Solstice Enterprise Manager 4.1 Managing Your Network Doc SetContentsPreviousNextIndex


Chapter 6

Controlling User Access

With the Security tool you can control user access to Solstice Enterprise Manager (Solstice EM) tools and managed objects. Based on the needs and responsibilities of system administrators, operators, and other users managing the components of your network, you can determine who may use any of the Solstice EM tools, and which managed objects they are allowed to access and manipulate for monitoring purposes.

This chapter comprises the following topics:

6.1 Overview

Controlling user access to Solstice EM tools and managed objects is an option.

Without access control, anyone can access all Solstice EM tools and manipulate the managed objects. The risks of this approach can be devastating when individuals without the proper authority or expertise alter or delete important components of the Solstice EM configuration and object attributes.

By controlling user access, you can prohibit unwanted access to critical applications and network components. By controlling user access, users are allowed to access only those applications and objects they need based on their network management responsibilities and other relevant criteria.

6.1.1 Understanding the Solstice EM Access Control Model

The access control model used by Solstice EM is based on the X.741 Recommendation issued by the International Telecommunications Union (ITU). This model uses rules and a logic in which these rules are enforced as a mechanism to control user access.

6.1.1.1 Security Rules

The basis for denying or granting users access to tools and managed objects are security rules. Security rules are controls that identify the user groups to which access controls are to be applied, the tools or managed objects for which access is to be denied or granted, and the policy to determine if access is to be denied or granted.

As such, the tasks outlined in this chapter involve working with users, tools and managed objects, and creating security rules.

What differentiates security rules from each other is the range of access granted or denied to the user groups.

6.1.1.2 Policy for Enforcing Security Rules


Note – Security rules that deny access to tools and managed objects are always enforced before security rules that grant access.


Note – When users derive their access privileges from multiple security rules, only one of these security rules will be enforced and determine the user's access to tools and managed objects.

The preceding notes contain the two fundamental principles to remember for determining an individual user's access. The principles and the policy logic are the same for controlling user access to Solstice EM tools and managed objects. The following graphic illustrates the logic of the policy that is used.

The policy logic used to enforce the security rules is a process of elimination, done in a hierarchical manner. When multiple security rules define an individual user's access privileges, only one of these rules will determine what the user can and cannot do.


FIGURE 6-1   Solstice EM Enforcement of Security Rules

6.1.1.3 About Users and Groups

In the Solstice EM control model, security rules are not set for individual users but for a group of users. This requires using existing user groups, or creating new groups and assigning individual users to such groups.

The identity of individual users and the groups to which they belong needs to be known to the MIS to which they connect. User identity is recorded in an access control list. User group data is recorded in profiles. (See Section 6.4.6 Preparing User Profiles for more information on user profiles.)

The control model used by Solstice EM allows individual users to belong to more than one group. This can result in situations where several seemingly conflicting rules control the access privileges of an individual user. In reality there is no conflict because of the policy logic in which the rules are enforced. The following scenario best illustrates the point.

Example- User John Doe is an operator monitoring alarms exclusively pertaining to routers. As such, John belongs to two user groups: the Operators group and the Routers group.

Users of the Operators group derive their privileges from one rule which denies them access to the Event Logs tool. Users of the Routers group derive their privileges from one rule which grants all users of that group access to all Solstice EM tools.

The question is: "Can John Doe start and use the Event Logs tool, say for creating or editing log files?" The answer is NO because rules that deny access are always enforced before rules that grant access. John, however, does have access to any of the other Solstice EM tools.


Tip – The preceding example illustrates the importance of ensuring that you do not assign Solstice EM users to user groups whose access to tools and managed objects would be denied due to conflicting security rules. Thorough advance planning and good record keeping should help avoid access problems.

See Also:

6.1.2 Predefined Groups, Security Rules, and Object Sets

The Solstice EM installation procedure provides you with a minimum of predefined privilege groups, security rules and sets of objects to get you started.

The installation procedures give you the opportunity to enable or disable (default) access control. If you choose to enable access control, you are also given the opportunity to create user profiles and to assign users to one of the three default privilege groups provided by the Solstice EM installation.

6.1.3 Implementation Schemes for Access Control

When you want to control user access, you can opt for the following schemes:

6.1.3.1 Control User Access to Tools

This scheme enables you to specify for a group of users the tools and tasks to which they are granted and denied access. The term tool means any Solstice EM tool such as Network Views, Network Discovery, Alarms, Security, and so on, as well as any custom-developed or third party application integrated using the Solstice EM API. The term task means any application features supported by the tool, such as create, edit, delete, and so on.

For example, network administrators should be able to create log files and alter the events that are to be recorded, while operators may only need the capability to view log records. In this instance, you would grant your network administrators the privilege to start and use the Event Logs tool to create and specify the contents of log files. In contrast, operators would be denied access to the Event Logs tool but would be able to use the Log Entry tool to look at log records.

6.1.3.2 Control User Access to Managed Objects

This scheme enables you to specify the managed objects to which a group of users is granted and denied access. The term managed object, and any of its variations such as object sets, are the representations of network components such as routers, hubs, bridges, logical and hierarchical views of the network, alarms, and so on.

Assume your company has regional headquarters in Boston and San Francisco. The two regional system administrators should only be able to manage the network components pertaining to their respective areas. By controlling access to managed objects, you can create access controls that exclude the Boston system administrators from seeing and manipulating network components pertaining to the San Francisco headquarters and vice versa.

