ISecurity User Profile & System Value Replication.

19
iSecurity User Profile & System Value Replication

Transcript of ISecurity User Profile & System Value Replication.

iSecurityUser Profile

&System Value Replication

Power i

User Profile

Replication Log Showing

Statistical info: Sent, Done, Errors, Wait

As well as each sent request in

full

iSecurity Standard User Profile Replication

Power i

User Profile

User Profile

Power i

User Profile

Report

Replication Rules: Decide

DestinationPower i

Replication

Auto Interception of:• CRTUSRPRF• CHGUSRPRF• DLTUSRPRF• CHGPWD

Power i

User Profile

iSecurity User Profile/Password Replication - Features

• Flexible user-defined replication rules defining user profiles, passwords and parameters to be replicated

• Definition of destination system(s) for replication• Bulk updates of user profiles• Setting of System Values to optimal value or site-defined baseline

values• Replication of all, group or individual system values • Collection & display of network-wide replication results• Revival of deleted users, with an option to modify parameters• Can be initiated from any system in the environment and does not

require special commands

Rule Based

Mass Update Command

Network Wide Replication Results Collected

Statistical Display

Keeps List of Deleted Users

Possibility to Modify Parameters

Specific Command CHGAUSV

Network Wide Results Collected

Statistical Display

Replication Options on GUI Navigator Tree

Replicate Users Dialog Box

Revive Deleted Users Dialog Box

System Values Table and Dialog Box

Current, Optimal (as set in Compliance Evaluator) and Baseline (as saved in the past) values displayed. New value, Optimal Value or Baseline value can be set.

User replication rules table. Specific operations and common attributes can be selected.

Replication history log including target system, result and actual CHGUSRPRF command invoked.

Please visit us at www.razlee.com

Thank You !