Prerequisites
Powerscale Connector Prerequisites
Verify your system fits the descriptions below before starting the installation.
Pre-software Requirements
EMC Isilon - OneFS 7.1 and above
EMC Common Event Enabler - CEE 6.5 and above
Required Permissions
Data Access Security requires different permissions, based on the tasks that require those permissions. The user configured in the Application configuration wizard must have the following permissions on the Access Zone:
- Share Read permissions to all share
- Member of the local Backup Operators group
- Ability to list shares
Add required permissions by creating a new role and associating the user with that role in one of the following ways:
Add Permissions via the Cluster Management Web Interface
- Log in to the OneFS Cluster Management Web interface.
- Select Access > Membership and Roles.
- Select the Roles tab.
- Select Create Role.
- Enter a name for the Role (ex. DataAccessSecurity)
- Select Add a member to this role and add the Data Access Security user which will be used in the Application Configuration wizard.
- Scroll down and select Add a privilege to this role and add the following privileges:
- ‘Platform API: Log in to the Platform API and WebUI’ – read_only Access
- Auth: Configure Identities and authentication sources – read_only Access
- Audit: Configure audit capabilities – read_only Access
- SMB: configure SMB server – read_only Access
Add Permissions via the Cluster Management Shell
Run the following commands from the cluster management shell:
isi auth roles create FileAccessManager
isi auth roles modify FileAccessManager --add-priv-ro=ISI_PRIV_LOGIN_PAPI
isi auth roles modify FileAccessManager --add-priv-ro=ISI_PRIV_SMB
isi auth roles modify FileAccessManager --add-priv-ro=ISI_PRIV_AUTH
isi auth roles modify FileAccessManager --add-priv-ro=ISI_PRIV_AUDIT
isi auth roles modify FileAccessManager --add-user=’<domain>\<user>’
Add Permissions via Built-in Roles
Associate the user with the SystemAdmin and SecurityAdmin built-in roles.
isi auth roles modify SystemAdmin --add-user=’<domain>\<user>’
isi auth roles modify SecurityAdmin --add-user=’<domain>\<user>’
Configuring the CLI
To enable auditing - isi audit settings global modify --protocol-auditing-enabled on
To disable auditing - isi audit settings global modify --protocol-auditing-enabled off
Add access zone to audit - isi audit settings modify --audited-zones <ZONE>
View audit settings - isi audit settings global view
Audit Event Configuration Using CLI
To enable specific audit events - isi audit settings modify --audit-success create, rename, delete, read, write, get_security, set_security
To enable all audit events - isi audit settings modify --audit-success all
To monitor all the activities listed under the Monitored Activates section - Enable all audit events
Communication Requirements
Requirement | Source | Destination | Port |
---|---|---|---|
Permissions Collection & Data Classification | Permissions Collection Virtual Appliance and / or Data Classification Virtual Appliance | Powerscale | SMB 445 |
Documentation Feedback
Feedback is provided as an informational resource only and does not form part of SailPoint’s official product documentation. SailPoint does not warrant or make any guarantees about the feedback (including without limitation as to its accuracy, relevance, or reliability). All feedback is subject to the terms set forth at https://developer.sailpoint.com/discuss/tos.