6.1.4 Implementation Plan

Implementing an access control scheme requires that you put the necessary framework in place. You need to perform a number of preparatory tasks to set the stage for setting access controls to tools only, or to tools and managed objects.

This chapter is organized according to the implementation schemes discussed in Section6.1.3 Implementation Schemes for Access Control.

The following table identifies the major tasks to be accomplished for each of the implementation schemes and the sections in this chapter where the information can be found.

TABLE 6-1   Implementation Schemes 
Implementation Scheme Implementation Guidelines
No access control.


All users have full and equal access to all applications and managed objects.


  • If you chose to disable security control during the installation procedure, no other tasks need to be performed.

  • If you chose to enable security control during the installation procedure, but do not want to implement security control after all, then turnoff access control as explained in Section6.3 Turning Off Access Control.

    No other access control tasks discussed in this chapter need to be performed. See Chapter 2 of the Installation Guide for more information about enabling or disabling security during installation.


  • Tool access control

  • If security control was disabled during the installation procedure, turn on access control as explained in Section6.4.4 Turning On Security Control.

  • Perform the tasks as explained in Section6.4 Preparing for Security Control.

  • Follow the directions of Section6.5 Controlling Access to Solstice EM Tools.



  • Managed object access control
    If you did not implement any application access controls:

  • Turn access control on as explained in Section6.4.4 Turning On Security Control.

  • Prepare for access control as explained in Section6.4 Preparing for Security Control.

  • Control user access to Solstice EM tools as explained in Section6.5 Controlling Access to Solstice EM Tools.

  • Control user access to managed objects as explained in Section6.6 Controlling Access to Managed Objects.

  • If you implemented access controls to tools:

  • Control user access to managed objects as explained in Section6.6 Controlling Access to Managed Objects.


  • Each section starts with an overview that provides details about concepts and other information appropriate for the tasks to be performed.

    6.1.5 Related Tasks

    See chapter 5 in the Customization Guide for information on creating log files.

    6.1.6 Related Files

    6.2 Getting Started With Security

    All access control operations are performed in the Solstice EM Security window which is displayed when you start the Security tool.

    You can start the Security tool from the following places:

    • The Administration window accessible from Network Tools
    • The operating system command line
      When logged in as root or users with permission to grant All Privileges start Security, they always have the right to connect to the MIS without user ID and password authentication.
      Users belonging to less privileged user groups can connect to the MIS with user ID and password authentication when security rules allow them to do so.
     

    To Use Security

    1. Start Security in one of the following ways:

    • From the Network Tools window, click Administration, and then click Security.
    • From an operating system prompt, enter the following command:
      em_accessmgr (to connect to a local MIS server)

      or

      em_accessmgr [-help] [-host hostname] &

      For example: em_accessmgr -host omega to connect to the MIS on the server omega and start the Security tool.

      The Security window is displayed.

    2. Perform any of the tasks discussed in this chapter.

    3. Click File->Exit when you are finished.

    See Also Section 6.8.1.1 The em_accessmgr Command for more information about the command options.

    6.3 Turning Off Access Control

    When you turn off access control, you are giving all Solstice EM users complete access to applications, managed objects, and the operations for manipulating the objects. Any Solstice EM user can add and remove applications, add and remove managed objects, and change object attributes.

    Turning off access control can be done either during or after the installation procedure. If you turned off access control during installation, no further tasks need to be performed. You can always turn on access control later when you want to control user access.

    In the event access control had previously been turned on, either during installation or at a later point in time, you can override it by disabling access control. If you do, any security rules that were put in place before disabling access control will no longer control the users' actions.

    Turning off access control requires you to disable access control.

     

    To Turn Off Access Control

    1. Start the Security tool in one of the following ways:

    • From the Administration window, click Security.
    • From the command line, execute the following command line at an operating system prompt:
      em_accessmgr

      or

      em_accessmgr -host MIS_Server_Name

    2. In the Security window, click Actions->Security Defaults to display the Defaults dialog.

    3. Verify that the Security option at the top of the dialog is "Off."

    4. Click OK.

    6.4 Preparing for Security Control

    As explained in Understanding the Solstice EM Access Control Model, individual users derive their access privileges from security rules that are applied to the privilege group to which they belong. The chapter overview also explained that users can belong to more than one group. In such event, users derive their access privileges from all the groups to which they belong.

    Whether you want to control user access to Solstice EM tools and tasks only, or also to managed objects, you need to perform a number of preparatory tasks to ensure the necessary framework is in place. The section Getting Ready for Security Control in this chapter takes you through the tasks in the sequence that they need to be performed.

    6.4.1 About Users, Granting All Privileges, and Root

    All Solstice EM users must have UNIX accounts which you create using the UNIX administration tools available for this purpose, such as admintool from Solaris. In addition, the identity of the users must be recorded in an access control list. This is done by using Solstice EM. Solstice EM makes a distinction between users who are logged in as root, users who can grant all privileges, and regular users.

    Users who are logged in as root or users who can grant all privileges always enjoy the following access privileges:

    • Full access to all the Solstice EM tools, managed objects, and the em_accesscmd utility, even if they belong to a group controlled by restrictive rules.
    • Create and modify Solstice EM user information and group profiles.
    • Access to remote MIS servers.

