System Administrator’s Guide

     Previous  Next    Open TOC in new window    View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Managing Management Users and Management User Groups

The following section describes how to set up and manage administrative users of Network Gatekeeper.

 


Overview

Management of Network Gatekeeper is performed by administrative users. There are a set of management users, identified by their user type. Each management user is also assigned a user level.

Below is an overview of the operations for managing management users.

To...
Use
Create an administrative user
List administrative users
Change password
Delete an administrative user

Users and User Groups

Network Gatekeeper classifies its users as either Traffic users or Management users.

Traffic users cannot login to the management console or perform any management operations.

During installation, the following default groups are created in WebLogic Server Embedded LDAP server

Table 4-1 User groups
Group Name
Membership
Role
TrafficUser
All Application Instances belong to this group
  • They should be able to just send traffic and should not have access to management functions.
  • They should not have access to WebLogic Server or Network Gatekeeper MBeans.
  • They should not be able to log into the console and perform WebLogic Server administration operations.
TrafficUser
OamUser
Management users who are of OAM type:
  • They have access to the console based on their level.
  • They should not be able to send traffic.
OamUser
PrmUser
Management users who are of type PRM:
  • They should not have access to the console.
  • They should perform their management operations using the PRM interfaces
PrmUser

When an Application Instance sends a SOAP request to the application-facing interfaces, it is authenticated by the WLNG Application Authenticator; and upon successful authentication it adds WLNGTrafficUsers group to the user principals, in addition to the service provider ID, application ID, service provider group ID, and application group ID.

When management users login successfully, they are added to the oamUser group.

Each group contains a user or set of users and is associated with a Security Role. Groups are generally static; they do not change at runtime.

A basic role condition can include users or user groups in a particular security role. For example: set Admin Role to all users in Administrators group.

Roles are evaluated at runtime by the Role Mapping Provider by checking the authenticated subject.

A policy contains one or more conditions. For example a simple policy can be: Allow access if the user belongs to Admin Role.

User Types

Below are the pre-defined management user types:

When creating a management user, the user is mapped to the Weblogic Server authentication provider WLNG OAM Authenticator.

User Level

User level
Access on Network Gatekeeper
Access on WebLogic Server
1000
Administration access to management functions.
Administration access:
  • View, modify and administer server configuration
  • Deploy applications
  • Start, resume and stop servers
666
Read-write access on management functions.
Deployer access:
  • View the server configuration, including some encrypted attributes related to deployment activities.
  • Change startup and shutdown classes, Web applications, JDBC data pool connections, EJB, Java EE Connector, Web Service. If applicable, edit deployment descriptors.
  • Access deployment operations in the Java EE Deployment Implementation (JSR-88).
333
Read-only access on management functions.
Monitor access:
  • View the server configuration
  • Have read-only access to Administration Console, WLST and other MBean APIs
0
No access to management functions.
Assigned to PRM Service Provider users internally.
Anonymous access:
No access to console

Management users are assigned different user levels based on which JMX resources they will be able to access. At a more granular level, an administrator may want to give access to only a subset of management interfaces. This can be achieved by applying XACML policies.

Below is an outline of how to apply these policies, in order to add more granular access control:

  1. Add a new management user.
  2. Create a user group.
  3. Add the user to the user group
  4. Add a XACML policy to assign role to the group
  5. Add a XACML policy to the user group. It is possible to restrict access at a granular level; MBean, MBean attribute, or MBean operation level. See http://download.oracle.com/docs/cd/E13222_01/wls/docs100/secwlres/xacmlusing.html for a detailed description of this process. The basic process includes:
    • Determine a special identifier, the resourceId, for each MBean.
    • Create a XACML policy for the new security role.
    • Specify one or more Rule elements that define which users, groups, or roles belong to the new security role.
    • Attach this role to the MBean using the resourceId.

 


Reference: Attributes and Operations for ManagementUsers

Managed object: Container ServicesArrow symbolManagementUsersArrow symbolManagementUsers

MBean: com.bea.wlcp.wlng.user.management.ManagementUserMBean

Below is a list of attributes and operations for configuration and maintenance.

Operation: addUser

Scope: Cluster

Adds a Network Gatekeeper administrative user.

Signature:

addUser(Username:String, Password: String, userLevel: int, type: int)

Table 4-2 addUser
addUser
Parameter
Description
Username
User name.
Password
Password
UserLevel
Defines the user level when administrating Network Gatekeeper. See User Level.
Type
Type of management user. Use:
0 for management user
1 for PRM operator user
2 for PRM service provider user

Operation: changeUserPassword

Scope: Cluster

Changes the password for an existing Network Gatekeeper administrative user.

Signature:

changeUserPassword(UserName: String, OldPasswd: String, NewPasswd: String)

Table 4-3 changeUserPassword
changeUserPassword
Parameter
Description
UserName
User ID for administrative user.
OldPasswd
Current password.
NewPasswd
New password.

Operation: deleteUser

Scope: Cluster

Deletes a Network Gatekeeper administrative user.

Signature:

deleteUser(UserName: String)

Table 4-4 deleteUser
deleteUser
Parameter
Description
UserName
User ID for administrative user.

Operation: getUserLevel

Scope: Cluster

Gets the user level for a management user. See User Level.

Signature:

getUserLevel(UserName: String)

Table 4-5 getUserLevel
getUserLevel
Parameter
Description
UserName
User ID for the management user.

Operation: listUsers

Scope: Cluster

Displays a list of all registered management users and their corresponding user levels. See User Level.

listUsers(Type: int, Offset: int, Size: int)

Table 4-6 listUsers
listUsers
Parameter
Description
Type
Type of user. Use:
0 for Administrative user
1 for PRM Operator user
2 for PRM Service Provider user
Offset
Offset in the list. Starts with 0.
Size
Size of the list.

 


Reference: Attributes and Operations for ManagementUserGroup

Managed object: Container ServicesArrow symbolManagementUsersArrow symbolManagementUserGroup

MBean: com.bea.wlcp.wlng.user.management.ManagementUserGroupMBean

Below is a list of attributes and operations for configuration and maintenance.

Operation: addUsertoGroup

Scope: Cluster

Adds a Network Gatekeeper administrative user to a user group.

Signature:

addUsertoGroup(Username:String, GroupName: String)

Table 4-7 addUsertoGroup
addUsertoGroup
Parameter
Description
Username
User name.
GroupName
Group name.

Operation: createUserGroup

Scope: Cluster

Creates a new user group.

Signature:

createUserGroup(GroupName: String, Description: String)

Table 4-8 createUserGroup
createUserGroup
Parameter
Description
GroupName
Name of the new administrative group.
Description
A textual description.

Operation: listGroups

Scope: Cluster

Lists all registered user groups.

Signature:

listGroups(Offset: int, Size: int)

Table 4-9 listGroups
listGroups
Parameter
Description
Offset
Offset in the list. Starts with 0.
Size
Size of the list.

Operation: listUsers

Scope: Cluster

Lists user based on user group.

Signature:

listUsers(GroupName: String, Offset: int, Size: int)

Table 4-10 deleteUser
deleteUser
Parameter
Description
GroupName
Group name.
Offset
Offset in the list. Starts with 0.
Size
Size of the list.


  Back to Top       Previous  Next