Delinea Serversuite Unix Evaluation
Delinea Serversuite Unix Evaluation
Version: 2024.x
Publication Date: 10/17/2024
© Delinea, 2024
Server Suite Unix and Linux Evaluation Guide
Version: 2024.x, Publication Date: 10/17/2024
© Delinea, 2024
Warranty Disclaimer
DELINEA AND ITS AFFILIATES, AND/OR ITS AND THEIR RESPECTIVE SUPPLIERS, MAKE NO REPRESENTATIONS
ABOUT THE SUITABILITY OF THE INFORMATION CONTAINED IN THE DOCUMENTS AND RELATED GRAPHICS, THE
SOFTWARE AND SERVICES, AND OTHER MATERIAL PUBLISHED ON OR ACCESSIBLE THROUGH THIS SITE FOR ANY
PURPOSE. ALL SUCH MATERIAL IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND. DELINEA AND ITS
AFFILIATES, AND/OR ITS AND THEIR RESPECTIVE SUPPLIERS, HEREBY DISCLAIM ALL WARRANTIES AND
CONDITIONS WITH REGARD TO SUCH MATERIAL, INCLUDING ALL IMPLIED WARRANTIES AND CONDITIONS OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, TITLE AND NON-INFRINGEMENT.
THE MATERIAL PUBLISHED ON THIS SITE COULD INCLUDE TECHNICAL INACCURACIES OR TYPOGRAPHICAL
ERRORS. CHANGES ARE PERIODICALLY ADDED TO THE INFORMATION HEREIN. DELINEA AND ITS AFFILIATES,
AND/OR ITS AND THEIR RESPECTIVE SUPPLIERS, MAY MAKE IMPROVEMENTS AND/OR CHANGES IN THE MATERIAL
DESCRIBED HEREIN AT ANY TIME.
Disclaimer of Liability
IN NO EVENT SHALL DELINEA AND ITS AFFILIATES, AND/OR ITS AND THEIR RESPECTIVE SUPPLIERS, BE LIABLE
FOR ANY SPECIAL, INDIRECT, OR CONSEQUENTIAL DAMAGES (INCLUDING LOSS OF USE, DATA, PROFITS OR
OTHER ECONOMIC ADVANTAGE) OR ANY DAMAGES WHATSOEVER, WHETHER IN AN ACTION OF CONTRACT,
NEGLIGENCE, OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF SOFTWARE, DOCUMENTS, PROVISION OF OR FAILURE TO PROVIDE SERVICES, OR MATERIAL
AVAILABLE FROM THIS SITE.
Table of Contents
Table of Contents
Unix and Linux Evaluation Guide i
Next Steps 23
Next Steps 28
Auditing Sessions 28
Install Auditing Components on Windows 28
Configure a New Audit Installation 29
Enabling Linux Desktop Auditing 29
Verify that Auditing is Enabled 30
Viewing Sessions with Predefined Queries 31
Replaying a Session 31
Managing Audited Sessions 32
Using Command Summaries 32
Exporting Sessions 33
Viewing and Editing Session Properties 33
Updating Review Status for a Session 33
Deleting Sessions 33
Creating Custom Queries 34
Intended Audience
This guide is for system and network administrators who want to evaluate Server Suite software. The guide
assumes you have a working knowledge of Windows Server and Active Directory and are familiar with Active
Directory features, functionality, and terminology. This guide also assumes you are familiar with the Linux or UNIX-
based computers you plan to manage and how to perform common administrative tasks.
To complete this evaluation, you install Server Suite software on two physical or virtual computers:
n Authentication & Privilege and Audit components on a Windows computer joined to an Active Directory
domain.
n Server Suite Agent for *NIX on a supported Linux-based or UNIX-based platform that you want to manage.
In most organizations, Server Suite software is not installed on the domain controller. However, you must be able to
connect to a domain controller from the other two computers to complete the evaluation.
n Windows Computer Requirements
n Linux and UNIX Computer Requirements
n Domain Controller Requirements
You should also verify that you have the .NET Framework, version 4.5 or later, installed. If the .NET Framework is
not installed, the setup program can install it for you. Alternatively, you can download the .NET Framework from the
Microsoft Download Center, if needed.
The Windows computer should have the following minimum hardware configuration:
RAM 256 MB
You should also verify that the Windows computer you plan to use for the evaluation is joined to the Active Directory
domain.
If you are installing the software on virtual computers, see Using a Virtual Environment for additional
guidelines.
When you configure the DNS Server, you should configure it to perform both forward and reverse lookups and to
allow secure dynamic updates.
CPU, RAM, and available disk space to run three virtual machines simultaneously. Delinea recommends the
following minimum configuration:
n CPU: at least 1.70 GHz
n RAM: at least 8 GB
n Available disk space: 15 GB
The virtual environment should also be configured to run as an isolated evaluation environment using Local/Host-
only or Shared/NAT networking.
