eTrust Access Control for UNIX and Linux User Guide

Transcription

eTrust Access Control for UNIX and Linux User Guide
eTrust Access Control for UNIX
and Linux
®
User Guide
r8 SP1
This documentation and any related computer software help programs (hereinafter referred to as the
“Documentation”) is for the end user’s informational purposes only and is subject to change or withdrawal by CA at
any time.
This Documentation may not be copied, transferred, reproduced, disclosed, modified or duplicated, in whole or in
part, without the prior written consent of CA. This Documentation is confidential and proprietary information of CA
and protected by the copyright laws of the United States and international treaties.
Notwithstanding the foregoing, licensed users may print a reasonable number of copies of the documentation for
their own internal use, and may make one copy of the related software as reasonably required for back-up and
disaster recovery purposes, provided that all CA copyright notices and legends are affixed to each reproduced copy.
Only authorized employees, consultants, or agents of the user who are bound by the provisions of the license for
the product are permitted to have access to such copies.
The right to print copies of the documentation and to make a copy of the related software is limited to the period
during which the applicable license for the Product remains in full force and effect. Should the license terminate for
any reason, it shall be the user’s responsibility to certify in writing to CA that all copies and partial copies of the
Documentation have been returned to CA or destroyed.
EXCEPT AS OTHERWISE STATED IN THE APPLICABLE LICENSE AGREEMENT, TO THE EXTENT PERMITTED BY
APPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING
WITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
OR NONINFRINGEMENT. IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANY
LOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUT
LIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLY
ADVISED OF SUCH LOSS OR DAMAGE.
The use of any product referenced in the Documentation is governed by the end user’s applicable license
agreement.
The manufacturer of this Documentation is CA.
Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to the
restrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.2277014(b)(3), as applicable, or their successors.
All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies.
Copyright © 2006 CA. All rights reserved.
CA Product References
This document references the following CA products:
„
eTrust® Access Control (eTrust AC)
„
eTrust® Single Sign-On (eTrust SSO)
„
eTrust® Web Access Control (eTrust Web AC)
„
eTrust® CA-Top Secret®
„
eTrust® CA-ACF2®
„
eTrust® Audit
„
Unicenter® TNG
„
Unicenter® Network and Systems Management (Unicenter NSM)
„
Unicenter® Software Delivery
Contact Technical Support
For online technical assistance and a complete list of locations, primary service
hours, and telephone numbers, contact Technical Support at
http://ca.com/support.
Contents
Chapter 1: Introducing the UNIX Interfaces
13
UNIX Administrative Interfaces ................................................................ 13
Policy Manager ............................................................................... 13
Security Administrator ........................................................................ 13
Chapter 2: Using Policy Manager
15
The Policy Manager Interface .................................................................. 15
Menu Bar ................................................................................. 16
Toolbar .................................................................................. 20
Program Bar .............................................................................. 22
Output Bar ............................................................................... 24
Managing Accessors .......................................................................... 25
Assigning Windows Rights to Accessors..................................................... 26
Restricting User Login ..................................................................... 26
Selecting User Activities to Audit ........................................................... 27
Entering Personal Information ............................................................. 28
Adding a User to a Group .................................................................. 29
Adding Nested Groups .................................................................... 29
Setting Active Directory Properties ......................................................... 30
Synchronizing Data with the Native Operating System....................................... 30
Managing eTrust AC Resources ................................................................ 31
Using the Calendar to Manage eTrust AC Resources ......................................... 32
Managing Windows Resources ............................................................. 33
Managing Windows Domains............................................................... 33
Protecting a Resource with SPECIALPGM ................................................... 34
Managing Policy Models ....................................................................... 34
Specifying the PMDB ...................................................................... 34
Displaying the Policy Model Window ........................................................ 34
Managing the Policy Model Hierarchy ....................................................... 36
Working with the Error Log ................................................................ 37
Displaying Properties ...................................................................... 38
Creating Sub Administrators ................................................................... 39
Chapter 3: Installing Security Administrator
41
What Is Security Administrator? ............................................................... 41
Memory Space and Disk Space ................................................................ 42
Contents v
Considerations for New Installations ........................................................... 42
Designating a Control Center .............................................................. 42
Workstations Where eTrust AC Is Necessary ................................................ 42
Installing Security Administrator ............................................................... 43
After the Installation .......................................................................... 45
Reviewing Security Administrator Configuration (All Installations) ............................ 45
Reestablishing Your Host Database (Upgraded Installations) ................................. 46
Creating a Secure Environment (New Installations) ......................................... 47
Upkeep ...................................................................................... 49
Chapter 4: Security Administrator Basics
51
Starting Security Administrator ................................................................ 51
The Main Window ............................................................................. 52
The Menu Bar ............................................................................ 54
The Toolbar .............................................................................. 55
Screen Locker ............................................................................ 56
Using Security Administrator .................................................................. 56
Performing Actions ........................................................................ 57
Using Dialogs ............................................................................. 57
Workflow..................................................................................... 58
Activity Page ................................................................................. 58
Activity Window .............................................................................. 61
Fields and Options ........................................................................ 62
Closing the Activity Window ............................................................... 63
Exiting Security Administrator ................................................................. 63
Chapter 5: Executing, Editing, and Reviewing Transactions
65
Executing Transactions........................................................................ 65
Verifying Commands Before Execution ..................................................... 66
Selecting a Source Host ................................................................... 66
Selecting Target Hosts .................................................................... 67
Selecting Users, Groups, or Resources ..................................................... 67
Viewing Transaction Progress .................................................................. 68
Monitoring Status ......................................................................... 68
Limiting Hosts ............................................................................ 70
Stopping and Restarting Transactions ...................................................... 71
Editing Commands ............................................................................ 71
Editing Commands for All Hosts ............................................................ 72
Editing Commands for One Host ........................................................... 74
Saving Commands in a File ................................................................ 76
Retrying Transactions ......................................................................... 77
vi User Guide
Viewing Output Messages ..................................................................... 78
Filtering Messages by Limiting Hosts ....................................................... 80
Finding a Word or String .................................................................. 81
Printing Output Messages ..................................................................... 81
Printing Messages from All Hosts ........................................................... 82
Printing Messages from One Host .......................................................... 82
Chapter 6: Host Administration
83
The Hosts Page ............................................................................... 83
Host Groups .................................................................................. 84
Creating a New Host Group ................................................................ 84
Adding Hosts to Host Groups .............................................................. 85
Removing Hosts from Host Groups ......................................................... 86
Deleting a Host Group ..................................................................... 86
Hosts ........................................................................................ 87
Creating a Host ........................................................................... 87
Selecting and Deselecting Hosts ........................................................... 88
Limiting the Display of Host Names ........................................................ 89
Updating a Host .......................................................................... 90
Deleting Hosts from the Database.......................................................... 90
Chapter 7: Account Administration
91
The Main Window ............................................................................. 91
Users ........................................................................................ 92
Filtering the List of Users .................................................................. 92
Creating a New User ...................................................................... 93
Using Templates to Copy User Properties ................................................... 94
Refreshing the User List ................................................................... 94
Selecting and Deselecting Users with Wildcards ............................................. 95
Viewing User Properties ................................................................... 96
Modifying User Properties ................................................................. 97
Changing Passwords ...................................................................... 99
Suspending and Resuming Users .......................................................... 100
Copying Users from the Source Host to Other Hosts ........................................ 101
Deleting Users ........................................................................... 102
Adding, Modifying, or Deleting User Access Permissions .................................... 103
Viewing User Access Permissions ......................................................... 104
User Groups ................................................................................. 105
Filtering the List of Groups ............................................................... 105
Creating a New Group .................................................................... 106
Using Templates to Copy Group Properties ................................................ 107
Contents vii
Refreshing the Group List ................................................................ 107
Selecting and Deselecting Groups Using Wildcards ......................................... 108
Viewing Group Properties ................................................................. 109
Modifying Group Properties ............................................................... 110
Adding Users To Groups and Removing Users From Groups ................................. 111
Copying Groups from the Source Host to Other Hosts ...................................... 112
Deleting Groups ......................................................................... 113
Adding, Modifying, or Deleting Group Access Permissions ................................... 114
Chapter 8: Resource Administration
117
Security Administrator ....................................................................... 117
Displaying Resources ........................................................................ 118
Filtering the List of Resources ................................................................ 119
Creating a Resource ......................................................................... 120
Selecting and Deselecting Resources Using Wildcards .......................................... 121
Viewing Resource Properties.................................................................. 122
Updating a Resource ......................................................................... 123
Editing Existing Resources and Creating New Ones ............................................. 126
Copying a Resource .......................................................................... 127
Protecting a Resource in the UNIX or Windows Environment .................................... 128
Deleting Resources .......................................................................... 129
Updating TCP Services and Ports ............................................................. 130
Adding Accessors to Windows Resources ...................................................... 131
Chapter 9: Policy Model Administration
133
The Policy Model Database ................................................................... 133
Working with PMDBs ......................................................................... 133
Accessor Transactions .................................................................... 134
PMDB Commands ........................................................................ 135
Chapter 10: Login Protection
137
Setting Up Login Protection .................................................................. 137
Chapter 11: Security Configuration
139
Working with Security Policies ................................................................ 139
Working with Password Policies ............................................................... 142
Viewing eTrust AC Status .................................................................... 143
viii User Guide
Chapter 12: Audit Log Routing
145
Log Routing ................................................................................. 145
View or Modify Audit Log Route Configuration .............................................. 145
Chapter 13: Setting Security Administrator Options
149
Specifying Preferences ....................................................................... 149
Preference Dialog Settings ................................................................... 149
Master Database Page ................................................................... 150
Activity Page ............................................................................ 151
Retry Mechanism Page ................................................................... 152
Password Page .......................................................................... 152
Property Editor Page ..................................................................... 153
Other Page .............................................................................. 153
Chapter 14: The Audit Browser: seauditx
155
The seauditx Utility .......................................................................... 155
Starting seauditx ............................................................................ 156
The seauditx Main Window ................................................................... 157
Switches ................................................................................ 158
Options ................................................................................. 159
Text Output ............................................................................. 160
Minimizing and Maximizing Areas ......................................................... 164
Help .................................................................................... 165
Filtering Audit Records ....................................................................... 165
Changing the Filter....................................................................... 166
Saving the Filter ......................................................................... 166
Retrieving a Saved Filter ................................................................. 167
Opening an Audit Log ........................................................................ 167
Loading a Backup Audit Log .............................................................. 168
Loading a Collected Audit Log ............................................................. 168
Loading a Default Audit Log .............................................................. 168
Viewing Audit Record Details ................................................................. 169
Network Trace Information Dialog......................................................... 172
Network Session Trace Configuration ...................................................... 172
Commenting the Audit Log ................................................................... 174
Creating or Editing a Comment ........................................................... 174
Inserting Information from an External File into a Comment ................................ 175
Saving a Comment in an External File ..................................................... 175
Searching for Text in a Comment ......................................................... 176
Clearing the Comment Editor Dialog....................................................... 176
Contents ix
Removing a Comment .................................................................... 176
Printing a Comment ...................................................................... 177
Adding Acknowledgements ................................................................... 177
Reassigning Comments and Acknowledgements ............................................... 178
Printing the Audit Log ........................................................................ 179
Setting Preferences for seauditx .............................................................. 179
Customizing seauditx ........................................................................ 180
The seos.ini File ............................................................................. 180
Chapter 15: SecMon
181
SecMon ..................................................................................... 181
Starting SecMon ............................................................................. 182
Minimizing SecMon .......................................................................... 183
The SecMon Main Window .................................................................... 184
Text Output ............................................................................. 186
Detailed Information ..................................................................... 188
Changing Text Color ..................................................................... 190
Performing Tasks with SecMon ............................................................... 191
Stopping and Restarting Retrieval of Audit Events .......................................... 191
Deleting Selected Audit Events............................................................ 191
Deleting All Audit Events ................................................................. 192
Changing Buffer Size ..................................................................... 192
Appendix A: User and Group Properties
193
User Properties .............................................................................. 193
eTrust AC User Properties ................................................................ 193
UNIX User Properties ..................................................................... 198
Windows User Properties ................................................................. 200
Group Properties ............................................................................ 202
eTrust AC Group Properties ............................................................... 203
UNIX Group Properties ................................................................... 206
Windows Group Properties ................................................................ 207
Appendix B: Resource Properties
209
Resource Properties ......................................................................... 209
The eTrust AC Classes ....................................................................... 209
Administration (ADMIN Class) ............................................................ 210
File and Directory (FILE Class) ............................................................ 213
File Group (GFILE Class) ................................................................. 216
Holiday (HOLIDAY Class) ................................................................. 218
x User Guide
Host (HOST Class) ....................................................................... 221
Host Groups (GHOST Class) .............................................................. 223
Host Network (HOSTNET Class) ........................................................... 225
Host Protection by Name Pattern (HOSTNP Class) .......................................... 227
Login by Terminal (TERMINAL Class) ...................................................... 229
Monitored Files (SECFILE Class) .......................................................... 232
Outgoing Connections by Host (CONNECT Class) ........................................... 233
Process (PROCESS Class)................................................................. 236
Security Labels (SECLABEL Class) ......................................................... 239
Security Categories (CATEGORY Class) .................................................... 241
SUID/SGID Programs (PROGRAM Class) ................................................... 242
Tasks (SUDO Class) ...................................................................... 245
Task Groups (GSUDO Class) .............................................................. 248
TCP Protection (TCP Class) ............................................................... 251
Terminal Groups (GTERMINAL Class) ...................................................... 254
User ID Substitution (SURROGATE Class) .................................................. 256
The UNIX Classes ............................................................................ 258
UNIX FILE Class ......................................................................... 258
Windows Classes ............................................................................ 260
NT FILE Class ............................................................................ 260
NT-PRINT Class .......................................................................... 262
NT-COM Class ........................................................................... 263
NT-SHARE Class ......................................................................... 264
NT-REGKEY and NT-REGVAL Class ........................................................ 266
Appendix C: seam.ini and UNIX Exits
269
The Security Administrator Configuration File .................................................. 269
[master_db] Section ..................................................................... 270
[transaction] Section ..................................................................... 271
[password] Section ...................................................................... 271
[hosts_groups] Section................................................................... 272
[print] Section ........................................................................... 272
[help_ini] Section ........................................................................ 272
[messages] Section ...................................................................... 272
[defaults] Section ........................................................................ 273
[user fields] Section...................................................................... 274
[others] Section ......................................................................... 275
[synchronize] Section .................................................................... 275
[bin] Section ............................................................................ 275
Security Administrator Command Line Options ............................................. 276
The Password Generation Utility .......................................................... 277
UNIX Exits .................................................................................. 277
Contents xi
Passing Arguments to UNIX Exits ......................................................... 278
Preserving the Values Passed to UNIX Exits ................................................ 279
Index
xii User Guide
281
Chapter 1: Introducing the UNIX
Interfaces
This section contains the following topics:
UNIX Administrative Interfaces (see page 13)
Policy Manager (see page 13)
Security Administrator (see page 13)
UNIX Administrative Interfaces
eTrust AC for UNIX provides two interfaces to help you manage the resources
in your enterprise and control who has access to them. The interfaces are
Policy Manager and Security Administrator.
This User Guide explains how to install and use each interface:
„
Chapters 1 and 2 provide information about Policy Manager.
„
The remaining chapters explain Security Administrator.
This chapter gives a brief introduction to each GUI interface so that you can
decide which one to use.
Policy Manager
Policy Manager lets you manage your UNIX workstations from a PC running
Windows NT, 2000, XP, or 2003. The CD that contains eTrust AC provides this
Windows GUI, which you can install by itself or with eTrust AC on the PC.
Security Administrator
The Security Administrator lets you manage your enterprise from a UNIX
workstation. The Administrator is a suite of tools that you can install with
eTrust AC or afterward.
Introducing the UNIX Interfaces 13
Chapter 2: Using Policy Manager
This section contains the following topics:
The Policy Manager Interface (see page 15)
Managing Accessors (see page 25)
Managing eTrust AC Resources (see page 31)
Managing Policy Models (see page 34)
Creating Sub Administrators (see page 39)
The Policy Manager Interface
Using Policy Manager 15
The Policy Manager Interface
The Policy Manager main window contains the following elements:
Title bar
Displays the window title.
Menu bar
Contains the pull-down menus of commands you can use with Policy
Manager.
Toolbar
Provides access to frequently used commands.
Program bar
Provides access to the categories of objects you can manage with Policy
Manager.
Workspace
Displays windows for wizards and other items invoked from the menus,
toolbar, or program bar.
Output bar
Displays a condensed version of the messages that the selang command
language returns as the result of any action you take that makes a change
to a database.
Split bar
Separates the window into its various panes-the program bar, the
workspace, and the output bar area. You can grab the split bar and drag it
left or right (or up and down) to change the relative sizes of the panes.
Status bar
Displays descriptive text for items that the cursor points to.
Menu Bar
The menu bar contains the pull-down menus of commands you can use with
Policy Manager. The menu bar structure is dynamic, with appropriate
commands appearing for the action you are taking. For example, the Tree
menu appears only when the active window contains a tree structure.
16 User Guide
The Policy Manager Interface
File Menu
With the File menu, you can:
„
Open any of the applications available from the program bar.
„
Open the Host Selection and Command Log dialogs.
„
Open the Manage Target Hosts dialog, which is used to set up the
multi-host transactions performed in Transaction mode. The dialog lets
you add hosts or groups of hosts, and select which ones will be active for a
particular multi-host session.
„
Activate the Transaction mode.
„
Clear the Command Log.
„
Exit Policy Manager.
Using Policy Manager 17
The Policy Manager Interface
View Menu
With the View menu, you can activate and deactivate all bars other than the
menu bar, and toggle Workbook mode. In Workbook mode, a tab is associated
with each open window in the workspace. Clicking a tab brings the associated
window to the front. This makes it easier to move around among multiple
widows.
When a window is open, the View menu chooses the type of display: large
icons, small icons, list, or details. (To make this choice yourself, use the
toolbar button Views, which is explained later in this chapter.)
Tools Menu
With the Tools menu, you can activate Wizards, display eTrust AC version or
Host information, and shut down eTrust services on the local or a remote host.
It also activates the Commands and Scripts dialog that runs selang commands
or scripts, and displays the output. The most important item on the Tools
menu is Options.
Note: You cannot create, maintain, or export the database from a remote
machine.
18 User Guide
The Policy Manager Interface
System Options
Policy Manager contains default system options. To change these settings
according to the needs of your organization, choose Options from the Tools
menu.
The following describe these options and their default settings:
Accounts & Resources
Defines the resources that are displayed when you work with a PMDB, and
lets you choose whether B1 security features are shown. For a complete
description of B1 security features, see B1 Security Level Certification in
the Administrator Guide.
Appearance
Defines the way the toolbar and main windows look, and activates the
connection dialog
Command Log
Defines whether eTrust AC logs commands that do not update the eTrust
AC or native database. By default, eTrust AC does not log commands that
do not update a database.
Create
Defines the environments in which eTrust AC creates new users and
groups. By default, eTrust AC creates users and groups in both eTrust AC
and the native environment. You can also choose to always use the
wizards to create users and special programs.
Format
Defines the colors used to represent users and resources.
Mail Configuration
Defines the configuration eTrust AC uses to send email.
Mail Contents
Defines the contents of the email automatically generated by eTrust AC to
notify a user when the password has been changed.
Password
Activates and sets rules for password generation.
Using Policy Manager 19
The Policy Manager Interface
Startup
Specifies the host to connect to on startup. By default, eTrust AC updates
the local host. You can also choose an alternate splash screen and whether
you want to display the Wizards window on startup.
Transaction Mgr.
Sets the options for multi-host transactions. By default, the Transaction
Manager is inactive.
Window Menu
The Window menu lists the open windows in the workspace, lets you cascade
or tile the windows, and lets you close them singly or all together.
Help Menu
The Help menu activates the online help system and shows the version
number of eTrust AC.
Toolbar
The toolbar provides easy access to frequently used commands. Most of the
commands are also accessible from the menu bar. Like the menu bar, the
toolbar is dynamic, with appropriate commands appearing for the action you
are taking. Common tools are described in the following sections. Tools
specific to a particular window are described in the section on that
functionality.
20 User Guide
The Policy Manager Interface
Connect
The Connect button displays the Host Selection dialog, which lets you connect
to a different host. By default, Policy Manager operates on the local host.
Note: For information about working with multiple hosts simultaneously, see
the online help.
The Connect button also lets you specify a list of favorites to choose from if
you frequently view or update any of the following:
„
Local Policy Model databases (PMDBs)
„
The eTrust AC database on a remote host
„
A PMDB on a remote host
You can also search the Network Neighborhood to connect to less frequently
accessed hosts. You can remove a host from the Favorites list at any time.
Note: To administer an eTrust AC database on a remote host, that remote
database must contain a TERMINAL record for your stand-alone machine,
granting it read and write access.
Transaction Mode
The Transaction Mode button toggles the Transaction Mode on or off. Before
you can use this button, you must activate the Transaction Manager in the
Tools menu.
Wizards
The Wizards button lets you activate the most commonly used wizards. You
can click the magic wand to open a window for selecting wizards, or click the
arrow and select a wizard to activate. You can also activate wizards by using
the Tools menu.
Refresh
The Refresh button lets you redisplay the current window after running a
transaction. The arrow lets you refresh all windows or the current window.
Views
The Views button lets you select the view for the active window. The choices
are: Large Icons, Small Icons, List, and Details. The arrow gives a drop-down
list of the choices. The icon toggles you through the list. Each window can
have its own view setting.
Using Policy Manager 21
The Policy Manager Interface
Print
The Print button displays a Print dialog that lets you print the contents of the
active window. You can select different formats for the header, content, and
footer. Clicking OK in this dialog opens the Windows Print dialog, where you
can set more printer options.
Program Bar
The program bar lets you choose specific items to protect or to be protected
from. To display the panels on the program bar, click the buttons labeled
Access Control, Windows NT, and Tools.
Access Control Panel
Users
This feature lets you administer users in the native Windows, native UNIX,
and eTrust AC environments.
Groups
This feature lets you administer groups in the native Windows NT, native
UNIX, and eTrust AC environments.
Resources
This feature lets you administer resources defined in the database.
22 User Guide
The Policy Manager Interface
Windows NT Panel
Note: This panel is visible only when you are connected to a Windows host.
Server Manager
This feature lets you administer resources defined in a native Windows
database.
Files
This feature lets you administer file resources defined in the native
Windows environment.
Registry Editor
This feature lets you administer registry keys and values. Use it instead of
Regedit.
Security Policies
This feature lets you administer predefined security features.
Tools Panel
Policy Model
This feature lets you administer PMDBs and their subscribers in the host to
which you are connected.
Audit
This feature lets you administer the predefined and user-defined filters
used to select data from the audit log.
Using Policy Manager 23
The Policy Manager Interface
Output Bar
The output bar displays the command log, which is the file in which eTrust AC
writes selang commands. The information shown in the output bar includes
commands that were created, the host on which they were created, the
environment in which they were created, and the date and time they were
executed.
Every time you begin a new session of Policy Manager, eTrust AC creates a
new command log. Therefore, if you want to save the commands from a
session, you should save or print the log.
Note: Each line in the output bar of the Policy Manager window may represent
more than one selang command in the Command Log.
Note: By default, eTrust AC logs only selang commands that update the
eTrust AC or native Windows database. However, by choosing Options from
the Tools menu, you can configure eTrust AC to log commands that do not
update a database.
24 User Guide
Managing Accessors
Managing Accessors
An accessor, sometimes called an account, is an entity that can access system
resources. The most common type of accessor is a user-typically a person who
logs on and for whom access authorities should be assigned and checked.
Groups, programs and terminals are also accessors.
eTrust AC can identify users by account name only or by account name
prefixed with a Windows domain name or server name (when the user account
is not part of a Windows domain), depending on which you use when you
create user records in the eTrust AC database.
You can administer all the users and groups defined in the native Windows
operating system and in the eTrust AC database (the eTrust environment).
You can do the following:
„
Add a user or group to either or both environments (Windows and eTrust)
„
Update a user or group in either or both environments
„
Delete a user or group from either or both environments
„
Rename a user (Windows environment only)
„
Add a user to or remove a user from a group
„
Add a group to or remove a group from a group
„
View the protected resources of a user or group
To perform these functions, click Users or Groups in the Access Control panel
of the program bar, and then click New, Delete, or Properties on the toolbar.
To add a user, click the Users icon, then click the New button. The Create New
User dialog displays.
Click the icons on the left to display different panels. For example, the General
panel lets you enter user name and description, specify the eTrust AC or
Windows environment (Advanced button), and set password information.
Note: eTrust AC also provides wizards for some of the tasks necessary to
manage accessors. You can access them by clicking Users or Groups in the
Access Control panel, and then choose from the Tools menu or click the
Wizards toolbar button.
Important! We strongly recommend that you not use Windows NT backup
domain controllers (BDCs) to define users. Most of the functions you can
perform in native Windows with the User Manager and User Manager for
Domains you can perform in the Access Control and Windows panels of the
program bar.
Using Policy Manager 25
Managing Accessors
You can import users and groups from your Windows system to the eTrust AC
database, either during the installation or later using the NT Import Wizard.
For more information and detailed procedures, see the online help for Policy
Manager.
Assigning Windows Rights to Accessors
You can assign standard and advanced rights to users and groups in Windows.
Most advanced rights are useful only to programmers writing applications for
computers running Windows Workstation or Windows Server; advanced rights
are not usually granted to a group or end user.
Note: For more information about programming rights, see the Windows NT
programming documentation.
Restricting User Login
You can restrict user login privileges in several ways:
„
Specify an expiration date
„
Suspend an account so that it exists in the eTrust AC database, but the
user cannot log in
„
Specify the number of grace logins
„
Specify the maximum number of terminals from which a user can log in
„
Specify the number of days that must pass before an account becomes
inactive
„
Limit login rights to specific days and hours
By default, the account does not expire or become inactive, the account is not
suspended, and a user can log in to any number of terminals without
restrictions.
Use the Create New User, Login panel to restrict login privileges.
26 User Guide
Managing Accessors
Selecting User Activities to Audit
For users defined in the eTrust AC database, you can specify the user activities
that eTrust AC should audit.
Note: Only users defined in the database with the AUDITOR attribute can
specify audit properties. This option is dimmed for users who are defined in
the Native environment only. For more information about auditing in eTrust
AC, see the Administrator Guide.
The following audit modes specify which user activities are included in the
eTrust AC audit log. These options are available from the Miscellaneous panel
of the dialogs for creating and editing users.
Success
Successful accesses to resources defined in eTrust AC are logged.
Logon Success
Successful logins are logged.
Logon Failure
Failed login attempts are logged.
Failure
Failed attempts to access resources defined in the database are logged.
Trace
Every message that appears in the trace file because of this user's actions
is also logged in the audit log.
All
All user activity, successful or not, is logged.
None
No user activity is logged.
Using Policy Manager 27
Managing Accessors
Entering Personal Information
You can enter personal information about the user from the Miscellaneous
panel of the dialogs for creating and editing users. These properties are
optional.
Location
An alphanumeric string of up to 47 characters specifying the location of
the user, such as Main Office or East Coast Sales.
Country
An alphanumeric string of up to 19 characters indicating the country in
which the user is located.
Organization
An alphanumeric string of up to 19 characters indicating the organization
to which the user is assigned.
Organization Unit
An alphanumeric string of up to 19 characters indicating the organization
unit to which the user is assigned.
Phone
An alphanumeric string of up to 19 characters indicating the user's
telephone number.
E-Mail
An alphanumeric string of up to 256 characters indicating the email
address of the user.
28 User Guide
Managing Accessors
Adding a User to a Group
You can add users to a group to make managing much easier. Use the Groups
panel of the dialogs for creating and editing users:
Adding Nested Groups
You can add or modify nested groups from the Miscellaneous pane of the
dialogs for creating and editing groups. (Click Groups in the program bar and
then New or Properties on the toolbar.)
The Nested Groups dialog lets you add and delete super groups (parents) and
member groups (children) from existing groups. Properties of a super group
are passed down to its member groups.
Using Policy Manager 29
Managing Accessors
Setting Active Directory Properties
When you are connected to a Windows 2000 machine with Active Directory,
you can use the Directory Services panel of the User or Group Properties
dialog to set Active Directory User or Group properties. These properties are
not supported in Windows NT, Windows 2000 without Active Directory, or the
eTrust AC native environment database.
The icon to activate the panel does not appear unless you are connected to a
Windows 2000 machine with Active Directory.
Note: Active Directory lets you organize users into different folders. Policy
Manager displays all Active Directory users in a single Users panel.
Synchronizing Data with the Native Operating System
When using selang commands, you can change data about an accessor in the
database without changing data in the native operating system. Likewise,
when using the User Manager in Windows, you can change data about an
accessor in Windows without changing data in eTrust AC. When you change
data in either of these ways, the accessor is defined differently in each
database..
eTrust AC monitors definitions in both eTrust AC and the native operating
system, and provides a Synchronization panel when the definitions in Windows
and eTrust AC do not match. When the definitions match, the Synchronization
icon is not visible.
30 User Guide
Managing eTrust AC Resources
Managing eTrust AC Resources
A resource is an entity that users and groups can access. The most common
type of resource is a file. You access a file when you read information from it
or write information to it.
Resources are grouped by class, which is a name for the type of resource. For
example, the TERMINAL class contains all objects that are terminals, such as
tty1, tty2, and so on; the SHARE class contains all objects that are shared; the
FILE class contains definitions for files and directories. For more information
about the eTrust AC classes, see the Reference Guide.
The properties of a protected resource are stored in the resource's record. A
record is a collection of data consisting of the name and properties of a
resource. Every record in a particular class contains values for the same set of
properties-the properties appropriate to the type of object that the class
describes.
Properties indicate who defined the resource, the date when the resource was
defined, and more. In general, the most important information contained in a
resource record is the list of accessors authorized to access the resource. This
list is called the access control list (ACL). Many resources contain another list
of accessors, for which access is denied. This list is called the negative access
control list (NACL).
Note: You can view the ACLs or NACLs for a specific user or group by choosing
Protected Resources from the menu displayed when you right-click a user or
group name.
You can administer all the resources in the eTrust AC database by:
„
Adding a resource to any class in the eTrust AC database
„
Updating a resource in any class in the eTrust AC database
„
Deleting a resource in any class from the eTrust AC database
„
Defining terminals and terminal groups from which users can log in
„
Defining Holidays when users need extra privileges to log in
„
Defining task delegation and task groups
To perform these functions, click
(Resources) in the Access Control panel
of the program bar, select a resource in the workspace, and then click New,
Delete, or Properties on the toolbar.
Using Policy Manager 31
Managing eTrust AC Resources
Here is the dialog for creating a resource in the FILE class (click Resources and
New):
Click the icons on the left to display different panels. For example, the General
panel, which is shown, lets you enter resource name and description, specify
the owner, and more.
Using the Calendar to Manage eTrust AC Resources
eTrust AC supports user, group, and resource access enforcement according to
the Unicenter TNG calendar. The calendar contains time intervals of 15
minutes that you can set to ON or OFF. A calendar time interval set to OFF
prevents access to resource; a calendar time interval set to ON allows access
to the resource. eTrust AC retrieves Unicenter TNG active calendars at
specified time intervals.
You can add, edit, or remove a calendar resource using the Resources view.
Select Login Protection in the resources tree. Click the Calendar tree entry,
and right click to select an option.
32 User Guide
Managing eTrust AC Resources
Managing Windows Resources
You can administer the resources in the native Windows database using the
dialogs for creating and editing resources. You can:
„
Add a resource to the REGISTRY and SHARE classes in the Windows
database.
„
Update a resource in any class in the Windows database, including the
Active Directory database.
„
Delete a resource in any class from the Windows database.
For more information about Windows resources, see the Windows Reference
Guide.
Managing Windows Domains
Using Policy Manager, you can:
„
Display information about a Windows domain
„
Add new computers to a Windows domain
„
Delete computers from a Windows domain
„
Create and delete trusted relationships between Windows domains
Select NT Specific in the resources tree. Click the Domain tree entry, and
right-click to select an option.
eTrust AC checks the validity of these operations if an eTrust AC client, such
as Policy Manager or selang, performs them. When it checks the validity of an
operation, eTrust AC uses the authorization rules that exist in the eTrust AC
database in the domain controller.
Each record in the eTrust AC class DOMAIN defines a Windows domain. The
three types of possible access for records in the DOMAIN class are:
READ
Lets the user display the properties of the domain.
CHMOD (Change Mode)
Lets the user create or delete trust relationships between domains.
EXEC (Execute)
Lets users add members to or delete members from a domain.
Using Policy Manager 33
Managing Policy Models
Protecting a Resource with SPECIALPGM
Objects in the SPECIALPGM class define an application that needs special
eTrust AC authorization protection. This class is especially useful for protecting
programs, such as system services, that typically need to be run as SYSTEM
account. To protect such a program, define it as a record in the SPECIALPGM
class and associate a logical user name (defined as a USER record in the
eTrust AC database) with the Windows user name required to run the
program, authorizing only that logical user to run the program.
