SecHard
Pam Module Implementation
Step: Creation of users;
Determining the people who will access the Pam Module.
Deciding the User types to be opened (Local or AD Account)
Determining whether the Users to be opened will use a System account or AD account when connecting to resources.
Creating users on Sechard.
Step
Creation of Roles
Determining the role matrices for the areas that users will access.
Granting sufficient permissions for the parts that will provide access. (Create/Read/Write/Delete)
Step
Assigning resorces to roles
Associete the resources that people who will be assigned to the Role will have access to,
Step
Assigning resorces to roles
Associete the resources that people who will be assigned to the Role will have access to,
Step
Implementation of White List / Black List structure
If there is a command restriction to be applied to users, creating White list / Black list groups and assigning them to roles.
SecHard