In addition, because the virtual environment runs as an isolated network, each virtual machine should be manually
assigned its own static TCP/IP address and host name.
1. Navigate to https://www.centrify.com/free-trial/.
2. Enter your contact and company information, click the check box to indicate that you agree to the terms of use
and privacy policy, and then clickStart My Trial.
Note: You will receive an email with the next steps in downloading your free trial.
1. Open a browser on the Windows computer you plan to use for the evaluation and go to www.centrify.com.
2. In the upper area of the web page, click Login.
3. Enter your email address and your account password, then click Login.
4. Go to Support > Downloads.
5. Select Zero Trust Privileges - Enterprise to locate the latest software bundles.
6. Next to the latest version for 64-bit Windows systems, click either the ISO or ZIP button to download the
software in that format.
The latest version of the Windows software bundle is called Server Suite.
7. Close the window when the download is complete.
You can download individual platform-specific packages directly from the Delinea website to a local Linux or UNIX
computer.
1. Open a browser on the Linux or UNIX computer you plan to use for the evaluation and go to www.centrify.com.
2. In the upper area of the web page, click Login.
3. Enter your email address and your account password, then click Login.
4. Go to Support > Downloads.
5. If you want the bundle that has all of the UNIX/Linux agents:
a. Select Zero Trust Privileges - Enterprise to locate the latest software bundles.
b. Next to the Agents for UNIX/Linux - All-in-One disk, click either the ISO or ZIP button to download the
software in that format.
6. If you want the agent package just for your specific UNIX/Linux system:
a. Select Authentication Service to locate the latest software bundles for the various *NIX systems.
b. Next to the Agent for your preferred operating system, click the TGZ button to download the software in that
format.
In addition to the organizational unit for Delinea objects, you need to have Log on as a service user access rights to
start the Zone Provisioning Agent included in the package.
To confirm that your account has “Log on as a service” access rights
Next Steps
This concludes the site preparation, Server Suite software download, and permissions assessment. You are now
ready to install the software and create the fundamental elements of the evaluation environment.
1. Open Active Directory Users and Computers and select the domain.
2. Right-click and select New > Organizational Unit.
3. Deselect Protect container from accidental deletion.
4. Type the name for the organizational unit, for example, Delinea, then click OK.
To illustrate the procedure, the following steps create an organizational unit for the Active Directory groups that will
be used in the evaluation to assign user access rights to the Delinea-managed computers within the top-level
organizational unit for Delinea-specific objects.
To create an organizational unit for evaluation groups
1. In Active Directory Users and Computers, select the top-level organizational unit you created in Creating an
organizational unit for Delinea.
2. Right-click and select New > Organizational Unit.
3. Deselect Protect container from accidental deletion.
4. Type the name for the organizational unit, for example, UNIX Groups, then click OK.
In later exercises, you will use this organizational unit and add other containers to manage additional types of
information.
1. Open Active Directory Users and Computers and select the domain.
2. Select the top-level organizational unit for Delinea objects, Delinea.
3. Right-click, then select Delegate Control.
4. In the Delegation of Control wizard, click Next.
5. Click Add.
6. Search for and select the user or group for delegation, then click Next.
1. On the physical or virtual computer where you downloaded Server Suite software, double-click autorun.
2. On the Getting Started page, click Authentication & Privilege.
3. On the Welcome page click Next.
4. Review the terms of the license agreement, click I agree to these terms, then click Next.
5. Type your name and organization, then click Next.
6. Select the components to install, then click Next.
7. Accept the default C:\Program Files\Centrify location for installing components, or click Browse to select a
different location, then clickNext.
8. Click Next to disable publisher verification.
9. Review the components you have selected, then click Next to begin installing components.
10. Deselect the Configure and start Zone Provisioning Agent option, then click Finish.
Because you are going to configure the service account for the Zone Provisioning Agent in a later exercise, click
Yes to dismiss the warning about the Zone Provisioning Agent running as the local system account.
11. Click Exit to close the Getting Started page.
3. Type a name and description for the zone, for example Headquarters, then click Next.
4. Leave Use default zone type selected, and click Next.
5. Verify information about the zone you are creating, then click Finish.
You now have one parent zone. You can have multiple parent zones or a single parent zone, depending on your
needs. If you expand the Zones node, the left pane displays your new zone.
Access Manager automatically creates the Computers, UNIX Data and Authorization nodes for each zone you
create. These nodes enable you specify precise access privileges for computer and application administrators in
each zone.
A parent zone can have one or more child zones. Child zones inherit information from the parent zone. For
example, you can define access rights, roles, and role assignments in a parent zone and use them or change them
in a child zone. You will work with child zones in a later exercise.
Now that you have Access Manager installed and have configured your first zone, you are ready to install the
Server Suite Agent on a UNIX or Linux computer.
