AIX Default Attributes
For the AIX service type, Identity Manager provides a set of default attributes.
Employee information page
The following list contains the default attributes. The administrator can remove attributes from or add attributes to the list.
For more information about other attributes, refer to your specific adapter installation and configuration guide.
- User ID
- Type the login user ID for the user.
- Gecos (comments)
- Type general descriptive information about the user.
- UID number
- Type the user ID number for the user.
Access information page
- UNIX Shell
- Specify a default command shell for the account.
- Account expiration date : Date
- Specify a date for when the account expires.
- Account expiration date : Time
- Specify a time that the account expires on the date specified in the Account expiration date : Date field. Alternatively, select Never to set the account to never expire.
- UNIX umask
- Specify the read, write, and execute permissions to be used by the account for a default file creation mask.
- Home directory permissions
- Specify the access used by the account as a default change file mode value for the user home directory.
Administration choices(1) page
- Force a password change?
- Select this check box to force the user to change the password for this account when logging in for the first time.
- Primary group
- Specify the name of the group to use as the primary group of the user.
- Secondary group
- Specify the name of the group to use as the secondary group of the user.
- Groups that can use the su command on this user
- Specify the name of the group that can use the UNIX su command on the user.
- Groups to be administered
- Specify the groups to administer.
- Home directory
- Type the fully qualified UNIX path for the home directory of the user account.
- Password maximum age
- Type the maximum number of weeks that the password for the account is valid.
- Password minimum age
- Type the minimum number of weeks that the password for the account is valid.
- Password warning age
- Type the number of days before the date that a password expires that a warning is issued to the user.
- Administrative roles
- Specify the administrative roles for the user.
- Additional mandatory methods for authenticating the user
- Specify other mandatory authentication methods.
- Additional optional methods for authenticating the user
- Specify other optional authentication methods.
- Allow at jobs?
- Select this check box to enable this account to run an at job.
- Allow cron jobs?
- Select this check box to enable this account to run a cron job.
Administration choices(2) page
- Audit class
- Specify the list of audit classes for the user.
- Allow user to execute daemon process?
- Select this check box to enable the user to run daemon processes on the system.
- Allow user to log in to the system?
- Select this check box to enable the user to log directly into the system.
- Allow user to remotely login to the system?
- Select this check box to enable the user to log into the system remotely.
- Can another user switch user to this user?
- Select this check box to enable another user to use the UNIX su command on this user.
- Is this user an administrator?
- Select this check box to designate the user as an administrator of the system.
- Trusted path status
- Select the default trusted path status for the account.
- always
- Specifies that the user that is confined to the trusted path.
- /notsh
- Specifies that the user session ends if the secure attention key (SAK) signal is detected.
- nosak
- Specifies that the SAK key is disabled.
- on
- Specifies that the standard trusted path management is used.
- Soft limit for largest core size
- Specify the soft limit for the largest core file that the user's process can create.
- Soft limit for maximum amount of CPU utilization
- Specify the soft limit for the largest amount of system unit time (in seconds) that the user's process can use.
- Soft limit for largest data segment
- Specify the soft limit for the largest process data segment for the user's process.
- Soft limit for largest file size
- Specify the soft limit for the largest file that the user's process can create or extend.
- Soft limit for largest stack segment
- Specify the soft limit for the largest process stack segment for the user's process.
- Largest core size
- Specify the largest core file that the user's process can create.
- Maximum CPU utilization
- Specify the largest amount of system unit time (in seconds) that the user's process can use.
- Largest data segment
- Specify the largest process data segment for the user's process.
- Largest file size
- Specify the largest file that the user's process can create or extend.
- Largest stack segment
- Specify the largest amount of physical memory that the user's process can allocate.
- Allowed login time
- Specify the days and times that the user is allowed to access the system.
- Allowed number of login retries before locking the account
- Specify the number of failed login attempts before the account is locked.
- Maximum number of days the account can remain valid after the password expires
- Specify the maximum time (in weeks) that the account can remain active after the password for the account has expired.
- Minimum alphabetic characters in password
- Specify the minimum number of alphabetic characters that must be included in the password for the account.
- Minimum difference between the current and last password
- Specify the minimum number of characters that are required in a new password that were not in the old password.
- Maximum number of characters that can be repeated in a password
- Specify the maximum number of characters in a password that can be repeated.
- Minimum length of the password
- Specify the minimum length of the password.
- Password restriction methods
- Specify password restriction methods to the account.
- Password dictionaries used to restrict passwords
- Specify the password dictionary files that are used to restrict which passwords can be used by the account.
- Number of previous passwords that cannot be reused
- Specify the number of passwords to be kept in the password history.
- Account last accessed on
- Specify a value for the last access date and time.
- Valid terminals allowed to access the account
- Specify which terminals can log in using this account.
- System authentication mechanism for the user
- Specify the authentication mechanism the system uses to authenticate the user.
- Authentication registry where the user is administered
- Specify the registry that is used for authenticating the user.