In Windows, you can use the Special Program Wizard to help set up this
protection. To run this wizard from the GUI, click the Resources button in the
program bar. Then select Special Program Wizard from the Tools menu.
Managing Policy Models
You can use Policy Manager to manage several PMDB functions. These include
specifying a PMDB, managing subscribers, managing the error log, starting
and stopping the Policy Model daemon (in UNIX), reactivating an unavailable
subscriber, and displaying properties. For a complete description of integrating
PMDBs into your implementation plan, see the Administrator Guide.
Specifying the PMDB
eTrust AC supports multiple Policy Models on a single host. You can specify the
PMDB using Policy Manager or selang. For information about using selang, see
the Reference Guide.
Displaying the Policy Model Window
The Policy Model window, activated from the Tools panel of the program bar,
lists all the PMDBs defined on the station to which you are connected,
including subscribers where applicable.
34 User Guide
Managing Policy Models
The Policy Model window contains the following columns:
Name
Lists the subscribers of the selected PMDB.
Type
Displays the type of subscriber: eTrust database, PMDB, or MF
(mainframe).
Status
Indicates whether the subscriber is Available or Unavailable. A subscriber
is Available when no commands are waiting to be executed. A subscriber is
Unavailable if its parent PMDB has sent one or more commands that have
not yet been executed. Commands are saved in the file updates.dat,
whose default location is \Program
Files\CA\eTrustAccessControl\data\pmdb.
Next Command
Displays the command that is waiting to be executed.
If the subscriber's status is Available, this column is empty.
Errors
Displays the number of errors for the selected subscriber. An error is a
command that failed; that is, it did not update the subscriber. Connection
failures are not included.
Executed Commands
Displays the percentage of commands that have been executed. If the
subscriber's status is Available, this column displays the value 100%.
Using Policy Manager 35
Managing Policy Models
Managing the Policy Model Hierarchy
Subscribers to a PMDB can be:
„
Another PMDB on the same or a remote host
„
An eTrust database on the same or a remote host
„
A mainframe database
Using Policy Manager, you can:
„
Add subscribers to a PMDB
„
Remove subscribers from a PMDB
„
Display the commands that were sent to subscribers but failed to update
them-the errors that appear in the error log
„
Erase the contents of the error log
When adding a subscriber, ensure that the parent PMDB and all the stations
you want to subscribe to it are part of the same network and can communicate
with each other by name. This lets eTrust AC update the parent_pmd key in
the registry of the subscriber.
36 User Guide
Managing Policy Models
Working with the Error Log
The Policy Model error log contains a list of transactions that the subscriber
stations refused to apply. For more information about the PMDB error log, see
the eTrust AC for Windows Administrator Guide.
Using Policy Manager, you can display the errors of a PMDB and all its
subscribers, or you can display errors for only one subscriber. You can also
clear the contents of the error log.
The Policy Model Error Log contains the following columns:
Host
The full name of the PMDB on which the command failed.
Command
The full eTrust AC command that failed.
Error Description
The reason why the command failed.
Offset
The location of the command in the updates.dat file.
Using Policy Manager 37
Managing Policy Models
Date
The date on which the command failed.
Time
The time the command failed.
Note: If you click the Next button, eTrust AC brings the next set of records.
The query_size registry key defines the number of records in a set. (The
default value is 100.) The records in the next set are added to the display.
This means that if you pressed Next once (and the value of the key is still
100), then 200 records are displayed.
Displaying Properties
To display the properties of a PMDB or a subscriber, select Properties from the
View menu or the right-click menu.
The description of the properties displayed for the parent PMDB is as follows.
Policy Model Name
The name of the PMDB.
Parent
Indicates whether the PMDB is a parent.
Password File
For UNIX only, the name of the file that contains information about the
locally defined users such as their full names, IDs, the ID of the groups to
which the users belong, their home directories, and encrypted passwords.
Group File
For UNIX only, the name of the file that contains information about the
locally defined groups such as the group IDs and the list of users in the
groups.
eTrust AC displays a different window to show the properties of subscribers.
See Displaying the Policy Model Window in this chapter for a description of the
properties displayed for subscribers.
38 User Guide
Creating Sub Administrators
Creating Sub Administrators
To set up sub administrators to manage users and groups from the Policy
Manager, complete the following steps:
1.
Launch Policy Manager.
Note: If eTrust AC server is installed on this machine, shut down eTrust
AC services after you log in to Policy Manager.
2.
From the Policy Manager toolbar, select Tools, Options.
The Options dialog displays.
3.
Select the Startup tab, then check Enable Users and Groups Sub
Administration.
4.
Click OK.
To enable sub administrators to access Policy Manager from a specific
terminal, complete the following steps:
1.
Select the Resources icon in the eTrust AC program bar to display the
Resources window.
2.
Expand the Login Protection folder.
3.
Select Terminal to display the list of available terminals.
4.
Double-click the terminal you want. The View or Set Terminal Properties General dialog displays.
5.
Select the Authorize icon to display the View or Set Terminal Properties Authorize dialog.
6.
Select the sub administrator you want to authorize and check Read and
Write permissions.
7.
Click OK.
To define a sub administrator with privileges to manage users, do the
following:
1.
Select the Resources icon in the eTrust AC program bar to display the
Resources window.
2.
Expand the Administration folder.
3.
Select Access by Class to display the list of available classes.
4.
Double-click the USER class and choose Properties. The View or Set ADMIN
Properties - General dialog displays.
Note: To enable the sub administrator to administer other classes, replace
the USER class with the class you want (GROUP, USER_DIR, and so forth).
5.
Select the Authorize icon to display the View or Set ADMIN Properties Authorize dialog.
Using Policy Manager 39
Creating Sub Administrators
6.
Click Add to display the Add eTrust AC Accessor dialog.
7.
Enter the name of the sub administrator in the Name field or click Browse
to locate.
8.
Check the permissions you want to give the sub administrator access to.
9.
Click OK to return to the View or Set ADMIN Properties - Authorize dialog.
10. Click OK to finish.
40 User Guide
Chapter 3: Installing Security
Administrator
This section contains the following topics:
What Is Security Administrator? (see page 41)
Memory Space and Disk Space (see page 42)
Considerations for New Installations (see page 42)
Installing Security Administrator (see page 43)
After the Installation (see page 45)
Upkeep (see page 49)
What Is Security Administrator?
Security Administrator is a set of eTrust AC graphical user interfaces (GUIs)
that you use to manage accessors and resources, audit logs, and security.
Security Administrator is a suite of tools that includes three programs:
Security Administrator
manages hosts, user accounts, groups, and resources. Using X Window
System dialogs, Security Administrator integrates the management of the
eTrust AC, UNIX, and Windows security environments.
Seauditx
manages and reviewing audit logs.
SecMon
monitors security in real time.
Note: Security Administrator is written for UNIX workstations running
X Window System, Release 5. It also runs on X terminals, assuming that
sufficient resources are available. You may also find that some PC-based
X simulators can run Security Administrator. However, because Security
Administrator is a color-intensive product, you may need to increase the
number of colors available in your X simulator.
Installing Security Administrator 41
Memory Space and Disk Space
Memory Space and Disk Space
eTrust AC is a prerequisite to Security Administrator. If you have already
installed eTrust AC, the Security Administrator requires no additional memory,
but it does require additional disk space. The following table lists disk space by
platform:
Platform
Extra Disk Space Required (in MB)
IBM AIX
19
Digital DEC UNIX
10
HP-UX
26
Sun Solaris SPARC
8
Considerations for New Installations
This section gives background information for those who are installing eTrust
AC and Security Administrator for the first time.
Designating a Control Center
Before installing Security Administrator for the first time, you must:
„
Decide which stations to use as the control center for your security
administration team
„
Decide which users constitute that team
„
Make the control center especially secure.
Note: For more information about making the control center secure, see
the Administrator Guide.
Workstations Where eTrust AC Is Necessary
The underlying eTrust AC software is necessary not only at the stations where
you will install Security Administrator but also at all other stations that eTrust
AC manages. If necessary, install eTrust AC at your control center and the
other stations that require protection.
Note: For information about installing eTrust AC, see the Implementation
Guide.
42 User Guide
Installing Security Administrator
Installing Security Administrator
You install Security Administrator only on the stations of your control center;
that is, only on the stations where your security administration team manages
the identities and permissions of users and user groups.
You can install Security Administrator from a graphical interface on the
following platforms:
„
IBM AIX
„
Digital DEC UNIX
„
HP-UX
„
Sun Solaris
Before using the graphical installation script, you must have the TCL/TK
environment installed, using the following versions:
„
TCL-Version 7.6 and later
„
TK-Version 4.2 and later
Note: You can run the standard (non-graphical) installation script on all
platforms.
To install Security Administrator:
1.
If eTrust AC is active, shut it down by entering the following command:
# eTrustACDir/bin/secons -s
where eTrustACDir is the directory where you installed eTrust AC, by
default /opt/CA/eTrustAccessControl.
2.
If necessary, log in as root, or su to root.
3.
Change (cd) into to the distribution directory (where the installation files
are located).
4.
Run the standard installation script by entering the following command:
# ./Unix/Access-Control/install_base -admin
Follow the instructions that appear on the screen.
Note: To display a list of options for commands, include the -h option (for
example, install_base -h).
5.
Choose the directory in which to install the product. The default setting is
/opt/CA/eTrustAccessControl.
6.
Choose the group owner of the products you will install. The default is
root.
Installing Security Administrator 43
Installing Security Administrator
7.
Select which products to install (Security Administrator, Seauditx, and
SecMon). You can install Security Administrator without installing Seauditx
or SecMon.
8.
Select the security environments that Security Administrator will support:
„
„
„
9.
If you select Windows support, you must then provide a Windows
station where the eTrust AC auditing daemon is running.
Subsequently, each time you invoke Security Administrator, you can
either use Windows support (provided that you are a Windows
administrator) or hide its support.
If you do not have eTrust AC for Windows or Audit Director, do not
choose Windows support.
If you decide to do without Windows support now, but want to receive
it in the future, you must reinstall Security Administrator.
If you are installing SecMon, you must specify to which port to route audit
information. You can leave this field empty for the default port.
The executable files are now installed. If you are installing from the
graphical interface, the dialog displays the progress of each product you
selected for installation.
10. If you are upgrading Security Administrator, indicate whether you want to
reestablish your host's database. (Because Security Administrator uses a
new file to describe hosts, installing this version in place of previous
Security Administrator versions reinitializes your list of hosts to include
only the local host.)
If you decide to restore your list of hosts, the old files are saved in a
backup directory and a new host database is generated from the old files.
If you do not choose to reestablish the old host database, the new
database includes only the local host. The host database path, at
eTrustACDir/data/seam/hosts, is where Security Administrator stores
information for itself about your hosts and host groups.
11. Start or restart eTrust AC by entering the following command:
# eTrustACDir/bin/seosd
where eTrustACDir is the directory where you installed eTrust AC, by
default /opt/CA/eTrustAccessControl.
44 User Guide
After the Installation
After the Installation
After installing Security Administrator, perform the following tasks:
„
Review Security Administrator configuration (all installations)
„
Reestablish your host database (upgraded installations)
„
Create a secure environment on the stations of your control center (new
installations)
Reviewing Security Administrator Configuration (All Installations)
This step is optional because eTrust AC works well with its default
configuration values. You do not need to change configuration values
immediately. Nevertheless, it is good to learn about the configuration file as
soon as you can, so that you can adjust it for best operation. For more
information, see Specifying Preferences in the chapter “Setting Security
Administrator Options.”
This step is necessary only for Security Administrator, not for SecMon or
Seauditx.
Note: You can also make changes by changing the token values in the
Security Administrator configuration file seam.ini. Security Administrator
tokens control various aspects of how Security Administrator operates. For
more information, see the appendix “seami.ini and UNIX Exits.”
Installing Security Administrator 45
After the Installation
Reestablishing Your Host Database (Upgraded Installations)
If you are upgrading from a previous version of eTrust AC and your network
uses PMDBs (Policy Model databases), you should update it bottom-up
(subscribers first) so that any given moment no version 2 PMDB has any
version 1 subscribers. Version 1 PMDBs, however, can have version 2
subscribers.
The Security Administrator host database consists of two files:
„
hosts_info.dat
„
hosts_tree.dat
1.
Add hosts to the hosts_info.dat file using the following format:
„
For UNIX:
hostname:3:comment:cellname
„
For Windows:
hostname:65:comment:*
2.
Add hosts to hosts_tree.dat file formatted like the following example:
ROOT:
0
GROUP_1
:
1
HOST_11
:
2
HOST_12
:
2
GROUP_2
:
1
HOST_21
:
2
HOST_22
:
2
Each row contains a group name or host name, followed by a colon and a
level number. Each row with a nonzero level number (n) describes a
subnode of the nearest preceding row that has the preceding level number
(n-1).
For example, in the lines shown in the example, ROOT is the highest node
in the tree, the parent of all subdirectories, and is at level 0. GROUP_1 and
GROUP_2 are both children of ROOT, so they are at level 1. HOST_11 and
HOST_12 are children of GROUP_1, so they occupy the next level down,
level 2.
For more information about upgrading eTrust AC, see the Implementation
Guide.
46 User Guide
After the Installation
Creating a Secure Environment (New Installations)
If your installation of Security Administrator is new, you can create a secure
environment by performing the following tasks on each station that Security
Administrator will manage. This procedure requires the ADMIN attribute.
If you are already familiar with eTrust AC, use eTrust AC to perform the
following steps in whatever way you want. If you are not familiar with eTrust
AC, follow the detailed steps later in this section.
The tasks to perform are:
1.
Give the ADMIN attribute to each member of the security administration
team.
2.
Define the terminals of the control center with “nobody” as owner.
3.
From each of control center terminal, give the security administration
team read and write access to the station it will manage. (If you want,
define a user group and a terminal group. For guidance with groups, see
the Administrator Guide.)
Installing Security Administrator 47
After the Installation
Detailed Steps
If you are not yet familiar with eTrust AC, follow these more detailed
instructions on each station that Security Administrator will manage. If you are
using groups, you will occasionally need to vary the commands, for example,
by using chgrp (“change group”) instead of chusr (“change user”) and
GTERMINAL (“group of terminals”) instead of TERMINAL.
1.
Log in as a user with the ADMIN attribute, or if you have not yet given the
ADMIN attribute to any user at your site, log in as root and give yourself
the ADMIN attribute. For guidance if necessary, see the Getting Started.
Giving the ADMIN attribute to a user means giving that user permission to
perform most administrative tasks.
2.
To receive the prompt for entering eTrust AC commands, enter the
eTrustACDir/bin/selang command if eTrust AC is already active or the
eTrustACDir/bin/selang -l command if eTrust AC is not active (where
eTrustACDir is the directory where you installed eTrust AC, by default
/opt/CA/eTrustAccessControl).
The command prompt eTrustAC> should appear.
3.
Define all members of the security administration team as users with the
ADMIN attribute.
If the users do not yet exist for eTrust AC, you can create them as ADMIN
users by using the newusr command. If they already exist, the appropriate
command is chusr.
The following example uses the newusr command for an administrator
named Spinelli:
eTrustAC> newusr Spinelli ADMIN
4.
Define each station in the control center as a TERMINAL object with default
read and write access, with nobody as owner. Use newres for a station not
yet defined to eTrust AC or chres for a station already defined. The
following example uses the newres command for a terminal named
EastWing:
eTrustAC> newres TERMINAL EastWing defaccess(read,write) owner(nobody)
The name “nobody” has a special meaning as a user name in eTrust AC:
The eTrust AC user “nobody” can never log into the system. Thus, at this
stage, no one working from the control center station can use eTrust AC to
manipulate permissions at the station you are setting up. Later, you will
define the security administration team as exceptions that can do that.
(If you have defined a group of terminals, use GTERMINAL rather than
TERMINAL in the newres or chres command.)
48 User Guide
Upkeep
After specifying that no one working from the control center station can
use eTrust AC to manipulate permissions at the station you are setting up,
you must now define the security administration team as exceptions.
Provided that the security administration team is working from the control
center, you must explicitly allow it to use eTrust AC to manipulate
permissions at the station you are setting up.
5.
For each member of the security administration team, enter the following
command once for each control center station that the member may use
to modify the eTrust AC database of your current station.
eTrustAC> authorize TERMINAL stationName uid(secadmusr) access(read,write)
where stationName is the name of the control center station and
secadmusr is the name of the member of the security administration team.
(If you have defined a group of terminals, use GTERMINAL rather than
TERMINAL. If you have defined a group of administrators, use gid rather
than uid.)
After performing the preceding steps on each station that the security
administration team will manage, you must set up an environment where only
security administration team members can manage all those stations, and only
from the control center.
Upkeep
Remember, whenever a new user joins the administrative team, to give the
new administrator the necessary permissions, either individually or by adding
the new administrator to a group of administrators that you have defined.
Similarly, whenever a new host station needs protection by the administrative
team, make the appropriate definitions at the new host. See Creating a Secure
Environment in this chapter.
Installing Security Administrator 49
Chapter 4: Security Administrator Basics
This section contains the following topics:
Starting Security Administrator (see page 51)
The Main Window (see page 52)
Using Security Administrator (see page 56)
Workflow (see page 58)
Activity Page (see page 58)
Activity Window (see page 61)
Exiting Security Administrator (see page 63)
Starting Security Administrator
Before starting Security Administrator perform the following steps:
1.
Log in to the system.
2.
If the seosd daemon is not running, use the seosd or seload commands to
start it.
3.
If necessary, start the X Window System.
4.
Set your terminal display according to the system requirements at your
site.
To start Security Administrator, enter the following command:
eTrustACDir/bin/seam
where eTrustACDir is the directory where you installed eTrust AC, by default
/opt/CA/eTrustAccessControl
Note: If you receive a series of “unknown keysym” warnings the first time you
start Security Administrator, it means that your Motif configuration has a
possible problem. You can solve the problem by setting the XNLSPATH variable
to eTrustACDir/data (where eTrustACDir is the directory where you installed
eTrust AC, by default /opt/CA/eTrustAccessControl).
Security and system administrators are defined as ADMIN and are responsible
for operating Security Administrator. If you are not defined as ADMIN, an error
dialog appears when you start Security Administrator, informing you that you
do not have ADMIN status, and therefore most of the Security Administrator
operations are unavailable.
The title screen appears next, accompanied by a few messages reporting
progress, followed by the Security Administrator Main window.
Security Administrator Basics 51
The Main Window
The Main Window
When you start Security Administrator, the Main window appears. By default,
the Accounts and Hosts pages are displayed. Use these pages to prepare
account transactions by specifying which users, groups of users, and host
stations to update, and with what data.
52 User Guide
The Main Window
The Main window contains the following sections.
„
The top section contains a menu bar and a toolbar. It also displays the
source database from which Security Administrator extracts the objects
that appear in the Main window. Some options in the toolbar and menu
bar are used for specific pages and are not available for the other pages.
„
The middle section contains two pages: Accounts and Resources.
–
The Accounts page displays sections for users and groups, where you
select the user accounts and user groups to create, query, or update.
For more information, see the chapter “Account Administration.”
–
The Resources page displays all the resources. For more information,
see the chapter “Resource Administration.”
„
Between the middle and bottom sections, on the right side of the window,
is the Resize button, also called the sash button. This button controls the
position of the borderline between the middle and bottom sections and,
thus, their relative sizes. Drag it to move the borderline.
„
The bottom section contains three pages: Hosts, Activity, and Policy
model.
–
The Hosts page displays sections for hosts and host groups, where you
indicate the databases to update with the new or changed information.
For more information, see the chapter “Host Administration.”
–
The Activity page displays the status of all transactions executed in
Security Administrator during the current session. For more
information, see the chapter “Executing, Editing, and Reviewing
Transactions.”
–
The Policy model page displays a list of subscribers that you can add to
and monitor PMDB status. For more information, see the chapter
“Policy Model Administration.”
Security Administrator Basics 53
The Main Window
The Menu Bar
The menu bar contains the following menus:
File
Contains the Exit command, which saves all host and host group
information and exits Security Administrator.
Edit
Contains commands to create, update, query, and manipulate selected
objects. It also contains special commands for managing users, groups,
and Policy Models.
View
Determines the display mode of the active page section.
Tools
Includes commands to configure eTrust AC password policy and user
account protection; run the eTrust AC audit utility (seauditx); and set
Security Administrator preferences.
Activity
Shows or hides the Activity window during transactions.
Note: Not all menu items are available for all pages or selected items (users,
hosts, and so on). When not available, menu items are dimmed.
54 User Guide
The Main Window
The Toolbar
The available toolbar buttons are:
Source
Changes the source database for the top pages.
Refresh
Updates the active Security Administrator page section. When data
changes, the background of this button blinks red to indicate that you
should refresh the display.
Filter
Determines which accessor, resource, or host-depending on which page is
active-to display or perform a transaction on.
Create
Creates a resource, host, and so on in the active page.
Delete
Deletes the selected resource, host, and so on.
Update
Updates information about a selected resource, host, and so on.
Copy
Copies the selected accessor, resource, host, and so on.
Query
Shows information about the selected accessor, resource, host, and so on.
Screen Locker
Locks your screen if you must be away from the terminal (for more
information, see Screen Locker in this chapter).
Audit
Opens the seauditx utility window (see the chapter “The Audit Browser:
seauditx”).
Password Rules
Displays eTrust AC password policy settings so that you can view and
modify them.
Audit Log Routing
Displays the log routing configuration settings in the file selogrd.cfg so
that you can view and modify them.
Note: Not all toolbar buttons are available for all pages or selected items
(users, hosts, and so on). When not available, toolbar buttons are dimmed.
Security Administrator Basics 55
Using Security Administrator
Screen Locker
The Screen Locker option automatically protects your station or X terminal if
you are away from your work area for any length of time. To activate or
deactivate the option, choose Screen Locker from the Tools menu, or click the
Screen Locker button at the top of the window. The Selock Parameters dialog
opens.
This dialog lets you specify the length of idle time before the screen locks. The
default value is 10 minutes. When the screen locks, Screen Locker displays a
moving eTrust AC logo on a black background. When Screen Locker detects
any user activity-use of the keyboard or mouse-a dialog containing a prompt
for your password appears. When Screen Locker detects the correct password,
it unlocks the screen.
If Screen Locker detects an incorrect password, the screen remains locked.
To activate screen locking, select the Activate button and click OK. To
deactivate the option, deselect the Activate button and click OK.
Using Security Administrator
To perform an operation or transaction, you must first select the appropriate
page. For example, to add a host to a host group, click the Hosts tab. Each
page can display information in the form of directory trees, icons, lists, or
tables. Use the View menu to select the display format for the current page.
Select and deselect objects by clicking their names (selected objects appear
highlighted).
56 User Guide
Using Security Administrator
Performing Actions
To create, delete, update, or perform other actions to manipulate information,
you can use one of several methods:
„
Use the pop-up menu that appears when you right-click anywhere in a
page, and select one of the commands.
„
Select the appropriate command from the menu bar.
„
Use the toolbar buttons to select a command.
Using Dialogs
In most cases, when you choose a command, a dialog that contains text
boxes, options, and buttons opens. Each dialog has the following buttons:
„
The OK button approves the command and closes the dialog.
„
The Cancel button closes the dialog without approving the command.
„
The Apply button, if any, accepts the command without closing the dialog.
Security Administrator Basics 57
Workflow
Workflow
Here is an overview of typical Security Administrator workflow. For more
detail, see the chapter “Executing, Editing, and Reviewing Transactions.”
1.
In the Main window, select the objects your command will manipulate: the
particular users, user groups, resources, hosts, and host groups. Next,
invoke the appropriate command. We recommend that for the source host,
you choose the host that is the target for transactions.
2.
If a dialog appears, you can further customize your command.
3.
Click OK, and the Activity Window (see page 61) appears. From here, you
can monitor command progress.
4.
To examine results and revise commands, use the Edit menu on the
Activity window.
5.
After the command runs on all hosts, you can observe the results in the
Activity Page (see page 58).
Activity Page
From the Main window, you can view the status of all the transactions
performed in Security Administrator by clicking the Activity in the lower
section of the window. The Activity page lists transaction names, status, and
statistics indicating transaction success or failure on one or more hosts.
58 User Guide
Activity Page
The columns on the Activity page are:
Activity Window List
This is a list of transactions. When the icons in the Status column are
highlighted, you can view the transactions in greater detail in the Activity
window. To open the window, right-click a transaction. For information
about the Activity window, see Activity window in this chapter.
Status
These icons indicate the success or failure of transactions. The icons are:
The check mark shows that Security Administrator performed all
transactions on all hosts successfully. While the check mark is green,
the transaction history is available for viewing.
The X indicates that at least one transaction failed, although others, if
any, may have succeeded. While the X is red, the transaction history is
available for viewing.
An exclamation point indicates that the transaction has been paused.
To continue, right-click to open the Activity window and click Apply
or Go.
Security Administrator Basics 59
Activity Page
A running man indicates that the transaction is in progress.
Host Statistics
This area shows the result of transactions, their progress, and the number
of hosts affected. The columns are:
Failure
The number of hosts where the transaction failed.
Success
The number of hosts where the transaction was successful.
Warning
The number of hosts where a warning was issued.
Unreachable
The number of hosts where the transaction failed because Security
Administrator was unable to connect to the host.
Progress
Transaction execution from 0 to 100 percent.
Total
The number of hosts affected by the transaction.
60 User Guide
Activity Window
Activity Window
The Activity window lets you monitor details about transactions. You can open
the Activity window from the Main window by:
„
Choosing from the Activity menu.
„
Right-clicking a highlighted transaction on the Activity page. A pop-up
menu appears with options to display the Activity window if it is closed
(Show), close it if it is open (Hide), or delete the transaction.
When icons for a transaction are no longer highlighted on the Activity
page, however, the transaction history is no longer available and you
cannot open the Activity window for that transaction.
Security Administrator Basics 61
Activity Window
Fields and Options
The Activity window contains the following items:
Menu Bar
Contains menus from which you access various Security Administrator
commands.
Transaction
Indicates the command to be processed. If the whole command does not
fit in the Activity window, you can display the remainder with the End and
Home keys or the left and right arrow keys.
Host List
Contains the list of hosts where the requested transaction will execute.
The host icons are gray before execution, blue during execution, and green
after successful execution. If the transaction fails, they are orange or red,
depending on the reason for the failure. Click any host name to open the
Host Messages/Commands window, where you can edit the commands and
retry the transaction. See the chapter “Executing, Editing, and Reviewing
Transactions.”
Progress Indicator
Displays transaction execution from 0 to 100 percent.
Status Bar
Contains the following indicators:
Total (white)
The number of hosts where the transaction will be processed.
Success (green)
The number of hosts where the transaction succeeded.
Warning (yellow)
The number of hosts where a warning was generated upon completion
of the transaction.
Failed (orange)
The number of hosts where the transaction failed.
Unreachable (red)
The number of hosts that could not be reached.
GO/STOP Button
Starts execution of the transaction (unless execution starts automatically).
During execution, the Go button becomes a Stop button, so that you can
stop the transaction before completion.
62 User Guide
Exiting Security Administrator
Close Button
Closes the Activity window and cancels any transaction in progress. You
can temporarily hide the Activity window by clicking the Minimize button at
the top right corner of the window. Reopen the Activity window with the
Show command from the Activity menu in the Main window.
Help button
Displays help information for the Activity window.
Closing the Activity Window
Closing the Activity window makes its transaction unavailable for further
viewing, editing, and execution. If you need the transaction again and you
have not saved it as text, you must reexecute it from the Main window. See
the chapter “Executing, Editing, and Reviewing Transactions.”
Exiting Security Administrator
Closing the Main window ends all Security Administrator processing unless you
leave one or more Activity windows open.
1.
From the System menu choose Exit.
The Exit SeAM dialog appears.
2.
Click Exit to close the Main window only and leave any Activity windows
open and usable, or click Exit All to close Security Administrator entirely.
Note: If any Activity windows remain open, all other windows associated with
them, such as output message windows, remain open as well.
Security Administrator Basics 63
Chapter 5: Executing, Editing, and
Reviewing Transactions
This section contains the following topics:
Executing Transactions (see page 65)
Viewing Transaction Progress (see page 68)
Editing Commands (see page 71)
Retrying Transactions (see page 77)
Viewing Output Messages (see page 78)
Printing Output Messages (see page 81)
Executing Transactions
A Security Administrator transaction is a query or update of specific data in the
databases of one or more host stations. An update can involve creating,
deleting, or changing a record. Security Administrator gives you one window
(the Main window) for preparing transactions and a second window (the
Activity window) for managing their execution. Both windows are discussed in
detail in the chapter “Security Administrator Basics.”
Use the Main window to prepare transactions.
Instructions about the types of transactions you can perform on each page
appear in the chapters “Host Administration,” “Account Administration,” and
“Resource Administration.” Many transactions have a common pattern,
particularly when you want to update a number of users or user groups.
Executing, Editing, and Reviewing Transactions 65
Executing Transactions
Verifying Commands Before Execution
By default, Security Administrator executes transactions automatically when
you click OK or Apply after entering command details. If you want the
opportunity to verify commands and edit them before execution, you can set a
preference in Security Administrator before you prepare the transaction. This
preference sets the verify option in the seam.ini file. To set the preference:
1.
From the Tools menu in the Main window, choose Options.
2.
Click the Activity tab on the Preferences dialog that appears.
3.
Select the Verify Before Executing check box, and click OK.
After choosing to verify transactions before running them, you must manually
start transaction execution. You do this by clicking GO in the Activity window.
For information about the Activity window, see the chapter “Security
Administrator Basics.”
For more information about preferences, see the chapter “Setting Security
Administrator Options.”
Selecting a Source Host
Initially, you may want to select a source host other than the default. If the
default source host (listed in the seam.ini file) suits your needs, however, you
can skip this step.
The source host is a host whose database supplies your list of users. To select
a source host, perform the following steps.
1.
Click the Source button to open the Source dialog.
2.
For eTrust AC, UNIX, and Windows, select the source in any of the
following ways:
„
„
„
3.
Select Master DB to use the default database from the seam.ini
[master_db] section, where you can specify a host name or a PMDB.
(If you select Master DB, you cannot use the separate sections in the
dialog for eTrust AC, UNIX, and NT.)
Click the arrow for any of the Sources (eTrust AC, UNIX, or NT) and
choose a host from the drop-down list.
Enter a host name in a Source data field. (For eTrust AC, you can
enter the name of a host or a PMDB.)
Click OK.
For detailed information about hosts, see the chapter “Host Administration.”
66 User Guide
Executing Transactions
Selecting Target Hosts
Select one or more hosts that contain the databases you want to update.
1.
In the Hosts page, select the host groups whose members you want to
update. When you select a host group, all its members appear highlighted
in the Hosts panel.
2.
In the Hosts panel, click the hosts to select only those that you want
updated.
3.
If you want to update the PMDB subscriber databases, click the Policy
model tab to open the Policy model page. (For detailed information about
PMDBs, see the chapter “Policy Model Administration.”)
4.
In the left panel, select the PMDB from the tree subscribers in the Policy
model page. When you select a PMDB, all its subscribers appear
highlighted in the right panel.
5.
If necessary, select the subscribers you want to target in the right panel.
Selecting Users, Groups, or Resources
Select the accounts that you want to update with the command.
1.
If you are updating users, select them in the Users panel of the Accounts
page.
If you are updating user groups, select them in the Groups panel of the
Accounts page.
If you are updating resources, click the Resources tab to open the
Resources page. Select the resource category in the left panel, and then
select the resources in the right panel.
2.
In the same panel (Users, Groups, or Resources), click the right mouse
button to open the pop-up menu. Click the transaction you want to
perform.
Alternatively, select the transaction from the Edit menu or toolbar.
3.
When the dialog opens, select the appropriate options. (For detailed
information about the options, see the chapters “Account Administration”
and “Resource Administration.”)
4.
To perform the transaction and close the dialog, click OK or press Enter.
Note: Some dialogs have an Apply button. Clicking Apply is the same as
clicking OK, except that the dialog remains open. Thus, you can use the same
dialog repeatedly without needing to reopen it each time.
Executing, Editing, and Reviewing Transactions 67
Viewing Transaction Progress
Viewing Transaction Progress
After clicking OK in the dialog where you specified command details, you can
monitor command progress in the Activity window (see page 61).
The transaction either begins after you click OK or remains available for
further editing, depending on the verify setting in the seam.ini file. See
Verifying Commands Before Execution in this chapter.
At any time, you can select hosts and examine their results or edit their
commands. (You do not need to wait for processing to stop.)
Important! If you close the Activity window while Security Administrator is
processing a transaction, the processing stops immediately. If you need the
transaction again and did not save it as text (see Saving Commands in a File
in this chapter), you must rerun it from the Main window.
Monitoring Status
You can use the Activity window to view the status of the transaction.
68 User Guide
1.
If Verify Before Executing is on, make any necessary edits; see Editing
Commands in this chapter. When you are finished, click GO in the Activity
window to execute the command.