Prompt Action
Do you want to run adcheck to verify your AD environment? Enter N to skip post-installation
checks.
Enable auditing on this computer (audit and monitoring service NSS Enter Y to enable auditing.
mode)?
Do you want to continue (Y) or re-enter information? Enter Y to install the default packages.
Enable Linux Desktop auditing on this computer? Enter Y to enable Linux desktop
auditing.
If you have more than one Linux or UNIX computers included in the evaluation, repeat Step 1 through Step 7 on
each computer.
8. Verify the installation by running the adinfo command at the UNIX command prompt.
adinfo
This command-line program displays information about the Linux or UNIX computer’s status in Active Directory.
At this point, the output should show you that you are not joined, but Licensed Features are enabled.
1. Open Active Directory Users and Computers and create a new User object.
a. Fill in the First, Last, and the User logon name fields.
b. Type and confirm a password and select the Password never expires option.
c. Acknowledge the warning, click Next, then click Finish.
2. Create a new Active Directory group in the UNIX Groups organizational unit you created under the Delinea
organizational unit.
a. For the Group name enter Login Users.
b. Select Global as the scope for the group and Security for the type of group, then click OK.
3. Add the evaluation user to the Login Users group.
a. Select the user you created in Step 1, right-click and select Add to a group.
b. Select the Login Users group, then click OK.
4. Provision a UNIX profile for the new user using Access Manager.
a. Expand the Zones node and select the Headquarters, right-click, then select Add User.
b. Select the user you created for the evaluation.
c. Select Define user UNIX profile only and deselect Assign roles.
d. Accept the default values for all profile properties.
e. Review your selections, click Next, then click Finish.
5. Assign the default UNIX Login role to the Login Users group using Access Manager.
a. Expand the Authorization node under the Headquarters zone.
b. Select Role Assignments, right-click, then select Assign Role.
c. Select the UNIX Login role and click OK.
d. Click Add AD account.
e. Change the object to Find from User to Group, then search for and select the Login Users group, then click
OK.
f. Click OK to complete the role assignment.
1. Open a terminal on your joined Linux or UNIX computer and switch to the root account.
2. Run adflush to clear the Server Suite Agent for *NIX’s cache.
This step simply ensures that the agent will make a new connection to Active Directory to get the latest user and
group information.
3. Log off as root.
4. Log in using the Active Directory credentials for the evaluation user you created and added to the Login User
group.
1. Open Active Directory Users and Computers and create a new User object.
a. Fill in the First, Last, and the User logon name fields.
b. Type and confirm a password and select the Password never expires option.
c. Acknowledge the warning, click Next, then click Finish.
2. Open Active Directory Users and Computers and create a new Group object in the UNIX Groups organizational
unit.
a. For the Group name, enter EnterpriseUnixAdmins.
b. Select Global as the scope for the group and Security for the type of group, then click OK.
3. Add the administrative user to the EnterpriseUnixAdmins group.
a. Select the user you created in Step 1, right-click and select Add to a group.
b. Select the EnterpriseUnixAdmins group, then click OK.
4. Provision a UNIX profile for the new user using Access Manager.
a. Expand the Zones node and select the Headquarters, right-click, then select Add User.
b. Select the user you created for UNIX administration.
c. Select Define user UNIX profile only and deselect Assign roles.
d. Accept the default values for all profile properties.
e. Review your selections, click Next, then click Finish.
You now have a root_any_command that grants privileges to run any command in your role definitions. In the next
steps, you create a role that will give members of the EnterpriseUnixAdmins group the root_any_command
privileges.
To create and assign the UNIX administrators role
a. Expand the Authorization node under the Headquarters zone, select Role Assignments, right-click, then
select Assign Role.
b. Select the UnixAdminRights role and click OK.
c. Click Add AD Account.
d. Change the object to Find from User to Group, then search for and select the EnterpriseUnixAdmins group,
then click OK.
e. Click OK to complete the role assignment.
1. Log on to the Linux or UNIX computer using the Active Directory logon name and password you created for the
UNIX administrator.
2. Open a terminal on the Linux or UNIX computer.
3. Run a command that requires root-level privileges.
For examples, run the dzinfo command to view the rights and roles for the UNIX Login user you createdAdding
and provisioning an evaluation user and group.
dzinfo user_name
Because you are logged on as the Active Directory user and not invoking the command using your role
assignment, the command displays an error messageindicating that you are not allowed to view authorization
information for another user.
4. Re-run the command using your role assignment by typing dzdo before the command.
dzdo dzinfo user_name
The command runs successfully and returns information about the evaluation user similar to this partial output.
