User accounts
The TrueSight Server Automation product creates various user accounts during component installation:
Account | Details | Password | Notes |
---|---|---|---|
BladeLogicRSCD On a domain controller: |
|
| The default random password length can be configured using chapw/agentctl command. Refer Changing-the-BladeLogicRSCDDC-account-password-on-domain-controllers. Password can be changed using the chapw command. The password is stored in the registry using the CryptProtectData function. If an Automation Principal is used exclusively, you can remove this user account using chapw. During RSCD Agent installation on a domain controller, user must provide a password for BladeLogicRSCDDC user. As BladeLogicRSCDDC account is shared across all domain controllers in the domain, the same password must be provided when installing RSCD Agent on all domain controllers in that domain. |
truesight NEW IN 20.02 |
|
| Account is created with a locked password. The Smart Agent process starts as a root user and it changes to the truesight user immediately. Therefore, the Smart Agent runs with the truesight user for most of the time. When the Smart Agent requires to perform the operations that need super user privileges, it changes to the root user to perform the operations. After these operations are completed, it changes back to the truesight user. |
bluser |
|
If the password is set to expire due to GPO settings then you must ensure that password is reset periodically before it expires, on all systems. And new password is updated in TSSA using blcli (See blcli LowPrivUser).
| This user account is used for restricting access to the Application Server file system. On Windows, the account is created during Application Server service startup. On Linux, the account is created during the Application Server installation. As a part of some of the Job execution, the Application Server needs to spawn some of the external commands/scripts on the Application Server hosts. So these commands/scripts (wherever required) are spawned with this user account so that those commands/scripts runs with this user's privileges. The user account gets removed during the Application Server uninstallation. If you don’t want to use the Application Server file system access restriction feature, you can delete this user account. Later, if you want to use this feature, enable it first. After you enable it, on Linux, you need to create this user account manually. On Windows, the user account is created automatically during the Application Server service startup. For more information, see Restricting-access-to-the-Application-Server-file-system. |
bladmin |
|
| Account is created with a locked password. The application server init scripts run a 'su - bladmin' to drop privileges. Ensure that the bladmin user belongs to the bladmin primary group before upgrading the Application Server. To check if the primary group is bladmin, run the following command: If that is not the primary group id, then modify the user account. Use the following sample code: For a fresh installation, TrueSight Server Automation creates the bladmin user and the bladmin group. |
BladeLogic |
|
|
|
BLAdmin |
|
| During install the BLAdmin account is created and a password is set. Because TrueSight Server Automation assigns permissions via the role (RBAC) this account can be locked or disabled (as long as there are other accounts in this role) and there is nothing inherently 'special' about this account. |
RBACAdmin |
|
| During install the BLAdmin account is created and a password is set. Because TrueSight Server Automation assigns permissions via the role (RBAC) this account can be locked or disabled (as long as there are other accounts in this role) and there is nothing inherently 'special' about this account. |
TrueSight Server Automation uses various accounts during operation:
Account Name | Details | Password | Notes |
---|---|---|---|
root |
|
| RSCD service must run as root for UPM as discussed in Impersonation-and-privilege-mapping. Password is not stored or used by the agent. |
Automation Principal |
|
| The Automation Principal account is created by the user on the target server or Windows domain and the credentials are stored in the TrueSight Server Automation database and used when the application is configured to use an AP for the noted purposes. |
Local server account |
|
| The User Impersonation function is used (link) and TrueSight Server Automation does not know the account password. |
bladelogic |
|
|
|
Application Users |
|
| Authentication is available with the built-in SRP authentication type or configurable to external authentication sources such as LDAP, Active Directory, PKI, and RSA. |