    Users not logged in as root or who cannot grant All Privileges in Security tool cannot change security access controls. However, they can access tools and manipulate managed objects based only on their access privileges to tools and managed objects.

    6.4.2 About Privilege Groups

    Solstice EM privilege groups--also referred as groups--are a collection of Solstice EM users having the same security privileges. Solstice EM privilege groups have no relationship to UNIX user groups. Privilege groups can have one or more members. There is no limit to the number of users you can assign to a group. Also, users can belong to more than one group.

    Security rules are set for the groups. When users belong to several privilege groups, they derive their security privileges from all the rules that control the groups to which they belong. As such, users may have seemingly contradictory privileges. Refer to Section6.1.1 Understanding the Solstice EM Access Control Model for more information about how Solstice EM determines user access.

    Group details such as membership, tools, and/or managed objects that group members can access based on the access privileges, are recorded in profiles. These profiles are represented as objects in the management information base.

    A Solstice EM installation provides the following predefined groups.

    TABLE 6-2   Pre-defined Groups 
    User Group Name Description
    Full Access
    Users belonging to this group can access all Solstice EM tools, create, modify, and delete all Solstice EM tools and managed objects according to any existing rules or the settings of the default rule.
    Users will not be able to update the security access controls.
    This is not quite the same as turning off access control. When access control is turned off, no existing rules limit the user's access to applications and managed objects.
    Operators
    Users belonging to this group can access specific tools and modify specific managed data.
    View Only
    Users belonging to this group can view a restricted set of controlled object data, but they cannot modify the data. Users in this group have access to a restricted set of tools to use for viewing data to which they have access.


    6.4.3 Getting Ready for Security Control

    Getting ready for security control requires you to carry out several preparatory tasks. The following outlines the tasks to be performed if you want to control user access to either Solstice EM tools or to managed objects.

    1. Log in as root or as super user, create UNIX accounts for all Solstice EM users.

    2. If not enabled during installation, turn on access control.

      Follow the instructions in Turning On Security Control.

    3. If multiple management information servers are used, prepare for remote connections to the MIS.

      Follow the instructions in Preparing for Remote Connections to the MIS.

    4. Prepare user profiles, if you did not do so during the installation. If you did and need not add any other profiles, skip this step. If you prepared some user profiles during installation, but need to add more, then execute this step.


      1. Follow the instructions in Preparing User Profiles.
        Note that at this stage of preparing user profiles you cannot yet specify group membership. You will be able to assign users to groups when you prepare the group profiles.


      2. If specific users need the ability to grant all privileges, follow the instructions in Granting Security Privileges.

    5. Prepare group profiles.

      Follow the instructions of Preparing Group Profiles.

    At this stage you will be able to complete the user profile by assigning group membership.

    Note that group profiles will be completed with information about the list of tools, and the rules for controlling user access to tools, when you perform the tasks described in Controlling Access to Solstice EM Tools.

    Similarly, the group profiles will be completed with information about the managed objects, and the rules for controlling user access to the objects, when you perform the tasks described in Controlling Access to Managed Objects.

    6.4.4 Turning On Security Control

    When you enable access control, you can grant or deny user access to the tool itself and to the operations that can be performed with these tools. Regarding access to managed objects, you can determine which users have access to which objects, and the operations they can perform on these objects.

    Turning on access control requires you to do the following:

    • Enable the Security option
    • Edit the security controls in the Solstice EM configuration file
    • Restart the MIS
     

    To Turn On Security Control

    1. In the Security window, click Actions->Security Defaults to display the Defaults dialog.

    2. Enable or disable access control:

    • To enable access control, verify that the Security option at the top of the dialog is On (default).
    • To disable access control, verify that the option is Off.

    3. Click OK.

    4. Edit the assignments for the following access control variables in the $EM_HOME/build/acct/EM-config configuration file:

    • EM_ACCESS_PASSWORD CONTROL
    • EM_ACCESS_CONNECTION CONTROL
    • EM_ACCESS_BACKWARD_COMPATIBILITY

    5. For each of these variables, use TRUE to enable and FALSE to disable the variable.

    The following is an example of access control settings in an EM-config file.

    ############################################
    
    # Access control configuration variables
    
    ############################################
    
    EM_ACCESS_PASSWORD_CONTROL:         TRUE
    
    EM_ACCESS_CONNECTION_CONTROL:       TRUE
    
    EM_ACCESS_BACKWARD_COMPATIBILITY:   FALSE
    
    ############################################
    

    The two TRUE statements indicate that access to Solstice EM will be controlled and that and user password will be required and verified. the FALSE statement indicates that objects created using Solstice EM V2.1 will not be accessible. See the Developing Applications guide for details concerning this configuration file.

    6. Restart the MIS after turning on Security by executing this command at an UNIX system prompt:

    em_services -reload

    6.4.5 Preparing for Remote Connections to the MIS

    To connect to a remote MIS server, the following must be set up:

    • The names of the systems connecting to the MIS server must be added to the list of trusted hosts on the system where the MIS resides.
    • If the users connecting to the MIS need the capability to set and change object attributes or access controls, you must enable the "Grant All Privileges" option for each of these users.