User: lois.lane
Forced into restricted environment: No
Role Name Avail Restricted Env
--------------- ----- --------------
UNIXLogin/Headquarters Yes None
Effective rights:
Password login
Non password login
Allow normal shell
Audit level:
AuditIfPossible
3. Select a user, then click the tabs to see details about that user’s profile, role assignments and UNIX rights.
3. Type a Zone name (Nevada) and a brief description (Western field office), then click Next.
4. Click Finish.
5. Repeat Step 1 through Step 4 giving the second child zone a different name (Delaware) and description
(Eastern web farm office).
6. Expand Child Zones and each new zone you created to view the nodes of the child zones.
To create a new Active Directory user and group for Apache administrators
1. Open Active Directory Users and Computers and create a new User object.
a. Fill in the First, Last, and the User logon name fields.
b. Type and confirm a password and select the Password never expires option.
c. Acknowledge the warning, click Next, then click Finish.
2. Open Active Directory Users and Computers and create a new Group object in the UNIX Groups organizational
unit.
a. For the Group name, enter ApacheAdmins.
b. Select Global as the scope for the group and Security for the type of group, then click OK.
3. Add the web administrator to the ApacheAdmins group.
a. Select the user you created in Step 1, right-click and select Add to a group.
b. Select the ApacheAdmins group, then click OK.
4. Provision a UNIX profile for the new user using Access Manager.
a. Expand the Zones node and select the Headquarters, right-click, then select Add User.
b. Select the user you created for web administration.
c. Select Define user UNIX profile only and deselect Assign roles.
d. Accept the default values for all profile properties.
e. Review your selections, click Next, then click Finish.
web_apachectl apachectl *: Front end command for managing the httpd daemon
web_httpasswd htpasswd * Create and update HTTP server user name and password file
These commands will be added to a new role definition, ApacheAdminRights. As an alternative to creating the
commands and role manually using Access Manager, as you did in the previous section, the following steps
illustrate how you can use an ADEdit script.
ADEdit is a command-line scripting environment included with the Delinea Agent for *NIX. You can use ADEdit
commands and scripts to modify Active Directory objects interactively directly from a UNIX or Linux computer
terminal. The sample script ApacheAdminRole illustrates how you can use an ADEdit script to create UNIX rights
and an Apache administrator role. This sample script is located in the /usr/share/centrifydc/samples/adedit directory
on the UNIX or Linux computer where you have installed the Delinea Agent.
To create the ApacheAdmin commands and the ApacheAdminRights role
1. Log on to the Linux or UNIX computer using the Active Directory logon name and password you created for the
UNIX administrator.
2. Open a terminal on the Linux or UNIX computer.
3. Change the directory to /usr/share/centrifydc/samples/adedit.
4. Run the ApacheAdminRole script.
./ApacheAdminRole
If you see the error /bin/env: bad interpreter: No such file or directory, try changing the first line in the script to
#!/usr/bin/env adedit.
5. Follow the prompts displayed to provide the following information for connecting to Active Directory:
n Domain name.
n The Active Directory account name that has administrator privileges in the organizational unit you’re using
for the Delinea zones.
n The password for the Active Directory account.
6. Select the zone from the list of zones in your domain.
For example, enter 2 to create the commands and role in the Nevada child zone or 3 to create the commands
and role in the Delaware zone. The script then creates the commands and the role in the selected zone.
using the sample script does not include the UNIX Login right for any computers.
To add more rights to the ApacheAdminRights role
1. Open the Group Policy Management utility (gpmc.msc) and expand your evaluation domain.
2. Right-click the Delinea organizational unit, and select Create a GPO in this domain, and Link it here.
3. Type a name for the new GPO (UNIX policies), then click OK.
4. Expand the Delinea organizational unit, right-click the GPO, then select Edit.
5. Expand the Computer Configuration > Policies node and select Delinea Settings.
6. Right-click and select Add/Remove Templates
7. Click Add and select all of the templates listed, click Open, then click OK.
This step adds both computer and user group policies under the Delinea Settings node. Expand Delinea
Settings to explore the specific policiesavailable. You can click the Explain tab for any group policy to see
moreinformation about what it does. The remainder of this section illustrateshow you would enable and
configure a few simple policies forDelinea-managed. You should note that all policies—including Delinea group
policies—are “Not configured” by default.
1. Expand Delinea Settings > DirectControl Settings, scroll down and double-click the Set user mapping policy.
2. Select Enabled, then click Add.
3. Type the UNIX user account name (root).
4. Click Browse to search for and select the Active Directory account to use, then click OK.
5. Click OK to enable the policy.
If you enable this policy, the root user in the zone will not be able to log in to the managed computers in
the zone.
1. Expand Delinea Settings > DirectControl Settings > Password Prompts and double-click Set login password
prompt.