2.
Monitor the command in the various sections of the Activity window.
Viewing Transaction Progress
Activity Window
Host list
In the Host area, the color of each host button indicates transaction
status:
Blue
The transaction is currently being attempted at the host.
Green
The databases of the host were successfully updated.
Yellow
A warning was issued.
Red
The transaction did not succeed because the connection failed.
Orange
Security Administrator succeeded in connecting to the host, but one or
more commands failed during execution.
Progress bar
The Progress Indicator advances to indicate the percentage of hosts that
have been processed.
Status bar
The counters in the Status area are updated as each host is processed:
Total
The number of hosts to be affected by the transaction.
Success
The number of hosts where the transaction succeeded.
Warning
The number of hosts where warnings were issued. If the transaction
includes both warnings and failures, the result is a failed transaction.
Failed
The number of hosts with failures because of a command. If a failure
occurs at any point in a transaction on a particular host, a failure icon
displays, although transactions on other hosts may have been
successful. This is merely to alert you that a failure occurred.
Unreachable
The number of hosts with failures because of a failed connection.
Executing, Editing, and Reviewing Transactions 69
Viewing Transaction Progress
Limiting Hosts
If the Activity window has more hosts than you want to see, you can make it
show only the hosts that interest you. You can filter based on transaction
status, host name, or both.
Note: Any filter you enter for the Activity window also affects the Transaction
Messages window, which lets you view (but not edit) transactions. For more
information, see Viewing Output Messages in this chapter.
1.
From the View menu, choose Filter.
The Filter dialog appears.
2.
To filter based on transaction status, select the appropriate check boxes in
the Status area.
The filters are:
Before execution
Displays hosts on which the transaction has not been executed yet.
Success
Displays hosts on which the transaction was successful.
Warning
Displays hosts where a warning was issued as a result of the
transaction.
Failed
Displays hosts on which connection occurred, but the transaction
failed.
Unreachable
Displays hosts on which the transaction failed because of a failure to
connect.
3.
To filter based on host name, use the Host Names text box. You can enter
the UNIX wildcard characters: ? for any one character; * for any one or
more characters, or none; or [x-y] for any numeric or alphabetic
characters in the specified range, inclusive. You can specify more than one
filter if you separate them with spaces.
4.
Click OK.
Security Administrator displays only hosts whose names match both the status
and host name filters.
70 User Guide
Editing Commands
Stopping and Restarting Transactions
Security Administrator lets you stop processing temporarily so that you can
edit commands.
1.
To stop the command temporarily, click STOP. Security Administrator
finishes processing the host on which it is currently working but does not
continue processing any further. The button label changes from STOP to
CONTINUE.
2.
To edit commands for hosts that Security Administrator has not yet
processed, follow the procedure in Editing Commands for One Host in this
chapter. To view output messages without editing commands, follow the
procedure in Viewing Output Messages in this chapter.
3.
To retry commands that failed, follow the procedure in Retrying
Transactions in this chapter.
4.
To resume processing, click CONTINUE.
Editing Commands
During command execution, you can stop processing to edit the transaction for
hosts where the command has not yet been processed. In addition, you can
edit commands before running them if you configure Security Administrator so
that commands run after you click GO in the Activity window instead of
running automatically.
This section has procedures for editing commands for all hosts and for one
host at a time.
Note: Security Administrator also provides a way to view command output
messages without editing commands. See Viewing Output Messages in this
chapter.
Executing, Editing, and Reviewing Transactions 71
Editing Commands
Editing Commands for All Hosts
Follow this procedure to edit commands for all hosts at one time. This is called
global editing.
Note: If you want to make some identical changes for all hosts (global
changes) as well as some changes for individual hosts, make the changes for
all hosts first. When you edit globally, changes you made to individual hosts
are lost.
1.
From the Edit menu in the Activity window, select Edit Commands.
The Edit window appears.
The Edit window contains two multi-line text areas. If a whole transaction
is not visible in these areas, use the scroll bars, left and right arrow keys,
or Home and End keys to view all the text. The areas are:
Commands
Contains the text of the commands that perform the requested
transaction.
Backout Commands
Contains commands for undoing the transaction. The backout
commands are performed automatically, in whole or in part, when the
transaction stops at an inappropriate point in the execution process.
Important! Do not edit lines that start with BT or ET. These lines are used
by the backout mechanism to restore the database if certain transactions
fail. Also, if you change the commands, make equivalent changes to the
backout commands. Otherwise, when you retry the transaction after
editing, the backout commands cannot undo any unsuccessful commands.
2.
In the Commands area, browse through the commands, and use the
mouse and the keyboard to edit them. Drag the resize button (the sash
button) vertically if you want to resize the Commands and Backout
Commands areas.
In the Commands area, the right mouse button displays a pop-up menu
with the following commands:
Restore original
Reverts to the commands as Security Administrator created them,
discarding all your editing.
Open
Opens a file that contains commands, and displays the commands in
the Commands area. See Saving Commands in a File in this chapter.
72 User Guide
Editing Commands
Save
Saves commands, including any editing you have done, in a file. If this
is the first save for these commands, you specify the name and
location for the file. After the first time, Security Administrator saves
the commands in the same file. See Saving Commands in a File in this
chapter.
Save As
Saves the commands, including any editing you have done, in a new
file for which you specify a name. See Saving Commands in a File in
this chapter.
Clear window
Erases the contents of the window.
3.
When you have finished editing, click OK to keep the changes you have
made.
Executing, Editing, and Reviewing Transactions 73
Editing Commands
Editing Commands for One Host
You can choose one host at a time and edit the commands for it alone.
Important! If you want to make global changes for all hosts and changes for
individual hosts, do the global changes first. When you edit globally, any
changes you made to individual hosts are lost. See Editing Commands for All
Hosts in this chapter.
1.
Click the host name in the Host area of the Activity window.
Security Administrator opens the Host Messages/Commands dialog.
When you right-click the Output Messages area, a pop-up menu provides
the following commands:
Print
Prints all messages in the Output Messages area. For more information
about printing, see Printing Output Messages in this chapter.
Clear Window
Erases the contents of the Output Messages area.
2.
Click More.
An expanded version of the Host Messages/Commands window appears,
showing the commands and backout commands for the host. If you made
global changes to the commands, Security Administrator displays the
updated commands.
When you right-click the Commands or Backout Commands areas, a
pop-up menu provides the following commands:
Retry
Executes the commands in their current form. (Available only in the
Commands area.)
Restore global
Reverts to the global commands.
Open
Opens a file that contains commands, and displays the commands in
the Commands area. See Saving Commands in a File in this chapter.
Save
Saves commands, including any editing you have done, in a file. If this
is the first save for these commands, you specify the name and
location for the file. After the first time, Security Administrator saves
the commands in the same file. See Saving Commands in a File in this
chapter.
74 User Guide
Editing Commands
Save As
Saves the commands, including any editing you have done, in a new
file for which you specify a name. See Saving Commands in a File in
this chapter.
Clear window
Erases the contents of the area.
3.
Browse through the commands and backout commands (commands for
undoing the transactions), using the mouse and keyboard to edit them.
Important! Do not edit lines that start with BT or ET. These lines are used
by the backout mechanism to restore the database if certain transactions
fail. Also, if you change the commands, make equivalent changes to the
backout commands. Otherwise, when you retry the transaction after
editing, the backout commands cannot undo any unsuccessful commands.
4.
Drag the resize button (the sash button) vertically if you want to resize the
Commands, Backout Commands, and Output Messages areas.
5.
If a transaction fails or is only partially successful, you can perform the
transaction again, using the Retry command or button.
„
„
6.
If you want to see the output messages for only the retried
transaction, erase the existing output messages by selecting Clear
Window from the pop-up menu in the Output Messages area.
If you want to rewrite the commands and backout commands
completely, erase the current commands and backout commands by
selecting Clear Window from the pop-up menu in the Commands and
Backout Commands areas.
After you finish, use one of the following buttons at the bottom of the
dialog:
Close
Saves any editing as part of the current transaction and returns you to
the Activity window.
Retry
Executes the commands in their current form. See Retrying
Transactions in this chapter.
Less
Returns you to the original version of the Host Messages/Commands
window, which shows only output messages.
Executing, Editing, and Reviewing Transactions 75
Editing Commands
Saving Commands in a File
You can save commands in a file and run the commands later. Saving
commands is useful when you need to run those same commands more than
once.
Note: To open a file that you have already saved, use this same procedure.
The only difference is to choose Open in step 2 instead of Save or Save As.
1.
Open a window for editing commands. To open the Edit window, choose
Edit, Edit Commands in the Activity window.
2.
To open the Host Messages/Commands dialog, click a host name in the
Host area of the Activity window. Click More to expand the dialog.
3.
Right-click in the Commands area, and choose Save or Save As from the
pop-up menu that appears.
The File Selection dialog opens.
4.
Specify a file name by doing one of the following:
„
Enter the full path and file name in the Selection field, and click OK.
„
Use the Directories and Files lists with the Filter field.
–
Double-click to select directories in the Directories list and files in
the Files list. The selections appear in the Filters field. The file
name in the Filter field does not change when you click to change
directories.
–
Limit the files and directories displayed by entering filters in the
Filters field. Use the asterisk (*) wildcard, which signifies zero or
more characters.
After you have selected a path and file name, click the Filter button to
make the Selection field match the Filter field.
Note: While the cursor is in the Filter field, the Enter key works like
the Filter button.
76 User Guide
Retrying Transactions
Retrying Transactions
If a transaction fails or is only partially successful, you can resubmit it to a
host, with or without editing it.
1.
Click a host name in the Activity window. The Host Messages/Commands
window opens.
2.
To edit the transaction, click the More button to display the Commands
and Backout Commands areas. Edit the commands. (For detailed
instructions, see Editing Commands for One Host in this chapter.)
3.
To see output messages for only the retried transaction, erase the existing
output messages by selecting Clear Window from the pop-up menu in the
Output Messages area.
4.
Click Retry to resubmit the transaction to the host.
When you close the Host Messages/Commands dialog, your edits are saved as
long as the Activity window remains open and no global editing is done there.
Executing, Editing, and Reviewing Transactions 77
Viewing Output Messages
Viewing Output Messages
You can view system messages by opening the Transaction Messages window.
The messages that appear are either for all hosts involved in the transaction
or, if hosts were filtered from the Activity window, for the hosts that remained
after filtering. See Limiting Hosts in this chapter. You can also limit hosts while
you are reviewing messages, as explained in a following procedure.
Note: You can also view messages, for one host only, from the Host
Messages/Commands dialog, which also lets you edit commands. See Editing
Commands for One Host in this chapter
To view transaction messages:
1.
If necessary, display the Activity window. In the Activity page, right-click a
transaction that is highlighted and choose Show. (If a transaction is not
highlighted, its messages are not available and the Activity window does
not open.)
2.
Choose Edit, Show Output in the Activity window.
Messages for one or more hosts appear in the Activity Log area of the
Transaction Messages window.
The three menus in the menu bar of the Transaction Messages window are
System, Search, and View.
System
Save
Saves the messages in an existing file.
Save As
Saves the messages in a new file.
Print
Prints the contents of the Transaction Messages window. See Printing
Output Messages in this chapter.
Print Selection
Prints a selection of the messages. See Printing Output Messages in
this chapter.
Clear Log
Erases the contents of the Activity Log.
Close
Closes the window.
78 User Guide
Viewing Output Messages
Search
Find
Finds specific words or strings. For more information, see Finding a
Word or String in this chapter.
Find Next
After using Find, Find Next jumps to the next instance of the same
string. For more information, see Finding a Word or String in this
chapter.
Find Selection
After you select words or sentences in the Transaction Messages
window, Find Selection jumps to the next instance of the same words
or sentences. For more information, see Finding a Word or String in
this chapter.
View
Filter
Lets you limit the hosts whose messages appear in the Transaction
Messages window. See Filtering Messages by Limiting Hosts in this
chapter.
While you are viewing messages, you can also do the following:
„
Filter messages by limiting hosts
„
Find a word or string in the messages
„
Print messages
Executing, Editing, and Reviewing Transactions 79
Viewing Output Messages
Filtering Messages by Limiting Hosts
You can filter the messages that appear in the Transaction Messages window
by limiting your view to only certain hosts. You can filter by transaction status,
host name, or both.
Note: Any filter you enter for the Transaction Messages window also affects
the Activity window.
1.
If necessary, display the Activity window. In the Activity page, right-click a
transaction that is highlighted and choose Show. (If a transaction is not
highlighted, its messages are not available and the Activity window does
not open.)
2.
Display the Transaction Messages window by choosing Edit, Show Output
in the Activity window.
3.
Choose Filter from the View menu.
The Filter dialog appears.
4.
To filter based on transaction status, select the appropriate check box in
the Status area.
The filters are:
Before execution
Displays hosts on which the transaction has not been executed yet.
Success
Displays hosts on which the transaction was successful.
Warning
Displays hosts where a warning was issued as a result of the
transaction.
Failed
Displays hosts on which connection occurred, but the transaction
failed.
Unreachable
Displays hosts on which the transaction failed because of a failure to
connect.
80 User Guide
5.
To filter based on host name, use the Host Names text box. You can enter
the UNIX wildcard characters: ? for any one character; * for any one or
more characters, or none; [x-y] for any numeric or alphabetic characters
in the specified range, inclusive. You can specify more than one filter if you
separate them with spaces.
6.
Click OK.
Printing Output Messages
Finding a Word or String
You can find a word or a text string in the Activity Log area of the Transaction
Messages window.
1.
If necessary, display the Activity window. In the Activity page, right-click a
transaction that is highlighted and choose Show. (If a transaction is not
highlighted, its messages are not available and the Activity window does
not open.)
2.
Display the Transaction Messages window by choosing Edit, Show Output
on the Activity window.
3.
Specify the search text using one of these methods:
„
„
Drag to select text in the Activity Log, and choose Find Selection from
the Search menu.
Choose Find from the Search menu. In the dialog that appears, enter a
word, part of a word, or several words. The search is case-sensitive,
so use the right combination of uppercase and lowercase letters. Click
OK.
4.
Click OK if the following dialog appears. This dialog is displayed if the
pointer is not at the beginning of the Activity Log, and Security
Administrator cannot find the requested string between the pointer and
the end of the Activity Log.
5.
To view the next appearance of the same string, choose Find Next from
the Search menu.
Printing Output Messages
You can print the output messages for all hosts or only one host.
Executing, Editing, and Reviewing Transactions 81
Printing Output Messages
Printing Messages from All Hosts
You can print all messages in the Activity Log area of the Transaction
Messages window, or just the messages that you select.
1.
If necessary, display the Activity window. In the Activity page, right-click a
transaction that is highlighted and choose Show. (If a transaction is not
highlighted, its messages are not available and the Activity window does
not open.)
2.
Display the Transaction Messages window by choosing Edit, Show Output
on the Activity window.
3.
To print all messages, choose Print from the System menu.
To print specific messages, drag to select them in the Activity Log area,
and choose Print Selection from the System menu.
The Print dialog appears, showing the current default print command.
4.
If necessary, change the print command, and click OK.
Note: Initially, the default print command is lp. To specify another default
printer, choose Tools, Options on the Main window and use the Activity page of
the dialog that appears. For more information, see the chapter “Setting
Security Administrator Options.”
Printing Messages from One Host
To print all output messages from one host:
1.
If necessary, display the Activity window. In the Activity page, right-click a
transaction that is highlighted and choose Show. (If a transaction is not
highlighted, its messages are not available and the Activity window does
not open.)
2.
In the Activity window, click the host name.
The Host Messages/Commands dialog appears.
3.
Right-click inside the Output Messages area.
A pop-up menu appears.
4.
Choose Print.
Security Administrator sends the messages to the printer. All the messages
are printed, even though they may not be visible without scrolling.
82 User Guide
Chapter 6: Host Administration
This section contains the following topics:
The Hosts Page (see page 83)
Host Groups (see page 84)
Hosts (see page 87)
The Hosts Page
When you invoke Security Administrator, the Main window appears. By
default, the Hosts page appears. Use this page to choose which hosts or
groups of hosts to update and with what data:
Host Administration 83
Host Groups
Host Groups
At a large site, you must often implement the same transaction on many hosts
at once. When certain hosts are repeatedly treated the same way, it is often
convenient to define them as a host group. A host group is simply a list of
hosts that can be handled as a single unit. In the Host Groups section in the
bottom left quadrant of the Main window, you can create, select, and delete
host groups.
The host group named ALL, containing all the hosts that Security Administrator
knows of, is always available.
Creating a New Host Group
To create a new host group for your own convenience:
1.
Use the Edit pull-down menu, toolbar, or pop-up menu to choose Create.
The Create Host Group dialog appears.
2.
Enter the name for the new host group in the Group Name text box, and
click OK to create the new host group and close the dialog.
Security Administrator adds the new host group to the Host Groups list.
84 User Guide
Host Groups
Adding Hosts to Host Groups
To add, or connect, hosts to one or more host groups:
1.
In the Host page, select the host groups to which you want to connect
hosts. For example, to add members to the group Demo_1, click its host
group name or folder.
2.
Right-click in the Host group panel to open the pop-up menu, and then
click Members.
The following dialog appears:
The Members list on the right shows all the hosts that are currently in the
group. In this example, there are none, because Demo_1 is a new group.
3.
Select and deselect hosts by clicking their names.
4.
Click Add to connect the selected hosts to the selected host groups.
To remove members from the Members list, select their names and click
Remove.
5.
Click OK to connect the selected hosts to the selected host group and close
the dialog.
Host Administration 85
Host Groups
Removing Hosts from Host Groups
To remove hosts from one or more host groups:
1.
In the Host page, select the host groups from which you want to
disconnect hosts. For example, to remove members from the Demo_1
group, click its name or folder icon.
2.
Right-click in the Host group panel to open the pop-up menu, and then
click Members. The following dialog appears.
The Members list shows all the hosts that are currently in the host group.
3.
Select and deselect hosts by clicking their names, and click Remove.
4.
Click OK to disconnect the selected hosts from the selected host group and
close the dialog.
Deleting a Host Group
To delete a host group from your Security Administrator configuration:
1.
In the host group panel, select the host group you want to delete.
Note: You cannot delete the ALL host group, which includes all the hosts
known to Security Administrator.
2.
Click Edit, Delete.
The Delete Host Group dialog appears.
3.
Click OK.
The dialog closes and the selected host groups no longer exist.
Note: The hosts themselves still exist; Security Administrator removes
only the host group that allowed you to manipulate them jointly.
86 User Guide
Hosts
Hosts
When you select a host group, all its member hosts in the host panel are
automatically selected. Even if a host is a member of more than one selected
host group, it appears in the host panel only once. This section describes the
procedures available for the Hosts panel.
Creating a Host
To register a new host in your Security Administrator configuration:
1.
In the List of Host Groups panel, select the host groups that will include
the new host. The ALL host group will in any case include your new host. If
you do not want your new host in any other host groups, select only ALL.
2.
Click in the List of Hosts panel to select it.
3.
Click Edit, Create.
The Create Host dialog appears.
4.
In the General page, do the following:
a.
In the Host Name text box, enter a name for the new host .
b.
In the Host Type section, click the radio button that indicates the host
environment. Note that depending on systems configuration, some of
these options may not be available.
c.
In the bottom section, enter a comment if you wish.
5.
In the middle of the Membership page, a list shows all of the host groups
selected when you invoked the command. You can click in the list to
deselect and reselect host groups to include the new host.
6.
Click OK to register the new host as specified and to close the dialog.
Alternatively, click Apply to register it and leave the dialog open for further
work.
7.
Later, if you need to, you can use the Update command to change the
host's type, comment; and you can use the host-group pop-up menu
Member option to change its assignment to host groups.
Host Administration 87
Hosts
Selecting and Deselecting Hosts
You can select and deselect hosts in the Hosts section of the Main window.
To select or deselect a single host, simply click the name of the host in the
host list. The host name switches between selected (highlighted) and
unselected.
To select or deselect hosts according to a wildcard pattern:
1.
Use the Edit main menu or the pop-up menu to choose Select or Deselect.
The Select Hosts or Deselect Hosts dialog appears.
88 User Guide
2.
Click inside the text box and type the filter to determine which of the hosts
in the host list select or deselect. You can use the UNIX wildcard
characters: ? for any one character, * for any one or more characters, or
none, or [x-y] for any numeric or alphabetic characters in the specified
range, inclusive. You can specify more than one filter, if you separate
them with spaces.
3.
Click OK to select or deselect the hosts whose names match the specified
filters. Other hosts remain selected or deselected, as they were.
Hosts
Limiting the Display of Host Names
You can limit the display of host names to those that are selected or to those
that match a specified filter.
To display only the selected host names:
1.
Move the pointer to any location in the host list and open the pop-up
menu.
2.
Choose Selected from the pop-up menu.
All unselected host names disappear from the host list.
To filter the host names according to a wildcard specification:
1.
Use the Edit main menu, toolbar, or pop-up menu to choose Filter.
The Hosts Filter dialog appears.
2.
Click inside the text box and type the filter to determine which of the hosts
in the selected host groups will appear in the host list. You can use the
UNIX wildcard characters: ? for any one character, * for any one or more
characters, or none, or [x-y] for any numeric or alphabetic characters in
the specified range, inclusive. You can specify more than one filter if you
separate them with spaces.
3.
Click OK. Hosts that do not match the specified filters are removed from
the host list.
To cancel both limitations:
1.
Move the pointer to any location in the hosts display.
2.
Choose Deselect from the pop-up menu.
Host Administration 89
Hosts
Updating a Host
To change the characteristics of a host, use the pop-up menu or the Edit menu
and choose the Update command described here. The Update command
operates only on the first selected host in the Main window.
Note: You cannot change the name of a host.
To update a host:
1.
In the List of Hosts panel, select the host that you want to update.
Deselect any selected hosts that you do not want to update.
2.
Click Update from the Host menu, toolbar, or pop-up menu.
The Host Properties dialog appears.
At the top of the dialog is the host name. It appears dimmed because you
cannot change it.
3.
In the General page:
a.
Indicate a change in the host environment by clicking the appropriate
radio button.
b.
In the Comment box, write or update a comment if you wish.
4.
The Membership page displays the host's groups. You cannot change the
host's assignment to host groups from here; to do so, use the Members
command (see Adding Hosts to Host Groups and Removing Hosts from
Host Groups in this chapter).
5.
Click OK to update the host as specified and close the dialog.
Note: To assign hosts to host groups, use the host group Member commands,
either through the pop-up menu or through the main Edit menu. See Adding
Hosts to Host Groups earlier in this chapter.
Deleting Hosts from the Database
To delete one or more hosts from your Security Administrator configuration:
1.
In the List Display of Hosts panel, select the hosts that you want to delete.
2.
Click Delete in the Edit main menu, toolbar, or pop-up menu.
The Delete Host(s) dialog appears.
The list box shows all the hosts that you selected when you invoked the
command. You can deselect and reselect hosts by clicking their names.
3.
90 User Guide
Click OK. The dialog closes and the hosts are removed from the database.
Chapter 7: Account Administration
This section contains the following topics:
The Main Window (see page 91)
Users (see page 92)
User Groups (see page 105)
The Main Window
When you invoke Security Administrator, the Main Window appears, showing
the Accounts page by default. Use the Accounts page to prepare account
transactions by specifying which users, which groups of users, and which host
stations are to be updated and with what data.
Account Administration 91
Users
Users
In the Accounts page, the User section contains the list of users and their
security environments.
Names may come from an eTrust AC source host or from an eTrust AC Policy
Model database (PMDB). A PMDB is a database that applies to more than one
host; for details, see the Administrator Guide.
To complete any user transaction, you must select a host (from the Hosts
section at the bottom) where the transaction will be applied.
Filtering the List of Users
You can base the list of users on the Accounts page on whatever database you
want. See Specifying Preferences in the chapter “Security Administrator
Basics” for instructions on choosing a source host. Then you can apply a filter,
if you want, to limit the names displayed.
To show fewer than all the users from the source database:
1.
Choose Edit, Filter.
The Filter User dialog appears.
2.
In the text box, specify the mask or filter to be used as a criterion for
displaying user names. Only those user names that match the specified
filter appear in the User list. You can use the UNIX wildcard characters: ?
for any one character, * for any one or more characters, or none, or [x-y]
for any numeric or alphabetic characters in the specified range, inclusive.
To specify more than one filter, separate them with spaces.
3.
To filter masks in one or more environment, select the appropriate check
box.
4.
Click OK.
Security Administrator closes the dialog, reads the databases of the source
host, updates the user list, and displays the name of the source host at the
top.
92 User Guide
Users
Creating a New User
To create a new user on one or more hosts:
1.
In the Hosts section of the Hosts page, select the hosts where the user is
to be created, and deselect all other hosts. If the hosts that you want are
not visible, make them visible by selecting the ALL group or some other
host groups. The host group named ALL includes all the hosts that Security
Administrator knows of.
2.
Choose Edit, Create.
The Create User dialog appears.
3.
Enter the user name.
4.
If you want the new user to have the same values as a user who already
exists in the database, Choose File, Load User.
The Load User dialog appears.
Select the name of the user whose values you want to copy, and click OK.
All the values of the other user now appear in the Create User dialog.
Note: You can also copy properties to a new user by loading a template.
See Using Templates to Copy User Properties in this chapter.
5.
To select or deselect an environment, click it in the top right section of the
dialog. By default, the user is defined on all environments controlled by
Security Administrator.
If you customized APPL, an APPL button also appears in the top right
section of the property editor. For more information about how to
customize the APPL, see UNIX Exits in the appendix “seam.ini and UNIX
Exits.”
6.
Change the user properties to the desired values. If you selected Load
User, change any values for the new user that are not the same as for the
old user. Use the tabs to view properties on different pages. For a
description of user properties, see the appendix “User and Group
Properties.”
If property editor synch mode is on, and you are creating the user in more
than one environment, fields that should contain identical data receive
identical data automatically. (See Preference Dialog Settings in the chapter
“Setting Security Administrator Options.”)
If you specify a new password in the property editor, that password is
good for one usage only. Once logged in with the new password, the user
should specify a different password for future use.
7.
Click OK to create the user and close the dialog. Or, to create the user but
leave the dialog open, so that you can immediately create another user,
click Apply.
You can monitor progress in the Activity Window or page. For details, see
the chapter “Editing, Executing, and Reviewing Transactions.”
Account Administration 93
Users
8.
To view the new user, click the Refresh button on the toolbar.
Using Templates to Copy User Properties
If you want to base new users on a set of preselected properties (which are
editable), you can save a set of values as a template. Reload the template at
any time, instead of specifying properties one by one. In fact, each time you
click Create to start defining a new user, Security Administrator loads the
default template.
Templates are stored as *.USER files in the directory
eTrustACDir/data/seam/defaults (where eTrustACDir is the directory where
you installed eTrust AC, by default /opt/CA/eTrustAccessControl) You have no
reason to view or edit those files; just be sure not to delete them.
Creating a Template
To create a template:
1.
Fill the property editor with the data for the template by creating or
modifying a user.
2.
In the Create User window, choose File, Save As Template.
3.
In the Save As Template dialog, enter a name for the template.
If you want to overwrite an existing template, you can search for the name
of the template using the Browse key.
Loading a Template
To load a template at any time during your work with the property editor:
1.
In the Create User window, choose File, Load Template.
2.
In the Load Template dialog, specify an existing template by entering or
clicking its name.
After loading a template, you can edit it and save the data as a user or a
template.
Refreshing the User List
Security Administrator does not automatically refresh the user list when you
create or delete a user. Instead, it highlights the Refresh button to indicate
that the displayed User list is outdated. When you click the Refresh button,
users are added to the list or deleted from it as appropriate.
94 User Guide
Users
Selecting and Deselecting Users with Wildcards
You can select and deselect users in the Users section of the Main window by
simply clicking their names. Security Administrator, however, also provides a
more powerful way to select and deselect: wildcards.
To select or deselect users according to a wildcard pattern:
1.
Choose Select or Deselect from the pop-up menu.
The Select User or Deselect User dialog appears.
2.
Click inside the text box and enter a filter. You can use the UNIX wildcard
characters: ? for any one character, * for any one or more characters, or
none, or [x-y] for any numeric or alphabetic characters in the specified
range, inclusive. You can specify more than one filter if you separate them
with spaces.
3.
Click OK.
The users whose names match the specified filter are selected or deselected.
Other users remain selected or deselected, as they were.
Account Administration 95
Users
Viewing User Properties
Asking to view the properties of a user is called querying the user. To query
one or more users on one or more hosts:
1.
If you wish, select Remove Host on Failure (Query). This automatically
reduces the list of host names, when the query is executed later, to only
those that contain the specified users. (For details, see Preference Dialog
Settings in the chapter “Setting Security Administrator Options.”)
2.
To query the user at fewer than all hosts, click the Hosts section to select
the hosts where the user is to be queried and to deselect all other hosts. If
the hosts that you want are not visible, make them visible by selecting the
ALL group or some other host groups. The host group named ALL includes
all the hosts that Security Administrator knows of.
3.
In the User section, select the users that are to be queried and deselect all
other user names. If the users that you want are not visible, use the
Source button or the Filter command from the pop-up menu.
4.
Choose Edit, Query.
The Query User dialog appears, listing the users that you selected in the
Main window.
5.
Use the dialog as follows:
„
„
„
„
6.
To query the user at all hosts, select the ALL button. Otherwise, the
user is queried only at the hosts that are selected in the Main Window.
To deselect and reselect users for querying, click the list at the left.
To query one additional user that does not appear in the list, enter the
user name in the text box under the list of users.
To select environments where the users should be queried, toggle the
appropriate check boxes in the Environment area. By default, the
users are queried in all environments controlled by Security
Administrator.
Click OK.
You can check progress in the Activity window or page. For details about using
the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
96 User Guide
Users
Modifying User Properties
The Update command lets you change user properties in all environments that
include the user. The Edit command lets you not only change properties but
also create users with the same properties in environments where they do not
currently exist. This procedure shows both commands.
1.
In the Hosts section, select the hosts where the user is to be changed and
deselect all other hosts. If the hosts that you want are not visible, make
them visible by selecting the ALL group or other host groups. The host
group ALL includes all the hosts that Security Administrator knows of.
2.
In the User section, do one of the following:
„
„
If you are updating properties only, select one user.
If you are updating properties and creating users in environments
where they do not exist, select one or more users.
If a user that you want is not visible, use the Source button or the Filter
command from the pop-up menu.
3.
To modify only properties, choose Edit, Update.
The following dialog appears, displaying the present properties. (If
properties are in the APPL section, you need a utility to reload their values.
See UNIX Exits in the appendix “seam.ini and UNIX Exits.”) The user name
is dimmed because you cannot change it.
Note: If you specify a new password in the property editor, that password
is good for only one usage. Once logged in with the new password, the
user should specify a different password for future use.
4.
To modify properties and create users in environments where they do not
exist, use the Edit menu, the toolbar, or the pop-up menu to select Edit.
The Edit User dialog appears.
You can add users that you would like edit that you have not already
selected. You can also add users that have not been created, because the
Edit command creates users that do not exist.
5.
To select or deselect an environment that includes the user, click it in the
top right section of the property editor. (By default, users are updated in
all environments where they exist. In addition, if you selected Edit, users
are also created in all environments where they do not exist.)
Note: If you see a Browse button to the right of the Comment field near
the top of the eTrust AC section, the seam.ini file has been used to replace
the Comment field with user fields. The user fields appear in a separate
dialog, which you can examine by pressing the Browse button. If the
seam.ini file has been used the Comment is read-only and can be edited
only through the Browse dialog.
Account Administration 97
Users
6.
Change the user properties to the desired values. Use the tabs to view
properties on different pages. For a description of user properties, see the
appendix “User and Group Properties.”
If property editor synch mode is on, and you are updating or creating the
user in more than one environment, fields that should contain identical
data receive identical data automatically. (See Preference Dialog Settings
in the chapter “Setting Security Administrator Options.”)
7.
Click OK.
You can check progress in the Activity window or page. For details about how
to use the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
98 User Guide
Users
Changing Passwords
You can use the property editor to change a user password, but if the
password is all you want to change, the separate Password command is more
convenient.
Like a new password from the property editor, a new password from the
Password command is good for only one usage. Once logged in with the new
password, the user should specify a different password for future use.
1.
In the User panel, select the user whose password is to change. Select
only one user. If the user that you want is not visible, use the Source
button or the Filter command from the pop-up menu.
2.
In the User panel, choose Edit, Password.
The Change Password dialog appears.
3.
Select the environments where the password is to change. Normally, you
should select all environments every time you change a password.
„
„
If you select UNIX or NT (Windows) but not eTrust AC, the history of
the user's password is not updated in eTrust AC, but the password is
updated.
If you select eTrust AC but not UNIX or NT (Windows), the user's
password is not changed, but the history of the user's password is
updated.
4.
Click the ALL radio button to make the change apply to all hosts, unless
you have a special reason to apply the change only to the hosts selected in
the Main window.