    When users connect to a remote MIS server, the machine from which they are connecting must be recognized as a trusted host by the server on which the MIS resides. For example, when John Doe connects from the machines called alpha, beta, and gamma, to a remote MIS server called omega, then the systems alpha, beta, and gamma must be known as a trusted host to establish a connection to omega. You accomplish this by adding the names of the alpha, beta, and gamma systems to the list of trusted hosts in the Security Defaults dialog on the omega server.

    With an established trusted host relationship, users can connect to a remote MIS but cannot make any changes. To connect to a remote MIS with the intention of changing object attributes, or application access, or both, users must be able to grant all privileges, or be able to log in as root. See Granting Security Privileges for step-by-step instructions.

     

    To Allow Connections to a Remote MIS Server

    1. In the Security window, click Actions->Security Defaults to display the Defaults dialog.

    2. Next to Trusted Hosts at the bottom of the dialog, type the name of the MIS server and click Add.

    Repeat this step for every MIS server to which the users who can grant all privileges should be able to connect to.

    3. Click OK.

     

    To Prevent Connections to a Remote MIS Server

    1. In the Security window, click Actions->Security Defaults to display the Defaults dialog.

    2. Select the MIS server from the list of trusted hosts and click Delete.

    Repeat this step for every MIS server to which users who can grant all privileges should no longer be able to connect to.

    3. Click OK.

    6.4.6 Preparing User Profiles

    When access control is turned on, Solstice EM requires that the identity of users be known to the management information server. User profile information is recorded in a Solstice EM access control list. In addition to the profile information, Solstice EM requires that all users have UNIX accounts.


    Note – It is imperative that the UNIX accounts be created before you create the user profiles. Failing to do so will result in your inability to prepare user profiles and an error message will be displayed.

    When access control is turned off, UNIX accounts are still needed but no Solstice EM user profiles need to be created.

    To prepare user profiles you will need the following information:

    User profiles are prepared using either the Security tool or the command line. Using the Security tool, you create new user profiles in one of the following two ways:

    • Completing the User Create dialog
    • Duplicating an existing user profile

    For preparing user profiles from the command line, see Section6.7 Using the em_accesscmd Utility.

     

    To Prepare User Profiles

    1. In the Security window, click Actions->Create to display the Create dialog.

    2. On the Identity tab, in User Login, type the user ID.

    For example: jdoe. The user ID must be a valid login ID for the host on which the current MIS is running. What you type in this field is what is listed in the User Login column in the Security window.

    3. In Full Name, type the user's first and last names.

    4. For users who will be entrusted with security management, click Grant All Privileges.

    See Section6.4.7 Granting Security Privileges for more information on the privileges associated with the option of Granting All Privileges.

    5. Click Apply to continue adding other users, or click OK when you have finished.

    The user ID is immediately added to the list of users and groups, and an empty user profile object for that individual is added to the MIS.

    Group membership cannot be assigned until group profiles have been prepared. Once group profiles have been prepared, you can assign group membership.

     

    To Prepare User Profiles by Duplication

    1. In the Security window, click the Users tab to list the existing users.

    2. Select the user whose profile you want to use for creating a new one.

    3. Click Actions->Duplicate to display the Duplicate dialog.

    4. On the Identity tab, type the user login for the user profile you want to create.

    5. Enter the user's first and last names.

    6. Click any of the other tabs and update the information as necessary.

    7. Click OK.

    6.4.7 Granting Security Privileges

    When access control is turned on, users who can grant all privileges--regardless of the groups to which they belong--are automatically granted update privileges to controlled applications and managed objects.

    The option Granting All Privileges enables any user to use all Solstice EM tools, to manipulate and update managed objects and access privileges to which they normally do not have access. Users who can grant all privileges may update user records and group profiles except their own, change security rules, change access controls to applications, and update object attributes.

    The privilege of granting all privileges can be given to any user when you prepare the user's profile or later as the need arises.


    Note – Note that users who are member of the Full Access group do not automatically have the ability to grant all privileges.

     

    To Grant Security Privileges

    1. In the Security window, click the Users tab to display all Solstice EM users.

    2. Click the user record to select it and then click Actions->Properties to display the Properties dialog for the selected user.

    3. Click Grant All Privileges.

    When selected, the option displays a check mark.

    4. Click OK.

    6.4.8 Preparing Group Profiles

    When access control is turned on, group identities, just like user identities, need to be recorded in profiles that are stored in the management information database as objects. Group profiles also identify the security rules that determine whether or not the group members are granted or denied access to the specified tools and the managed objects.

    To prepare group profiles you need to have the following information on hand:

    • The name to be given to the group
    • The IDs of the users who will become members of the group

    Group profiles will be completed when you carry out the task for controlling user access to applications and managed objects.

    Group profiles are created using the Solstice EM graphical user interface or from the command line. Using the graphical user interface, you create group profiles in one of the following two ways:

    • Completing the Group Create dialog
    • Duplicating an existing group profile

    For preparing group profiles from the command line, see Section6.7 Using the em_accesscmd Utility.


    Tip – Use the Full Access users group (or any other existing group) as the basis for creating (by duplication) group profiles for new users groups; then, modify the access controls for the newly created group as needed.

     

    To Prepare Group Profiles by Duplication

    1. In the Security window, select the Privilege Groups tab to display the list of existing privilege groups.

    2. Select the group you want to use as the basis for creating a new privilege group.

    3. Click Actions->Duplicate to display the Group Duplicate dialog.

    This dialog is identical to the Create Privilege Group dialog. A duplicate of that group is created and the group information is loaded into the dialog.