2. Select Enabled.
3. Type the text string you want displayed, then click OK.
Next Steps
You now have a basic foundation for working with Server Suite software. You have created a parent zone and child
zones, provisioned users to log on to computers in those zones, defined rights and roles in different zones, and
granted Active Directory users and groups specific rights by assigning them to roles. You’ve also seen how to apply
and configure group policies for Centrify-managed computers. From here, you can experiment on your own or
explore some of the additional tools that Server Suite provides.
One strategy for adding and managing a large number of UNIX profiles is to use the Zone Provisioning Agent and
provisioning properties. The Zone Provisioning Agent can automatically provision new users with the full
complement of UNIX profile attributes when you add them to an Active Directory group. Configuring the
environment to illustrate automated provisioning with the Zone Provisioning Agent, however, requires several steps
that are only applicable if you choose that deployment scenario.
The following steps summarize the process, but are not recommended for an evaluation.
To deploy the Zone Provisioning Agent
1. Create an Active Directory service account with the “Log on as a service” user right.
2. Open the Centrify Zone Provisioning Agent Configuration Panel and configure the service to use the service
account you created for it.
3. Create or identify the Active Directory groups you will use as source groups for UNIX users.
4. Set the provisioning properties for the zone or zones where users will be automatically provisioned.
For example, open Access Manager, select the parent zone, right-click, then select Properties to see the
Provisioning properties. You can then set theActive Directory source group and how you want UNIX attributes to
be automatically generated.
5. Migrate all existing users using the appropriate override attributes into zones to preserve their profiles.
6. Start the Zone Provisioning Agent service.
Keep in mind that the Zone Provisioning Agent takes over all user provisioning if enabled for a zone. After you start
the service, you cannot use the Access Manager Add User option to add a user to the zone. This ensures that all
UIDs are unique in the domain.
If you configure the Zone Provisioning Agent, you can add and remove users from selected Active Directory groups
to automatically add or remove their UNIX profiles in a zone.
To add users after configuring zone provisioning
1. Open the users.txt file in the /usr/share/centrifydc/samples/adedit directory to add more or change names.
Use an editor that does not insert a carriage return at the end of each line. Each line must end with a line feed.
2. Run the AddUnixUsers sample script in the directory to create the Active Directory account for each UNIX user
and add each user to the Active Directory UNIX Users group.
./AddUnixUsers users.txt.
3. Follow the prompts displayed to provide the following information for connecting to Active Directory:
n Domain name.
n The Active Directory account name that has administrator privileges in the organizational unit you’re using
for the Delinea zones.
n The password for the Active Directory account.
4. Type an initial password that meets the Active Directory requirements to be used for all of the accounts added.
5. Open the Delinea Zone Provisioning Agent Configuration Panel and click Restart.
6. Open Access Manager or Active Directory Users and Computers and assign users to the appropriate Active
Directory groups to assign rights.
adcheck /usr/share/centrifydc/bin Performs operating system, network, and Active Directory tests to
verify a computer meets the system requirements for a successful
installation. For example, the install.sh script runs the adcheck
program.
adedit /usr/bin Starts the adedit application for interactive commands or running
scripts For more information about the adedit application, see
Using ADEdit.
adflush /usr/sbin Clears the computer’s agent cache. Use this after you have made
changes to Active Directory accounts to remove and replace the
previous values.
adgpupdate /usr/bin Retrieves group policies from the Active Directory domain
controller and applies the policy settings to the local computer and
current user immediately. If you do not use the command, group
policies are automatically updated at a random interval between
90 and 120 minutes.
adleave /usr/sbin Removes the local computer from the Active Directory domain.
adpasswd /usr/bin Changes the Active Directory account password for the current
user or a specified user.
adquery /usr/bin Queries Active Directory for information about users and groups.
dzinfo /usr/bin Displays information about the effective rights and roles for the
current login account.
dzdo /usr/bin Enables you to run privileged commands as root or another user.
Some UNIX commands require you to be logged on as root or as a user with root privileges. Other commands allow
different operations or return different results if you are logged on as root. For the complete list of Server Suite
command line programs you can run on Linux and UNIX computers, see the Administrator’s Guide for Linux and
UNIX. For detailed information about the options available for any command, see the man page for that command.
Using ADEdit
The Server Suite Agent for *NIX also includes the Tcl-based ADEdit program. ADEdit has two basic components:
n the adedit command-line application
n the ade_lib Tcl library
ADEdit provides a scripting language that you can use to bind to one or more Active Directory domain controllers.
You can then use ADEdit to retrieve, modify, create, and delete Active Directory objects of any kind, including
Server Suite specific objects such as zones, rights, and roles. For example, you used ADEdit and a sample script to
create rights and a role in Defining command rights and a new role for Apache administrators.
The following sections introduce a few of the key features for ADEdit. For more information about using ADEdit
commands and the ade_lib library, see the ADEdit Command Reference and Scripting Guide.