5.
Check that the password policy is correct, and then change the password
according to that policy.
Hidden
Enter the password in the New box, and then in the Confirm box.
Security Administrator displays asterisks (*) in the boxes; it does not
display what you type.
Clear (without Generate)
Enter the password in the New box. You can see what you have typed;
review it visually to make sure that the password is correct. There is
no need to use the Confirm box.
Clear and Generate
With Clear selected, click Generate. Security Administrator generates
the password and displays it in the New text box. Security
Administrator generates the password randomly, unless you specified
a password generator of your own. (For details about how to specify a
password generator, see The Password Generation Utility in the
appendix “seam.ini and UNIX Exits.”)
Account Administration 99
Users
6.
Click OK.
You can check progress in the Activity window or page. For details about
how to use the Activity window, see the chapter “Executing, Editing, and
Reviewing Transactions.”
Suspending and Resuming Users
To suspend one or more users, thereby temporarily or indefinitely halting their
permission to log in on one or more hosts:
1.
In the Hosts section, select the hosts where the user is to be suspended
and deselect all other hosts. If the hosts that you want are not visible,
make them visible by selecting the ALL group or other host groups. The
host group named ALL includes all the hosts that Security Administrator
knows of.
2.
In the User section, select the users who are to be suspended. If the users
are not all visible, use the Source button or the Filter command from the
pop-up menu.
3.
Choose Suspend from the Edit menu or the pop-up menu.
The Suspend User dialog appears.
If you wish, click users in the list to deselect and reselect the users
selected when you invoked the command. At the bottom of the list, you
can type one additional user to be selected.
4.
Specify the date and time for the start of the suspension. The default is
the current date. To change the date or time, enter a value in the
appropriate field or click the up or down arrows at the far right. Note that
the time is in 24-hour format.
5.
Choose all the hosts that are defined to Security Administrator or only
hosts that are selected in the Hosts display.
6.
Click OK to suspend the specified users from the specified hosts, starting
at the specified time and date.
You can check progress in the Activity window or page. For details about
how to use the Activity window, see the chapter “Editing, Executing, and
Reviewing Transactions.”
7.
100 User Guide
If you know when you want to allow the users to log in again (or be
resumed automatically), choose Edit, Resume. Specify the date and time.
The procedure for resuming users is similar to the preceding procedure for
suspending users.
Users
Copying Users from the Source Host to Other Hosts
If you want to copy groups and their users from host to host, you should copy
the groups first, then the users. This is the reason:
„
When you copy a group, users that belong to the group at the source
host (the host you are copying from) automatically join the group at the
target host (the one you are copying to) if they exist there. If they do not
exist there, they are ignored as the group is copied to the target host.
„
When you copy a user, the transaction succeeds only if all the groups to
which the user belongs on the source host already exist on the target host
and if all the connections succeed. Otherwise, the transaction is not
completed; backout occurs instead. (For more about backout-the undoing
of an unsuccessful command-see Transactions for All Hosts in the chapter
“Editing, Executing, and Reviewing Transactions.”)
To copy the definitions of one or more users on a particular host to one or
more other hosts:
1.
Define as your source host the host from which you want to copy. (The
source host name appears at the top of the Main Window. For details
about how to change it, see Specifying Preferences in the chapter
“Security Administrator Basics.”)
2.
If you want to copy to fewer than all other hosts, select the hosts to which
you want to copy the users. If the hosts that you want are not visible in
the Hosts display, make them visible by selecting the ALL group or other
host groups. The host group named ALL includes all the hosts that Security
Administrator knows of.
3.
In the User section, select the users to be copied. If the users are not all
visible, use the Source button or the Filter command from the pop-up
menu.
4.
Choose Edit, Copy.
The Copy User dialog appears.
5.
Use the dialog as follows:
To deselect and reselect users, click the list at the left.
„
„
„
6.
To copy one additional user that does not appear in the list, enter the
user name in the text box under the list of users.
To copy the user to all hosts, select the ALL button. Otherwise, the
user is copied only to the hosts that are selected in the Main Window.
To select environments where the users should be copied, toggle the
appropriate check boxes in the Environment area. By default, the
users are copied to all environments controlled by Security
Administrator.
Click OK.
Account Administration 101
Users
You can check progress in the Activity window or page. For details about how
to use the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Deleting Users
To delete one or more users from one or more hosts:
1.
To delete the user from fewer than all hosts, click the Hosts section to
select the hosts where the user is to be deleted. Deselect all other hosts. If
the hosts that you want are not visible, make them visible by selecting the
ALL group or other host groups. The host group ALL includes all the hosts
that Security Administrator knows of.
2.
In the User section, select the names of users to be deleted, and deselect
all others. If the users that you want to delete are not visible, use the
Source button or the Filter command from the pop-up menu.
3.
Choose Edit, Delete.
The Delete User dialog appears, listing the users that you selected in the
Main window.
Use the dialog as follows:
„
„
„
„
„
102 User Guide
To delete the user from all hosts, select All. Otherwise, the user is only
from the hosts that are selected in the Main window.
To deselect and reselect users, click the list at the left.
To delete one additional user that does not appear in the list, enter the
user name in the text box under the list of users.
To deselect and reselect environments, toggle the check boxes in the
Environment area. By default, the groups are deleted from all
environments that Security Administrator controls.
To delete the users' home directories, click Delete. For information
about deleting a user's home directory automatically when you delete
a user, see the appendix “seam.ini and UNIX Exits.” This option is
available only if you are deleting the user from the UNIX environment.
4.
Click OK. The Activity window appears. For details about how to use the
Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
5.
To remove the deleted user graphically from the list of users, click the
Refresh toolbar button.
Users
Adding, Modifying, or Deleting User Access Permissions
To add or change user access permissions, follow this procedure:
1.
In the Main Window, select the hosts where you want your changes to be
implemented. Select one or more users.
2.
Choose Edit, Permit.
The Permit User dialog appears.
The name of the first selected user appears at the top of the Permit User
dialog. The dialog shows the access rights of the selected user to all the
resources.
3.
Use the dialog as follows:
„
„
Click the button under the selected user name to receive a list of all
the resource classes. The default class is FILE. (See the appendix
“Resource Properties” for an explanation of classes.) After you select a
class, all the resources in the class are listed below it.
Select one of the resources to see what permissions the user has to
the resource. Letters represent the different permissions. If you run
your cursor over the letters, the full names of the permissions pop up.
4.
If you want to remove access permission to a resource, click Delete.
Confirm the deletion and click OK until the Activity Window reappears. The
deletion is complete.
5.
If you want to add access permission to a resource, select the resource
from the list and click Add.
If you want to change access permission, click Update.
The Permit Popup dialog appears.
6.
To give the same permissions to more than one user, enter names in the
Accessor field and separate them with commas.
7.
In the Permissions section, select the access rights you want to give to the
user. Each resource class has its own set of permissions. For example, you
can have Execute permission to a resource in the class PROGRAM, and
Read and Write permissions to a resource in the class TERMINAL. Every
set contains None.
8.
(Optional) In the Program field, specify a program through which the user
is permitted to access the resource-for example /bin/login.
9.
Click OK to implement your changes and return to the Permit User dialog.
10. When you are finished making all changes, click OK in the Permit User
dialog.
The Activity window reopens. For details about using the Activity window, see
the chapter “Editing, Executing, and Reviewing Transactions.”
Account Administration 103
Users
Viewing User Access Permissions
Any user belonging to both the ADMIN and SERVER user types can view and
print a report detailing the permissions for a particular user in various eTrust
AC classes (FILE, PROGRAM, SURROGATE, TERMINAL, SUDO, and CONNECT)
on the local host. The local host is the host on which Security Administrator is
running.
To display the report:
1.
Become a SERVER-type user (if you are not one already).
2.
Select the user in the Users panel of the Accounts page.
Note: Security Administrator generates a report on one user at a time; if
you select more than one user, it reports on the first one only.
3.
Click Tools, User Permissions.
The User Permissions dialog appears.
4.
Select or deselect the classes that you want to include or omit from the
report.
Note: If you want to include only one or a few classes, it is easier to click
Deselect All, and then select the appropriate classes. Conversely, if you
want to omit only one or a few classes, click Select All, and then deselect
the appropriate classes.
5.
If you want the report to include permission information for all the
resources, click ALL. Otherwise, the report just lists the resources.
6.
Click OK.
Security Administrator generates the permissions report and opens the
Report window (click Help in the window for information).
The name of the user you selected appears at the top left of the dialog.
7.
To close the report click Close.
To print the report, right-click the Report window and choose Print from
the pop-up menu that appears.
8.
104 User Guide
Ensure that the proper print command for your specific printer appears in
the text box, and then click OK.
User Groups
User Groups
Security Administrator works with user groups and host groups. When it
appears alone in Security Administrator or in this chapter, the word “group”
refers to a user group.
In the Main window, the Group section contains the group list and the buttons
that initiate operations on groups.
At the top of the Main window, the Source field next to the Source button
indicates from where the group names were copied. eTrust AC names may
come from an eTrust AC source host or from an eTrust AC PMDB. A PMDB is a
database that applies to more than one host; for details, see the Administrator
Guide.
The procedures used in the Group section are described in the following
section. To complete any group transaction, you must select a host (from the
Hosts section at the bottom) where the transaction is applied.
Filtering the List of Groups
You can base the list of groups, displayed on the Accounts page, on whatever
database you want. To select a database source host other than the default,
see Specifying Preferences in the chapter “Security Administrator Basics.”
Then you can apply a filter, if you want, to limit the names displayed.
To show fewer than all the groups in the source database:
1.
Choose Edit, Filter.
The Filter Groups dialog appears.
2.
In the text box, specify the mask or filter to be used as a criterion for
displaying group names. Only those host names that match the specified
mask appear in the list of groups. You can use the UNIX wildcard
characters: ? for any one character, * for any one or more characters, or
none, or [x-y] for any numeric or alphabetic characters in the specified
range, inclusive.
3.
Click OK.
Security Administrator closes the dialog, reads the databases of the source
host, updates the group list, and displays the name of the source host at the
top.
Account Administration 105
User Groups
Creating a New Group
To create a new group on one or more hosts:
1.
In the Hosts section of the Hosts page, select the hosts where the group is
to be created, and clear all other hosts. If the hosts that you want are not
visible, make them visible by selecting the ALL group or some other host
groups. The host group named ALL includes all the hosts that Security
Administrator knows of.
2.
Choose Edit, Create.
The Create Group dialog appears.
3.
Enter a name for the group.
4.
If you want the new group to have the same values as a group that
already exists in the database, choose File, Load Group.
The Load Group dialog appears.
Enter the name of the group whose values you want to copy in the Group
name field. Click OK. All the values of that group now appear in the Create
Group dialog.
Note: You can also copy properties to a new group by loading a template.
See Using Templates to Copy Group Properties in this chapter.
To select or deselect an environment, click it in the top right section of the
dialog. By default, the group is defined on all environments controlled by
Security Administrator.
5.
Change the group properties to the desired values. If you selected Load
Group, change any values for the new group that are not the same as for
the old group. Use the page tabs to view properties on pages not initially
displayed. For a description of the properties, see the appendix “User and
Group Properties.”
If property editor synch mode is on, and you are creating the group in
more than one environment, fields that should contain identical data
receive identical data automatically. (See Preference Dialog Settings in the
chapter “Setting Security Administrator Options.”)
6.
Click OK to create the group and close the dialog. Or, to create the group
but leave the dialog open, so that you can immediately create another
group, click Apply.
You can check progress in the Activity window or Activity page at the
bottom of the Security Administrator Main window. For details about how
to use the Activity window, see the chapter “Editing, Executing, and
Reviewing Transactions.”
7.
106 User Guide
To make the new group appear in the list of groups, click the Refresh
toolbar button.
User Groups
Using Templates to Copy Group Properties
If you want to base new user groups on a set of pre-selected properties (which
are editable), you can save a set of values as a template. Reload the template
at any time, instead of specifying properties one by one. In fact, each time you
click Create to start defining a new user group, Security Administrator loads
the default template.
Your templates are stored as *.GROUP files in the directory
eTrustACDir/data/seam/defaults (where eTrustACDir is the directory where
you installed eTrust AC, by default /opt/CA/eTrustAccessControl). You have no
reason to view or edit those files; just be sure not to delete them.
Security Administrator comes with a group template named “default,” but you
can use a different template with your own default values.
Creating a Template
To create a template:
1.
Fill the property editor with the data for the template by creating or
modifying a group.
2.
In the Create Group window, choose File, Save As Template.
3.
In the dialog that appears, specify a name for the template.
If you want the template to appear automatically each time you create a
new group, click the Load Template by Default check box.
Loading a Template
To load a template at any time as you work with the property editor:
1.
In the Create Group window, choose File, Load Template.
2.
In the Load Template dialog, specify an existing template by entering or
clicking its name.
After loading a template, you can edit it and save the data as a group or a
template.
Refreshing the Group List
The group list is not refreshed automatically when a group is created or
deleted. The Refresh button blinks to indicate that the displayed group list is
outdated. Click the Refresh button, and groups are added to the list or deleted
from it as appropriate.
Account Administration 107
User Groups
Selecting and Deselecting Groups Using Wildcards
You can select and deselect groups in the Groups section of the Main window
by simply clicking their names. Security Administrator, however, also provides
a more powerful way to select and deselect: wildcards.
To select or deselect groups according to a wildcard pattern:
1.
In the Groups section, choose Select or Deselect from the pop-up menu.
The Select Group(s) or Deselect Group(s) dialog appears.
2.
Click inside the text box and enter a filter. You can use the UNIX wildcard
characters: ? for any one character, * for any one or more characters, or
none, or [x-y] for any numeric or alphabetic characters in the specified
range, inclusive. You can specify more than one filter if you separate them
with spaces.
3.
Click OK.
The groups whose names match the specified filter are selected or deselected.
All other groups remain selected or deselected, as they were.
108 User Guide
User Groups
Viewing Group Properties
Asking to view the properties of a group is called querying the group. To query
one or more groups on one or more hosts:
1.
If you wish, ensure that Remove Host on Failure (Query) is selected. This
automatically reduces the list of host names, when the query is executed
later, to only hosts that contain the specified groups. (For details, see
Preference Dialog Settings in the chapter “Setting Security Administrator
Options.”)
2.
To query the group at fewer than all hosts, click the Hosts section to select
the hosts where the group is to be queried and to deselect all other hosts.
If the hosts that you want are not visible, make them visible by selecting
the ALL group or some other host groups. The host group named ALL
includes all the hosts that Security Administrator knows of.
3.
In the Group section, select the groups that are to be queried and deselect
all other group names. If the groups that you want to query are not
visible, use the Source button or the Filter command from the pop-up
menu.
4.
Choose Edit, Query.
The Query Group dialog appears, listing the groups that you selected in
the Main window.
Use the dialog as follows:
„
„
„
„
5.
To query the group at all hosts, select the All button. Otherwise, the
group is queried only at the hosts that are selected in the Main
Window.
To deselect and reselect groups for querying, click the list at the left.
To query one additional group that does not appear in the list, enter
the group name in the text box under the list of groups.
To select environments where the groups should be queried, toggle
the appropriate check boxes in the Environment area. By default, the
groups are queried in all environments controlled by Security
Administrator.
Click OK.
You can check progress in the Activity window or page. For details about how
to use the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Account Administration 109
User Groups
Modifying Group Properties
The Update command lets you change group properties in all environments
that include the group. The Edit command lets you not only change properties
but also create a group with the same properties in an environment where the
group does not currently exist. This procedure shows both commands.
1.
In the Hosts section, select the hosts where the group is to be changed
and deselect all other hosts. If the hosts that you want are not visible,
make them visible by selecting the ALL group or other host groups. The
host group ALL includes all the hosts that Security Administrator knows of.
2.
In the Group section, do one of the following:
„
„
If you are updating properties only, select one group.
If you are updating properties and creating groups in environments
where they do not exist, select one or more groups.
If the group that you want is not visible, use the Source button or the
Filter command from the pop-up menu.
3.
To modify only properties, choose Edit, Update.
The following dialog appears, displaying the present properties. (If
properties are in the APPL section, you need a utility to reload their values.
See UNIX Exits in the appendix “seam.ini and UNIX Exits.”) The group
name is dimmed because you cannot change it.
4.
To modify properties and create groups in environments where they do not
exist, choose Edit, Edit. (If properties are in the APPL section, you need a
utility to reload their values. See UNIX Exits in the appendix “seam.ini and
UNIX Exits.”)
The Edit Group dialog appears.
You can add groups that you would like edit that you have not already
selected. You can also add groups that have not been created, because the
Edit command creates groups that do not exist.
5.
To select or deselect an environment that includes the group, click it in the
top right section of the property editor. (By default, groups are updated in
all environments where they exist. In addition, if you selected Edit, groups
are also created in all environments where they do not exist.)
6.
Change the group properties to the desired values. Use the tabs to view
properties on different pages. For a description of group properties, see
the appendix “User and Group Properties.”
If property editor synch mode is on, and you are updating or creating the
group in more than one environment, fields that should contain identical
data receive identical data automatically. (See Preference Dialog Settings
in the chapter “Setting Security Administrator Options.”)
7.
110 User Guide
Click OK.
User Groups
You can check progress in the Activity window or page. For details about how
to use the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Adding Users To Groups and Removing Users From Groups
The following procedure lets you add users to groups and remove them from
groups. You can do this for one or more users, one or more existing groups,
and one or more hosts.
1.
In the Hosts section of the Main Window, select the hosts where the users
are to join the groups or be removed from them. Deselect all other hosts.
If the hosts that you want are not visible, make them visible by selecting
the ALL group or other host groups. The host group named ALL includes all
the hosts that Security Administrator knows of.
2.
In the User section, select the users who are to join the groups or be
removed from them. If all the users are not visible, use the Source button
or the Filter command from the pop-up menu.
3.
In the Group section, select the groups that the users are to join or leave.
If all the groups are not listed, use the Source button or the Filter
command from the pop-up menu.
4.
If you are adding users, choose Edit, Connect.
The Connect User to Group dialog appears.
5.
If you are removing users, choose Edit, Disconnect.
The Disconnect User From Group dialog appears.
These dialogs have no list of hosts. The command takes effect on the
hosts that are currently selected in the Main window.
In the left section of these dialogs is a list of users who were selected
when you invoked the command. Likewise, the right section contains a list
of selected groups.
6.
If you wish, click users or groups in the list to deselect and reselect them.
At the bottom of the list, you can type one additional user or group to be
selected.
7.
If you wish, click environments in the middle of the dialog to select or
deselect them as the locations where the users join or leave groups.
8.
Click OK.
You can check progress in the Activity window or page. For details about how
to use the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Account Administration 111
User Groups
Copying Groups from the Source Host to Other Hosts
If you want to copy groups and their users from host to host, you should copy
the groups first, then the users. This is the reason:
„
When you copy a group, users that belong to the group at the source
host (the host you are copying from) automatically join the group at the
target host (the one you are copying to) if they exist there. If they do not
exist there, they are ignored and the group is copied to the target host.
„
When you copy a user, the transaction succeeds only if all the groups to
which the user belongs on the source host exist already on the target host
and if all the connections succeed. Otherwise, the transaction is not
completed; backout occurs instead. (For more about backout-the undoing
of an unsuccessful command-see Transactions for All Hosts in the chapter
“Editing, Executing, and Reviewing Transactions.”
To copy the definitions of one or more groups on a particular host to one or
more other hosts:
1.
Define as your source host the host from which you want to copy. (The
source host name appears at the top of the Main Window. For details
about how to change it, see Specifying Preferences in the chapter
“Security Administrator Basics.”)
2.
If you want to copy to fewer than all the other hosts, select the hosts to
which you want to copy the groups. If the hosts that you want are not
visible in the Hosts display, make them visible by selecting the ALL group
or other host groups. The host group named ALL includes all the hosts that
Security Administrator knows of.
3.
In the Group section, select the groups to be copied. If the groups are not
all visible, use the Filter command from the pop-up menu.
4.
Choose Edit, Copy.
The Copy to Group dialog appears.
Use the dialog as follows:
„
„
„
„
5.
112 User Guide
To deselect and reselect groups, click the list at the left.
To copy one additional group that does not appear in the list, enter the
group name in the text box under the list.
To copy the group to all hosts, select the ALL button. Otherwise, the
group is copied only to the hosts that are selected in the Main Window.
To select environments where the groups should be copied, toggle the
appropriate check boxes in the Environment area. By default, the
groups are copied to all environments controlled by Security
Administrator.
Click OK.
User Groups
You can check progress in the Activity window or page. For details about how
to use the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Deleting Groups
When you delete groups, the users that belong to the groups still exist; only
the groups that allow the users to be manipulated jointly are cancelled.
To delete one or more groups from one or more hosts:
1.
To delete the group from fewer than all hosts, click the Hosts section to
select hosts where the group is to be deleted. Deselect all other hosts. If
the hosts that you want are not visible, make them visible by selecting the
ALL group or other host groups. The host group ALL includes all the hosts
that Security Administrator knows of.
2.
In the Group section, select the names of groups to be deleted and
deselect all others. If the groups that you want to delete are not visible,
use the Source button or the Filter command from the pop-up menu.
3.
Choose Edit, Delete.
The Delete Group dialog appears, listing the groups that you selected in
the Main window.
Use the dialog as follows:
„
„
„
„
To delete the group from all hosts, select All. Otherwise, the group is
deleted only from the hosts that are selected in the Main window.
To deselect and reselect groups, click the list at the left.
To delete one additional group that does not appear in the list, enter
the group name in the text box under the list of groups.
To deselect and reselect environments, toggle the check boxes in the
Environment area. By default, the groups are deleted from all
environments that Security Administrator controls.
4.
Click OK. The Activity window appears. For details about how to use the
Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
5.
To remove the deleted group graphically from the list of groups, click the
Refresh toolbar button.
Account Administration 113
User Groups
Adding, Modifying, or Deleting Group Access Permissions
To add or change group access permissions, follow this procedure:
1.
In the Main Window, select the hosts where you want your changes to be
implemented. Select one or more groups.
2.
Choose Edit, Permit.
The Permit Group dialog appears.
The name of the first selected group appears at the top of the Permit
Group dialog. The dialog shows you the access rights of the selected group
to all the resources.
3.
Use the dialog as follows:
„
„
Click the button under the selected group name to receive a list of all
the resource classes. The default class is FILE. (See the appendix
“Resource Properties” for an explanation of classes.) After you select a
class, all the resources in the class are listed below it.
Select one of the resources to see what permissions the group has to
the resource. Letters represent the different permissions. If you run
your cursor over the letters, the full names of the permissions pop up.
4.
If you want to remove access permission to a resource, click Delete.
Confirm the deletion and click OK until the Activity Window reappears. The
deletion is complete.
5.
If you want to add access permission to a resource, select the resource
from the list and click Add.
If you want to change access permission, click Update.
The Permit Popup dialog appears.
6.
To give the same permissions to more than one group, enter names in the
Accessor field and separate them with commas.
7.
In the Permissions section, select the access rights you want to give to the
group. Each resource class has its own set of permissions. For example,
you can have Execute permission to a resource in the class PROGRAM, and
Read and Write permissions to a resource in the class TERMINAL. Every
set contains None.
8.
(Optional) In the Program field, specify a program through which the
group is permitted to access the resource-for example /bin/login.
9.
Click OK to implement your changes and return to the Permit Group
dialog.
10. When you are finished making all changes, click OK in the Permit Group
dialog.
The Activity window reopens. For details about how to use the Activity window,
see the chapter “Editing, Executing, and Reviewing Transactions.”
114 User Guide
User Groups
Account Administration 115
Chapter 8: Resource Administration
This section contains the following topics:
Security Administrator (see page 117)
Displaying Resources (see page 118)
Filtering the List of Resources (see page 119)
Creating a Resource (see page 120)
Selecting and Deselecting Resources Using Wildcards (see page 121)
Viewing Resource Properties (see page 122)
Updating a Resource (see page 123)
Editing Existing Resources and Creating New Ones (see page 126)
Copying a Resource (see page 127)
Protecting a Resource in the UNIX or Windows Environment (see page 128)
Deleting Resources (see page 129)
Updating TCP Services and Ports (see page 130)
Adding Accessors to Windows Resources (see page 131)
Security Administrator
This chapter describes how Security Administrator manages eTrust AC, UNIX,
and Windows resources. Using the Security Administrator Main Window, you
can edit, copy, and add resources; set relevant parameters; and perform
many other related transactions.
Resource Administration 117
Displaying Resources
Displaying Resources
When you invoke Security Administrator, the Main window appears. To display
all resource classes, click the Resources tab.
The resources are divided according to the following environments: eTrust AC,
UNIX, and NT (Windows). Each environment is in turn subdivided into resource
categories specific to that environment. Clicking the plus sign of an
environment name opens its list of categories, and clicking the plus sign of a
category opens its list of object subcategories.
Clicking any of the resource subcategories displayed in the left panel displays
all the relevant resource records or objects in the right panel. Click the lowest
branch of the category to display class-specific records.
The Copy, Delete, Select, Deselect, and Filter functions are similar for most
resources. However, the Create and Update functions may differ because some
resources have different protections, conditions, or parameters. For example,
attributes and parameters that you can assign to ADMIN class resources differ
from those you can assign to TCP class resources or to the NT File class.
Therefore, the pages that appear in the Security Administrator resource
property editor vary for different classes. For more information about specific
parameters that appear in the Security Administrator resource property editor
for each class, see the appendix “Resource Properties.”
118 User Guide
Filtering the List of Resources
Filtering the List of Resources
You can base the list of resources, displayed on the Resources page, on
whatever database you want. To select a database source host other than the
default, see Specifying Preferences in the chapter “Security Administrator
Basics.” Then you can apply a filter, if you want, to limit the names displayed.
To show fewer than all the resources in the source database:
1.
Choose Edit, Filter.
A Filter dialog appears.
2.
In the text box, specify a mask or filter for displaying resource record
names. The filter is case-sensitive. You can use the UNIX wildcard
characters: ? for any one character, * for any one or more characters, or
none, or [x-y] for any numeric or alphabetic characters in the specified
range, inclusive. You can specify more than one filter if you separate them
with spaces.
3.
Click OK.
Security Administrator closes the dialog, reads the databases of the source
host, updates the resource record list, and displays the name of the source
host at the top of the Main Window.
Resource Administration 119
Creating a Resource
Creating a Resource
To add resource records to a resource type, use the Security Administrator
resource property editor. To create a new record:
1.
In the Hosts page at the bottom of the Main window, select the host or
host group where you want to create the resource.
2.
In the left panel of the Resources page, select the appropriate resource
subcategory. For example, to create a CATEGORY class resource, click
Security Categories under the B1 Features category.
3.
Choose Edit, Create.
The Create a New Security Category dialog appears.
4.
In the Category Name field, enter the name of the new category record.
5.
In the Owner field, enter the name of a user or group entitled to edit the
record. To view a list of predefined owners, click Browse.
6.
In the Comment field, enter any data useful for your site.
7.
Click OK.
Security Administrator closes the resource property editor and generates the
commands required to perform the specified actions. You can monitor progress
in the Activity window. For details, see the chapter “Editing, Executing, and
Reviewing Transactions.”
120 User Guide
Selecting and Deselecting Resources Using Wildcards
Selecting and Deselecting Resources Using Wildcards
You can select and deselect resources in the Resources section of the Main
window by simply clicking their names. Security Administrator, however, also
provides a more powerful way to select and deselect: wildcards.
To select records according to a wildcard pattern:
1.
In the Hosts page at the bottom of the Main window, select a host or host
group.
2.
In the Resources area, right-click and choose Select or Deselect from the
pop-up menu.
The Select file or Deselect file dialog appears.
3.
Click inside the text box and enter a filter. You can use the UNIX wildcard
characters: ? for any one character, * for any one or more characters, or
none, or [x-y] for any numeric or alphabetic characters in the specified
range, inclusive. You can specify more than one filter if you separate them
with spaces. The filter is case-sensitive.
4.
Click OK.
The records whose names match the specified filter are selected or deselected.
All other records remain selected or deselected, as they were.
Resource Administration 121
Viewing Resource Properties
Viewing Resource Properties
Asking to view the properties of a resource is called querying the resource. To
query one or more resources on one or more hosts:
1.
To query fewer than all hosts, click the Hosts section to select the hosts
where the resource is to be queried and to deselect all other hosts. If the
hosts that you want are not visible, make them visible by selecting the ALL
group or some other host groups. The host group named ALL includes all
the hosts that Security Administrator knows of.
2.
Select a resource class in the left pane, and then one or more resource
records in the right pane.
3.
Choose Edit, Query.
A Query dialog appears.
On the left is a list of the resource records that were selected when you
invoked the command.
4.
Use the dialog as follows:
„
„
„
5.
To deselect and reselect resources for querying, click the list at the
left.
To query one additional resource that does not appear in the list, enter
the resource name in the text box under the list.
To query all hosts, select the All button. Otherwise, the resource is
queried only at the hosts that are selected in the Main Window.
Click OK.
You can monitor progress in the Activity window or page. For details about
using the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
122 User Guide
Updating a Resource
Updating a Resource
You can modify the properties of any existing resource record by using the
Update command. Each resource class has its own set of properties (note that
statistics data is read-only). For more information about specific properties for
each class, see the appendix “Resource Properties.”
Note: You can modify existing resources and add new ones by using the Edit
command. See Editing Existing Resources and Creating New Ones in this
chapter.
To update a record:
1.
In the Hosts page at the bottom of the Main window, select the host or
host group where you want to create the resource.
2.
In the left panel of the Resources page, select the appropriate resource
subcategory. For example, to update a FILE class resource category, click
File and Directory under the System Resources category.
3.
Select a record in the right panel, and then choose Edit, Update.
The Update the File Properties dialog opens.
4.
In the General page, you can change the following parameters:
Owner
A user or group entitled to edit the record. To receive a list of users
and groups, click the Browse button.
Comment
Any data useful for your site
Default Access
The type of default access for the FILE record. Select the default
accesses you want to give to accessors. Select None if the default
should allow no access to the resource.
5.
In the Access List page, you can edit the access permissions of accessors.
Move your cursor over the permission initials to get the full names. For
information about the permissions, click the Help button in the dialog that
appears when you click the Add or Edit buttons.
Use the Access List page as follows:
„
„
To give one or more existing users or groups access to the file, click
the Add button. Click beside the names of the accessors under the
appropriate authority to give permission (a check mark appears) or
remove the permission.
To remove accessors from the access list of the FILE resource, select
the appropriate accessor and click the Delete button.
Resource Administration 123
Updating a Resource
„
6.
To change the permissions of the accessors, select the appropriate
accessor and click the Edit button.
In the Restrictions page, you can change the following parameters:
Allowed Days
The days on which the resource can be accessed. To select all seven
days of the week, click Anyday. To select Monday through Friday, click
Weekdays. To select individual days, click the boxes representing each
day. To clear all the days, click Reset.
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting.
The time range is in 24-hour format.
7.
In the Membership page, you can view the following parameters:
Not Members
Group or groups to which this file does not belong.
Members
Group or groups to which this file will be added.
8.
In the Statistics page, you can view the following parameters:
Creation Time
The time and date when the FILE resource record was created. This is
a read-only field.
Update Time
The time and date of the most recent update. This is a read-only field.
Updated By
The name of the user who last updated the resource. This is a
read-only field.
9.
In the Auditing page, you can change the following parameters:
Warning
Whether to enable warning mode. In warning mode, all access
requests are granted. If a request normally would have been denied, a
record is written to the audit log. Default is no.
Notify
The email address or alias of the person who is to be notified when the
resource is accessed. You must be properly configured for this activity
through appropriate eTrust AC permissions. For more information, see
the Administrator Guide. You can enter up to 30 alphanumeric
characters.
124 User Guide
Updating a Resource
Audit Mode
The type of operations to trigger creation of audit records:
Success
Successful operations
Failure
Failed operations
None
No operations
10. In the B1 page, you can change the following parameters:
Categories
The list of security categories assigned to the resource. Enter the
name of an existing category, or click the Browse button to receive a
list of all the existing categories. (To create a new category, select the
CATEGORY class from the resource class list in the Main window, and
then use the Create command. See Creating a Resource in this
chapter.)
Seclabel
The security label assigned to the resource. Enter the name of an
existing seclabel, or click the Browse button to receive a list of all the
existing seclabels. (To create a new seclabel, select the SECLABEL
class from the resource class list in the Main window, and then use the
Create command. See Creating a Resource in this chapter.)
Seclevel
The security level assigned to the resource. Enter an integer up to
255. Default is zero.
11. When you have finished making changes to the pages, click OK.
Security Administrator closes the resource property editor and generates the
commands required to perform the specified actions. You can check the
progress in the Activity window or page. For details about how to use the
Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Resource Administration 125
Editing Existing Resources and Creating New Ones
Editing Existing Resources and Creating New Ones
The Edit command lets you update existing records and create new records at
the same time. The Update command, explained previously, is effective when
you are working on records already in existence. The Edit command, however,
allows more flexibility because it not only updates existing records but it
creates new ones in environments where they do not currently exist.