    4. On the Identity tab, type the name of the new privilege group

    5. Type a group description.

    6. Move from tab to tab and modify the existing group information to meet the requirements for the new group.

    7. Click OK.

     

    To Prepare Group Profiles

    1. In the Security window, select the Privilege Groups tab.

    2. Click Actions->Create to display the Create Group dialog.

    3. On the Identity tab, in Privilege Group Name, type the group's name.

    4. Type a group description.

    For example, if the group will contain the names of operators monitoring the routers in your network, "Router Operators" might be a suitable name.

    5. On the Members tab, specify the group members as follows:

    • Select one or more users from the Managed Users list on the left and click Add.
    • To select all users, click Select All and then click Add.

    The rest of the group profile will be completed when you carry out the tasks outlined in Section6.5 Controlling Access to Solstice EM Tools and Section6.6 Controlling Access to Managed Objects.

    6.4.9 Saving and Reusing Profiles

    After defining profiles for the Solstice EM users and groups, you may want to save the profile information to a file of your choice. This file can then be loaded back into the system after an upgrade or a re-installation of Solstice EM.

    When importing a file, the file to be imported must have been created using the Export command. The imported access information is created in the current MIS. This information is appended to any pre-existing information. No information is removed.

     

    To Save Profiles

    1. In the Security window, click File->Export to display the Export dialog.

    2. Select one of the following options:

    • All Access Control Objects - Select this option to save the access control data of all users, groups, and trusted hosts, applications, targets, rules, and security default information for the current MIS.
    • Users, Groups, Trusted Hosts, and Application List - Choose this option to save information for the current MIS.
    • Targets, Rules, and Security Defaults - Select this option to save control access data information for the current MIS.

    3. In File Name, type a directory path name and file name for saving the profiles.

    If you do not know the directory path name, click Browse to select a directory path name. Use the * wildcard and click Filter to filter the contents of the selected directory. For example, /home/user1/EM_EXPORTS/* will display the contents of this directory; from this list, select the file to which the data should be saved. If the file does not exist, type a file name.

    4. Click OK.

     

    To Reuse Saved Profiles

    1. In the Security window, click File->Import to display a standard Select File dialog.

    2. Enter the directory path and file name, or click Browse to search for and select an existing profile file.

    3. Click OK.

    6.4.10 Printing Profiles

    You can print the list of Solstice EM users and groups in two formats:

    • Text format - Prints the existing user groups and their members in plain ASCII format.
    • Table format - Creates an encapsulated PostScript file of the table listing the user groups in the Security window.
     

    To Print Profiles

    1. In the Security window, click File->Print to display the Print dialog.

    2. Select Print to File or Printer as print destination.

    If you select Print to File, click the [...] button to display a file selection dialog from which you select the profile to be printed.

    3. Select either Text or Table format.

    4. Click Print.

    6.4.11 Searching for Users and Groups

    Solstice EM provides a search mechanism for finding existing Solstice EM users and groups based on search criteria that you specify.

     

    To Search for Users and Groups

    1. In the Security window, click Action->Find to display the Find dialog.

    2. Select User or Privilege Group from the Find options.

    3. Select the type of match.

    4. Specify whether or not to use case sensitivity when searching.

    5. (Optional) Enter the search string.

    6. Click Find to start searching.

    7. Click Close to exit.

    6.4.12 Maintaining User Profiles

    Maintaining user profiles includes the following activities:

    • Modifying the profile properties of existing users
    • Assigning users to other groups
    • Deleting user profiles

    The above tasks can be performed using the Security tool as explained below, or from the command line as explained in Section6.7 Using the em_accesscmd Utility.

     

    To Update User Profiles

    1. In the Security window, click the Users tab to display the existing users.

    2. Select the user from the list, and click Actions->Properties to display the Properties dialog for the selected user.

    3. Move from tab to tab and enter your changes.

    4. Click Apply to change and keep the dialog open, or click OK to change and exit.

     

    To Assign Users to Other User Groups

    1. In the Security window, click the Users tab to list the existing users.

    2. Select the user from the list and click Actions->Properties to display the Properties dialog for the selected user.

    Alternatively, double-click on the user's name.

    3. Select the Privilege Groups tab.

    4. To add the user to another privilege group, select the privilege group from the list on the left and click Add.

    5. If necessary, to remove the user from a privilege group to which the user currently belongs, select the privilege group from the list on the right and click Remove.

    6. Click Apply or OK.

     

    To Delete User Profiles

    1. In the Security window, click the Users tab to list all existing users.

    2. Select the name of the user to be deleted.

    3. Select Actions->Delete.

    4. Click OK.

    6.4.13 Maintaining Group Profiles

    Maintaining group profiles includes the following activities:

    • Updating the properties of groups, such as the changing the group's members, the group's privileges to applications and database objects
    • Deleting groups

    The above tasks can be performed using the Security tool as explained below, or from the command line as explained in Section6.7 Using the em_accesscmd Utility.

     

    To Update Group Profiles

    1. In the Security window, click the Privilege Groups tab to list the existing groups.

    2. Select the privilege group whose profile is to be updated and click
    Actions->Properties to display the Group Properties dialog.

