今回はMIM Serviceの管理ポリシールール(Management Policy Rule/MPR)が現行バージョンであるForefront Identity Manager 2010R2 SP1(FIM)とどのように変わったのかを見てみます。
※MIM 2015 CTP3とFIM 2010R2 SP1を比較していますので、リリースまでに変わる可能性があります。
以下のスクリプトで定義されているMPR一覧が取得できるので、変化点を見てみましょう。
Add-PSSnapin FIMAutomaion
$curObject = Export-FIMConfig -Uri http://localhost:5725/resourcemanagementservice -OnlyBaseResources -CustomConfig ("/ManagementPolicyRule")
foreach ($fimobject in $curObject)
{
$attributes = $fimobject.ResourceManagementObject.ResourceManagementAttributes
$displayName = $attributes | where {$_.AttributeName -eq 'DisplayName'}
write-host $displayName.Value
}
結果、以下の通りとなりました。
色を付けた部分のセルが新規追加になっているMPRです。
PAM(Privilege Access Management/特権アカウント管理)部分だけですね。
| MPR一覧 |
|---|
| Administration - Schema: Administrators can change selected attributes of non-system attribute type descriptionresources |
| Administration - Schema: Administrators can change selected attributes of non-system binding description resources |
| Administration - Schema: Administrators can change selected attributes of non-system schema related resources |
| Administration - Schema: Administrators can change selected attributes of schema related resources |
| Administration - Schema: Administrators can create attribute type description resources |
| Administration - Schema: Administrators can create binding description resources |
| Administration - Schema: Administrators can create resource type description resources |
| Administration - Schema: Administrators can delete non-system schema related resources |
| Administration: Administrators can control requests |
| Administration: Administrators can control synchronization configuration resources |
| Administration: Administrators can delete non-administrator users |
| Administration: Administrators can read all resources |
| Administration: Administrators can read and update Users |
| Administration: Administrators can update synchronization filter resources |
| Administration: Administrators control configuration related resources |
| Administration: Administrators control management policy rule resources |
| Administration: Administrators control set resources |
| Administration: Administrators control synchronization rule resources |
| Administration: Administrators control workflow definition resources |
| Administrators have full control over filter scope resources |
| Anonymous users can reset their password |
| Button viewable management: Members could read all attributes of the sets in all button viewable sets |
| Distribution list management: Owners can read attributes of group resources |
| Distribution list management: Owners can update and delete groups they own |
| Distribution list Management: Users can add or remove any members of groups subject to owner approval |
| Distribution list management: Users can add or remove any members of groups that don't require owner approval |
| Distribution List management: Users can create Static Distribution Groups |
| Distribution list management: Users can read selected attributes of group resources |
| General workflow: Filter attribute validation for administrator |
| General workflow: Filter attribute validation for non-administrators |
| General workflow: Registration initiation for authentication activity |
| General: Users can read non-administrative configuration resources |
| General: Users can read schema related resources |
| Group management workflow: Group information validation for dynamic groups |
| Group management workflow: Group information validation for static groups |
| Group management workflow: Owner approval on add member |
| Group management workflow: Validate requestor on add member to open group |
| Group management workflow: Validate requestor on remove member |
| Group management: Group administrators can create and delete group resources |
| Group management: Group administrators can read attributes of group resources |
| Group management: Group administrators can update group resources |
| [新規]PAM: Administrators control PAM Requests |
| [新規]PAM: Administrators control PAM Roles |
| [新規]PAM: User can read Pam Roles that he can request |
| [新規]PAM: User can see PAM requests that he created |
| [新規]PAM: Users can create a PAM Request |
| Password reset users can read password reset objects |
| Password Reset Users can update the lockout attributes of themselves |
| Reporting Administration: Administrators can control reporting binding resources. |
| Reporting Administration: Administrators can control reporting job resources. |
| Request management: Request approvers can read their approval resources |
| Request management: Request approvers can read their approval response resources |
| Request management: Request creators can cancel their requests |
| Request management: Request creators can read related approval response resources |
| Request management: Request creators can read their approval resources |
| Request management: Request creators can read their request resource |
| Request management: Request participants can read related approval resources |
| Request management: Request participants can read related approval response resources |
| Request management: Request participants can read their request resource |
| Security group management: Owners can read selected attributes of group resources |
| Security group management: Owners can update and delete groups they own |
| Security group management: Users can add or remove any member of groups subject to owner approval |
| Security Group management: Users can create Static Security Groups |
| Security group management: Users can read selected attributes of group resources |
| Security groups: Users can add and remove members to open groups |
| Synchronization: Synchronization account can delete and update expected rule entry resources |
| Synchronization: Synchronization account can read group resources it synchronizes |
| Synchronization: Synchronization account can read schema related resources |
| Synchronization: Synchronization account can read synchronization related resources |
| Synchronization: Synchronization account can read users it synchronizes |
| Synchronization: Synchronization account controls detected rule entry resources |
| Synchronization: Synchronization account controls group resources it synchronizes |
| Synchronization: Synchronization account controls synchronization configuration resources |
| Synchronization: Synchronization account controls users it synchronizes |
| Temporal policy workflow: Impending group resource expiry notification |
| User management: Users can read attributes of their own |
| User management: Users can read selected attributes of other users |
| Users can create registration objects for themselves |
| Users can modify registration objects for themselves |

0 件のコメント:
コメントを投稿