To change or create one or more resources, select Edit from the pop-up menu.
You can change any properties listed on these pages. Auditing data is
read-only and each resource class has its own set of properties. For more
information about particular properties for each class, see the appendix
“Resource Properties.”
To edit a record:
1.
In the Hosts page at the bottom of the Main window, select a host or host
group.
2.
Select a resource category. This example demonstrates editing File
Groups.
3.
Select one or more resources in the right panel.
If o records exist you can use the Edit command to create some.
4.
Right-click, and choose Edit from the pop-up menu.
For file groups, the dialog contains several pages of access properties.
(The number of pages depends on the resource.)
5.
Click each tab and enter the desired properties. For information, click Help.
6.
When you have finished making changes, click OK.
Security Administrator closes the dialog and generates the commands required
to perform the specified actions.
You can check the progress in the Activity window or page. For details about
how to use the Activity window, see the chapter “Editing, Executing, and
Reviewing Transactions.”
126 User Guide
Copying a Resource
Copying a Resource
To copy one or more resource records:
1.
Define as your source host the host from which you want to copy. (The
source host name appears at the top of the Main Window. For details
about how to change it, see Specifying Preferences in the chapter
“Security Administrator Basics.”)
2.
If you want to copy to fewer than all the other hosts, select the hosts to
which you want to copy the resource. If the hosts that you want are not
visible in the Hosts display, make them visible by selecting the ALL group
or other host groups. The host group named ALL includes all the hosts that
Security Administrator knows of.
3.
Click to select the class you want to copy from, and then click one or more
files in the right panel.
4.
Choose Edit, Copy.
The Copy File dialog appears.
At the left is a list of the resource records that were selected when you
invoked the command.
5.
Use the dialog as follows:
„
„
„
6.
To deselect and reselect resources, click the list at the left.
To copy one additional resource that does not appear in the list, enter
the resource name in the text box under the list.
To copy the resource to all hosts, select the ALL button. Otherwise, the
group is copied only to the hosts that are selected in the Main Window.
Click OK to copy the selected records to the selected hosts.
Security Administrator closes the resource property editor and generates the
commands required to perform the specified actions.
You can monitor progress in the Activity window or page. For details about
using the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Resource Administration 127
Protecting a Resource in the UNIX or Windows Environment
Protecting a Resource in the UNIX or Windows Environment
To protect a resource:
1.
Right-click the UNIX or Windows file that you want to protect. Choose Edit,
Protect.
The Update the File Properties dialog appears.
This dialog is similar to the one for creating a resource. Each page shows a
different set of properties.
2.
Make any changes to the pages, and click OK.
Security Administrator closes the dialog and generates the commands required
to perform the specified actions.
You can check progress in the Activity window or page. For details about how
to use the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
128 User Guide
Deleting Resources
Deleting Resources
To delete a resource record:
1.
To delete from fewer than all hosts, click the Hosts section to select the
hosts where the resource is to be deleted and to deselect all other hosts. If
the hosts that you want are not visible, make them visible by selecting the
ALL group or some other host groups. The host group named ALL includes
all the hosts that Security Administrator knows of.
2.
Select a resource class on the left panel of the Resources page, and then
click one or more records on the right panel.
3.
Choose Edit, Delete.
A Delete dialog appears.
At the left is a list of the resource records that were selected when you
invoked the command.
4.
Use the dialog as follows:
„
„
„
5.
To deselect and reselect resources, click the list at the left.
To delete one additional resource that does not appear in the list,
enter the resource name in the text box under the list.
To delete from all hosts, select the All button. Otherwise, only on the
hosts that are selected in the Main Window are deleted.
Click OK.
Security Administrator closes the dialog and generates the commands required
to perform the specified actions.
You can monitor progress in the Activity window or page. For details about
using the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
Resource Administration 129
Updating TCP Services and Ports
Updating TCP Services and Ports
To let hosts use particular TCP services and ports:
1.
Select the TCP resource classes.
2.
Select one or more TCP class records to change (this example has only
one), and then select Update from the pop-up menu or the toolbar.
The Update the TCP Protection Properties dialog appears.
3.
Select the access type you want for the resource. The access types for the
TCP class are Read and None. Read access lets the resource record use the
services and ports that are listed in the access list.
4.
When you have finished making changes to the pages, click OK.
Note: If you change the access types of the resource record, the name of the
TCP service or port you selected in the Access List page appears automatically
in the Name field.
Security Administrator closes the dialog and generates the commands required
to perform the specified actions.
You can monitor progress in the Activity window or page. For details about
using the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
130 User Guide
Adding Accessors to Windows Resources
Adding Accessors to Windows Resources
If you have appropriate access, you can add or edit accessors to Windows
resources you are creating or updating:
1.
Select one of the Windows resource classes, and then one or more records
that you want to work with.
2.
From the Edit menu, choose Create or Update. The relevant dialog
appears.
3.
Click the button at the top of the dialog to select the class (user or group)
you want to add to the access list of the resource record.
4.
Enter the name of the resource in the Name field.
5.
Select the access types you want the user or group to have, or change the
current access types. The Windows resource class has the following
permissions:
READ
The accessor can use the resource record without changing it.
WRITE
The accessor can write in the resource record.
MODIFY
The accessor can change the resource record.
DELETE
The accessor can delete the resource record.
CHOWN
The accessor can change the owner of the resource record.
CHMOD
The accessor can change the standard Windows access modes.
UTIME
The accessor can change the resource modification time.
SEC
The accessor can change the access control list of the record.
NONE
The accessor has no access rights in the resource record.
6.
When you finish making changes, click OK.
The Security Administrator closes the dialog and generates the commands
required to perform the specified actions.
Resource Administration 131
Adding Accessors to Windows Resources
You can check progress in the Activity window or page. For details about using
the Activity window, see the chapter “Editing, Executing, and Reviewing
Transactions.”
132 User Guide
Chapter 9: Policy Model Administration
This section contains the following topics:
The Policy Model Database (see page 133)
Working with PMDBs (see page 133)
The Policy Model Database
The eTrust AC Policy Model database (PMDB) is a regular eTrust AC database
that includes a list of subscriber databases, each of which resides on a
separate computer. The Policy Model service allows the management of many
eTrust AC databases from one central database. Security Administrator
automatically propagates any rules defined in the central database and applies
them to the subscriber databases. The PMDB is a useful tool for managing
many stations that have identical authority restrictions and access rules.
You can configure the subscriber eTrust AC databases as PMDBs if they also
have subscribers, or as ordinary eTrust AC databases if they do not have
subscribers. This allows for a hierarchical configuration of PMDBs. Whenever
you make a change to the PMDB, Security Administrator automatically updates
all of its subscriber databases. For a complete description of the PMDB, see the
Administrator Guide.
You perform PMDB tasks from the Policy model page at the bottom of the Main
window. Click the Policy model tab to display the page.
The left panel displays the Policy Models as a hierarchical tree. Note that the
topmost, or root, element is not a PMDB; it is the master list of PMDBs. As
such, you cannot perform any commands on this element.
The right panel displays the subscribers to the PMDB selected in the left panel.
If you select the root element, the right panel lists all the PMDBs.
Working with PMDBs
The two ways to update a PMDB are accessor (user and group) transactions
and PMDB commands. This section describes both.
Policy Model Administration 133
Working with PMDBs
Accessor Transactions
Normally, when you perform a user or group transaction-such as a query or an
update-Security Administrator performs the transaction for the selected users
or groups that reside on the selected hosts. It then adds the result of the
transaction to the host eTrust AC database.
By contrast, when you update a PMDB, eTrust AC propagates the result to all
subscriber databases. For information about performing accessor transactions,
see the chapter “Account Administration.”
134 User Guide
Working with PMDBs
PMDB Commands
PMDB commands affect selected PMDBs and their subscribers. To execute a
command, select the PMDB or subscriber, and right-click to open the pop-up
menu.
Show commands
Displays the list of commands (in the command file) sent to subscribers
and the subscribers that received them.
Show error
Displays the transaction and PMDB connection errors in the error file. If
there are no errors for any subscribers, a message box appears when you
select this option.
Add subscriber, Remove subscriber
Opens a dialog where you add a subscriber to, or remove a subscriber
from, the selected PMDB. If an error occurs, a message appears in the
dialog Error Message area.
Distribution status
Displays the names of PMDB hosts on which an error occurred (such as a
command error or an unavailable host), the number of errors, and
whether the host is currently unavailable.
Start daemon, Stop daemon
Starts or stops the PMDB daemon. A confirmation box appears when you
select either of these options. If an error occurs (for example, if you
attempt to start the daemon and it is already running), an error message
appears.
Clear error
Deletes the error file. A confirmation box appears when you select this
option.
Truncate
Clears or truncates the command file. When you enter the subscriber
name and offset and click OK, Security Administrator truncates the
subscriber command file from the beginning of the file to the specified
offset.
Policy Model Administration 135
Chapter 10: Login Protection
This section contains the following topics:
Setting Up Login Protection (see page 137)
Setting Up Login Protection
The Login Protection Setup dialog lets you determine which terminals
accessors can log in from, which login applications they can use when they log
in, and the maximum number of logins they can perform. You can restrict
login privileges for both users and groups.
To set up login protection:
1.
Click Tools, Login Protection Setup.
Note: Because you select the users and groups from the dialog, Security
Administrator ignores any accessors already selected in the Account page.
2.
In the Accessors to Protect section, specify the names of the users and
groups whose login privileges you want to restrict. Either enter the names
separated by commas or click List, select the names from the left side of
the dialog, click the right arrow button to move them to the right side, and
click OK.
3.
In the Login from Terminals section, specify which terminals accessors can
(Allow terminals) and cannot (Deny terminals) log in from. Enter the
terminal names separated by commas; or click List, select the names from
the left side of the dialog, click the right arrow button to move them to the
right side, and then click OK.
Note: This setting modifies TERMINAL class properties.
4.
In the Login Through Programs section, specify which login applications
accessors can (Allow programs) and cannot (Deny programs) use. Either
enter the terminal names separated by commas or click List, select the
names from the left side of the dialog, click the right arrow button to move
them to the right side, and then click OK.
Note: This setting modifies LOGINAPPL class properties.
5.
Click the Restrictions tab to open the Restrictions page.
6.
In the top section of the page, indicate the days when accessors can log
in. Either click individual day buttons or click Weekdays to select
Monday to Friday.
Login Protection 137
Setting Up Login Protection
7.
Drag the From and To sliders to set the range of hours when accessors can
log in. The time shown to the left of the sliders indicates the current
setting.
8.
In the bottom section, enter the maximum number of concurrent logins
allowed for each accessor.
9.
Select Ignore or Allow to determine Holiday access. If you select Allow,
enter or select the appropriate holidays.
10. Click OK to save the changes and close the dialog.
138 User Guide
Chapter 11: Security Configuration
This section contains the following topics:
Working with Security Policies (see page 139)
Working with Password Policies (see page 142)
Viewing eTrust AC Status (see page 143)
Working with Security Policies
To view and modify security policy settings for the eTrust AC and Windows
environments:
1.
Click Security Options in the Tools menu or on the toolbar.
The Security Options dialog appears.
The dialog consists of two pages-eTrust and NT (Windows)-each with its
own set of option pages. The NT page is available if you have eTrust AC
Windows software installed.
2.
If necessary, indicate the environments you want to configure by selecting
or clearing the eTrust or NT check boxes located above the page section.
3.
On the subpages of the eTrust page, indicate the security options you
want. Each option activates or deactivates an eTrust AC class or setoptions
parameter.
The following table lists the security options on each page and their
corresponding classes or parameters. For more information about classes
and the setoptions command, see the Reference Guide.
Subpage
Option
Class or Parameter
Login Protection
Login by application checks
LOGINAPPL
Terminal checks
TERMINAL
Holiday checks
HOLIDAY
File checks
FILE
Process checks
PROCESS
SUID/SGID program checks
PROGRAM
Administration checks
ADMIN
System Resources
Security Configuration 139
Working with Security Policies
Subpage
Option
Class or Parameter
Network Protection
TCP checks
TCP
Incoming connection checks
HOST
Outgoing connection checks
CONNECT
Surrogate checks
SURROGATE
Task delegation (SUDO)
SUDO
Special programs
SPECIALPGM
Category checks
CATEGORY
Seclabel checks
SECLABEL
Seclevel checks
SECLEVEL
Accumulative group rights
setoptions accgrr
Accumulative checks for ACL and PACL
setoptions accpacl
Owner password change
setoptions cng_ownpwd
Admin password change
setoptions cng_adminpwd
User Identity
Control
B1 Features
Algorithm Options
4.
140 User Guide
If you have eTrust AC Windows software installed, use the NT page to
change Windows security parameters. Every user in Windows is associated
with an account that identifies the accessor to Windows.
Working with Security Policies
The NT page contains one subpage with the following options:
Maximum Login Failures Before Lock
The number of times users can fail to log in before their accounts are
disabled. When the limit is exceeded, users cannot log in, even with
the correct password. Enter a positive integer.
Disabled Access Attempt
The length of time, in minutes, that accounts are disabled after
exceeding the maximum number of login attempts. After the time has
elapsed, disabled accounts are allowed to log in. Enter a positive
integer.
Maximum Time After Logins Restriction (Min)
The length of time, in minutes, when the application shuts down
automatically after the user time restriction has passed. For example,
if user Joe can work only from 9:00 to 17:00, the number you enter
determines how many minutes Joe has to log off after 17:00 before his
application shuts down automatically. Enter a positive integer.
5.
Click OK to submit the changes.
The Activity window opens. For a description of the Activity window, see the
chapter “Editing, Executing, and Reviewing Transactions.”
Security Configuration 141
Working with Password Policies
Working with Password Policies
A password policy is a set of rules regarding a password's lifetime, restrictions,
and so forth. When an eTrust AC password policy is enabled, the user
changing the password must obey the rules of the policy. When a password is
changed, the new password is checked according to the rules of the password
policy. If the new password does not conform to the password policy, the
change is rejected.
Use the following procedure to view and modify the minimum acceptable
conditions for user passwords and accounts for the eTrust AC environment.
1.
Click Tools, Password.
The Password Rules dialog appears.
2.
Click Default to set the rules globally, or click Profile Group to set the rules
for a specific profile group. If you select Profile, enter a profile group name
or click Browse to select one. You can create a new profile group by
entering a name that does not exist.
3.
To activate or deactivate password checking, click Password Checks at the
top of the eTrust page. This option affects the setoptions class
(PASSWORD) setting. For more information, see the Reference Guide.
4.
On the pages, indicate password policy rules. Depending on the rule, you
select or deselect a check box or enter a value. The following table
describes the subpages and their options.
Subpage
Option
Description
Validity
Check
The user name Determines whether new passwords can contain the name of the user.
For example, if this option is selected for the user John, then the
password cannot be Johnson or Johnston, although it can be Jonssen.
The password Determines whether new passwords can contain the old password. For
being replaced example, if the old password was John, and you select this option, the
new password cannot be Johnson, and vice versa.
Limits
Number of
stored old
passwords
142 User Guide
Specifies the number of old passwords that are stored in the database to
prevent reuse of recent passwords. Enter a number between 0 and 24.
If you specify 0, passwords are not saved.
Viewing eTrust AC Status
Subpage
Option
Description
Maximum
days between
passwords
Sets the maximum number of days before eTrust AC prompts you for a
new password.
Minimum days Sets the minimum number of days before eTrust AC lets you change
your password.
between
passwords
Format
Maximum
number of
grace logins
Specifies the number of grace logins that users can have. The number
you enter determines the number of times a user can log in after the
password expires.
Minimum
number of
characters
Sets the minimum number of characters that passwords must contain, in
these following categories: alphabetic, numeric, alphanumeric,
lowercase, uppercase, and special characters. All values must be
integers.
Maximum
number of
repetitive
characters
Specifies the maximum number of consecutive, identical characters that
passwords may contain.
Minimum
password
length
Specifies the minimum number of characters that passwords must
contain.
5.
Click OK to submit the changes.
The Activity window opens. For a description of the Activity window, see the
chapter “Editing, Executing, and Reviewing Transactions.”
Viewing eTrust AC Status
You can view the status of the serevu, selogrd, and selogrcd services at any
time during a Security Administrator session. Click Tools, eTrust Status to
open the eTrust Status dialog.
This dialog displays the source host name, the current version of eTrust AC,
and the status of the three optional services. The check box to the right of
each daemon indicates whether it is currently running. See the chapter
“Utilities in Detail” in the Utilities Guide for information about these daemons.
Note: The information in the eTrust Status dialog is read-only; you cannot
modify it.
Security Configuration 143
Chapter 12: Audit Log Routing
This section contains the following topics:
Log Routing (see page 145)
Log Routing
eTrust AC uses the log routing daemon, selogrd, to distribute selected local
audit log records to specific hosts; reformat audit log records into email
messages, ASCII files, or user windows; and transmit notification messages
based on audited events.
To determine audit record routing, selogrd uses a configuration file,
selogrd.cfg. This file is a list of which audit log records to route-or not to
route-and to where. For a complete description of this file, see the selogrd
command in the Utilities Guide.
You can view and modify the selogrd.cfg file in Security Administrator from the
Audit Log Routing dialog. You can also propagate a particular configuration file
to other hosts.
The dialog shows the current routing information in the selogrd.cfg file of the
source host. Each line represents a section in the file. Use the buttons on the
right to add predefined or customized destination sections and to update or
delete existing sections.
View or Modify Audit Log Route Configuration
To view or modify audit log route configuration:
1.
If necessary, specify the source host by clicking the Source toolbar button,
selecting the source host, and clicking OK.
2.
If you want to propagate the source selogrd.cfg file to other hosts, select
those hosts in the Hosts page.
Note: The current version of Security Administrator does not support this
feature for PMDB propagation.
3.
Click Tools, Audit Log Routing. The Audit Log Routing dialog appears.
Audit Log Routing 145
Log Routing
Add Predefined Destination
To add predefined destination sections:
1.
Click Add.
The Add Predefined Destination dialog appears.
2.
Select the destination or destinations you want to add by clicking the
appropriate check boxes. For each destination you select, enter the
destination in the corresponding text box or select the destination by
clicking its List button (for email, you must type the destinations).
3.
Click OK to close the dialog; the new sections appear in the information
window. If you change your mind, click Cancel to close the dialog without
adding any lines.
Note: The additions are not stored in the selogrd.cfg file until you close the
Audit Log Routing dialog by clicking OK.
Create Customized Destination
To create a customized destination section:
1.
Click Add Customize.
The Section Editor dialog appears.
2.
Enter the name of the section in the Section name text box.
3.
Click the Destination button, which shows the current destination type,
and select the appropriate type from the drop-down list. Depending on the
type you select, enter the appropriate destination name or click Browse (or
List) and select the name.
4.
To include or exclude the record, click Add.
The Rules dialog opens.
146 User Guide
a.
In the Rule type section, select Include or Exclude to specify whether
to route this audit record.
b.
In the Rule section, fill in the appropriate rule categories by entering
the information in the field or by clicking List and selecting a name or
item.
c.
Click OK to close the Rules editor.
5.
To delete a rule, select the rule and click Delete.
6.
Click OK to save changes and close the Section editor.
Log Routing
Modify Existing Destination
To modify existing destination sections:
1.
Select the section you want to modify and click Update.
The Section Editor dialog appears, with the current settings for the
selected section filled in.
2.
Follow Steps 2-6 in the procedure for creating a customized destination in
this chapter.
Delete a Section
To delete a section:
1.
Select the sections you want to delete.
2.
Click Delete.
3.
When you have finished adding or modifying sections, click OK to save
them and close the Audit Log Routing dialog.
Note: When you modify the selogrd.cfg file, eTrust AC creates a copy of the
original file named selogrd.cfg_save. This occurs on all the hosts that you
selected.
Audit Log Routing 147
Chapter 13: Setting Security
Administrator Options
This section contains the following topics:
Specifying Preferences (see page 149)
Preference Dialog Settings (see page 149)
Specifying Preferences
This procedure shows how to specify preferences for operations (rather than
for users and for groups).
1.
From the Tools menu on the Main window, choose Options.
The Preferences dialog appears.
2.
Change whatever settings you wish. See Preference Dialog Settings in this
chapter.
3.
To save the changes, click OK.
The values you specify are saved in the seam.ini file, so that Security
Administrator can use them in future sessions.
Preference Dialog Settings
This section describes the settings on each page of the Preferences dialog.
Setting Security Administrator Options 149
Preference Dialog Settings
Master Database Page
The Master Database page lets you specify the hosts whose databases are
loaded when you start Security Administrator.
eTrust AC host
The eTrust AC host (or hosts) whose users, groups, resources, password
policies, and account policies are loaded when you invoke Security
Administrator. The transactions you execute are implemented on these
hosts.
UNIX host
The UNIX host (or hosts) whose users, groups, resources, password
policies, and account policies are loaded when you invoke Security
Administrator. The transactions you execute are implemented on these
hosts.
Windows NT host
The Windows host (or hosts) whose users, groups, resources, password
policies, and account policies are loaded when you invoke Security
Administrator. The transactions you execute are implemented on these
hosts.
150 User Guide
Preference Dialog Settings
Activity Page
The Activity page contains preferences for the Activity window.
Verify before executing
Whether to delay execution of each transaction until you click GO in the
Activity window. If you do not select this option, processing begins at the
same time that the Activity window appears.
Remove host on failure (query)
When processing a user or group query, whether to erase from the Activity
window the names of hosts where the query failed. If you do not select
this option, you must inspect the results to see where the user or group is
defined and where it is not.
Execute backout commands on warning
Whether the backout commands, which undo a transaction, should be
activated when a warning is issued. If you select this button, every time a
warning is issued the transaction is undone.
Print Command
The command in the dialog for printing transaction results. The default is
lp.
Output directory
The name of the directory for temporary files. When you close Security
Administrator, the temporary files are deleted.
Max. hosts running parallel
The number of hosts where Security Administrator runs transactions
simultaneously. The default is 1, meaning that Security Administrator runs
transactions on one host at a time.
Setting Security Administrator Options 151
Preference Dialog Settings
Retry Mechanism Page
The Retry Mechanism page contains preferences for retrying transactions.
Automatic retry mechanism: Number of retries
The number of times Security Administrator tries to connect to a host after
failing the first time. The default is 3. Clicking the STOP button in the
Activity window stops the retries.
Automatic retry mechanism: Interval between retries
How many seconds Security Administrator waits before each retry. The
default is 60.
Automatic retry mechanism: Max. hosts running parallel
The number of hosts where Security Administrator retries transactions
simultaneously without a retry request from you. The default is 1.
Manual retry (Output box): Max. hosts running parallel
The number of hosts where Security Administrator retries transactions
simultaneously when you retry from the Host Messages/Commands
window. The default is 1.
Password Page
The Password page contains preferences for passwords.
Use clear password
The default password policy for a user or group. When Use clear password
is selected, you can see the password when you enter it onto the screen or
a password generator enters a password automatically. If you do not
select Use clear password, you must type the password twice and you
cannot see the password.
Password generator
The name of the program that generates the password automatically. (For
information about preparing such a program, see The Password Generation
Utility in the appendix “seam.ini and UNIX Exits.”) If you leave the box
blank, then a random algorithm creates the password.
152 User Guide
Preference Dialog Settings
Property Editor Page
The Property Editor page contains preferences for the windows that let you
create and modify users, groups, and resources.
Synchronize mode
When you specify Synchronize mode, the value for a property that appears
in more than one section of the property editor is automatically copied
from one section to the others. If you do not select this option, the values
remain independent of each another.
The properties can have the same name, as in Password, or they can be
close equivalents such as the eTrust AC Full Name and the UNIX GECOS
Info. To find corresponding properties, use the tables in the appendix
“Resource Properties,” or see the defaults.usr and defaults.grp files in
eTrustACDir/data/seam/defaults.
APPL Extractors
The names of the utilities that restore data from UNIX exits to the
site-specific fields in the property editor APPL section. One utility is for
user data and another utility (or the same one) is for group data. (See
Passing Arguments to UNIX Exits in the appendix “seam.ini and UNIX
Exits.”)
Other Page
The Other page contains miscellaneous preferences.
Host database path
The full directory path of the Security Administrator files that store
definitions for hosts and host groups.
Delete homedir for delete user
Whether to delete a user home directory automatically when Security
Administrator deletes a user from the UNIX environment. If this option is
selected, then the home directory is deleted by default when you delete a
UNIX user. Otherwise, the default is to retain the user home directory.
Setting Security Administrator Options 153
Chapter 14: The Audit Browser: seauditx
This section contains the following topics:
The seauditx Utility (see page 155)
Starting seauditx (see page 156)
The seauditx Main Window (see page 157)
Filtering Audit Records (see page 165)
Opening an Audit Log (see page 167)
Viewing Audit Record Details (see page 169)
Commenting the Audit Log (see page 174)
Adding Acknowledgements (see page 177)
Reassigning Comments and Acknowledgements (see page 178)
Printing the Audit Log (see page 179)
Setting Preferences for seauditx (see page 179)
Customizing seauditx (see page 180)
The seos.ini File (see page 180)
The seauditx Utility
The seauditx utility is an X Window System graphical user interface (GUI) that
displays, filters, and prints the data in the audit log. The utility lets you set
preferences, print the current selection of audit log records, and open old audit
logs that were saved.
The seauditx utility is installed when you install the Security Administrator. For
installation instructions, see the chapter “Installing Security Administrator.”
We recommend that you become familiar with the basic concepts of eTrust AC
before using seauditx. The concepts, both basic and advanced, are described
in the Administrator Guide and the Reference Guide.
This chapter describes the seauditx audit browser. It includes information
about:
„
How to start seauditx
„
The seauditx Main window
„
The audit log
„
How to perform the various functions of seauditx
Note: eTrust AC also offers the seaudit utility. The seaudit utility is an audit
reader, not a GUI. For more information about this utility, see the Utilities
Guide.
The Audit Browser: seauditx 155
Starting seauditx
Starting seauditx
You can start seauditx from the command line or the Security Administrator.
1.
Start the X Window system and ensure that the application display is set
to your terminal according to the system requirements at your site.
2.
Start seauditx in one of the following ways.
„
„
In Security Administrator, choose Audit from the Report menu of the
Main window.
At the command line, enter the seauditx command. seauditx supports
the same command line parameters as seaudit. For more information,
see the seaudit utility in the Utilities Guide.
For example, the following command opens the seauditx Main window
with the Resource switch activated and the FILE class selected. The
window displays all the File audit records in the database.
seauditx -r FILE \* \*
Note: Entering seauditx -h gives you a list of all the command line
parameters. It also gives examples of strings of parameters.
Note: The seauditx utility does not display a password even if one was
entered as part of a logged chusr, editusr, or newusr command. A series of
asterisks (***) appears instead of the clear-text password.
156 User Guide
The seauditx Main Window
The seauditx Main Window
The seauditx utility displays records from the default audit log, which contains
audit information for the station where you are working.
The audit log is automatically opened and filtered according to the default
settings. A progress indicator appears. Usually filtering takes seauditx several
seconds. You can stop the operation by clicking Stop in the progress indicator
window at any point.
After the filtering is finished, the Main window appears.
The Main window contains the following areas:
Title bar
Displays the window title and several buttons used to close, minimize, or
maximize the window.
Menu bar
Contains the pull-down menus.
Switches
Contains settings that filter data from the audit log according to what
caused an event to be audited.
Options
Contains settings that filter data from the audit log according to data that
is in every record, such as date, time, source, and type of error.
Text Output
Contains the audit log records, reports of login attempts and resource
access attempts, and reports of relevant messages displayed by eTrust AC
after execution of a login or access command.
Scroll bars
Contain standard tools to move up and down or left and right to locate the
particular record you want.
The switches and options in the Main window can be used separately or
together to define exactly which records you want to display from the audit log
in the output area, and can filter the audit log in various ways such as the
following:
„
User login
„
Terminal login
„
Host
„
Resource class
The Audit Browser: seauditx 157
The seauditx Main Window
„
Start and end dates
„
Start and end times
„
Type of access
Switches
Use various switches to select data from the audit log. At least one switch
must be active. You can use more than one switch at a time to provide a more
specific filter. The following table describes the switches and the filtering they
provide.
Switch
Element
Description
Login
User
Selects the login data for one user or for a selected set of users.
Enter the user name or a pattern.
Terminal
Selects the login data from one terminal or from a selected set of
terminals. Enter the terminal name or a pattern.
Host
Selects the data from one host or from a set of hosts. Enter the host
name or a pattern.
Services
Selects the data of one service or of a set of services. Enter the
service name or a pattern.
Class
Selects the data from one class or from a selected set of classes.
Enter the class name or a pattern.
Resource
Selects one or more specific records in the selected classes, if you
select a resource class in the Class element of this switch.
User
Selects the data of one user or a selected set of users who tried to
access the specified resource.
Network
Resource
Trusted
Program
Displays the data for programs that are marked as Trusted.
StartupShutdown
Lists the start-up and shutdown commands for eTrust AC daemons.
Admin
158 User Guide
Command
Selects the eTrust AC command to display in the Text Output area.
Even if you write the full name of the command, an asterisk (*)
must follow it.
Class
Specifies which class or set of classes to display as targets of the
specified command.
Object
Selects a specific record or set of records to display as targets of the
specified command.
User
Selects one user or a set of users who executed the specified
command.
The seauditx Main Window
Switch
Element
Description
Trace User
Displays the trace records of the user with the specified user name.
Trace
Resource
Displays the trace records of the specified resource.
Trace Records
Only
Displays all the trace records of the users and resources whose
activities are being traced.
Options
Use the various options to select the data for display in Text Output. You can
use more than one option to provide a more exact selection of records from
the audit log. The following table describes the options and the filtering they
provide.
Option
Elements
Description
Date
Start
Command is reported only if it was executed during the period
defined by the start and end dates.
End
Time
Start
End
Command is reported only if it was executed during the period
defined by the start and end times.
Source
Host
If the data has been collected from several hosts, this option
permits you to select data from one host or from a specified set
of hosts. Enter the host name or a pattern.
Show
Failures
Data is reported that meets one or more of these criteria, which
are types of access.
Successes
Notify
Warnings
For example, if you want to see accesses that failed, select
Failures, and seauditx displays only the entries in the audit log
that represent failed access.
Password
Logout
The Audit Browser: seauditx 159
The seauditx Main Window
Text Output
After you select criteria in the Switches and Options areas, and press Apply,
the filtered information from the audit log appears in Text Output. To view
information that lies outside the currently displayed window, you can do any of
the following:
„
Use the scroll bars, which move Text Output horizontally and vertically.
„
Minimize the Switches area and the Options area, automatically increasing
the size of Text Output. For more information, see Minimizing and
Maximizing Areas in this chapter.
„
Enlarge the Main window to increase the size of Text Output.
Note: To see detailed information about a record in the Text Output area,
double-click it. See Viewing Audit Record Details in this chapter.
The columns in the Text Output area are described in the following table:
(Comment)
Column to click to add or remove a comment in a record. See Commenting
the Audit Log in this chapter.
(Acknowledge)
Column to click to add or remove an acknowledge icon (check mark) to
signify that the record has been read. See Adding Acknowledgements in
this chapter.
Host
Host station where the audit record was collected.
Date
Date when the (attempted) access occurred.
Time
Time when the (attempted) access occurred.
R
eTrust AC alphabetic return code indicating what happened. The values
and their meanings are:
A
An attempt to log in failed because an invalid password was entered
repeatedly.
D
eTrust AC denied access to a resource, did not permit a login, or did
not permit an update to the eTrust AC database because the accessor
did not have sufficient authorization.
160 User Guide
The seauditx Main Window
E
Serevu enabled a disabled user account.
F
An attempt to update the eTrust AC database failed.
I
Serevu disabled a user account.
M
The executed command started or stopped a daemon.
O
A user logged out.
P
eTrust AC permitted access to a resource or permitted a login.
S
The eTrust AC database was successfully updated.
T
An audit record was written because all the actions of the user are
being traced.
U
A trusted program (setuid or setgid) was changed; therefore, it is no
longer trusted.
W
An accessor's authority was insufficient to access the specified
resource; however, eTrust AC allowed the access because warning
mode is set in the resource.
Event
The attempted action.
The remaining fields depend on the type of event in the Event column, as
described in the following sections.
The Audit Browser: seauditx 161
The seauditx Main Window
For Most Event Types (All Types Except Login, Logout, Update, and Trace)
Most event types have the following columns to the right of the Event column.
User
The name of the accessor who executed the command.
Acc(or)
(Access or Accessor) The access type, if relevant.
Stage
Two numbers. The first number (up to three digits) indicates at which
stage eTrust AC decided what action to take. The second number
represents the reason for the audit record. For an explanation of this code,
double-click anywhere in the record.
Object
The name of the resource being accessed or updated.
Pgm
The name of the program that accessed the resource.
For Login and Logout
Login and Logout events have the following columns to the right of the Event
column:
Class / User
The name of the accessor who executed the command.