    Alternatively, double-click the privilege group.
    The dialog is identical to the Group Create dialog.

    3. Moving from tab to tab, update the group's properties as necessary.

    4. Click OK.

     

    To Delete Group Profiles


    Caution – Deleting groups by deleting group profiles irrevocably and immediately removes the corresponding group profile objects from the MIS.

    1. In the Security window, click the Privilege Groups tab to list the existing groups.

    2. Select the privilege group you want to delete and click Actions -> Delete.

    6.5 Controlling Access to Solstice EM Tools

    This section of the guide discusses the tasks you need to perform to control user access to Solstice EM tools.

    The tasks involved in controlling access to tools are easy to accomplish. As such, controlling user access to Solstice EM tools can be considered a stepping stone toward building the expertise you need to control user access to managed objects.


    Note – Before you carry out any of the tasks outlined in this section of the chapter, you must have accomplished all the required preparatory tasks outlined in Section6.4 Preparing for Security Control.

    6.5.1 Implementation Overview

    This overview expands the concepts introduced in the chapter overview and discusses them in more detail.

    This Implementation Overview provides more details about the following:

    • Definition of Solstice EM tools and tasks
    • Security rules for controlling access to tools
    • Guidelines for controlling access to tools

    6.5.1.1 About Solstice EM Tools and Tasks

    Solstice EM enables you to control access at the tool level and at the task level.

    As used in this guide, tool means any Solstice EM tool and any custom-developed application developed using the Solstice EM API; tasks mean any of the tool features supported by the tool, such as edit, create, delete, and so on.

    Before you can proceed with setting access controls, all tools must be placed under Solstice EM Security control.

    6.5.1.2 Security Rules for Controlling Access to Tools

    As explained in Overview, security rules are at the heart of Solstice EM for controlling user access. User access to tools can be controlled by creating security rules that deny or grant access in the following ways:

    • Deny members of identified groups access to all Solstice EM tools - Use this type of rule when you want to exclude specific users from accessing any Solstice EM and all of the Solstice EM tools. When no specific groups are identified, the rule applies to all groups.
    • Deny members of identified groups access to specific Solstice EM tools - Use this type of rule when you want to ensure that specific users do not have the capability to run specific tools. For example, denying operators the right to create log files using Solstice EM's Event Logs tool.
    • Deny members of identified groups the ability to perform specific tasks when using Solstice EM tools - This type of rule allows specific users to run the tools but they are denied access to specific tool features, such as the edit or delete function provided by the tool. For example, allowing operators to view log records using Solstice EM's Log Entries tool, but denying them the capabilities of editing the log records in the log file, or deleting them using the Log Entries tool edit and delete functions.

    The logic used for controlling user access is explained in Section6.1.1 Understanding the Solstice EM Access Control Model.

    Access to the tool is enforced by the tool itself. The MIS only stores the list of features that can be accessed for each application.

    6.5.2 Getting Ready to Control Access to Solstice EM Tools

    The tasks in this section need to be carried out if you want to control user access to Solstice EM tools and tasks. The following outline is a high-level overview of the tasks to be performed.

    1. Make sure you have accomplished all preparatory tasks.

      See Section6.4.3 Getting Ready for Security Control.

    2. If necessary, add custom-developed applications to Solstice EM.

      Follow the instructions in Section6.5.3 Placing Tools Under Security Control.

    3. Define the privileges for accessing tools and tasks.

      Follow the instructions in Section6.5.5 Granting and Denying Access to Tools and Tasks.

    6.5.3 Placing Tools Under Security Control

    Before you can specify access controls to applications and tasks, you must ensure that any custom-developed applications for which you want to control user access are under Solstice EM control.

    If you plan on controlling user access at the task level for custom-developed applications, you will need to obtain the following:

    • The name of the application's executable(s).
    • The exact name of the application tasks to which access will be controlled. The task name must be the name recognized by the application. For example, if you want to control user access to the delete function of the XYZ application, you need to know that the developer named that function "XYZDelete."

    Once the tools are added to Solstice EM, tasks supported by the tools appear as a list of options from which you make your selections.

     

    To Place Tools Under Security Control

    1. In the Security window, click Actions->Privilege Components->Applications List to display the Applications dialog.

    2. Click Add to display the Application Create dialog.

    3. In Application Name, type the name of the application to be added.

    You can choose either the name of the executable or the commercial name.

    4. In Description, type a description of the application.

    5. (Optional) At the bottom of the dialog, type the description for the Application Task.

    Enter the description for an application task before adding the task name to the list. For example, if the task is delete, type: Delete.
    Attempting to add a description to an existing task results in a duplicate task name displaying in the list. If you have done this, delete the undescribed task name from the list, leaving only the described version of the task.

    6. Still at the bottom of the dialog, enter the application task.

    For example, if the name of the task is "XYZDelete", then type: XYZDelete. If the application developer named the task "XYZ-delete", then type: XYZ-delete. The syntax of the task must match the task name as defined by the application developer.
    Note the Task and Description list display table in the center of the Application Add dialog. This is a display/selection list only. To add a task to this list, enter the task name in the Application Task field below the table, and then click Add. The feature name must be the name recognized by the application (for example, the Viewer application task "Move Object" is listed as "MoveObject").

