go to start of metadata

Table of Contents

Introduction

Description

Linux Connector could manage a lot of services running on Linux systems (either 32 or 64 bits).

Managed Systems

This connector has implemented several ways to communicate with services on Linux, below, the list of those services:

  • Shell
  • SSH
  • Cisco ASA
  • Exchange
  • Power Shell


If your system is not in the previously list, it's possible to include it easily!

For more information to check if your system may be synchronized with this connector you do not hesitate to contact us through our Contact form

Prerequisites

A Soffid Synchronization Server must be installed on the managed Linux system.

Download and install

This addon is located in the Connectors section and its name is Shell Connector.

For download and install the addon you could review our generic documentation about this process: Addons installation

Agent configuration

Basics

Generic parameters

After the installation of the addon, you may create and configure agent instances.

To configure this Shell Connector you could select one agent, from the next list of available agents, in the attribute "Type" of the generic parameters section in the agents page configuration.

  • Shell Agent
  • SSH Agent
  • Cisco ASA Agent
  • Exchange Agent
  • Power Shell Agent

 

For more information about how you may configure the generic parameters of the agent, see the following link: Agents configuration

Custom parameters

Below, there are the specific parameters for each agent implementation.

Shell Agent

ParameterDescription
Shell

Shell to assign to new users

PersistentTwo options [ Yes , No ].
Prompt
 
Password hash algorithm
For example SHA1, SHA-256
Password hash prefix
For example SHA
Enable debug
Two options: [ Yes / No ]. When it is enabled more log traces are printed in the Synchronization Server log

 

SSH Agent

ParameterDescription
User nameUser Linux for the SSH connection

Key file (optional)

 
PasswordPassword of the user Linux
ServerHost or IP of the server for the SSH connection
Password hash algorightmFor example SHA1, SHA-256
Password hash prefixFor example SHA
CharsetFor example: UTF-8
Enable debugTwo options: [ Yes / No ]. When it is enabled more log traces are printed in the Synchronization Server log


Cisco ASA Agent

ParameterDescription
User nameUser Linux

Key file (optional)

 
PasswordPassword of the user Linux
Privileged password 
ServerHost or IP of the server
CharsetFor example: UTF-8
Enable debugTwo options: [ Yes / No ]. When it is enabled more log traces are printed in the Synchronization Server log


Exchange Agent

ParameterDescription
User nameExchange user
PasswordPassword of the exchange user
Exchange server PS script (ConnectExchange.ps1) 
Enable debugTwo options: [ Yes / No ]. When it is enabled more log traces are printed in the Synchronization Server log


Power Shell Agent

ParameterDescription
Startup script 
Password hash algorightmFor example SHA1, SHA-256
Password hash prefixFor example SHA
Enable debugTwo options: [ Yes / No ]. When it is enabled more log traces are printed in the Synchronization Server log

Attribute mapping

The "Attribute Mapping" tab is accessible for all the agents for the three types: properties, attributes and triggers.

This connector could manage Users, Groups and Roles.

Users

  • Any user or account will be created at /etc/passwd file.
  • Home directories will be created using default linux configuration properties.
  • If stated, samba users will be mapped for each managed linux user.
  • Soffid passwords expiration date will be managed by Soffid. So, Linux won't be notified about when those passwords needs to be expired.

Groups

  • Groups will be created and removed as linux groups.

Roles

  • Roles bound to this system will be created as linux groups.
  • Any removed role will trigger the bound linux group to be removed.

Properties

You can map user, groups and role objects. These are some of the properties to be mapped in those objects:

PropertyDescription
checkfgrep $user /etc/passwd
deleteuserdel $user
insertuseradd $user
selectAllcat /etc/passwd
selectAllParse([^:]*):[^\n]*
selectByAccountNamefgrep $user /etc/passwd
selectByAccountNameParse([^:]*):[^\n]*
updateusermod $user
updatePassword-
validatePassword-

For the "Cisco ASA Agent" has these attributes:

PropertyDescription
checkshow run user $user
checkAttributesuser level
checkParseusername ([^ ]+) password.*privilege (\d+)\r\n
deleteno username $user
insertusername $user password $password encrypted privilege $level
selectAllshow run user
selectAllAttributesuser level
selectAllParseusername ([^ ]+) password.*privilege (\d+)\r\n
selectByAccountNameshow run user
selectByAccountNameParseusername ([^ ]+) password.*privilege (\d+)\r\n
selectByAccountNamelAttributesuser level
updateusername $user password $password encrypted privilege $level
updatePasswordusername $user password $password encrypted privilege $level

For the "Exchagne Agent" has these attributes:

PropertyDescription
checkfgrep $user /etc/passwd
deleteuserdel $user
insertNew-Mailbox -UserPrincipalName "${UserPrincipalName}" -Name "Shell plugin" -Alias "${Alias}" -Room
selectAllGet-Mailbox
selectByAccountNameGet-Mailbox "Shell plugin"
updateusermod $user
updatePassword-
validatePassword-

Attributes

You can map user, groups and role objects. These are some of the attributes to be mapped in those objects:

System attributeDescription
useraccountName
this{"1"}accountName

For the "Cisco ASA Agent" has these attributes:

System attributeDescription
levelattributes{"level"}
useraccountName
passwordpassword

For more information about how you may configure attribute mapping, see the following link: Soffid Attribute Mapping Reference

Triggers

"Cisco ASA Agent" has no implemented this feature.

Pending to be documented.

 

For example:

Load triggers

Pending to be documented.

Account metadata

Pending to be documented.

Operational

Monitoring

After the agent configuration you could check in the monitoring page if the service is running in the Synchronization Server, please go to "Start Menu > Monitoring and reporting > System monitoring".

Tasks

Authoritative

If you are checked "Authorized identity source", an automatic task to load identities from the managed system to Soffid is available, please go to "Start Menu > Processes and Tasks > Manage automatic tasks", and you will something like "Import authoritative data from <AGENT_NAME>".

Reconcile

If your are configured the "Attribute Mapping" tab with some of our objects: "user, account, role, group or grant", an automatic task to synchronize these objects from the managed system to Soffid is available, please go to "Start Menu > Processes and Tasks > Manage automatic tasks", and you will something like "Reconcile all accounts from <AGENT_NAME>".

Synchronization

About the synchronization of the objects, there are two possible options:

  • If you are checked the generic attribute "Read Only" in the "Basics" tab, only the changes in the managed systems will be updated in Soffid. We recommend this options until the global configuration of Soffid will be tested.
  • If you are not checked the generic attribute "Read Only" in the "Basics" tab, all the changes in Soffid or the managed system will be updated in the other. Note that this synchronization must be configured in the "Attribute mapping" tab correctly.

 

  • No labels