About documentation
Layout themes of the Admin Panel
Introduction
System overview
Supported protocols
Citrix StoreFront (HTTP)
HTTP
ICA
Modbus
MS SQL (TDS)
MySQL
RDP
SSH
Telnet 3270
Telnet 5250
Telnet
VNC
X11
TCP
Secret Checkout
Deployment scenarios
Connection modes
User authentication methods and modes
Security measures
Data encryption
Backups
Permissions
Sandboxing
Reliability
Cluster configuration
Data model
Dashboard
Widgets
Adding, customizing and removind dashlets
Hard drives status information
User Portal (Access Gateway)
Third-Party Licenses
System deployment
Requirements
Hardware overview
System initiation
Quick start
SSH
Prerequisites
Configuration
Establishing connection
Viewing user session
SSH in bastion mode
Prerequisites
Configuration
Establishing connection
Viewing user session
RDP
Prerequisites
Configuration
Establishing an RDP connection with a remote host
Viewing user session
RDP in bastion mode
Prerequisites
Configuration
Establishing an RDP connection with a remote host
Viewing user session
Telnet
Prerequisites
Configuration
Establishing a telnet connection with the remote host
Viewing user’s session
Telnet 5250
Prerequisites
Configuration
Establishing a telnet connection with the remote host
Viewing user’s session
MySQL
Prerequisites
Configuration
Establishing connection with a MySQL database
Viewing user session
MS SQL
Prerequisites
Configuration
Establishing connection with a MS SQL database
Viewing user session
HTTP
Prerequisites
Configuration
Connecting to remote resource
Viewing user session
Citrix
ICA
Prerequisites
Configuration
Creating
.ica
file with connection parameters
Connecting to remote resource
Viewing user session
ICA via Citrix StoreFront
Prerequisites
Configuration
Connecting to remote resource
Viewing user session
VNC
Prerequisites
Configuration
Establishing connection
Viewing user session
Oracle over RemoteApp
Prerequisites
Configuration
Changing registry entries on the RDS domain controller
Establishing connection
Viewing user session
User authentication against external LDAP server
Prerequisites
Configuration
Users
Creating a user
Editing a user
Blocking a user
Unblocking a user
Deleting a user
Time access policy
Authentication failures counter
Roles
Users synchronization
Two-factor OATH authentication with Google Authenticator
Protocols Supporting OATH Authentication Method
Configuring the OATH Authentication Method
Servers
Creating a server
Static server
Creating a Citrix server
Creating an HTTP server
Creating an ICA server
Creating a Modbus server
Creating a MS SQL server
Creating a MySQL server
Creating an RDP server
Creating an SSH server
Creating a Telnet server
Creating a Telnet 3270 server
Creating a Telnet 5250 server
Creating a VNC server
Creating a TCP server
Dynamic server
Creating a dynamic servers group
Adding a single host to a servers group
Editing a server
Blocking a server
Unblocking a server
Deleting a server
Deleting a static server definition
Deleting a dynamically added host
Accounts
Creating an account
Creating an
anonymous
account
Creating a
forward
account
Creating a
regular
account
Editing an account
Blocking an account
Unblocking an account
Deleting an account
Managing security alerts
Triggering password change
Ignoring security alert
Listeners
Creating a listener
Creating a Citrix listener
Creating a HTTP listener
Creating an ICA listener
Creating a Modbus listener
Creating a MySQL listener
Creating an RDP listener
Creating an SSH listener
Creating a MS SQL listener
Creating a Telnet listener
Creating a Telnet 3270 listener
Creating a Telnet 5250 listener
Creating a VNC listener
Creating a TCP listener
Editing a listener
Blocking a listener
Unblocking a listener
Deleting a listener
Safes
Creating a safe
Editing a safe
Blocking a safe
Unblocking a safe
Deleting a safe
Discovery
Creating a rule
Creating a scanner
Manage accounts
Password changers
Password changer policy
Defining a password changer policy
Editing a password changer policy
Deleting a password changer policy
Custom password changers
Defining a custom password changer
Editing a custom password changer
Deleting a custom password changer
Connection modes
SSH
LDAP
Telnet
WinRM
Setting up password changing on a Unix system