    7. Click Apply.

    8. Keep adding tool tasks and descriptions until you have added all the features to be controlled.

    9. Click OK when you are finished.

     

    To Place Tools Under Security Control by Duplication

    1. In the Security window, click View->Privilege Components->Applications List to display the Applications dialog.

    2. Select the application you want to use for creating a new one, and click Duplicate to display the Application Duplicate dialog.

    3. Enter the application name.

    4. Change the application's description.

    5. Make any necessary modifications as follows:

    • To delete a feature from the list, select it and then click Delete.
    • To modify a feature description or name, first delete the existing feature from the list, and then re-add it with the new description.

    6. Click Apply for each change.

    7. Click OK when you are finished.

    6.5.4 Removing Tools From Security Control

    When specific tools are no longer to be used under Solstice EM, you should remove them. Removing tools from Solstice EM control results in deleting the objects which represent these tools in the MIS.

    If the tool to be removed is a custom-developed application for which you had specified access controls at the task level, removing it will result in losing task information which may have been time consuming to collect.

    You cannot restore a tool that was removed. If the application is a Solstice EM tool, your only option is to reinstall Solstice EM. If the tool to be removed is a custom-developed application, you will need to add it again under Solstice EM as explained in Section6.5.3 Placing Tools Under Security Control.

     

    To Remove Tools From Security Control

    1. In the Security window, click Actions->Privilege Components->Applications List to display the Applications dialog.

    2. Select the tool name from the list and click Delete.

    3. Click Close.

    6.5.5 Granting and Denying Access to Tools and Tasks

    After making sure that all applications are under Solstice EM control, you can proceed by specifying the rules that will determine the group access privileges to tools and tool tasks.

    You both grant or deny access at the tool level and at the task level at the same time.

     

    To Grant and Deny Access to Tools and Tasks

    1. In the Security window, click the Privilege Groups tab.

    2. Select the group and click Actions->Properties to display the Properties dialog for the selected group.

    3. On the Tasks tab, select Task Access by Application and click Edit to display the Edit Task Access By Application dialog.

    4. In Application Names, select the application.

    Solstice EM tools are listed by the names of their executables. For example, the Security tool is listed as em_accessmgr.

    5. Specify the level of access by selecting No Access, Full Access or Specify Tasks.

    • No Access - Denies the members of the group any access to the tool. Users will not be able to start and run the tool.
    • Full Access - Grants the members of the group complete access to the tool and its tasks. Users will be able to start and run the tool and perform all tasks supported by the tool.
    • Specify Task - Grants the members of the group access to the tool but denies and grants access to specific tool tasks. Users will be able to start and run the tool. If, for example, you denied access to the Delete task, users will not be able to perform any delete operations.

    6. If you selected Specify Tasks, select the tasks from the list of available tasks.

    The list of tasks available for selection is determined by the selected application.

    7. Click Apply to continue, or click Close when you have finished to return to the Properties dialog.

    8. Click OK.

    The group profile data in the MIB is updated to include the rules that determine access to the tools and tasks.

    6.5.6 Viewing Tool Access Privileges

    When security control is enabled, individual Solstice EM users can view the privileges that control their access to tools and tasks.

     

    To View Tool Access Privileges

    1. In the Security window, click the Users tab to list the users.

    2. Select a user.

    3. Click Actions->Properties to display the Properties dialog for the selected user.

    4. Click the Tasks tab to view access privileges information.

    The information shown is for viewing only and cannot be changed. See Section 6.5.5 Granting and Denying Access to Tools and Tasks for instructions on granting and denying access to tools.

    5. Click Cancel to close the dialog.

    6.5.7 Updating Tool Access Privileges

    Organizational or other changes affecting the Solstice EM configuration may require you to update the access controls to tools and tasks.


    Note – To make any changes, you must either be a user who can grant all privileges, or be logged in as root. If necessary, follow the instructions in Section6.4.7 Granting Security Privileges before making any of the desired changes. You cannot change your own privileges; to do so, log in as root.

     

    To Update Tool Access Privileges

    1. In the Security window, click Actions->Privilege Components->Applications List to display the Applications dialog.

    2. Select the application you want to modify and click Edit to display the Applications Edit dialog.

    3. Enter your changes.

    • To change the tool name or tool task, click in the Description field box and type your changes.
    • To delete a task from the list, select it and click Delete.
    • To modify a task description or task name, type the new task description or task name.

    4. Click OK.

    6.6 Controlling Access to Managed Objects

    This section of the guide discusses the tasks you need to accomplish to control user access to managed objects.

    The tasks involved in controlling access to managed objects are complex and require a solid understanding of the Solstice EM configuration as well as experience in controlling user access to Solstice EM tools. As such, controlling user access to managed objects should only be considered after you have acquired expertise in controlling user access to Solstice EM tools and tasks.


    Note – Before you carry out any of the tasks outlined in this section of the chapter, you must have accomplished all the required preparatory tasks outlined in Section6.4 Preparing for Security Control and the tasks outlined in Section6.5 Controlling Access to Solstice EM Tools.

    6.6.1 Implementation Overview

    This overview expands the concepts introduced in the chapter overview and discusses them in more detail to successfully set up security controls to managed objects.

    This Implementation Overview provides more details about the following:

    • Security rules for controlling access to managed objects
    • Definition of object sets
    • Guidelines for controlling access to managed objects

    6.6.1.1 Security Rules for Controlling Access to Managed Objects

    As explained in Section6.1 Overview, security rules are the foundation for controlling user access.

