User accounts
The TrueSight Server Automation product creates various user accounts during component installation:
Account | Details | Password | Notes |
---|---|---|---|
BladeLogicRSCD On a domain controller: |
|
| The default random password length can be configured using chapw/agentctl command. Refer Changing-the-BladeLogicRSCDDC-account-password-on-domain-controllers. Password can be changed using the chapw command. The password is stored in the registry using the CryptProtectData function. If an Automation Principal is used exclusively, you can remove this user account using chapw. During RSCD Agent installation on a domain controller, user must provide a password for BladeLogicRSCDDC user. As BladeLogicRSCDDC account is shared across all domain controllers in the domain, the same password must be provided when installing RSCD Agent on all domain controllers in that domain. |
truesight |
|
| Account is created with a locked password. The Smart Agent process starts as a root user and it changes to the truesight user immediately. Therefore, the Smart Agent runs with the truesight user for most of the time. When the Smart Agent requires to perform the operations that need super user privileges, it changes to the root user to perform the operations. After these operations are completed, it changes back to the truesight user. |
bluser |
|
If the password is set to expire due to GPO settings, you must ensure that password is reset periodically on all systems before it expires. The new password is updated in TrueSight Server Automation using BLCLI LowPrivUser command. For more information, see LowPrivUser - setPassword.
| This user account is used for restricting access to the Application Server file system. As part of execution of few jobs, the Application Server needs to spawn some of the external commands or scripts on the Application Server hosts. Therefore, these commands or scripts (wherever required) are spawned with this user account so that those commands or scripts run with this user's privileges. On Windows, the account is created during the Application Server service startup and removed during the Application Server uninstallation. On Linux, the account is created during the Application Server installation and removed during the Application Server uninstallation. If you don’t want to use the Application Server file system access restriction feature, you can delete this user account. Later, if you want to use this feature, enable it first. After you enable it, on Linux, you need to create this user account manually. On Windows, the user account is created automatically during the Application Server service startup. For more information, see Restricting-access-to-the-Application-Server-file-system. |
bladmin |
|
| Account is created with a locked password. The Application Server init scripts run a 'su - bladmin' to drop privileges. |
BladeLogic |
|
|
|
BLAdmin |
|
| During install the BLAdmin account is created and a password is set. Because TrueSight Server Automation assigns permissions via the role (RBAC) this account can be locked or disabled (as long as there are other accounts in this role) and there is nothing inherently 'special' about this account. |
RBACAdmin |
|
| During installation, the BLAdmin account is created and a password is set. Because TrueSight Server Automation assigns permissions via the role (RBAC) this account can be locked or disabled (as long as there are other accounts in this role) and there is nothing inherently 'special' about this account. |
TrueSight Server Automation uses various accounts during operation:
Account Name | Details | Password | Notes |
---|---|---|---|
root |
|
| RSCD service must run as root for UPM as discussed in Impersonation-and-privilege-mapping. Password is not stored or used by the agent. |
Automation Principal |
|
| The Automation Principal account is created by the user on the target server or Windows domain and the credentials are stored in the TrueSight Server Automation database and used when the application is configured to use an AP for the noted purposes. |
Local server account |
|
| The User Impersonation function is used (link) and TrueSight Server Automation does not know the account password. |
bladelogic |
|
|
|
Application Users |
|
| Authentication is available with the built-in SRP authentication type or configurable to external authentication sources such as LDAP, Active Directory, PKI, and RSA. |