Oracle® Internet Directory Administrator's Guide 10g (9.0.4) Part Number B12118-01 |
|
Delegation of Privileges for an Oracle Technology Deployment, 3 of 5
Administrative privileges are delegated to either Oracle components that use the identity management infrastructure or to end users themselves. A privilege can be delegated to either an identity--for example, a user or application--or to a role or group.
This section contains these topics:
To delegate administrative privileges, the Oracle Internet Directory super user does the following:
This realm administrator, in turn, delegates certain privileges that Oracle components require to the Oracle defined roles--for example, Oracle Application Server administrators. The Oracle components receive these roles when they are deployed.
In addition to delegating privileges to roles specific to Oracle components, the realm administrator can also define roles specific to the deployment--for example, a role for help desk administrators--and grant privileges to those roles. These delegated administrators can, in turn, grant these roles to end users. In fact, because a majority of user management tasks involve self-service--like changing a phone number or specifying application-specific preferences--these privileges can be delegated to end users by both the realm administrator and Oracle component administrators.
In the case of a group, one or more owners--typically end users--can be identified. If they are granted the necessary administrative privileges, then these owners can manage the group by using Oracle Internet Directory Self-Service Console, Oracle Directory Manager, or command-line tools.
Managing users involves privileges to:
The access control policy point (ACP) for creating users is at the Users container in the identity management realm.
This section describes each of these privileges in more detail.
To create users for a realm, an administrator must be a member of the Subscriber DAS Create User Group. Table 17-3 describes the characteristics of this group.
To modify user attributes, an administrator must be a member of the Subscriber DAS Edit User Group. Table 17-4 describes the characteristics of this group.
To delete a user in a realm, an administrator must be a member of the DAS Delete User Group. Table 17-5 describes the characteristics of this group.
A delegated administrator can perform specified operations within the directory and requires permission to add any user to the User Creation, User Edit, or User Delete Groups described previously.
To grant user administration privileges to a delegate administrator, the granting administrator must be a member of the User Privilege Assignment Group. Table 17-6 describes the characteristics of this group.
Managing users and groups involves privileges to:
The ACP for creating groups is at the Groups container in the identity management realm.
To create groups in Oracle Internet Directory, an administrator must be a member of the Group Creation Group. Table 17-7 describes the characteristics of this group.
To modify the attributes of groups under the Groups container in a realm, an administrator must be a member of the Group Edit Group. Table 17-8 describes the characteristics of this group.
To delete groups, an administrator must have membership in the Group Delete Group. Table 17-9 describes the characteristics of this group.
To delegate group administration to other users--that is, to add or remove users from the Group Creation, Group Edit, or Group Delete Groups described previously--an administrator must be a member of the Group Privilege Assignment Group. Table 17-10 describes the characteristics of this group.
|
![]() Copyright © 1999, 2003 Oracle Corporation. All Rights Reserved. |
|