2.2. Adding users in the Web UI
Usually, you need to create a new user account before a new employee starts to work. Such a stage account is not accessible and you need to activate it later.
Prerequisites
- Administrator privileges for managing IdM or User Administrator role.
Procedure
Log in to the IdM Web UI.
For details, see Accessing the IdM Web UI in a web browser.
Go to Users
Stage Users tab. Alternatively, you can add the user account in the Users
Active users, however, you cannot add user groups to the account. - Click the + Add icon.
Optional: In the User login field, add a login name.
If you leave it empty, the IdM server creates the login name in the following pattern: The first letter of the first name and the surname. The whole login name can have up to 32 characters.
- Enter First name and Last name of the new user.
Optional: In the GID drop down menu, select groups in which the user should be included.
Note that this option is only available on the Active Users dialog box.
- Optional: In the Password and Verify password fields, enter your password and confirm it, ensuring they both match.
Click the Add button.
At this point, you can see the user account in the Stage Users or Active Users table.
If you click on the user name, you can edit advanced settings, such as adding a phone number, address, or occupation.
주의IdM automatically assigns a unique user ID (UID) to new user accounts. You can assign a UID manually, or even modify an already existing UID. However, the server does not validate whether the new UID number is unique. Consequently, multiple user entries might have the same UID number assigned. A similar problem can occur with user private group IDs (GIDs) if you assign GIDs to user accounts manually. You can use the
ipa user-find --uid=<uid>oripa user-find --gidnumber=<gidnumber>commands on the IdM CLI to check if you have multiple user entries with the same ID.You should not have multiple entries with the same UIDs or GIDs. If you have objects with duplicate IDs, security identifiers (SIDs) are not generated correctly. SIDs are crucial for trusts between IdM and Active Directory and for Kerberos authentication to work correctly.