ADEdit Application
ADEdit uses Tcl as its scripting language. The Tcl scripting language includes all standard programming features,
such as variables, logical operators, and predefined functions (called “procedures” in Tcl). The ADEdit application
also includes a Tcl interpreter and Tcl core commands, which allow it to execute standard Tcl scripts, and a
comprehensive set of its own commands designed to manage Server Suite-specific objects in Active Directory.
You can use ADEdit to execute individual commands interactively or to execute sets of commands together in the
form of an ADEdit script.
The ade_lib Tcl library is a collection of Tcl procedures that provide helper functions for common Centrify-specific
management tasks such as listing zone information for a domain or creating an Active Directory user. You can
include ade_lib in other ADEdit scripts to use its commands.
The Server Suite Agent for *NIX includes several sample adedit scripts that you can run in your evaluation
environment. The scripts are in the /usr/share/centrifydc/samples/adedit directory on the UNIX or Linux computer
where you have the agent installed.
To run scripts that have the .sh extension, enter /bin/sh filename.sh.
To run scripts that do not have an extension, you can just enter ./filename.
If you get the error /bin/env: bad interpreter: No such file or directory when you run a script, this means
that the env command is not in the /bin directory. In most cases, it is in /usr/bin instead. To fix this,
change the first line in the script to:
#!/usr/bin/env adedit
The following table lists the sample scripts and the arguments.
computers-report -domain domain_ -m -p password Use -m if you want to authenticate using the
name -u AD_user_ computer account credentials instead of an Active Directory user
name -sep account. If using an Active Directory user account, use -p if you
separator want to include the user's password in the command line. If you
don’t specify this option, you are prompted for the password.
CreateChildZones -d domain_name -z -p password Use -p if you want to include the user's password in
parent_zone_ the command line. If you don’t specify this option, you are
name -u AD_user_ prompted for the password.
name
getopt-example -d domain_name - -p password Use -p if you want to include the user's password in
u AD_user_name the command line. If you don’t specify this option, you are
prompted for the password.
useracc-report -domain domain_ -m -p password Use -m if you want to authenticate using the
name -u AD_user_ computer account credentials instead of an Active Directory user
name -sep account. If using an Active Directory user account, use -p if you
separator want to include the user's password in the command line. If you
don’t specify this option, you are prompted for the password.
For more information about the sample scripts and how they can be used or modified, see the ADEdit Command
Reference and Scripting Guide.
Next Steps
You have now explored some of the additional tools available for working with Server Suite-managed computers,
including the basic features of ADEdit sample scripts and default reports. You are now ready to see how you can
use the audit and monitoring service to capture, replay, and manage user sessions on managed Linux and UNIX
computers.
Auditing Sessions
This chapter describes how to install and use the Delinea Administration and Services components. The auditing
service is a process on each managed UNIX and Linux computer that captures user session input and output and
transfers this information to a collector service. The collector service forwards the audited sessions to a database,
where it is available for review and replay.
n Install Auditing Components on Windows
n Configure a New Audit Installation
n Enabling Linux Desktop Auditing
n Check that Auditing is Enabled
n Viewing Sessions with Predefined Queries
n Replaying a Session
n Managing Audited Sessions
n Creating Custom Queries
1. On the physical or virtual computer where you downloaded Server Suite software, double-click autorun.
2. On the Getting Started page, click Audit & Monitor.
3. At the Welcome page, click Next.
4. Review the terms of the license agreement, click I accept the terms in the license agreement, then click Next.
5. Select both Centrify Administration and Centrify Services to install all components, then click Next.
6. Accept the default location for installing files by clicking Next, then click Next to proceed with the installation.
7. Confirm that the Launch Configuration Wizard box is selected by default, then click Finish.
8. Click Exit to close the Getting Started page.
1. If you have launched the new installation wizard automatically, at the Welcome page, click Next.
You can also use Audit Manager to launch the new installation wizard.
2. In the New Installation wizard, accept the default audit installation name by clicking Next.
For the evaluation, use the default installation name to automatically collect the sessions cached on the
managed computers. If you use a different name, you must manually specify the installation an audited
computer should use.
3. Select the option to create a new management database and verify the SQL Server computer name, instance
name, and database name are correct, then click Next.
4. Select Use the default NT AUTHORITY\SYSTEM account to run the stored procedures that read and write
information to the management database, then click Next.
5. Type the license key you received, then click Add or click Import to import the keys directly from a file, then click
Next.
6. Accept the default location for publishing installation information, then click Next.
7. Select the installation-wide auditing options you want to enable, then click Next.
For the evaluation, select Enable video capture recording of user activity to capture shell activity on the
audited computer, then click Next. Do not select the options that disallow the review and deletion of your own
sessions.
8. Review details about the installation and management database, then click Next.
If you have SQL Server system administrator (sa) privileges and can connect to the SQL Server instance, the
wizard automatically creates the management database.
