isecurity user profile & system value replication
TRANSCRIPT
Power i
User Profile
Replication Log Showing
Statistical info: Sent, Done, Errors, Wait
As well as each sent request in
full
iSecurity Standard User Profile Replication
Power i
User Profile
User Profile
Power i
User Profile
Report
Replication Rules: Decide
DestinationPower i
Replication
Auto Interception of:• CRTUSRPRF• CHGUSRPRF• DLTUSRPRF• CHGPWD
Power i
User Profile
iSecurity User Profile/Password Replication - Features
• Flexible user-defined replication rules defining user profiles, passwords and parameters to be replicated
• Definition of destination system(s) for replication• Bulk updates of user profiles• Setting of System Values to optimal value or site-defined baseline
values• Replication of all, group or individual system values • Collection & display of network-wide replication results• Revival of deleted users, with an option to modify parameters• Can be initiated from any system in the environment and does not
require special commands
System Values Table and Dialog Box
Current, Optimal (as set in Compliance Evaluator) and Baseline (as saved in the past) values displayed. New value, Optimal Value or Baseline value can be set.