HP Intelligent Management Center v5.1 TACACS+ Authentication Manager Administrator Guide
127
L
LDAP authentication + TAM local authorization,5
LDAP Overview,75
Log management,4
Login authorization and command authorization,3
Login methods and authentication-authorization
methods,4
M
Managing audit logs,114
Managing authentication logs,105
Managing authorization logs,109
Managing device areas,29
Managing device types,32
Managing LDAP servers,76
Managing LDAP synchronization policies,83
Managing LDAP users,90
Managing users bound to an LDAP synchronization
policy,89
Modifying a command set,46
Modifying a device,25
Modifying a device area or a sub-area,31
Modifying a device type or a sub-type,34
Modifying a device user,67
Modifying a device user group or a sub-group,58
Modifying a shell profile,42
Modifying an authorization policy,52
Modifying an authorized time range policy,38
Modifying an LDAP synchronization policy,87
Modifying LDAP server settings,81
Modifying LDAP user information,96
Modifying operator privileges for device user
groups,59
Modifying the device area and type,27
O
Online user management,4
Q
Querying audit logs,115
Querying authentication logs,106
Querying authorization logs,111
Querying blacklist users,71
Querying device users,61
Querying devices,20
Querying LDAP users,92
Querying online users,101
R
Regrouping device users,69
Related information,123
Releasing a blacklisted user,104
Releasing an LDAP user from the blacklist,98
Removing device users from the blacklist,73
S
Scenario-based authorization,3
Shell profile,40
Subscription service,123
Support and other resources,123
Synchronizing LDAP users,95
T
TAM,8
TAM features,1
TAM functional structure,2
TAM local authentication and authorization,4
TAM user types,3
Testing connectivity to an LDAP server,81
U
Unbinding users with an LDAP synchronization
policy,95
V
Validating on-demand synchronization policies,90
Validating the system configuration,122
Viewing audit log details,117
Viewing authentication log details,108
Viewing authorization log details,113
Viewing authorization policy details,49
Viewing authorized time range policy details,37
Viewing blacklist user details,72
Viewing blacklist users,71
Viewing command set details,44
Viewing device area details,30
Viewing device details,20
Viewing device type details,33
Viewing device user details,63
Viewing device user group details,56
Viewing device users in a device user group or
sub-group,59
Viewing devices in a device area or sub-areas,32