Plug-ins
Developing plug-ins
Development environment
Plugin structure
Preparing plug-ins for deployment
Uploading plug-ins
Policies
Downloads
Sessions
Files
Account activity in the User Portal (Access Gateway)
Access requests
Awaiting requests
Active requests
Archived requests
Sessions
Filtering sessions
Defining filters
Managing user defined filter definitions
Full text search
Viewing sessions
Pausing connection
Terminating connection
Joining live session
Sharing sessions
Commenting sessions
Sessions’ retention lockdown
Exporting sessions
Export Session File Formats
Deleting sessions
OCR processing sessions
Session data replication
Timestamping selected sessions
Cancelling sessions timestamping
Approving pending user requests
Fudo management interface
Declining pending requests
Fudo administration interface
AI sessions processing
Content models
Session scoring
Quantitive models
Reports
Productivity
Overview
Sessions analysis
Activity comparison
Administration
System
Date and time
SSL certificates
Deny new connections
SSH access
Sensitive features
System update
Updating system
Deleting upgrade snapshot
License
Hotfix
Diagnostics
Configuration encryption
Default domain
Password complexity
Single Sign On
Setting up Fudo PAM for SSO
Single Sign On in Admin Panel
Single Sign On in User Portal
Setting up domain controller
Setting up user workstations
Password changers - active cluster node
Cluster Password Changers
Network settings
Network interfaces configuration
Managing physical interfaces
Defining IP address using system console
Setting up a network bridge
Setting up virtual networks (VLANs)
Setting up LACP link aggregation
Labeled IP addresses
Routing configuration
DNS configuration
ARP table configuration
Notifications
Artificial Intelligence
Configuring models trainers
Configuring behavioral analysis models
Trusted time-stamping
Certificate-based authentication scheme
External authentication
New external authentication server definition
SMS authentication definition
DUO authentication definition
External passwords repositories
CyberArk Enterprise Password Vault
Hitachi ID Privileged Access Manager
Lieberman Enterprise Random Password Manager
Thycotic Secret Server
Resources
RDP/VNC login screen configuration
User portal
login screen configuration
System version restore
System restart
SNMP
Configuring SNMP
SNMP MIBs
Getting SNMP readings using
snmpwalk
Fudo PAM specific SNMP extensions
Backups and retention
System backup
Data retention
External storage
Configuring external storage
Expanding external storage device
Exporting/importing system configuration
Exporting system configuration
Importing system configuration
Cluster configuration
Initiating cluster
Adding cluster nodes
Editing cluster nodes
Deleting cluster nodes
Redundancy groups
Events log
External syslog servers
Exporting events log
Changing encryption passphrase
Integration with CERB server
System maintenance
Backing up encryption keys
Monitoring system condition
Health Check
API Health Check
Call Home
Hard drive replacement
Resetting configuration to default settings
Reference information
RDP connections broker
Log messages
ICA configuration file
Non-TLS connections ICA file
TLS connections ICA file
Footer Information
Fudo Officer 1.0
Configuration
Managing session requests
Settings
AAPM (Application to Application Password Manager)
Compiling
fudopv
tool
Python
Virtual environment
Fetching dependencies
Package creation script
Deploying
fudopv
without compiling source files
Using
fudopv
API interface
Authentication methods
Static password
Token
Ticketing systems
Client applications
PuTTY
Microsoft Remote Desktop
VNC Viewer
SQL Server Management Studio
Troubleshooting
Booting up
Connecting to servers
Logging to administration panel
Session playback
Cluster configuration
Trusted timestamping
Support mode
Frequently asked questions
Glossary
API Documentation
User Portal
PDF
PL
Fudo PAM 5.1
Start
»
Users
»
Unblocking a user
Unblocking a user
¶
Select
Management
>
Users
.
Define filters to limit the number of objects displayed on the list.
Click
Unblock
.
Click
Confirm
to unblock selected objects.
Related topics:
Users synchronization
Data model
System initiation
Servers
Accounts