SecHard

Pam Module Implementation

  1. Step: Creation of users;

Determining the people who will access the Pam Module.

Deciding the User types to be opened (Local or AD Account)

Determining whether the Users to be opened will use a System account or AD account when connecting to resources.

Creating users on Sechard.

  1. Step

Creation of Roles

  •   Determining the role matrices for the areas that users will access.

  •   Granting sufficient permissions for the parts that will provide access. (Create/Read/Write/Delete)

  1. Step

Assigning resorces to roles

Associete the resources that people who will be assigned to the Role will have access to,

  1. Step

Assigning resorces to roles

Associete the resources that people who will be assigned to the Role will have access to,

  1. Step

Implementation of White List / Black List structure

If there is a command restriction to be applied to users, creating White list / Black list groups and assigning them to roles.

 

SecHard