While the Agent stores user credentials and settings locally, it can synchronize the credentials and settings with remote file systems, directories, databases, devices, and so on.
Logon Manager settings, which control the UI, implement security, enable, disable, and configure features, and more.Įach of these customization decisions impacts multiple stages of planning, deployment, use, and management.
Password policies, which propagate enterprise security policies, improve security, and (when automated) improve usability. Mobility Support, to provide location transparency and automatic backup and restore.Įvent Logging, which enables Logon Manager to log various events such as logons, password changes, and so on.įirst-time use, which customize the user setup process to meet an organizations needs and improve usability. Applications include Windows applications, host applications, and Web applications. Some of the most commonly-customized functions are:Īpplication Templates, which improve usability by letting users select from a predefined logon list. It can work with its default installation settings however, you have the flexibility to tailor its functionality to the specific needs of any organization. Logon Manager ships with the configuration information for popular applications built in. For more information on host emulators, see Section 7.2.4, "Configuring Host Emulators." (Default: The Agent works with all supported emulators but requires emulator configuration for some emulators.) Oracle recommends that you configure host emulators to work with the Agent before deploying Logon Manager.įor more information on adding additional application configurations, see Creating and Using Templates. You determine which, if any, the Agent will recognize. (Default: All modules install, but Host support is disabled.) Logon Manager supports many host emulators.
You determine whether to install support for Web and/or Host applications. Access Manager acquires the credentials from the Shell. It interfaces with Access Manager to supply the proper credentials to each application. The interface that performs these evaluations is the Intelligent Agent Response. When an application presents a request for credentials, the Agent detects this event, determines the appropriate action, and responds with the correct credentials.
Section 2.20, "Provisioning Gateway Overview" Section 2.17, "Configuring the Agent with Global Agent Settings" Section 2.16, "Configuring Logon Manager for Specific Environments" Section 2.14, "Configuring a Specific Application"
Section 2.13, "Creating New Applications" Section 2.12, "Creating and Using Templates" Section 2.9, "Working with User Exclusions" Section 2.8, "Working with Credential Sharing Groups" Section 2.4, "Configuring the Server for Logon Manager" Section 2.3, "Considerations Before Deploying Logon Manager" In this chapter, you will learn about the following:
This section describes the procedures and settings in the Administrative Console, and how to use them to configure repositories, connections, and Logon Manager for your end-users. 2 Using the Administrative Console to Configure Logon Manager