9. Select the Launch Add Audit Store Wizard option if you want to start the Add Audit Store wizard, then click
Finish.
n The application name and window title when the user switches the focus to that application. For example, if a
user opens a web browser or a terminal window.
n Changes to the application window title that currently has focus. For example, if a user opens a web browser
and goes to a new web page, desktop auditing records the title of a web page.
Linux sessions must be running X as the primary display manager (not Wayland).
Linux desktop auditing requires shell session auditing.
To enable desktop auditing on a Linux computer
When you enable auditing, the desktop auditing module shows as Enabled. You can also see if auditing is enabled
or not for a system in the Audit Manager console.
Within a few minutes the collector service should start to retrieve session activity for the managed computer. For
more information about configuring and managing the auditing infrastructure, see the Auditing Administrator’s
Guide.
After you select a specific user, Audit Analyzer displays detailed information about each of that user’s sessions. For
each session, Audit Analyzer lists the user name who started the session, the user display name, the account name
used during the session, the name of the audited computer, the audit store used, start and end time, current state,
whether the audited session is a console or terminal client session, the review status of the session, the name of the
user that modified the status, the size of the session in kilobytes, and any comments that have been added to the
session.
In addition to the predefined queries for audited sessions, Audit Analyzer includes predefined queries for audit trail
events and predefined queries for basic reports. You can explore these queries on your own as you capture
additional activity.
Replaying a Session
If you accepted the defaults when you created the installation for auditing, you should have video capture auditing
enabled. Video capture auditing records all standard input (stdin), standard output (stdout), and standard error
(stderr) activity that occurs on the managed computer. With video capture enabled, you can select a session, right-
click, then select Replay to review the session in the session player.
At this point in the evaluation, you have had very limited activity on the Linux or UNIX computer you are managing
and auditing. Before replaying any sessions, you might want to log on to the managed computer and run several
simple UNIX shell commands, then close the UNIX terminal and log off.
To replay the sample session
4. Click the Play/Pause icon at the bottom of the session player to start or stop the session you are viewing.
You can also fast forward session playback by clicking the Speed control icon to play back at 2x or 3x the
normal speed. The dark blue playback line across the bottom of the window represents the total time of the
session. You can drag the Timepoint needle to go directly to a specific point in the session.
The Real-time icon toggles to allow you to play back a session as it was recorded in real time or move swiftly
from one user action to the next. The Session point in the lower right corner identifies the date and time of the
current point in the session playback.
5. Close the session player.
Exporting Sessions
You can export session activity to several different formats to enable you to share information for review and
analysis. After selecting a session, you can right-click to export the session to the following formats:
n As a plain text (TXT) file that includes the time of each input and output event that occurred during the session.
n As a comma separated values (CSV) file where each row represents a single command input or output line from
the terminal window.
n As a Microsoft Windows Media Video (WMV) file can be played by using any media player that supports the
WMV format. This option enables you to share the video capture of activity with auditors or other users who
don’t have access to Audit Analyzer. You should note, however, that WMV files do not include all of the
information available in the session player. For example, exporting a session to a WMV files does not preserve
information such as the session summary that includes the user name, computer, start and end time for the
session and the summary of events.
n As a uniform resource identifier (URI) by selecting Copy Session URI. This option enables you to share the
session with auditors or other users who don’t have access to Audit Analyzer. Once copied to the clipboard, you
can paste the URI into a browser to open the session for replay.
Deleting Sessions
You can select a session, right-click, then select Delete to delete a session after you have finished reviewing
activity and taken appropriate action or when it is no longer needed. Selecting this option deletes the session from
all predefined and custom query lists. For example, if you delete the session from the results for the Today
predefined query, the session might also be deleted from the results for the predefined Sessions to be Reviewed
query or any shared or private queries where it was previously listed.
If you create a quick, private, or shared query, a new node is added to the Audit Analyzer console for that type of
query under the Audit Sessions node. If you want to search for audit trail events, you can also create queries for
audit events, which are added to Audit Analyzer under the Audit Events node.
To create a new custom query
1. Open Audit Analyzer, select Audit Sessions, right-click, then select one of the following options for a new query:
n New Quick Query
n New Private Query
n New Shared Query
2. Type a name and description for the query.
3. Select the type of sessions that you want the query to find.
For example, select UNIX sessions to limit the search to only include UNIX sessions. By default, new queries
search for both UNIX and Windows sessions.
4. Select an attribute for grouping query results, if applicable.
5. Select an attribute for ordering query results within each group, if applicable.
6. Click Add to add search criteria to filter the results of the query.
7. Select an appropriate attribute from the Attribute list based on the sessions you want to find.
8. Select the appropriate criteria for the attribute you have selected, then click OK.
The specific selections you can make depend on the attribute selected. For example, if the attribute is Review
status, you can choose between “Equals” and “Not equals” and the specific review status you want to find., such
as “To be Reviewed.” If you select the attribute Comment, you can specify “Contains any of” and type the text
string that you want to find any part of.