Acc(or)
(Access or Accessor) The access type.
Stage
Two numbers. The first number (up to three digits) indicates at which
stage eTrust AC decided what action to take. The second number
represents the reason for the audit record. For an explanation of this code,
double-click anywhere in the record.
Object
The name of the terminal from which the login or logout was attempted.
Pgm / Origin
The name of the program that attempted the login or logout.
162 User Guide
The seauditx Main Window
For Update
Update events have the following columns to the right of the Event column.
Class / User
The class that was updated.
Acc(or)
(Access or Accessor) The name of the accessor who executed the
command.
Stage
Two numbers. The first number (up to three digits) indicates at which
stage eTrust AC decided what action to take. The second number
represents the reason for the audit record. For an explanation of this code,
double-click anywhere in the record.
Object
The name of the resource being updated.
Pgm / Origin
The name of the terminal from which the update was made.
Command / Miscellaneous
A complete copy of the command entered by the accessor. If the
command is a password update, the password itself is not displayed.
The Audit Browser: seauditx 163
The seauditx Main Window
For Trace
Trace events have the following columns to the right of the Event column.
Trace indicates that the record was created for the class on which the action
was performed.
Login user ID
The UNIX UID of the process.
Effective user ID
The effective UID of the process.
Real user ID
The UID that eTrust AC associates with the process.
Stage Code
A number that indicates at which stage eTrust AC decided what action to
take. For more information about stage codes, see the Reference Guide.
Trace Information
The name and details of the resource being accessed or updated, or the
action being traced. The format of these fields is the same as the format
described in the Utilities Guide.
Minimizing and Maximizing Areas
The Switches, Options, and Text Output areas in seauditx can appear
minimized or maximized. A minimized area occupies only sufficient space to
display the current settings of the area. Settings cannot be changed in a
minimized area. A maximized area displays all information in the area,
whether it is selected or not, and settings can be changed there.
To toggle an area between minimized and maximized, click the arrow button
to the left of the area title.
The following figure shows the Switch and Options areas minimized. With
these areas minimized, you can see more audit records in the Text Output
area.
164 User Guide
Filtering Audit Records
Help
The online help for seauditx provides the following information:
„
The seauditx version number. Choose Help, About in the Main window.
„
Information about seauditx. Choose Help, Contents in the Main window.
„
Information about dialogs. Click the Help button in those dialogs.
Filtering Audit Records
You can control which audit records appear in the Text Output area by
changing information in the Switches and Options areas.
A button represents each switch and option. At least one switch must be
selected; however, you do not have to select any options.
In this figure, the switch in the upper left box-Login-is active; all the others
are inactive.
When you deactivate a button, all the settings for the button are saved. They
are recalled when you next activate the button.
If a button is active, you can change the criteria in its boxes, and activate the
filter criteria by pressing Apply. If a button is inactive, the specified criteria are
not applied.
Note: You must enter years as four digits (for example, 1997), and times as
24 hours (hh:mm), separating the hours and minutes with a colon (:). For
example, to specify 2:15 p.m., type 14:15.
The Audit Browser: seauditx 165
Filtering Audit Records
Changing the Filter
You can change the list in the Audit log by specifying filter criteria.
1.
Specify filter criteria by setting the switches and options:
„
„
„
„
2.
To toggle a button between active and inactive, click anywhere within
the button frame except a text box.
To change the value in a text box, double-click the old value and then
enter the new value over it.
To specify classes for Resource and Admin, click the arrow beside the
text box to display a list of options. Click to select the class you want.
To change a month on the Date button of the Options area, click the
month and then select the new month from the pop-up menu.
Press Enter or click Apply.
In the following two cases it is not necessary to click Apply:
„
When seauditx is invoked from the command line. You can activate a filter
by typing the appropriate command line parameters. If the filter is not
activated by command line parameters, then a default filter is activated.
The default filter is installed with seauditx, and cannot be changed.
„
When a file is opened or loaded through the File menu. The filter is
activated according to the switches and options set in the main window at
the time the file is opened or loaded.
After you click Apply, the Main window displays a progress indicator. The
progress indicator measures the time span of the operation. Usually, it takes
seauditx several seconds to filter the information differently or to load a
different file. You can stop the operation by clicking Stop in the progress
indicator window at any point.
Saving the Filter
After setting the switches and options, you can save the filter criteria you
selected.
1.
From the System menu, select Save Filter.
The SeOS Audit Save Filter dialog appears.
2.
Enter a name for your filter in the Filter Name field and click OK.
All saved filters are kept in your home directory in the audit.ini file. You need
never open that file directly, but be careful not to delete it.
166 User Guide
Opening an Audit Log
Retrieving a Saved Filter
To use a saved filter, follow this procedure:
1.
From the System menu, choose Load Filter.
The Audit Load Filter dialog appears.
2.
Select one of the saved filters displayed in the Filter name field.
In the Command line options field, all the options and switches for the
selected filter appear. To see all the criteria, scroll the information with
your left mouse button.
3.
Click OK or press Enter.
Opening an Audit Log
Provided you have sufficient authority, you can open the latest eTrust AC audit
log or any other eTrust AC audit log that was saved. The log appears in the
Text Output area of the seauditx Main window.
1.
From the File menu, choose Open.
The File Selection dialog appears.
2.
Specify a file name by doing one of the following:
„
Enter the full path and file name in the Selection field.
„
Use the Directories and Files lists with the Filter field.
–
Double-click to select directories in the Directories list and files in
the Files list. The selections appear in the Filter field. The file name
in the Filter field does not change when you click to change
directories.
–
Limit the files and directories displayed by entering filters in the
Filter field. Use the asterisk (*) wildcard, which signifies zero or
more characters.
After you have selected a path and file name, click the Filter button to
make the Selection field match the Filter field.
When you have specified the file you want to open, click OK or press
Enter.
The specified file is opened and filtered according to the filter criteria that were
set when you started to open the file.
The Audit Browser: seauditx 167
Opening an Audit Log
Loading a Backup Audit Log
When the default audit log becomes very large, eTrust AC saves it as a backup
log. eTrust AC creates a new, empty audit log that becomes the default. The
name of the backup audit log is defined in the audit_back token in the seos.ini
file. To load the backup audit log, in the seauditx Main window choose File,
Load, Backup.
Loading a Collected Audit Log
The collected audit log contains all the audit information amassed by the
eTrust AC collector program, selogrcd. Selogrcd collects audit information from
selected stations that are running eTrust AC auditing programs and sending
the records through selogrd.
The name of the collected audit log is defined in the CollectFile token in the
seos.ini file. To load the collected audit log, in the seauditx Main window
choose File, Load, Collected.
Loading a Default Audit Log
The default audit log contains current audit information about the station
where you are working. The name of the log is defined in the audit_log token
in the seos.ini file. To load the default audit log, in the seauditx Main window
choose File, Load, Default.
168 User Guide
Viewing Audit Record Details
Viewing Audit Record Details
You can see detailed information about any record in the audit log shown in
the Text Output area of the seauditx Main window.
1.
Select the record that has information you want to see by clicking it or
moving the cursor to it with the up or down arrow key.
2.
Double-click the record or press Enter.
The Audit Record Info dialog appears.
The Audit Browser: seauditx 169
Viewing Audit Record Details
Different information appears for different event types. In the dialog shown,
the type of event is incoming network connection.
Note: If you have configured your system to trace network sessions, and
information is available about what computers the user has been logging into,
the Net Trace button is active. In this case, you can click the Net Trace button
to receive more information about the source and trace of the login. For
information about the dialog that the Net Trace button displays, see Network
Trace Information Dialog in this chapter. For configuration details, see Network
Session Trace Configuration in this chapter.
The following is a list of the various types of information shown in the Audit
Record Info dialog for the event types, in alphabetical order. Not all of this
information appears for all the events.
Access
The access type, if relevant.
Administrator
The name of the administrator who executed the command in the selected
record.
Class
The class that the executed command was directed to.
Command
The complete command that the accessor entered.
Command type
The type of command used in the selected record. For example, Add
Resource appears if the command executed was to add a resource.
Daemon
The name of the daemon that was started or shut down.
Date
The date that the command was executed: day, month, and year.
Details
Other details about the executed command.
„
„
If the Event type was a daemon shutdown or a trace, then Details tells
at which stage eTrust AC decided what action to take.
Details can also record the reason for the success or failure of the
access attempt, or the purpose of the access.
Effective user ID
The effective UID of the process.
Event type
170 User Guide
Viewing Audit Record Details
The type of event that took place. For example, if a resource was added to
the database, the Event type field records the type of event by displaying
“Security database administration.”
File
The name of the file that is being accessed.
Host name
The name of the remote host that the connection was executed
(attempted) from.
Login user ID
The UNIX UID of the process.
Object
The resource that is being accessed.
Program
The name of the program through which the event was executed.
Real user ID
The UID that eTrust AC associates with the process.
Resource
The name of the resource being accessed or updated.
Service
The name of the service that was requested from the remote host.
Status
What happened when the user accessed or attempted to access the
resource. The full word of the explanation appears here. For a list of all the
possibilities, see the R (Alphabetic Return Code) table entry in Text Output
in this chapter.
Terminal
The terminal that the event was executed from.
Time
The exact time that the command was executed.
Trace Information
The name and details of the resource being accessed or updated, or the
action being traced. The format of these fields is the same as the format
described in the Utilities Guide.
User name
The name of the accessor who executed the command.
The Audit Browser: seauditx 171
Viewing Audit Record Details
Network Trace Information Dialog
To receive more trace login information, double-click the NetTrace button in
the Audit Record Info dialog. A Net Trace dialog opens.
The following is the information for the event types in the Net Trace
Information dialog in alphabetical order.
Date
Date when login took place.
Host
The name of the host to which login occurred.
User
The user name used for the login.
Login program
The program used to log in.
Session
A unique session number for each session opened in eTrust AC.
Network Session Trace Configuration
The following configuration steps let you activate network session tracing,
which lets you find the computers that users have logged on to.
Note: The following procedures assume that you installed eTrust AC in the
/opt/CA/eTrustAccessControl directory.
172 User Guide
Viewing Audit Record Details
Collections Hosts
At each collection host:
1.
For all platforms except IBM AIX, Digital DEC UNIX, and HP-UX, add the
following line to the file /opt/CA/eTrustAccessControl/etc/selogrcd.ext:
sessgen /opt/CA/eTrustAccessControl/lib/ext_so.so.500.0
For IBM AIX platforms, add the following line instead:
sessgen /opt/CA/eTrustAccessControl/lib/ext_so.o.500
For Digital DEC UNIX and HP-UX platforms, add the following line instead:
sessgen /opt/CA/eTrustAccessControl/lib/ext_so.sl.500.0
2.
Copy the file /opt/CA/eTrustAccessControl/data/seauditx/loginports.init to
the directory /opt/CA/eTrustAccessControl/etc.
3.
Start the selogrd daemon.
Collections Agents
At each collection agent:
1.
Start the seosd daemon.
2.
Change CONNECT, HOST, and TCP classes by entering these eTrust AC
commands:
so class-(CONNECT, HOST)
so class+(TCP)
3.
Add the user property to be audited:
chusr userName audit(loginsuccess)
4.
Enable an audit log for TCP class:
cr TCP_default audit (a)
5.
Add the following to the /opt/CA/eTrustAccessControl/log/selogrd.cfg file:
NetSection
host hostName
include CLASS(TCP*).
include CLASS(LOGIN).
include CLASS(SHUTDOWN).
where hostName is the name of the host to which information is being
sent for collection.
The Audit Browser: seauditx 173
Commenting the Audit Log
Commenting the Audit Log
You can specify comments for the audit records displayed in the Text Output
area of the seauditx Main window. The procedures in this section show you
how to:
„
Create or edit a comment
„
Add information from a file to a comment
„
Save a comment in a file
„
Search for text in a comment
„
Remove a comment
„
Print a comment
Creating or Editing a Comment
1.
To create a new comment, select the record that you want to comment on
and click the leftmost dot.
To edit an existing comment, click the comment icon.
The Comment Editor dialog appears.
2.
To add or edit a comment, click in the text box and start typing. When you
are finished, click OK to save the comment in an internal seauditx file.
When you create a new comment, the dot in the Text Output area of the
seauditx Main window changes to a comment icon.
174 User Guide
Commenting the Audit Log
Inserting Information from an External File into a Comment
You can use the contents of an external file as a comment. You can also copy
information from an external file into an existing comment. This procedure
shows how to do both.
1.
Select a record to comment. Click the leftmost dot.
The Comment Editor window appears.
2.
From the File menu, choose Open.
A File Selection dialog appears.
3.
Either enter a file name in the Selection field, or locate your file using the
Directories and Files lists with the Filter field. (For information about how
to use the File Selection Box, see Opening an Audit Log in this chapter.)
The comment appears in the Comment Editor.
4.
If necessary, edit the comment by clicking in the display area and typing.
5.
If you want to copy this comment to an existing comment:
6.
a.
Select the text to copy, and from the Edit menu choose Copy. If you
want to search for the correct text, see Searching for Text in a
Comment in this chapter.
b.
Open the other comment from the seauditx Main window.
c.
In the Comment Editor, position the cursor where you want to copy
the information, and choose Edit, Paste.
Click OK.
Saving a Comment in an External File
You may want to save a comment in an external file in order to use the same
text again for other audit log records.
1.
In the Comment Editor, pull down the File menu and choose Save.
The File Selection box appears
2.
Either enter a file name in the Selection box, or locate your file using the
Directories and Files lists with the Filter text box. (For information about
how to use the File Selection Box, see Opening an Audit Log in this
chapter.)
If a file with the same name already exists, a prompt asks you to confirm
that you want to overwrite the existing file.
3.
Click OK or press Enter.
The Audit Browser: seauditx 175
Commenting the Audit Log
Searching for Text in a Comment
This procedure shows how to find text in a comment that is displayed in the
Comment Editor.
1.
Open a comment in the Comment Editor by clicking the comment icon in
the seauditx Main window. If the comment is saved in an external file,
open the file by choosing File, Open.
2.
In the Comment Editor, choose Edit, Find.
3.
In the Find dialog that appears, enter the text that you are looking for and
click OK.
4.
To find the next occurrence choose Edit, Find Next.
Note: Select text by left clicking at the beginning of the text. Continuing
to hold down the left button, drag the mouse to the end of the text, and
release the button.
5.
Another way to select text that you want to search for is to highlight it in
the comment with the mouse, and then choose Edit, Find Selection. The
cursor and highlight jump to the next location of your text.
Clearing the Comment Editor Dialog
By removing all text from the Comment Editor, you can enter a new comment.
Use either the Edit menu or the pop-up menu that appears when you rightclick in the display area. Choose Clear Window from either menu.
Removing a Comment
This procedure removes a comment from the internal seauditx file, but not
from any external file you created for the same comment.
1.
Click the comment in the Text Output area. The Comment Editor dialog
appears.
2.
Click the Remove button at the bottom of the Comment Editor.
The comment is erased from the internal seauditx file, and the comment icon
reverts to a dot, as shown.
176 User Guide
Adding Acknowledgements
Printing a Comment
You can print a whole comment or selected text in a comment.
1.
Open a comment in the Comment Editor by clicking the comment icon in
the seauditx Main window. If the comment is saved in an external file,
open the file by choosing File, Open.
2.
To print the whole comment, choose File, Print (or right-click and choose
Print).
To select part of the comment, drag to select the text, and choose File,
Print Selection.
Note: The default print command is lpr. It is possible to change the default
print command by selecting Preferences from the System menu.
Adding Acknowledgements
To acknowledge that you have examined a line in the Audit log, you can tag it
with a check mark to serve as a reminder in the future. The check is graphical
and does not change the audit log. To acknowledge that you have examined a
line, click the near left dot.
The button becomes a check mark.
To remove the check mark, click it. It reverts to a dot.
The Audit Browser: seauditx 177
Reassigning Comments and Acknowledgements
Reassigning Comments and Acknowledgements
In several circumstances, you must reassign or remove comments and
acknowledgements for an audit file:
„
You delete the audit file. The comments and acknowledge marks are not
automatically removed from the seauditx log file.
„
You move the audit file. The comments and acknowledges are not
automatically moved from the seauditx log file.
„
When the audit log becomes very large, eTrust AC saves the log file with a
different name, and opens a new audit log.
You receive the following prompt to reassign or save your comments.
To remove the comments, click the Remove button. The comments are erased
from the internal seauditx files and no longer appear. If you received the
prompt because eTrust AC has created a backup of your audit file, the
comments no longer appear in the backup audit file either.
To reassign the comments to another audit log file:
1.
Click the Reassign button. The File Selection dialog opens.
2.
Either enter a file name in the Selection field, or locate your file using the
Directories and Files lists with the Filter field. (For information about how
to use the File Selection Box, see Opening an Audit Log in this chapter.)
3.
Click OK.
The comments are reassigned to the chosen audit log. Whether the audit file
was deleted, moved, or backed up, the new file opens without comments. The
previous audit log still has its comments.
178 User Guide
Printing the Audit Log
Printing the Audit Log
You can print the audit data in the Text Output area of the seauditx Main
window. If you filtered the information in the log (see Filtering Audit Records
in this chapter), all audit records that match the filter are printed, whether
visible or not. Comments and the acknowledgement marks are not printed.
1.
From the File menu in the seauditx Main window, choose Print. The Print
dialog appears, containing the default print command.
Note: The default print command is lpr. You can change the default print
command by choosing Preferences from the System menu.
2.
If necessary, enter the new command over the existing command.
3.
Press Enter or click OK.
The file is sent to the printer.
Setting Preferences for seauditx
Preferences indicate the default print command and determine how
information appears in seauditx.
To change the preferences:
1.
From the System menu, choose Preferences.
The Audit Preferences dialog appears.
Note: When seauditx is installed, hosts and services are identified by
name, and the print command is lpr by default.
2.
Click a radio button to specify how to identify network hosts. This setting
determines the format for data in the Text Output area and the format you
use to specify network hosts in the Switches area.
3.
Click a radio button to specify how to identify network services. This
setting determines the format for data in the Text Output area and the
format you use to specify network services in the Switches area.
4.
To change the print command, enter the new command over the existing
command.
5.
Click OK.
Your preferences are saved in your home directory in the .audit.ini file.
The Audit Browser: seauditx 179
Customizing seauditx
Customizing seauditx
The application resources that you can customize, such as colors and fonts,
are in the seauditx file. During standard installation, this file is placed into the
/usr/lib/X11/app-defaults/ directory for all platforms except Sun Solaris. In
Sun Solaris, the file is placed in the /usr/lib/openwin/app-defaults/ directory.
The seos.ini File
The seauditx utility uses tokens in two sections of the seos.ini file:
„
logmgr
„
selogrd
For more information, see the Administrator Guide.
180 User Guide
Chapter 15: SecMon
This section contains the following topics:
SecMon (see page 181)
Starting SecMon (see page 182)
Minimizing SecMon (see page 183)
The SecMon Main Window (see page 184)
Performing Tasks with SecMon (see page 191)
SecMon
SecMon is an X Window System graphical user interface (GUI) that provides
an ongoing display of current audit events taking place in a UNIX environment.
The utility contains a Main window that displays real-time data, which is also
transmitted to the audit log. The window both lists audit events and lets you
see detailed information about them.
The SecMon utility is installed when you install the Security Administrator. For
installation instructions, see the chapter “Installing Security Administrator.”
We recommend that you become familiar with the basic concepts of eTrust AC
and log routing in eTrust AC before using SecMon. The concepts, both basic
and advanced, are described in the Administrator Guide and the Reference
Guide.
This chapter describes the SecMon audit viewer. It includes information about
the following:
„
How to invoke SecMon
„
The SecMon main window
„
How to perform the various functions of SecMon
Note: eTrust AC also offers the seauditx utility, which is a GUI that displays,
filters, prints, and saves audit information. For more information about this
utility, see the chapter “The Audit Browser: seauditx.”
Note: The SecMon utility does not display a password even if one was entered
as part of a chusr, editusr, or newusr command. A series of asterisks (***)
appears instead of the clear text password.
SecMon 181
Starting SecMon
Starting SecMon
Start SecMon from the command line.
1.
Start the X Window system and ensure that the application display is set
to your terminal according to the system requirements at your site.
2.
Do the following on each client machine:
„
„
Edit the eTrustACDir/log/selogrd.cfg (where eTrustACDir is the
directory where you installed eTrust AC, by default
/opt/CA/eTrustAccessControl) file to define the audit events you want
to be notified about. For the syntax of this file, see the selogrd utility
in the Utilities Guide.
Be sure that the message destination type in the selogrd.cfg file is
cons. Include the heading SecMon and set the destination name to the
full host name of the administrator machine where SecMon will be
running. For example, if you want SecMon to display a message each
time a user starts an eTrust AC daemon, enter the following three lines
into the eTrustACDir/log/selogrd.cfg file:
secmon
cons monitoring_host_name
.
„
Start the selogrd daemon:
selogrd
3.
Start the SecMon application on the administrator machine. When you
enter command-line parameters, the Main window implements the
parameters when it opens. For example, to open the Main window with 20
rows of data displayed, enter the command:
secmon -visibleRows 20
Note: Entering secmon -h gives you a list of all the command line
parameters.
182 User Guide
Minimizing SecMon
Minimizing SecMon
If you run SecMon as an icon (minimized), it alerts you to new messages by
flashing (except when run using the .fvwm95 window manager). Click to
minimize SecMon to an icon.
This is how SecMon looks as an icon on the desktop.
SecMon 183
The SecMon Main Window
The SecMon Main Window
After you enter the secmon command, the Main window appears. It displays
audit messages as they are received.
184 User Guide
The SecMon Main Window
The Main window contains the following areas:
Title bar
Displays the window title and several buttons used to close, minimize, or
maximize the window.
Toolbar
Contains buttons that let you stop or start real-time auditing, change the
buffer size, clear records, view information about SecMon, and exit
SecMon.
Text Output
Contains audit records displayed in real-time.
Detailed Info
Gives further detail for the chosen audit record.
Scroll bars
Contain standard tools to move up and down or left and right to locate the
particular record you want.
The SecMon audit utility can display records according to the following criteria:
„
User login
„
Terminal login
„
Specific host
„
Specific resource class
„
Start and end dates
„
Start and end times
You select the type of access that will be reported by editing the selogrd.cfg
file on all the monitored systems.
All reporting is runtime only. To look at the stored audit logs, use the seauditx
utility (for more information, see the chapter “The Audit Browser: seauditx”).
SecMon 185
The SecMon Main Window
Text Output
Audit record information appears in the Text Output area. To view information
that lies outside the currently displayed window, you can:
„
Use the scroll bars, which move Text Output up and down, and left and
right. When you click the up and down scroll bar, SecMon stops receiving
new audit information. When you finish examining previous records, click
the top left toolbar button to reactivate retrieval.
„
Enlarge the Main window to increase the size of Text Output.
The following table describes the Text Output fields.
Host
Host station where audit record was collected.
Date
The date on which the (attempted) access occurred.
Time
The time at which the (attempted) access occurred.
R
This is the eTrust AC alphabetic return code indicating what happened. The
valid values and their meanings are:
A
An attempt to log in failed because an invalid password was entered
repeatedly.
D
eTrust AC denied access to a resource, did not permit a login, or did
not permit an update to the eTrust AC database because the accessor
did not have sufficient authorization.
E
Serevu enabled a disabled user account.
F
An attempt to update the eTrust AC database failed.
I
Serevu disabled a user account.
M
The executed command started or shut down a daemon.
O
A user logged out.
186 User Guide
The SecMon Main Window
P
eTrust AC permitted access to a resource or permitted a login.
S
The eTrust AC database was successfully updated.
T
An audit record was written because all the actions of the user are
being traced.
U
A trusted program (setuid or setgid) was changed; therefore it is no
longer Trusted.
W
The authority of an accessor was insufficient to access the specified
resource; however, eTrust AC allowed the access because warning
mode is set in the resource.
Event
This is the type of event-login, logout, or update-or the class on which the
action was performed.
Content of Message
Further details, such as name of the accessor, the name of the terminal
from which a login or logout was performed, the name of the program that
accessed a resource, and so on depending on the action examined.
SecMon 187
The SecMon Main Window
Detailed Information
The Detailed Info area of the SecMon Main window displays detailed
information about any record in the audit log.
To display the Detailed Info:
1.
Select the record that has information you want to see by clicking it with
the left mouse button or moving the cursor to it with the down arrow key.
2.
Double-click the record or press Enter.
3.
The information appears in the Detailed Info area:
The following describes the information for the various event types, in
alphabetical order. Not all of this information appears for all the event types.
Access
The access type, if relevant.
Administrator
The name of the administrator who executed the command in the selected
record.
Class
The class that the executed command was directed to.
188 User Guide
The SecMon Main Window
Command
The complete command that the accessor typed.
Command type
The type of command used in the selected record. For example, Add
Resource appears if the command executed was to add a resource.
Daemon
The name of the daemon that was started or shut down.
Date
The date that the command was executed: day, month, and year.
Details
Other details concerning the executed command.
If the Event type was a daemon shutdown or a trace, this column displays
the Stage at which the event was audited. The Stage consists of two
numbers. The first number (up to three digits) indicates at which stage
eTrust AC decided what action to take. The second number represents the
reason for the audit record. For an explanation of this code, double-click
anywhere in the record.
Details can also record the reason for the success or failure, the access
attempt, or the purpose of the access.
Effective user ID
The effective UID of the process.
Event type
The type of event that took place. For example, if a resource was added to
the database, the Event type field records the type of event by displaying
“Security database administration.”
File
The name of the file that is being accessed.
Host name
The name of the remote host that the connection was executed
(attempted) from.
Login user ID
The UNIX UID of the process.
Object
The resource that is being accessed.
Program
The name of the program through which the event was executed.
SecMon 189
The SecMon Main Window
Real user ID
The UID that eTrust AC associates with the process.
Resource
The name of the resource being accessed or updated.
Service
The name of the service that was requested from the remote host.
Status
What happened when the user accessed or attempted to access the
resource. The full word of the explanation appears here. For a list of all the
possibilities, see the R (Alphabetic Return Code) table entry in Text Output
in this chapter.
Terminal
The terminal that the event was executed from.
Time
The exact time that the command was executed.
Trace Information
The name and details of the resource being accessed or updated, or the
action being traced. The format of these fields is the same as the trace
messages described in the Utilities Guide.
User name
The name of the accessor who executed the command.
Changing Text Color
After you examine a record in the Detailed Info area, it changes color in the
Text Output area.
You can modify the color of a visited record by using the -visitColor parameter
when starting SecMon. The default color is green, but to set the color to red at
startup, enter the following command:
secmon -visitColor red
After you finish examining a record, it appears in red.
190 User Guide
Performing Tasks with SecMon
Performing Tasks with SecMon
SecMon is a runtime monitor that displays audit messages in the Text Output
area as they are received. Toolbar buttons in the upper left corner let you:
„
Stop and restart the retrieval of audit events
„
Delete selected audit events or all of them
„
Change the buffer size for the Text Output area
„
Exit SecMon
Tool tips for the toolbar buttons appear if you move the pointer over the
button. You do not need to click the button for the explanation to appear.
Stopping and Restarting Retrieval of Audit Events
If you want to stop the retrieval of audit events, click the leftmost button on
the toolbar. This button operates in toggle mode. The icon changes to reflect
the action that you can take with it.
Once clicked, new messages are not displayed. The messages that you already
received remain in the buffer and can be viewed using the scroll bars.
Click the running man icon to receive messages again.
Deleting Selected Audit Events
To delete records from the display and the buffer, use the second button to
the left.
The audit information is not cleared from audit logs that are collected for other
auditing uses; the display buffer for SecMon is temporary and is used for
real-time purposes.
The following procedure shows how to clear selected events. You can also
clear all events; see Clearing All Audit Events in this chapter.
1.
Click one or more records to highlight and select them.
2.
Click the Clear messages button.
A confirmation message appears.
3.
Click Yes to remove the selected lines from the display area and the
display buffer.
SecMon 191
Performing Tasks with SecMon
Deleting All Audit Events
This procedure shows how to clear all audit events from the SecMon display
area and buffer. This procedure does not delete audit messages from the audit
log, only from the SecMon display.
1.
Do not highlight any lines and click the Clear Buffer button.
A confirmation message appears:
2.
Click Yes to remove all lines from the display area and the display buffer.
Changing Buffer Size
The SecMon buffer size determines how many incoming messages are
displayed in the SecMon Text Output area. The default is 200 lines of text.
1.
Click Options to change how many scrollable lines of records are available
for viewing.
2.
In the Options dialog, enter the number of message lines to appear in the
Text Output area.
3.
Click OK.
You can also set buffer size from the command line when you invoke SecMon:
secmon -scrollLine number-of-lines
where number-of-lines is the number of scrollable lines.
192 User Guide
Appendix A: User and Group Properties
This section contains the following topics:
User Properties (see page 193)
Group Properties (see page 202)
User Properties
You can define user properties using the property editor in the Create User,
Update User, and Edit User dialogs. Different user properties exist for eTrust
AC, UNIX, and Windows.
eTrust AC User Properties
The eTrust page contains seven subpages of options.
User and Group Properties 193
User Properties
The following table describes the options in each subpage:
Subpage
Option
Purpose
Personal Data
Full name
The full name of the user. This name is for your own administrative
purposes; eTrust AC does not use this information.
Comment
A comment string of up to 255 characters that you can use for your
own purposes. Security Administrator does not use this string.
Note: You can use the seam.ini file to replace the Comment field
with fields of your own, which appear at the end of the eTrust AC
properties. For details, see the description of the seami.ini section
[user fields] in The Security Administrator Configuration File in the
appendix “seam.ini and UNIX Exits.”
Login
Location
The user's location.
Country
The country the user works in.
Phone
The user's telephone number.
Organization
The organization in which the user works.
Org unit
The organizational unit in which the user works.
For the following three properties, click the buttons to receive a list of months,
days, and years. Select the date, and type in the hour (in 24-hour format) and
minute, when you want the property to activate.
Suspend
The date and time for suspending the user account (revoking
permission to log in).
Resume
The date and time for restoring permission to the user to log in after
suspension.
Expire date
The date and time that the user's login becomes invalid. After the
specified time, the user cannot log in to the system.
Grace login
The number of grace logins for the user (maximum 255). When the
user's password expires, the user is granted the specified number of
grace logins before eTrust AC prevents further logins. If you leave
this field blank, eTrust AC uses the system default value.
Note: For more information, see the chapter “Controlling Login
Commands” in the Administrator Guide.
194 User Guide
Max logins
The maximum number of terminals from which the user can
simultaneously log in.
Inactive days
The number of days that must pass before the system changes the
user to inactive. When the specified number of days is reached, the
user account becomes inactive, and the user cannot log in.
User Properties
Subpage
Option
Purpose
Password
New
The new password. Use any characters except spaces. Rules about
passwords vary according to what environment or program you are
working with.
Note: For more information about password rules in eTrust AC, see
the sepass utility in the Utilities Guide.
Note: For more information about password rules in UNIX, see your
UNIX documentation.
Confirm
Retype the new password to confirm.
Hidden
Lets you enter a password manually.
Clear
Clears the current password. If you want Security Administrator to
generate the password for you, click Clear, and then Generate.
Generate
Automatically generates a password.
Password
interval
The number of days that must pass after the password was set or
changed before the system prompts the user for a new password.
When the specified number of days is reached, eTrust AC informs
the user that the current password has expired.
Password
The minimum number of days that must pass before the user is
minimum time allowed to change the password.
Restrictions
Allowed days
The days on which the user can access the system. Select the check
boxes that represent the days to allow the user access. To select
only Monday through Friday, click Weekdays. This limitation applies
only to logging in; once logged in, the user can continue working
indefinitely.
Note that the days refer to the time zone of the host to which the
user is attempting to log in, which is not necessarily the time zone
of the user's location.
Allowed time
The period during which the user can log in on the specified days.
Drag the Start and End sliders to the required time, which appears
to the left of the sliders. The time range is in 24-hour format.
Ignore holiday Specifies whether the user can log in during any period, ignoring
restrictions defined by a holiday record.
Note: For more information, see the HOLIDAY class in the
Reference Guide.
User and Group Properties 195
User Properties
Subpage
Option
Purpose
Auditing
Audit mode
Specifies when to write an audit record to the eTrust AC audit log.
You can assign a value to this property only if you set the AUDITOR
attribute. Click a check box to select or deselect it. The modes are:
Success-Writes an audit record each time the user successfully
accesses a resource.
Failure-Writes an audit record each time the user is denied access
to a resource.
Login success-Writes an audit record each time the user succeeds
in logging into the system.
Login failure-Writes an audit record each time eTrust AC prevents
the user from logging into the system.
Trace-Writes an audit record for every message that appears in the
eTrust AC trace file because of the user's actions.
None-Does not write any audit records to document the particular
user's activities.
Characteristics
Notify
Notifies a user or email recipient every time the user logs in. The
specified user should log in frequently to respond to the
unauthorized access attempts described in each message. Each time
a notification message is sent, an audit record is written.
User Mode
Special administrative attributes that you can assign to the user.
Click a check box to select or deselect it. The modes are:
Admin-The user can run Security Administrator and perform all
eTrust AC activities except assigning audit attributes.
Auditor-The user can assign audit attributes, and display user and
characteristics.
Operator-The user can display user and user-group characteristics.
Server-eTrust AC permits a pseudo-login by a multiuser (MUSAS)
process with the user's ID, so that the user has greater access
through the process than without it. If the user has the ADMIN
attribute as well, Security Administrator can provide details of user
permissions (see Viewing User Properties in the chapter “Account
Administration”).
Password Manager-The user can change the passwords of other
users
196 User Guide
Owner
The user or group that can change the user's properties without
requiring the ADMIN attribute.
Profile
Assigns the user to the specified profile group. eTrust AC assigns
properties from the profile group to the user if the properties were
not explicitly assigned to the user in the user record.
User Properties
Subpage
B1
Option
Purpose
Groups
The list of groups that the user belongs to. Specify zero or more
groups. If you specify more than one group, separate group names
with spaces.
Policy Model
Specifies that when a user changes a password with the sepass
utility, the new password is propagated to the specified PMDB.
Category
The special administrative attributes that you can assign to the
user.
Security label
The security label of the user.
Security level
The security level of the user. The number 0 means the user has no
access to anything that possesses a security level. Range is 0 - 255.
UNIX User Properties
The UNIX page contains two subpages of options.
User and Group Properties 197
User Properties
The following table describes the options in each subpage:
Subpage
Option
Purpose
Personal
Gecos
The user's GECOS information.
Shell
The full path of the initial program or shell to be executed after the
user invokes the login or su command. The default path is /bin/sh.
eTrust AC checks whether the specified program or shell exists and,
if not, issues an error message.
Home dir
The user's home directory; specify the full path. eTrust AC attempts
to create the directory, but updates the UNIX file (/etc/passwd)
regardless of whether eTrust AC successfully creates the home
directory. The default directory is /home/userName (where
userName is the name you assign when you create the user).
Primary group
The user's primary group ID. Specify a UNIX group that already
exists. The default is the group whose ID number is 1.
Groups
The list of groups that the user belongs to. Specify zero or more
groups. If you specify more than one group, separate group names
with spaces.
UserId
The numeric ID for the user (UID), which serves as a unique
discretionary access control. The default is a number that is one
more than the largest existing UID.
Note that the seos.ini file may define certain numbers as
untouchable-that is, outside the permissible range-for the UID. For
a description of the seos.ini file, see the Administrator Guide.
Password
198 User Guide
New
The new password.
Confirm
Retype the new password to confirm.
Hidden
Lets you enter a password manually.
Clear
Clears the current password. If you want Security Administrator to
generate the password for you, click Clear and Generate.
Generate
Automatically generates a password.
User Properties
Windows User Properties
The NT page contains six subpages of options.
The following table describes the options in each subpage:
Subpage
Option
Personal Data Full name
Account Data
Purpose
The full name of the user.
Comment
Any remark you want to add to the user record. If the string contains
any blanks, enclose it in single quotation marks.
Location
The user's location.
Country
The country the user works in. This string is part of the X.500 naming
scheme; you can also use it for language selection.
Phone
The user's telephone number.
Organization
The organization in which the user works.
Org unit
The organizational unit where the user works.
Home dir
drive
The drive that accommodates the user's home directory.
User and Group Properties 199
User Properties
Subpage
Option
Purpose
Home dir
The full path of the user's home directory.
Primary
Group
The name of the Primary Global Group. A primary group is the only
group from which the user cannot be deleted.
Account is
disabled
Specifies whether the user account is disabled. If it is, the user cannot
access the system.
Account is
currently
locked out
Specifies whether the user account is locked out temporarily. If it is,
the user cannot log in.
Password
Specifies whether the user password can expire.
never expires
Login
Cannot
change the
password
Specifies whether the user can change the user password.
No password
is required
Specifies whether the user needs a password to log in to the system.
Expire date
The date and time that the user's login becomes invalid. Click the
buttons to display a list of months, days, and years. Select the date,
and enter the hour (in 24-hour format) and minute for this property to
activate. After the specified time, the user cannot log in to the system.
Never expires Specifies that the user password never expires.
Password
200 User Guide
Logon server
The server where this user must log in to.
Num logons
The number of terminals a user can log in from concurrently.
Profile
The full path of the user's profile. The profile is a file that contains a
record of the user's Desktop environment.
Script
The full path of the script that logs the user into the application. This
field is dimmed if No is selected for “Is script active” (see the next
option).
Is script
active
Specifies whether the script that logs the user into the application is
active. If you select No, the Script path field is dimmed.
New
The new password. Use any characters except spaces. Rules about
passwords vary according to what environment or program you are
working with. For more information about password rules in eTrust AC,
see the sepass utility in the Utilities Guide. For more information about
password rules in UNIX, see your UNIX documentation.
Confirm
Retype the new password to confirm.
Hidden
Lets you enter a password manually.
Clear
Clears the current password. If you want Security Administrator to
generate the password for you, click Clear, and then Generate.
Group Properties
Subpage
Option
Purpose
Generate
Automatically generates a password.
Password age The number of days before a user must change the password.
Restrictions
Bad
passwords
count
The number of bad passwords a user is permitted to enter before
being locked out of the system.
Allowed days
The days on which the user can access the system. Select the check
boxes that represent the days to allow the user access. To select only
Monday through Friday, click Weekdays.
Allowed time
The period during which the user can log in on the specified days.
Drag the Start and End sliders to the required time, which appear to
the left of the sliders. The time range is in 24-hour format.
Characteristic Workstations
s
The workstations this user has administrative access to.
Terminals
The terminals from which this user can log in.
Groups
The list of groups that the user belongs to. Specify zero or more
groups. If you specify more than one group, separate group names
with spaces.
UserId
The user ID of the user.
GroupId
The group ID of the user.
Group Properties
You can define different group properties for eTrust AC, UNIX, and Windows
using the property editor in the Create group, Update group, and Edit group
dialogs.
User and Group Properties 201
Group Properties
eTrust AC Group Properties
The eTrust page contains five subpages of options.
Personal Data
Full name
The user's full name. This name is for your own administrative
purposes; Security Administrator does not use this information.
Comment
A comment string of up to 255 characters that you can use for your
own purposes. Security Administrator does not use this string.
202 User Guide
Group Properties
Characteristics
Owner
The user or group that can update the group's properties without
requiring the ADMIN attribute.
Superior group
An optional, second group to which the members will automatically
belong. A group can have no more than one superior group.
Any group can be designated as the superior group (parent) of any
number of other groups; however, the parent group must already exist
in the environment in which the group is being created.
Note: For more information about group-to-group relationships, see
the Administrator Guide.
User list
The list of users that belong to the group. Each user must already be
defined to eTrust AC. Separate each user name with a space.
Restrictions
Allowed days
The days on which the user can access the system. Select the check
boxes that represent the days to allow the user access. To select only
Monday through Friday, click Weekdays. This limitation applies only to
logging in; once logged in, the user can continue working indefinitely.
Note that the days refer to the time zone of the host to which the user
is attempting to log in, which is not necessarily the time zone of the
user's location.
Allowed time
The period during which the user can log in on the specified days. Drag
the Start and End sliders to the required time, which appear to the left
of the sliders. The time range is in 24-hour format.
Profile Data
Policy model
Specifies the PMDB to which a new password is propagated when a
user changes the password with the sepass utility. Enter the name of
the PMDB.
Password minimum time
Sets the number of days that must pass, after the user sets or
changes a password, before the system prompts the user for a new
password. When the specified number of days is reached, eTrust AC
informs the user that the current password has expired.
Inactive days
User and Group Properties 203
Group Properties
The minimum number of days that must pass before the user is
allowed to change the password.
Password interval
Specifies the number of days that must pass before the system
changes the user account to inactive. When the number of days is
reached, the user cannot log in.
Profile login
For the following three properties, click the buttons to receive a list of
months, days, and years. Select the date, and type in the hour (in 24-hour
format) and minute, when you want the property to activate.
Expire date
The date and time that the user's login becomes invalid. After the
specified time, the user cannot log in to the system.
Suspend
The date and time for suspending the user account (revoking
permission to log in).
Resume
The date and time for restoring permission to the user to log in after
suspension.
Max logins
The maximum number of terminals from which the user can
simultaneously log in.
Grace login
The number of grace logins for the user (maximum 255). When the
user's password expires, the user is granted the specified number of
grace logins before eTrust AC prevents further logins. If you leave this
field blank, eTrust AC uses the system default value.
Note: For more information, see the Administrator Guide.
204 User Guide
Group Properties
UNIX Group Properties
The UNIX page contains one subpage of options.
Personal Data
Members
The list of users that are members of the group. The users in this list
must be defined to UNIX. Use spaces or commas to separate user
names.
Group Id
The group's identification number. If you do not specify a group ID,
eTrust AC assigns a group ID that equals the largest current group ID
plus one. eTrust AC creates group ID numbers in the same way when
adding more than one group at a time. eTrust AC does not allow a
group ID of zero. Additionally, the seos.ini file may define certain
numbers as untouchable-that is, outside the permissible range-for the
UID and the GID. For a description of the seos.ini file, see the
Administrator Guide.
User and Group Properties 205
Group Properties
Windows Group Properties
The NT page contains one subpage of options.
Personal Data
Comment
Any remark you want to add to the group record. If the string contains
any blanks, enclose it in single quotation marks.
Members
A list of all the users in the group. To add to the list, type the names of
the users you want, or click Browse. To add users to the group you are
creating or updating, select the names of the users in the User list and
click the right arrow button. To remove users from a group, select the
users in the Selection list and click the left arrow button.
206 User Guide
Group Properties
Group Id
The group's identification number. If you do not specify a group ID,
eTrust AC assigns one that is equal to the largest current group ID
plus one. eTrust AC creates group ID numbers the same way when
adding more than one group at a time.
eTrust AC does not allow a group ID of zero. Additionally, the seos.ini
file may define certain numbers as untouchable-that is, outside the
permissible range-for the UID and the GID. For a description of the
seos.ini file, see the Administrator Guide.
User and Group Properties 207
Appendix B: Resource Properties
This section contains the following topics:
Resource Properties (see page 209)
The eTrust AC Classes (see page 209)
The UNIX Classes (see page 258)
Windows Classes (see page 260)
Resource Properties
For resource classes, you deal with a list of characteristics (called properties)
in a property editor. This appendix lists the meanings of each class's property
and its values.
You can view and modify class properties using the property editor in the
Update and Edit dialogs. There are different classes for eTrust AC, UNIX, and
Windows. All classes appear in the Resources tabbed page.
The eTrust AC Classes
This section details the eTrust AC classes and their properties. To view the
eTrust AC classes, click the Access by Class item under Administration in the
eTrust section.
Resource Properties 209
The eTrust AC Classes
Administration (ADMIN Class)
To view and modify the ADMIN record, select the object in the right pane, and
then select Update or Edit from the Edit menu or toolbar. For information
about the property editor, see the chapter “Resource Administration.”
The ADMIN class contains the definitions that allow non-ADMIN users to
administer specific classes. Each ADMIN record represents an eTrust AC class
that is to be administered by specific users. The record contains a list of
accessors along with the access authority of each. The key of the ADMIN class
record is the name of the class being protected.
Owner
The eTrust AC user or group that owns the record. Click the Browse button
to view a list of all the users.
Any user or group name in the database
Creation Time
The date on which the record was created. This property is shown only
when updating a record.
Read-only field
Update Time
The date on which the record was updated. This property is shown only
when updating a record.
Read-only field
Updated by
The user name of whomever updated the record. This property is shown
only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
resource is accessed.
Alphanumeric, 30 characters
210 User Guide
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes, No
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection.
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Seclevel
The security level (1 - 255) assigned to the resource, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the resource. Type in the name of a
seclabel, or click the Browse button to receive a list of all the existing
seclabels.
The name of a security label in the database, or nothing
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button to receive a
list of all the existing categories.
One or more categories in the database, or none
Resource Properties 211
The eTrust AC Classes
Default Access
The permitted access for users who are not covered in the access list:
C-Create
D-Delete
J-Join
P-Password
R-Read
Y-Modify
Any selection. Selecting nothing means default access is none.
Access list
A list of accessors and their access authority to the resource. The
authorities are:
A-All
C-Create
D-Delete
J-Join
N or nothing-None
P-Password
R-Read
Y-Modify
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
212 User Guide
The eTrust AC Classes
File and Directory (FILE Class)
Each record in the FILE class defines the access allowed to a file, a directory,
or the files that match a certain file name pattern (also called a mask). A file
need not have been created yet to have a rule defined for it.
You can protect symbolic links like any other files. Note, however, that by
protecting a link you do not automatically protect the file that the link points
to.
The key of the FILE class record is the name of the file or directory protected
by the record. The full path must be specified.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the file's record. This property is shown
only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operation
F-Failed operations
N-No operations
Success, Failed, both, None
Notify
The email address or alias of the person who is to be notified when the file
is accessed.
Alphanumeric, 30 characters
Membership
Assign eTrust AC groups to be the owner of the record.
Resource Properties 213
The eTrust AC Classes
Not Members: Groups to which this file does not belong.
Members: Groups to which this file will be added.
Any group name in the database
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Seclevel
The security level (1 - 255) assigned to the file, or 0. The number 0 means
that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the resource. Type in the name of a
seclabel, or click the Browse button to receive a list of all the existing
seclabels.
The name of a security label in the database, or none
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button to receive a
list of all the existing categories.
One or more categories in the database, or none
Default Access
214 User Guide
The eTrust AC Classes
The permitted access for users who are not covered in the access list:
(Create)
(Delete)
(Chmod)
(Chown)
(Sec)
(Utime)
(Read)
(Rename)
(Write)
(Execute)
Any selection-selecting nothing means default access is none
Membership
Assign eTrust AC groups to be the owner of the group of files.
Not Members: Groups to which these files do not belong.
Members: Groups to which these files will be added.
Any group name in the database
Access list
A list of accessors and their access authority to the resource. The
authorities are:
A-All
R-Read
C-Create
S-Sec
D-Delete
T-Utime
J-Join
U-Update
M-Chmod V-Rename
N or nothing-None W-Write
O-Chown X-Execute
P-Password Y-Modify
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names, each of which can be followed by the access
authority in parentheses. Each must be separated from the next name (if
any) by a comma.
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Resource Properties 215
The eTrust AC Classes
File Group (GFILE Class)
Each record in the FILE class defines the access allowed to a file, a directory,
or the files that match a certain file name pattern (also called a mask). A file
need not have been created yet to have a rule defined for it.
You can protect symbolic links like any other files. However, by protecting a
link you do not automatically protect the file that the link points to.
The key of the FILE class record is the name of the file or directory protected
by the record. You must specify the full path.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the file
is accessed. If dimmed, not allowed.
Alphanumeric, 30 characters
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
216 User Guide
The eTrust AC Classes
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Access list
A list of accessors and their access authority to the resource. The
authorities are:
A-All
R-Read
C-Create
S-Sec
D-Delete
T-Utime
J-Join
U-Update
M-Chmod V-Rename
N or nothing-None W-Write
O-Chown X-Execute
P-Password Y-Modify
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names, each of which can be followed by the access
authority in parentheses. Each must be separated from the next name (if
any) by a comma.
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Resource Properties 217
The eTrust AC Classes
Holiday (HOLIDAY Class)
Each record in the HOLIDAY class defines one or more periods when users
need extra permission to log in. Each holiday record can include several
periods; you can include all the year's holiday periods in one holiday record.
However, if you include more than one holiday period in one holiday record,
you cannot allow a user to log in during some of them and prevent the user
from logging in during others. If you want to allow a specific user to log in
during New Year's Day but not during Christmas, for example, the two
holidays must be defined in different records.
Owner
The eTrust AC user or group that owns the record. You can click the
Browse button for a list of all users.
Any user or group name in the database
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
resource is accessed.
Alphanumeric, 30 characters
Warning
Enables or disables warning mode. In warning mode, all access requests
are granted, but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
218 User Guide
The eTrust AC Classes
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Seclevel
The security level (1 - 255) assigned to the resource, or 0. The number 0
means that the accessor's security level is not checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the resource. Enter the name of a seclabel,
or click the Browse button for a list of all existing seclabels.
The name of a security label in the database, or none
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button for a list of
all existing categories.
One or more categories in the database, or none
Start date
Date at which the holiday begins.
Choose Forever if it is an annually recurring holiday. If you choose
Forever, the year button does not appear.
Choose All Day if the holiday lasts 24 hours.
Month, date, and year
End date
Date when the holiday ends.
Choose Forever if it is a recurring holiday each year. If you choose
Forever, the year button does not appear.
Click All Day if the holiday is 24 hours. Choose Forever if it is an annually
recurring holiday. If a holiday starts in one year and ends in the next, you
must make separate holidays for each year (for example, Christmas to
New Year's Day).
Month, date, and year
Resource Properties 219
The eTrust AC Classes
Access list
A list of accessors and their access authority to the resource. The
authorities are:
A-All
R-Read
C-Create
S-Sec
D-Delete
T-Utime
J-Join
U-Update
M-Chmod V-Rename
N or nothing-None W-Write
O-Chown X-Execute
P-Password Y-Modify
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names, each of which can be followed by the access
authority in parentheses. Each must be separated from the next name (if
any) by a comma.
Access list
A list of accessors and their access authority to the resource. The
authorities are:
N or nothing-None
R-Read
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
220 User Guide
The eTrust AC Classes
Host (HOST Class)
The HOST class defines access rules that govern the access other stations
(hosts) have to the local host when they are using Internet communication.
Records in the HOST class represent these “clients” of the local host. For each
client (HOST record), a property lists the service rules that govern the services
the local host may provide to the client.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Group Membership
A list of GHOST records (groups of hosts) in which the HOST is a member.
The name of one or more GHOST records
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Resource Properties 221
The eTrust AC Classes
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Internet Access list
A list of TCP services and the permitted access to them (R or none) from
this resource
[for example, telnet(R), talk, ftp(N)].
Talk is the default access.
The list may be empty.
TCP service names and their access
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
222 User Guide
The eTrust AC Classes
Host Groups (GHOST Class)
Each record in the class defines a group of hosts. Grouping is accomplished by
explicitly connecting hosts (records of the HOST class) to the GHOST record.
GHOST records define access rules that govern the access other stations
(hosts) that belong to the group of hosts have to the local host when they are
using internet communication. For each client group (GHOST record), a
property lists the service rules that govern the services the local host can
provide to hosts belonging to the client group.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Members
A list of hosts that are members of the group. The list may be empty.
One or more names, separated by a comma. No spaces are allowed.
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Resource Properties 223
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Internet Access list
A list of TCP services and the permitted access to them (R or none) from
this resource
[for example, telnet(R), talk, ftp(N)].
Talk has the default access.
The list may be empty.
TCP service names and their access
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
224 User Guide
The eTrust AC Classes
Host Network (HOSTNET Class)
Each record in the HOSTNET class defines a group consisting of all hosts on a
particular network. HOSTNET records define access rules that govern the
access other stations (hosts) on the specific network have to the local host
when they are using Internet communication. The key of each HOSTNET
record consists of mask and match values for the IP address. For each group
of clients (HOSTNET record), a property lists the service rules that govern the
services the local host may provide to the clients.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Resource Properties 225
The eTrust AC Classes
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Internet Access list
A list of TCP services and the permitted access to them (R or none) from
this resource,
[for example, telnet(R), talk, ftp(N)].
Talk has the default access.
The list may be empty.
TCP service names and their access
IP Match
When a bitwise AND is performed on the mask and the inet address of a
host, and the result equals match, the host is a member of the HOSTNET
record. For example, specifying mask(255.0.255.0) and
match(192.0.133.0) includes all hosts with inet addresses of the format
192.anything.133.anything.
Each, four numbers separated by periods (.)
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
226 User Guide
The eTrust AC Classes
Host Protection by Name Pattern (HOSTNP Class)
The term HOSTNP (HOST Name Pattern) refers to a group of hosts that have
similar host names. HOSTNP records define access rules that govern the
access other stations (hosts) that match the record's name pattern have to the
local host when they are using Internet communication. In each mask
(HOSTNP record), a property lists the service rules that govern the services
the local host may provide to the group of clients.
The key of the HOSTNP class record is the name pattern identifying the hosts
that are protected by the HOSTNP record.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Resource Properties 227
The eTrust AC Classes
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Internet Access list
A list of TCP services and the permitted access to them (R or none) from
this resource
[for example, telnet(R), talk, ftp(N)].
Talk has the default access.
The list may be empty.
TCP service names and their access
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
228 User Guide
The eTrust AC Classes
Login by Terminal (TERMINAL Class)
The TERMINAL class defines records that represent the terminals of the local
host, another host on the network, or X-Terminals from which a user can log
into the system. Terminals are checked during user login. Users can log in
from a terminal only if they have been authorized to use the terminal.
The key of the TERMINAL record is the name of the terminal. This name
identifies the terminal to eTrust AC.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Group Membership
A list of terminal groups in which the terminal is a member.
The name of one or more GTERMINALs in the database
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
terminal is used.
Alphanumeric, 30 characters
Resource Properties 229
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection.
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Seclevel
The security level (1 - 255) assigned to the terminal, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the terminal.
The name of a security label in the database, or none
Categories
A list of categories assigned to the terminal.
One or more categories in the database, or none
Default Access
The permitted access for users who are not covered in the access listR (Read; log in by the terminal),
W (Write; edit the eTrust AC database), or neither.
R (Read), W (Write), or neither
230 User Guide
The eTrust AC Classes
Access list
A list of accessors and their access authority by this terminal. The
authorities are:
A-All
N or nothing-None
R-Read; log in from the terminal
W-Write; edit the eTrust AC database
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Resource Properties 231
The eTrust AC Classes
Monitored Files (SECFILE Class)
Each record of the SECFILE class contains the name of a file that is protected
by the seoswd program-the eTrust AC Watchdog daemon.
By scanning these files and ensuring that the information known about them is
still accurate, the eTrust AC Watchdog ensures that unauthorized users have
not changed the files.
The key of the SECFILE class record is the name of the file that the SECFILE
record protects. Specify the full path.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
232 User Guide
The eTrust AC Classes
Outgoing Connections by Host (CONNECT Class)
eTrust AC provides protection for outgoing TCP connections. Each record in the
CONNECT class represents a target of the connection-a remote host
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Default Access
The permitted access for users who are not covered in the access list: R
(Read) or none. Select None if there is no default access to the record.
Read or nothing
Access list
A list of accessors and their access authority to this resource. The
authorities are:
N or nothing-None
R-Read
For example, click Add to add users. Once you have added accessors, click
permissions beside them. A check mark appears to indicate permissions
chosen.
Any user or group names, for each of which access authority is selected by
clicking appropriate buttons.
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Notify
The email address or alias of the person who is to be notified when the
resource is accessed.
Alphanumeric, 30 characters
Resource Properties 233
The eTrust AC Classes
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button to receive a
list of all the existing categories.
One or more categories in the database, or none
Creation Time
The date and time on which the record was created. This property is
shown only when updating a record.
Read-only field
Update Time
The date on which the record was updated. This property is shown only
when updating a record.
Read-only field
Updated by
The user name of whomever updated the record. This property is shown
only when updating a record.
Read-only field
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
234 User Guide
The eTrust AC Classes
Seclevel
The security level (1 - 255) assigned to the resource, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the resource. Type in the name of a
seclabel, or click the Browse button to receive a list of all the existing
seclabels.
The name of a security label in the database, or none
Resource Properties 235
The eTrust AC Classes
Process (PROCESS Class)
The PROCESS class defines programs-executable binaries running in their own
address space-that must be protected from being killed. Major daemons and
database servers are examples of the type of programs that require such
protection because these processes are the main targets for service denial
attacks.
The key of the PROCESS class record is the name of the program the record
protects. Specify the full path.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
process is accessed.
Alphanumeric, 30 characters
236 User Guide
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Seclevel
The security level (1 - 255) assigned to the process, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the process.
The name of a security label in the database, or none
Categories
A list of categories assigned to the process.
One or more categories in the database, or none
Default Access
The permitted access for users who are not covered in the access list:
R (Read) or none.
Read or nothing
Resource Properties 237
The eTrust AC Classes
Access list
A list of accessors and their access authority to this resource. The
authorities are:
A-All
N or nothing-None
R-Read
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
238 User Guide
The eTrust AC Classes
Security Labels (SECLABEL Class)
Each SECLABEL record defines a security label. A security label is like a
variable that has a security level as its value.
When security level checking is enabled, eTrust AC performs security level
checking in addition to its other authorization checking. A security level is an
integer between 1 and 255 that can be assigned to users and resources. When
a user requests access to a resource that has a security level assigned to it,
eTrust AC compares the security level of the resource with the security level of
the user. If the user's security level is equal to or greater than the security
level of the resource, eTrust AC continues with other authorization checking;
otherwise, the user is denied access to the resource.
To protect a resource by security level checking, assign a security level to the
resource's record.
To allow a user access to resources protected by security level checking,
assign a security level to the user's record.
If the SECLABEL class is active, eTrust AC uses the security level associated
with the security labels of the resource and user; the security level that is
explicitly set in the resource and user records is ignored. The key of the
SECLABEL class record is the name of the security label. This name is used to
identify the security label when assigning it to a user or resource.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Resource Properties 239
The eTrust AC Classes
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
level
The security level (1 - 255) assigned to the security label, or 0. The
number 0 means that no security level is assigned.
Integer between
0 and 255, inclusive.
Default = 0
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button to receive a
list of all the existing categories.
The name of one or more categories in the database
240 User Guide
The eTrust AC Classes
Security Categories (CATEGORY Class)
Each record of the CATEGORY class defines a security category. When the user
requests access to a resource that has been assigned one or more security
categories, eTrust AC compares the list of security categories in the user's
record with the list of security categories in the resource record. If eTrust AC
finds any security category in the resource record that is not in the user's
record, eTrust AC denies access to the resource. If the user's record contains
all the security categories specified in the resource record, eTrust AC continues
with other authorization checking.
Each security category defined to eTrust AC is represented by a record in the
CATEGORY class.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
The date on which the record was created. This property is shown only
when updating a record.
Read-only field
Update Time
The date on which the record was updated. This property is shown only
when updating a record.
Read-only field
Updated by
The user name of whomever updated the record. This property is shown
only when updating a record.
Read-only field
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Resource Properties 241
The eTrust AC Classes
SUID/SGID Programs (PROGRAM Class)
The PROGRAM class defines programs that are considered part of the trusted
computing base. The eTrust AC Watchdog monitors programs in the PROGRAM
class to ensure that they are not modified.
Each PROGRAM record contains several properties that define information
about the trusted program's file. The eTrust AC daemons check whether these
values change. If the values change, the program is marked untrusted.
The key of the PROGRAM class record is the file name of the program the
record protects. Specify the full path of the file.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Untrust
Whether the program has become untrusted. If the program is untrusted,
it is being prevented from running because some change has been
detected.
Yes or no
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
242 User Guide
The eTrust AC Classes
Notify
The email address or alias of the person who is to be notified when the
program is accessed.
Alphanumeric, 30 characters
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Seclevel
The security level (1 - 255) assigned to the program, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the program.
The name of a security label in the database, or none
Categories
A list of categories assigned to the program.
One or more categories in the database, or none
Resource Properties 243
The eTrust AC Classes
Default Access
The permitted access for users who are not covered in the access list:
x (Execute) or none.
Execute or nothing
Access list
A list of accessors and their access authority to this resource. The
authorities are:
A-All
N or nothing-None
X-Execute
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
244 User Guide
The eTrust AC Classes
Tasks (SUDO Class)
Each record in the SUDO class defines a command that the SuperUser-Do
utility allows a user to perform or prevents a user from executing.
Command
The command to be executed by root.
Up to 255 alphanumeric characters. For format, see the sesudo utility in
the Utilities Guide.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
resource is accessed.
Alphanumeric, 30 characters
Resource Properties 245
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
level
The security level (1 - 255) assigned to the resource, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the resource. Type in the name of a
seclabel, or click the Browse button to receive a list of all the existing
seclabels.
The name of a security label in the database, or none
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button to receive a
list of all the existing categories.
One or more categories in the database, or none
Default Access
The permitted access for users who are not covered in the access list:
x or none.
Execute or nothing
246 User Guide
The eTrust AC Classes
Access list
A list of accessors and their access authority to this resource. The
authorities are:
A-All
N or nothing-None
x-Execute
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
Resource Properties 247
The eTrust AC Classes
Task Groups (GSUDO Class)
The GSUDO class defines groups of actions that the Surrogate-Do utility may
let a user execute or prevent a user from executing. A SUDO record must
already define each action. If there are several actions that you want to treat
similarly, handling them all in a single GSUDO record is more economical and
less error-prone than handling each of them in its individual SUDO record. A
single access rule can make the whole group of actions available or
unavailable to a particular user or group of users.
Command
The command to be executed by root.
Up to 255 alphanumeric characters. For format, see the sesudo utility in
the Utilities Guide.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
resource is accessed.
Alphanumeric, 30 characters
248 User Guide
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
level
The security level (1 - 255) assigned to the resource, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the resource. Type in the name of a
seclabel, or click the Browse button to receive a list of all the existing
seclabels.
The name of a security label in the database, or none
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button to receive a
list of all the existing categories.
One or more categories in the database, or none
Default Access
The permitted access for a new GSUDO record. Select Execute if any user
who accesses the script can execute changes in it. Select None if there is
no default access to the record.
Execute or nothing
Resource Properties 249
The eTrust AC Classes
Access list
A list of accessors and their access authority to this resource. The
authorities are:
A-All
N or nothing-None
E-Execute
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
250 User Guide
The eTrust AC Classes
TCP Protection (TCP Class)
The TCP class defines records that represent individual TCP/IP services, such
as mail, ftp, and http. Each record's ACL can specify access types not only for
individual hosts that may request the service, but also for host groups
(GHOSTs), networks (HOSTNETs), and sets of hosts defined by a name pattern
(HOSTNPs).
If the HOST class is active (that is, used as a criterion for access), the TCP
class cannot effectively be active.
The key of the TCP record is the name representing the service.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
service is used.
Alphanumeric, 30 characters
Resource Properties 251
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Default Access
The permitted access for hosts who are not covered in the access list:
Incoming connection (Read), Outgoing connection (Write) or nothing.
W-Write-for outgoing connection
N or nothing-None
R-Read-for incoming connection
Read, Write, or nothing
Access list (ACL)
A list of accessors and their access authority to this resource. Accessors
can be hosts, host groups, networks, or host name patterns. The
authorities are:
A-All
N or nothing-None
R-Read-for incoming connection
A and R are synonymous for this resource.
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Zero or more host names, host group names, network names, or host
name patterns
252 User Guide
The eTrust AC Classes
Negative Access List (NACL)
A list of accessors that have do not have authority to access this resource.
Accessors can be hosts, host groups, networks, or host name patterns.
The authorities are:
A-All
N or nothing-None
R-Read-for incoming connection
A and R are synonymous for this resource.
Zero or more host names, host group names, network names, or host
name patterns
PACL
A list of accessors and their access authority to this resource. Accessors
can be hosts, host groups, networks, or host name patterns. The
authorities are:
N or nothing-None
R-Write-for outgoing connection
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Zero or more host names, host group names, network names, or host
name patterns
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Resource Properties 253
The eTrust AC Classes
Terminal Groups (GTERMINAL Class)
The GTERMINAL class defines groups of terminals. Such groups help you
economize on access. You can specify an access rule (a permission or
prohibition) for a group of terminals by a single command, rather than having
to specify the same access rule for each terminal. Similarly, a rule regarding a
group of terminals can be applied by a single command to a group of users.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Members
A list of terminals that are members of the group. The list may be empty.
One or more names, separated by commas. No spaces are allowed.
Access list
A list of accessors and their access authority to this resource. The
authorities are:
A-All
N or nothing-None
R-Read; log into the terminal
W-Write; edit the terminal's eTrust AC database
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names, each of which can be followed by the access
authority in parentheses. Each must be separated from the next name (if
any) by a comma or space.
254 User Guide
The eTrust AC Classes
The access authority can be written in full, or its abbreviation can be used.
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Default Access
The access to the resource for defined accessors that are not covered by
explicit rules: R (Read), W (Write), both, or none.
R, W, both, or neither.
Resource Properties 255
The eTrust AC Classes
User ID Substitution (SURROGATE Class)
Records of the SURROGATE class define restrictions that protect a user from
other users when they make su (substitute UID) requests. eTrust AC treats the
surrogate request as an abstract resource that can be accessed only by
authorized users.
A record in the SURROGATE class represents every user or group of users that
requires surrogate protection.
Owner
The eTrust AC user or group that is the owner of the record. You can click
the Browse button to receive a list of all the users.
Any user or group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Updated by
Name of user who last updated the resource's record. This property is
shown only when updating a record.