9. Click Add to add another filter to the criteria for the query, or click OK to save the query and find the sessions
that match the criteria you have specified.
1. Expand Zones and parent and child zones to find the zone for the computer requiring an override.
2. Expand Computers to display the computer requiring an override.
3. Expand the computer name and UNIX Data.
4. Right-click Users under the selected computer, click Add User to Zone
5. Search for and select the Active Directory user.
6. Select the UNIX properties to change in the user’s UNIX profile.
For example, you can change the UID used for the selected user. The new profile attribute is only used on the
computer where you make the change.
7. Set the new value, then click OK.
For all other computers in the selected zone and in other zones, the user’s UNIX profile remains unchanged. You
can change any or all profile attributes on other computers to accommodate your legacy identity information.
Generally, you start assigning roles at the child zone and then the computer role levels. However, there are
occasions when you need to make the role assignment for a single computer. In this case, you use the computer-
level override functionality.
To make a role assignment as a computer-level override
1. Expand Zones and parent and child zones to find the zone for the computer requiring an override.
2. Expand Computers to display the computer requiring an override.
3. Expand the computer name and select Role Assignments.
4. Right-click Role Assignments under the selected computer, click Assign Role.
5. Select the role requiring a computer-specific assignment.
6. Click Add AD Account to search for and select a user or group.
1. Create Active Directory groups for the sets of users who have specific access rights.
For example, you might create a group for OracleUsers and a group for OracleAdmins in the Delinea UNIX
Groups organizational unit.
2. In Access Manager, expand Zones and parent and child zones to find the zone for the computer requiring a
computer role.
3. Expand Authorization, right-click Computer Roles, then select Create Computer Role.
4. Type the name and description, then select Create group to create the Active Directory security group for the
computers than share a common purpose.
For example, create a new global group named Oracle Servers.
5. In Access Manager, create or identify the access rights and role definitions that will be specifically applicable for
the set of computers.
For example, define the access rights appropriate for the Oracle users and for the Oracle administrators.
Add role definitions for the Oracle users (OracleLoginRights) and administrators (OracleAdminRights), then add
the appropriate rights to each role.
6. Assign the role definitions to the appropriate Active Directory groups.
For example, assign the OracleLoginRights role to the OracleUsers group and the OracleAdminRights role to
the OracleAdmins group.
7. Add the computers to the computer role group.
For example, expand Computer Roles and Oracle servers, right-click Members, then select Add Computer to
add each Oracle server to the Members node.
You can use computer roles to ensure that only specified users have access at each stage. In this case, you would
define two computer roles in the zone:
n DevelopmentSystems
n TestSystems
Now, only the members of the Developer and Tester Active Directory groups have access to the corresponding
computer role’s member computers.
1. Create an Active Directory group in the UNIX Groups organizational unit called Listed. In the description enter,
Terminated users.
2. In Access Manager, expand Zones and find the zone where the account profile is required.
3. Expand Authorization and Role Assignments, then select Assign Role.
4. Select the listed role, click Add AD Account, search for and select the select the Listed Active Directory group,
then click OK.
To terminate a user
1. Remove the user account from all of the UNIX Groups that have access rights.
2. Verify that the user has no role assignments and no effective rights in any zone.
3. Add the user account to the Listed group.
If the user rejoins the company, you simply delete the user from the Listed group and add the user to groups, as
needed.
Can Active Directory Credentials be used for Phone and Tablet Users?
Yes. Delinea offers software that enables you to authenticate users on iOS and Android devices before they can
access their company email, web, and SaaS applications. A separate evaluation package is available for you to try
out mobile device management for smart phones or tablets. Contact your sales representative for a free evaluation.
1. On the physical or virtual computer where you downloaded Server Suite software, double-click autorun.
2. On the Getting Started page, click Authentication & Privilege.
3. At the Welcome page, click Next.
4. Select Uninstall, then click Next.
5. Review the list of software to be removed, then click Next.
6. Click Finish to exit the wizard.
The Authentication & Privilege components are now removed from the host Windows computer. You should note,
however, that these steps do not remove any of the Active Directory organizational units, users, or groups you used
for the evaluation. You should manually remove these objects with Active Directory Users and Computers or ADSI
Edit.
1. On the physical or virtual computer where you downloaded Server Suite software, double-click autorun.
2. On the Getting Started page, click Audit & Monitor.
3. Select Uninstall, then click Next.
4. Click Finish to exit the wizard.
The Audit & Monitoring Service components are now removed from the host Windows computer. You should note,
however, that these steps do not remove the installation service connection point, databases, or database
instances. You should manually remove these objects with ADSI Edit and Microsoft SQL Server Management
Studio.