Read-only field
Audit Mode
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
N-No operations
Success or Failed, both, or None
Notify
The email address or alias of the person who is to be notified when the
resource is accessed.
Alphanumeric, 30 characters
256 User Guide
The eTrust AC Classes
Warning
Whether to enable warning mode. In warning mode, all access requests
are granted but if an access request normally would have been denied, a
record is written to the audit log.
Yes or no
Allowed Days
The days on which the resource can be accessed. Select the boxes
representing each day to allow access to the resource on those days. To
select all seven days of the week, click Anyday. To select Monday through
Friday, click Weekdays.
To clear your selection for all the days, select Reset.
Any selection
Allowed Time
The time period during which accessors can access the resource on the
specified days. Drag the Start and End sliders to the required setting. By
default, if you set Allowed Time without setting Allowed Days, access is set
for all seven days a week for the times specified.
Any time range, specified by 24-hour slider
Seclevel
The security level (1 - 255) assigned to the resource, or 0. The number 0
means that the accessor's security level will not be checked.
Integer between
0 and 255, inclusive.
Default = 0
Seclabel
The security label assigned to the resource. Type in the name of a
seclabel, or click the Browse button to receive a list of all the existing
seclabels.
The name of a security label in the database, or none.
Categories
A list of categories assigned to the resource. Type in the name or names of
a category, separated by commas, or click the Browse button to receive a
list of all the existing categories.
One or more categories in the database, or none.
Default Access
The permitted access for users who are not covered in the access list:
R or none.
Read or nothing
Resource Properties 257
The UNIX Classes
Access list
A list of accessors and their access authority to this resource. The
authorities are:
A-All
N or nothing-None
R-Read
For example, click Add to add a user. Once you have added accessors,
click permissions beside them. A check mark appears to indicate
permissions chosen.
Any user or group names
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
The UNIX Classes
This section details the UNIX classes and their properties.
UNIX FILE Class
Each object in this class defines a file to UNIX. The key of the FILE record is
the file name, without the directory. You can set the following properties when
updating file properties:
Owner
The eTrust AC user that is the owner of the record. You can click the
Browse button to receive a list of all the users.
Any user name in the database
Group
The eTrust AC group that is the owner of the record. You can click the
Browse button to receive a list of all the groups.
Any group name in the database
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
258 User Guide
The UNIX Classes
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
Last Accessed
Time of last update. This property is shown only when updating a record.
Read-only field
Default Access
The permitted access for users who are not covered in the access list:
R (Read), W (Write, edit the eTrust AC database), or E (Execute). Select
Set UID/GID to identify the files as programs that reset the user or
groupID. If Set UID/GID is selected, accessors who attempt to execute the
program are monitored.
R (Read), W (Write), or Execute
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Modification Time
The date and time the file was last modified.
Read-only field
Directory
Whether the file is a directory.
Read-only field
Device
The device ID for where the file is located.
Read-only field
Inode
The file's inode. The inode is the address of a program.
Read-only field
Size (in bytes)
The size of the file, in bytes.
Read-only field
Link Name
If the file is a symbolic link, the name of the other file to which the
record's file is linked.
Read-only field
Resource Properties 259
Windows Classes
Windows Classes
This section details the Windows classes and their properties.
NT FILE Class
Each object in the NT FILE class defines the access allowed to a file or
directory. You can set the following properties when updating file properties:
Owner
A user or group entitled to edit the record. You can click the Browse button
to receive a list of predefined owners.
Any user or group name in the database
Group
The name of the group that has access to the file. To receive a list of
predefined groups, click the Browse button.
Any group name in the database
File Attributes
The attributes of the file.
Archive-The file is an archival file. Applications use this value to mark files
for backup or removal.
Hidden-The file is hidden. It is not included in an ordinary directory
listing.
Normal-The file has no other attributes. This value is valid only if used by
itself.
Read-Only-The file is a read-only file. Applications can read the file, but
cannot write in it or delete it.
System-The file is part of the operating system or is used exclusively by
the operating system.
Temporary-The file is being used for temporary storage.
Archive, Hidden, Normal, Read-Only, System, or Temporary
Creation Time
Date when record was created. This property is shown only when updating
a record.
Read-only field
Update Time
Date of last update. This property is shown only when updating a record.
Read-only field
260 User Guide
Windows Classes
Last Accessed
Time of last update. This property is shown only when updating a record.
Read-only field
Default Access
A list of accessors, each with its access authority to the NT FILE. If the file
is a directory, a Directory tab and a File tab appear at the bottom of the
list of accessors. Select Directory if you want the access rights to apply to
the directory only. Select File if you want the access rights to apply to all
the files that are created in this directory.
Click beside the names of the accessors under the appropriate authority to
enable or remove the access right from the accessor. Or click the Add
button to give one or more existing users or groups access to the NT FILE
record. Click the Edit button to change the access rights of the accessors.
Click the Delete button to remove the access rights of the users and
groups.
Any user or group names
Auditing
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
Success or Failed or none.
Is Directory
A flag that indicates Yes if the file is a directory; or No if not.
Yes or no
Device
The device ID for where the file is located.
Read-only field
File Index
A unique identifier. The file index is used to establish the identity of an
open file.
Read-only field
Resource Properties 261
Windows Classes
File Size (in bytes)
The size of the file, in bytes.
Read-only field
Number of Links
If the file is a symbolic link, the number of links that are contained in the
file.
Read-only field
NT-PRINT Class
The NT PRINT class defines printers. Each record contains a set of properties
that defines the printer.
The following properties can be set when updating print properties:
Owner
A user or group entitled to edit the record. You can click the Browse button
to receive a list of predefined owners.
Any user or group name in the database
Group
The name of the group that has access to the file. To receive a list of
predefined groups, click the Browse button.
Any group name in the database
Comment
Any data useful for your site, or you can leave the field blank.
Alphanumeric, 255 characters
Access List
A list of accessors, each with its access authority to the NT PRINTER. Click
the Add button to give one or more existing users or groups access. Click
the Edit button to change the access rights. Click the Delete button to
remove access rights.
Any user or group names
Auditing
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
Success or Failed or none
262 User Guide
Windows Classes
Printer Name
The name of the PRINTER.
Location
The physical location of the printer.
Read-only field
Server Name
The server that controls the printer
Read-only field
Share Name
The share name of an outside computer. The outside computer is known
inside the network by this name.
Read-only field
NT-COM Class
The COM class defines a serial communication port, represented by Com1:,
Com2:, and so on. A serial communication port is a hardware interface used
mostly by computer modems.
The following properties can be set when updating COM properties:
Owner
A user or group entitled to edit the record. You can click the Browse button
to receive a list of predefined owners.
Any user or group name in the database
Access List
A list of accessors, each with its access authority to the COM record. Click
the Add button to give one or more existing users or groups access. Click
the Edit button to change the access rights. Click the Delete button to
remove access rights.
Any user or group names
Auditing
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
Success or Failed or none
Resource Properties 263
Windows Classes
User ID
If a user is the owner of the serial communication port, UID specifies the
name of the owner.
Any user or group name in the database
Group Id
If a group is the owner of the serial communication port, GID specifies the
name of the owner.
Any user or group name in the database
Device
Security data for the COM class is stored in the Device section.
Read-only field
NT-SHARE Class
Each object in the SHARE class defines directories that are shared with
external computers and users-other computers and users can access the
shared directories.
You can set the following properties when updating file properties:
Owner
A user or group entitled to edit the record. You can click the Browse button
to receive a list of predefined owners.
Any user or group name in the database
Auditing
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
Success or Failed or none
Access List
A list of accessors, each with its access authority to the NT SHARE. Click
the Add button to give one or more existing users or groups access. Click
the Edit button to change the access rights. Click the Delete button to
remove access rights.
Any user or group names
264 User Guide
Windows Classes
Path
The directory where the share name is located.
Valid directory
Comment
A brief description of the SHARE record.
Alphanumeric, 255 characters
Max Connections
The maximum number of connections (users accessing a SHARE record) at
any given time.
Numeric
Name
The share name of a resource. A share name is the name by which an
outside computer is known inside the network.
Host name
Type
The different types of the class SHARE.
PRINTQ, DISKTREE, DEVICE, and IPC
Number of Connections
The number of connections (users accessing a SHARE record) at any given
time.
Numeric
Available Permissions
The access permissions that you can give to the accessors, as listed below.
The following lists the permissions that are available:
ACCESS_ALL
Permission to read, write, create, execute, and delete resources, and to
modify their attributes and permissions.
ACCESS_ATTRIB
Permission to modify the resource's attributes; for example, the date and
time when a file was last updated.
ACCESS_CREATE
Permission to create a resource (such as a file). Data can be written to the
resource while it is being created.
ACCESS_DELETE
Permission to delete the resource.
Resource Properties 265
Windows Classes
ACCESS_EXEC
Permission to execute the resource (such as a PROGRAM record).
ACCESS_PERM
Permission to modify the permissions (read, write, create, execute, and
delete) assigned to a user or an application for a resource.
ACCESS_READ
Permission to read data from a resource and, by default, to execute the
resource.
ACCESS_WRITE
Permission to write data to the resource.
NT-REGKEY and NT-REGVAL Class
The REGKEY class defines the tree-like structure of keys (like directories)
where Windows configurations and information is saved. The REGKEY section
also contains records in the REGVAL class. The REGVAL class defines the files
within the directories where the configuration values are stored.
The following properties can be set when updating REGKEY or REGVAL
properties:
Owner
An owner of the registry key. You can click the Browse button to receive a
list of predefined owners.
Any user or group name in the database
Default Access
Whether the REGKEY record has default access or not.
None-users not on record's eTrust AC list do not have access to record.
Deselect None-users not on list have default access to the record.
Any selection. Selecting nothing means default access is none.
Auditing
What should trigger creation of audit records:
S-Successful operations
F-Failed operations
Success or Failed or none
266 User Guide
Windows Classes
Access List
A list of accessors, each with access authority to the REGKEY record. Click
the Add button to give one or more existing users or groups access. Click
the Edit button to change the access rights. Click the Delete button to
remove access rights.
Any user or group names
SUBKEY
The first subdirectory on the next level under the REGKEY registry. At
bottom of list of accessors, click SUBKEY to give users and group access
rights to SUBKEY.
Any user or group names
KEY
The first file on the next level under the REGKEY registry. At bottom of list
of accessors, click KEY to give users and group access rights to SUBKEY.
Any user or group names
Value Name
The type of REGVAL record:
String-Registry values are strings.
Dword-Registry values are decimal or hexadecimal integer.
Binary-Registry values are string, number, or range of hexadecimal
number.
Numeric or string
Value Data
The data corresponding to the value name (type) of REGVAL record, as
shown in the next table.
For REGVAL
Value name... Value data is...
Description
String
String
String
Dword
Integer. Select form in Base
section before entering the value
data.
Hexadecimal or decimal
Resource Properties 267
Windows Classes
For REGVAL
Value name... Value data is...
Binary
268 User Guide
Description
Hexadecimal or decimal
Integer. First column is offset
integer and is read-only. Second
column is actual value of the
binary REGVAL. This can be
entered as a number, string, or
range of hexadecimal numbers.
Separate hexadecimal strings and
numbers by spaces or commas.
Appendix C: seam.ini and UNIX Exits
This section contains the following topics:
The Security Administrator Configuration File (see page 269)
UNIX Exits (see page 277)
The Security Administrator Configuration File
Note: A convenient way to edit much of the Security Administrator
configuration file is the Pref command on the Options menu of the Main
window.
Security Administrator takes its default settings from a configuration file called
seam.ini. During the process of Security Administrator installation, the location
of the seam.ini file is automatically recorded in the eTrust AC configuration
file, seos.ini. Thereafter, Security Administrator relies on the seos.ini file for
the location of the seam.ini file. Specifically, the Data token in the [seam]
section of the seos.ini file specifies the location of the seam.ini file. For
example:
[seam]
data = /opt/CA/eTrustAccessControl/data/seam
Among the specifications in the seam.ini file are the names and locations of
various files used by Security Administrator. Some of the files can be
customized; whereas others should not be touched. All the default values allow
normal behavior of Security Administrator after installation, so that you do not
need to modify any of the files unless you want to.
The seam.ini file is divided into sections, and each section contains one or
more tokens and their settings. The structure of the file consists of section
names enclosed in square brackets and followed, on separate lines, by tokens;
the tokens are separated from their values by the = signs:
[section-name]
token1 = value1
token2 = value2
The remainder of this section describes the tokens.
seam.ini and UNIX Exits 269
The Security Administrator Configuration File
[master_db] Section
db = database-name
database-name specifies the default database for eTrust AC in Security
Administrator. The database is the source of information for the objects
(users, groups, and resources) defined in the eTrust AC environment in
Security Administrator.
It can be a host name or the name of a PMDB. A PMDB is a database that
applies to more than one host; for details, see the Administrator Guide.
unix = host-name
host-name specifies the default database for UNIX in Security
Administrator. The database is the source of information for the objects
(users, groups, and resources) defined in the UNIX environment in
Security Administrator.
It can be a host name or the name of a PMDB.
nt = host-name
host-name specifies the default database for Windows in Security
Administrator. The database is the source of information for the objects
(users, groups, and resources) defined in the Windows environment in
Security Administrator.
It can be a host name or the name of a PMDB.
pmd = master-pmdb[,master-pmdb[,...]]
master-pmdb specifies the master PMDB you want to administer from
Security Administrator. You can specify more than one master PMDB by
separating them with commas.
270 User Guide
The Security Administrator Configuration File
[transaction] Section
output_dir = directory
directory specifies the directory for Security Administrator's temporary
files. Default is /tmp/seos_trans.
remove_pb_hosts_on_failure = {yes|no}
A yes value means that Security Administrator does not show you any
hosts where your transaction cannot be executed or where your
transaction has no effect. For example, if your transaction is a query for
the status of a user, that user may not exist on every host. In that case,
Security Administrator lists only the hosts where it can get user
information.
A no value means that Security Administrator shows you all hosts
regardless of transaction success or failure. Default is no.
retry_interval = time-in-seconds
time-in-seconds is the minimum number of seconds that Security
Administrator waits before retrying to connect to hosts that could not yet
be reached for transaction execution. Default is 60.
retry_num = how-many
how-many is the number of times that Security Administrator tries to
connect to hosts if it failed to connect to them in its first attempt. Default
is 3.
verify = {yes|no}
A yes value means that Security Administrator waits for you to click Go
before executing a transaction. Default is yes.
A no value means that Security Administrator starts executing a
transaction as soon as you okay the transaction's dialog.
[password] Section
show = {yes|no}
A yes value means that new passwords appear when entered, and you
must type them only once.
A no value means that new passwords are invisible when entered, and you
must type them twice. Default is no.
generator = utility
utility specifies the executable file that runs your password generation
utility. (See The Password Generations Utility in this appendix.) The
default is the random algorithm.
seam.ini and UNIX Exits 271
The Security Administrator Configuration File
[hosts_groups] Section
path = directory
directory specifies the location of the files that describe host groups. Each
file has the same name as a host group and consists of a list of that host
group's members. The default is
/opt/CA/eTrustAccessControl/data/seam/hosts.
[print] Section
command = utility
utility specifies the executable file for printing Security Administrator
transaction output. The default is lp.
[help_ini] Section
path = directory
directory specifies the location of the Security Administrator help files,
which contain the information that the HELP button invokes. The default is
/opt/CA/eTrustAccessControl/ data/seam/help. You should not alter the
help files.
[messages] Section
msg_file = filename
filename specifies the Security Administrator message file, which contains
Security Administrator's error messages, warning messages, and
confirmation messages. The default is
/opt/CA/eTrustAccessControl/data/seam/ seam_errors.msg. You should
not alter the message file.
272 User Guide
The Security Administrator Configuration File
[defaults] Section
delete_homedir = {yes|no}
A yes value means that when you use Security Administrator to delete a
user from the UNIX environment, the user's home directory is deleted.
Security Administrator relies on eTrust AC UNIX exit scripts to erase the
home directory. When eTrust AC is installed, the scripts that delete the
home directory are installed automatically and registered as UNIX exits.
A no value means that the user's home directory remains even when you
use Security Administrator to delete the user from the UNIX environment.
Default is no.
group = filename
filename specifies the group configuration file, which contains default
settings for new groups. (In the context of Security Administrator, the
word group, unless otherwise clarified by its context, refers to a group of
users.) To specify the default settings, you use the property editor (see
Modifying Group Properties in the chapter “Account Administration”) rather
than directly editing the group configuration file.
user = filename
filename specifies the user configuration file, which contains default
settings for new users. To specify the default settings, you use the
property editor (see Modifying User Properties in the chapter “Account
Administration”) rather than directly editing the user configuration file.
seam.ini and UNIX Exits 273
The Security Administrator Configuration File
[user fields] Section
For users, only you can replace the property editor Comment field with one or
more fields of your own. Your fields appear at the end of the property editor
eTrust section.
To specify fields to replace the Comment field for users, add the section
header [user fields] at the end of the seam.ini file and follow it with one or
more lines in this format:
fieldname=(MaxLength=length, Format='formatstring')
where:
fieldname
Specifies your chosen name for the field.
length
Specifies the maximum number of characters you allow in the field. All
your maximum lengths together must not total more than 255.
formatstring
Specifies an optional string in which each character dictates the format of
the corresponding character in the user field value. When used in
formatstring:
„
d permits any digit
„
a permits any alphanumeric character
„
l permits any letter
„
* permits any character
The following characters are literal, permitting only themselves:
- (hyphen)
: (colon)
; (semicolon)
, (comma)
. (period)
(blank-space)
The string is enclosed in single quotes.
Example
For example, the following section calls for a field named SSN that consists of
nine digits, hyphenated after the third and fifth digits, and a field called
Contact that has up to 20 characters in no particular format.
[user fields]
SSN=(MaxLength=11, Format='ddd-dd-dddd')
Contact=(MaxLength=20)
274 User Guide
The Security Administrator Configuration File
If your seam.ini file contains an erroneous user-fields section, the property
editor retains its Comment field instead of your user fields.
[others] Section
read_usr_appl = script-name
script-name is the UNIX exit (see page 277) utility that Security
Administrator uses to extract a user's APPL data.
read_grp_appl = script-name
script-name is the UNIX exit (see page 277) utility that Security
Administrator uses to extract a group's APPL data.
max_items_to_copy = how-many
how-many is the maximum number of users, groups, and resources you
can copy from host to host at one time.
Note: Copying may take a while. Security Administrator is suspended until the
transaction is finished in all the selected environments.
[synchronize] Section
sync_mode = {y|n}
A yes value means that you specify Synchronize mode. If you give a value
to a property in one environment (eTrust AC or UNIX), the value is
automatically copied to the other environments if a corresponding property
exists there.
In the Create, Edit, and Update property editors, the value for a property
that appears in more than one section of the property editor is
automatically copied from one section to the others.
Corresponding properties do not necessarily have exactly the same name
on screen. To find corresponding properties, use the tables in the appendix
“Resource Properties,” or consult the defaults.usr and defaults.grp files in
eTrustACDir/data/seam/defaults.
A no value means that no property value in any environment affects the
values in any other environment. The default is no.
[bin] Section
path = directory
directory specifies the directory where the Security Administrator is
installed. It must not be changed. The default is
/opt/CA/eTrustAccessControl/bin.
seam.ini and UNIX Exits 275
The Security Administrator Configuration File
Security Administrator Command Line Options
Security Administrator has several command line options, which are used to
determine colors, width, and so on as follows.
„
To start Security Administrator without the initial progress indicator
window, use the -nologo flag:
eTrustACDir/bin/seam -nologo
„
To size the Security Administrator Main window differently, change the
setting with the -geometry flag:
eTrustACDir/bin/seam -geometry WidthxHeight
where:
eTrustACDir
Specifies the directory where you installed eTrust AC.
Width
Specifies the desired width, in points.
Height
Specifies the desired height, in points.
Note: An x must separate the Width and Height parameters.
276 User Guide
UNIX Exits
The Password Generation Utility
You can write a password generation utility of your own, as a script or any
other type of executable. Write it according to the following rules, reference it
in the [password] section of your seam.ini file, and when Security
Administrator is called upon to generate a password, it will use your utility.
Otherwise, passwords are generated with the help of the default random
algorithm.
If you write a password generation utility, observe the following rules.
„
The utility must have these four parameters:
host_name
The name of the host where the user is defined.
user_name
The name of the user.
full_user_name
The value of the user's Full User Name property in the eTrust
environment.
comment
The value of the user's Comment property in the eTrust environment.
If you replaced the comment with user fields (see [user fields] Section
in this appendix), then this is the concatenated value of those fields.
„
The utility must print the generated password to standard output.
„
If any error occurs while the password is being generated, the utility must
print an error message to standard output, and the string ERROR: must
appear as the start of the error message.
The eTrustACDir/samples directory includes an example of a
password-generating script, SeamGenPasswd.sh.
UNIX Exits
As Security Administrator runs, it can trigger shell scripts or executables of
your own, called UNIX exits. For example, you can perform an initialization
process for each new user that is added, or you may want to perform some
extra logging or screening of commands before they are executed.
Note: For more information about how to run UNIX exits, see the
Administrator Guide.
seam.ini and UNIX Exits 277
UNIX Exits
Passing Arguments to UNIX Exits
Your exits can take advantage not only of all standard eTrust AC data, such as
names and permissions, but also of additional information that you provide
especially for exit-time use. For example, you may want to receive more
information about a user's job description than that provided by standard
eTrust AC properties.
To define such extra properties:
1.
Create a new text file in the eTrustACDir/data/seam/appl directory. The
file is for storing names and default values of your extra properties. Give it
an appropriate name.
If you will be using many extra properties and you find it convenient to
group them into categories, you can use this first file for one category and
then repeat the procedure for other categories. Give each file a name that
describes its category. Security Administrator will repeat the file names as
category names in the property editor.
(The property editor is the set of dialogs where you create or change
values for record properties. The information for use by exits appears in a
special section of the dialog, the APPL section.)
2.
In the text file, begin each line with the name of a property. After the
property, type a space and the default value for the property if you want it
to have a default value. For example:
calendar_file my_dates
3.
Save the text file. Create further text files in the same directory, for
further categories of properties, if you want.
4.
If you want the APPL section of the property editor to include the actual
values for your extra properties when you invoke the property editor to
update a user or group, you must define a script to extract the properties
in the [others] section of seam.ini. An example of how to define a script to
extract the property values for users is:
read_usr_appl =
/opt/CA/eTrustAccessControl/data/seam/scripts/read_usr_appl.sh
If you do not define a script to extract the properties of users or groups,
only default values appear in the APPL section of the property editor when
you update a user.
5.
As you use Security Administrator and your pre-update and post-update
exits are automatically invoked, the current values of your extra properties
will be passed to the exit programs. The invocation of exits depends on the
seos.ini file. For more information about how to specify which exit
programs to run, see the chapter “UNIX Exits” in the Administrator Guide.
If you want the values to remain available later, it is up to the exit
program to save them, as described in Preserving the Values Passed to
UNIX Exits in this appendix.
278 User Guide
UNIX Exits
Preserving the Values Passed to UNIX Exits
When you use the APPL section of the property editor to pass extra user or
group data to an exit program, Security Administrator does not save the data.
It is the responsibility of the exit programs to save the data, if you want the
data saved.
Saving
The exit receives the APPL data as a parameter from Security Administrator.
The parameter's syntax is:
APPL=Section1(Field1a=Value1a Field1b=Value1b ... ) \
Section2(Field2a=Value2a Field2b=Value2b ... ) \
...
For example:
APPL=Directories(pgms=programs arcv=archives)
\
Files(cal=calendar tel=phones hrs=hours)
At the host where the user or group is defined, the pre-update exit can save
the APPL data in a temporary file. Then the post-update exit can save it at the
local NIS server, for example.
Then to reload the data into Security Administrator when next the user or
group appears in the property editor, you need a utility of your own: a
user-written script or an executable program.
seam.ini and UNIX Exits 279
UNIX Exits
Reloading
The utility for reloading data into the property editor must accept the following
input parameters from Security Administrator.
host_name
The name of Security Administrator's current source host. If the current
source is a PMDB, then host_name is the name of the host that governs
the PMDB.
object_class
USER or GROUP
object_name
The name of the user or group.
The utility must print the extracted data to the standard output in the
following format.
.section1
field1a value1a
field1b value1b
...
.section2
field2a value2a
field2b value2b
...
As you use this format:
„
Divide the output into sections, one section for each of the
eTrustACDir/data/seam/appl/* files containing your data.
„
For the first line of each section, write a dot (.) followed by the file name
from the appl directory.
„
For the remainder of each section, use lines each of which consist of a field
name, a blank, and the value for the field.
Do not use blanks in the field value. (You can use underscores instead.)
The utility must exit with 0 in the case of success and with any nonzero value
in all other cases.
The error message produced by the utility must be printed not on the
standard error port but, like the extracted data, on the standard output.
You must register the name of the utility in the appropriate field in the Others
section of Security Administrator's Preferences dialog. Then the property editor
will automatically run the utility and retrieve the data.
280 User Guide
Index
A
Access Control List (ACL) • 31
Access Control panel in • 22
ACCESS_ALL • 264
ACCESS_ATTRIB • 264
ACCESS_CREATE • 264
ACCESS_DELETE • 264
ACCESS_EXEC • 264
ACCESS_PERM • 264
ACCESS_READ • 264
ACCESS_WRITE • 264
accessors, definition of • 25
ACL (Access Control List) • 31
Active Directory properties in Windows 2000 •
30
Activity tabbed page of Security Administrator
• 58
Activity window of Security Administrator
about • 61
closing • 63
editing transactions • 71
filtering hosts in • 70
retrying transactions • 77
viewing transaction progress • 68
ADMIN class • 210
ALL host group • 84
audit events • 181
audit log • 155
Audit Record Info dialog • 169
auditing user activities • 27
B
backout commands • 72
C
calendars, specifying access with • 32
CATEGORY class • 241
classes • 209
ADMIN • 210
CATEGORY • 241
COM • 263
CONNECT • 233
DOMAIN • 33
FILE • 213, 258, 260
for • 209
for UNIX • 258
for Windows • 260
GFILE • 216
GHOST • 223
GSUDO • 248
GTERMINAL • 254
HOLIDAY • 218
HOST • 221
HOSTNET • 225
HOSTNP • 227
PRINT • 262
PROCESS • 236
PROGRAM • 242
REGKEY • 266
REGVAL • 266
SECFILE • 232
SECLABEL • 239
SHARE • 264
SPECIALPGM • 34
SUDO • 245
SURROGATE • 256
TCP • 251
TERMINAL • 229
COM class • 263
command log in • 24
commandsSee transactions • 65
configuration file of Security Administrator •
269
CONNECT class • 233
contacting technical support • 3
customer support, contacting • 3
D
database, Policy Model • 34
deleting
groups • 113
users • 102
DOMAIN class • 33
E
executing transactions • 65
exitsSee UNIX exits • 277
Index 281
F
FILE class
FILE class • 213
UNIX • 258
Windows • 260
filtering
groups • 105
hosts • 70
messages • 80
resources • 119
users • 92
for groups • 203
for resources • 209
for users • 193
G
GFILE class • 216
GHOST class • 223
groups
about • 105
Active Directory in Windows 2000 • 30
adding to other environments • 110
adding to resources • 131
adding users to • 29, 111
assigning Windows rights to • 26
copying to another host • 112
creating • 25, 106
creating with templates • 107
deleting • 113
deselecting with wildcards • 108
filtering • 105
groups • 203
modifying • 25, 110
nesting • 29
permissions • 114
properties • 109, 202
refreshing list of • 107
removing users from • 111
selecting with wildcards • 108
synchronizing data with Windows • 30
templates for creating • 107
UNIX properties • 206
Windows properties • 207
GSUDO class • 248
GTERMINAL class • 254
H
HOLIDAY class • 218
282 User Guide
HOST class • 221
host groups
adding hosts to • 85
ALL • 84
creating • 84
deleting • 86
removing hosts from • 86
Host Messages/Commands dialog • 74
HOSTNET class • 225
HOSTNP class • 227
hosts
adding to host groups • 85
copying groups to • 112
copying users to • 101
creating • 87
deleting • 90
deselecting • 88
displaying • 89
filtering • 70
removing from host groups • 86
selecting • 88
source host • 66
updating • 90
J
joinSee users, adding to groups • 111
L
login, restricting • 26
M
Main window of seauditx
about • 157
acknowledgements in audit log • 177, 178
comments in audit log • 174, 178
filtering audit records • 165
minimizing areas of • 164
opening audit log • 167
Options area • 159
printing audit log • 179
Switches area • 158
Text Output area • 160
viewing audit records • 169
Main window of seauditxSee also seauditx •
155
Main window of SecMon
about • 184
Detailed Info area • 188
Text Output area • 186, 190
Main window of SecMonSee also SecMon • 181
Main window of Security Administrator
about • 52
Activity tabbed page • 58
closing • 63
menu bar • 54
screen locker • 56
toolbar • 55
menu bar • 16
in • 16
in Security Administrator • 54
messages
filtering • 80
printing • 81
reviewing • 78
N
NACL (Negative Access Control List) • 31
Negative Access Control List (NACL) • 31
O
output bar • 24
output bar in • 24
P
passwords
changing • 99
policies • 142
utility for generating • 277
permissions
for groups • 114
for users • 103, 104
PMDB (Policy Model database) • 34
Policy Model database • 34
Preferences window • 149
PRINT class • 262
printing messages • 81
PROCESS class • 236
program bar • 22
program bar in • 22
PROGRAM class • 242
properties • 193, 203
properties • 193, 203, 209
UNIX for groups • 206
UNIX for resources • 258
UNIX for users • 198
Windows for groups • 207
Windows for resources • 260
Windows for users • 200
Q
querying propertiesSee viewing properties • 96
R
refreshing
group list • 107
user list • 94
REGKEY class • 266
REGVAL class • 266
reports of user access permissions • 104
resources
about • 31, 117
adding accessors to • 131
classes • 209, 258
copying • 127
creating • 31, 120, 126
deleting • 129
deselecting with wildcards • 121
displaying • 118
filtering • 119
modifying • 31, 123, 126
properties • 122, 209
protecting • 128
protecting special programs • 34
selecting with wildcards • 121
using calendars with • 32
Windows domain • 33
resourcesSee also classes • 209
S
screen locker • 56
seam.ini
[bin] section • 275
[defaults] section • 273
[help_ini] section • 272
[host_groups] section • 272
[master_db] section • 270
[messages] section • 272
[others] section • 275
[password] section • 271
[print] section • 272
[synchronize] section • 275
[transaction] section • 271
[user fields] section • 274
about • 269
tokens • 269
SeAMSee Security Administrator • 41
seauditx
Index 283
about • 155
customizing • 180
help for • 165
Main window • 157
seos.ini • 180
setting preferences for • 179
starting • 156
seauditxSee also Main window of seauditx •
155
SECFILE class • 232
SECLABEL class • 239
SecMon
about • 181
changing buffer size • 192
deleting audit events • 191, 192
Main window • 184
selogrd.cfg file • 182
starting • 182
stopping and restarting retrieval of audit
events • 191
SecMonSee also Main window of SecMon • 181
Security Administrator
Activity window • 61
command line options • 276
configuration file • 269
Edit window • 72
exiting • 63
Host Messages/Commands dialog • 74
Main window • 52
password generation utility • 277
Preferences window • 149
seam.ini • 269
setting preferences for • 149
starting • 51
transactions, executing • 65
UNIX exits • 277
workflow • 58
selogrd.cfg • 182
seos.ini • 180, 269
seosd daemon • 51
setoptions command • 139
SHARE class • 264
source host • 66
SPECIALPGM class • 34
SUDO class • 245
support, contacting • 3
SURROGATE class • 256
synchronizing data with Windows • 30
284 User Guide
T
TCP class • 251
technical support, contacting • 3
templates
for creating groups • 107
for creating users • 94
TERMINAL class • 229
toolbar • 20
in • 20
in Security Administrator
in Security Administrator • 55
Tools panel in • 23
transactions
editing for all hosts • 72
editing for one host • 74
executing • 65
retrying • 77
reviewing messages • 78
saving in a file • 76
verifying before execution • 66
viewing progress • 68
U
UNIX classes • 258
UNIX exits
passing arguments to • 278
reloading saved values • 280
saving values from • 279
users
about • 92
Active Directory in Windows 2000 • 30
adding to groups • 29, 111
adding to resources • 131
assigning Windows rights to • 26
auditing • 27
copying to another host • 101
creating • 25, 93, 97
creating with templates • 94
deleting • 102
deselecting with wildcards • 95
filtering • 92
modifying • 25, 97
password • 99
permissions • 103, 104
personal information • 28
properties • 96, 193
refreshing list of • 94
removing from groups • 111
restricting login privileges • 26
resuming • 100
selecting with wildcards • 95
suspending • 100
synchronizing data with Windows • 30
templates for creating • 94
UNIX properties • 198
users • 193
Windows properties • 200
V
viewing properties
groups • 109
resources • 122
users • 96
W
Windows classes • 260
Windows NT panel in • 23
Index 285