    User access to managed objects can be controlled by creating rules that deny or grant access in the following ways:

    • Deny members of specific groups access to all managed objects - Use this type of rule when you want to exclude the members of specific groups from accessing all objects in the MIS. When no specific groups are identified, the rule applies to all groups. This rule is sometimes referred to as the global deny rule.
    • Deny members of specific groups access to specific managed objects - Use this type of rule when you want to exclude the members of specific groups from accessing specific objects. For example, members of the "Routers Operators" group should not have any access to managed objects representing bridges which are monitored by members of the "Bridge Operators" group. This rule is sometimes referred to as the item deny rule.
    • Grant members of specific groups access to all managed objects - Use this type of rule when you want to ensure that all members of specific groups have access to all the managed objects. For example, members of the "SysAdmin" group should have access to all managed objects in the MIS. This rule is sometimes referred to as the global grant rule.
    • Grant members of specific groups access to specific managed objects - Use this type of rule when you want to ensure that all members of specific groups have access to specific managed objects. For example, members of the "Boston SysAdmin" group have access to all objects representing the Boston network components in the management information database. This rule is sometimes referred to as the item grant rule.
    • Grant and/or deny members of all groups access to managed objects - When none of the above rules apply, Solstice EM will use this type of rule--sometimes referred to as the default rule--to determine user access as follows:

      • To managed objects that are not included in a list of managed objects to which access is either specifically granted or denied.
      • To managed objects where there are no rules that specifically deny or grant user groups access to managed objects.
        For example, user Jane Smith is a member of the "Router Operator" group whose access privileges are defined by a rule that grants the group members access to managed objects of the router type in the MIS.
        In addition, there are no rules that specifically deny the group members access to objects of a type other than router.
        Jane Smith's access to managed objects that are not of the router type, will be determined by the default rule settings.

    The logic used for controlling user access is explained in Section6.1.1 Understanding the Solstice EM Access Control Model.

    The installation provides you with the following predefined security rules.

    TABLE 6-3   Predefined Security Rules 
    Rule Name Description
    Full Access
    Grants the users of the "Operators" and "Full Access" groups access to all Solstice EM tools and managed objects.
    DenyAccessControlObjectsChange
    Denies the users of the "Operator" group access to change object attributes.
    View Only
    Grants the users of the "View Only" group access to the following objects named:

  • "View Only" which allows the users to view data but not to change it.

  • "Connection" which allows them to connect to a MIS to view data.


  • The MIS enforces the access control policy as defined by the security rules.

    Before you proceed in setting access controls to managed objects, you must have completed all preparatory tasks as explained in Preparing for Security Control and Controlling Access to Solstice EM Tools.

    6.6.1.2 Understanding Object Sets

    An object set is a group of managed objects protected by the same access rule. Object sets identify managed objects within the security domain. An object set can be one or more of the following:

    • Any managed object type or class
    • One or more specific instances of an object.
    • All objects below that object in the Management Information Tree (MIT)
    • One or more subtrees below an object, including or not including the object itself
    • One or more attributes of an object

    The following are some examples of object sets:

    • All Solstice EM log files, except AlarmLog
    • topoNodes contained in the 129.146.0.0 network
    • "Set" operations on objects of the type "router"

    A default Solstice EM installation provides the following predefined object sets.

    TABLE 6-4   Predefined Object Sets 
    Name of Object Set Description
    DenyAccessControlObjectsChange
    Pointer for the object /em-name="accessControlContainer"
    < /font>
    Connection
    Pointer for the instance of the object subsuystemid='EM-MIS" which is of type emApplicationinstance
    View Only
    Pointer to the root directory of the Management Information Tree (MIT)


    See Section6.8.1.4 More About Object Sets for more information.

    6.6.2 Getting Ready to Control Access to Managed Objects

    The tasks in this section of the chapter need to be carried out if you want to control user access to managed objects. The following outline is a high-level overview of the tasks to be performed.

    1. Make sure you have accomplished all preparatory tasks.

      See Section6.4.3 Getting Ready for Security Control.

    2. If you are not already controlling user access to Solstice EM tools, define access controls to Solstice EM tools.

      See Section6.5 Controlling Access to Solstice EM Tools.

    3. Define the object sets.

      Follow the instructions in Section6.6.3 Defining Object Sets.

    4. Define the security rules for the object sets.

      Follow the instructions in Section6.6.4 Defining Security Rules for Object Sets.

    5. Assign the objects sets and rules to the appropriate groups.

      Follow the instructions in Section6.6.5 Assigning Objects and Security Rules to Groups.

    6.6.3 Defining Object Sets


    Note – To define object sets, you must be logged in as root or a user with "grant all" privileges.

    To complete the tasks pertaining to specifying object sets, you will need to have the following information on hand:

    • The object class of the objects
    • The name of the object instance in the MIS
    • The access scope in the topology
    • Target filters
    • Available CMIS filter(s)
    • The operations that can be performed on the objects

    Using the graphical user interface, you add sets of objects in one of the following ways:

    • Using the Object Set Create dialog
    • Duplicating an existing definition
     

    To Define Object Sets

    1. In the Security window, click Actions->Privilege Components->Object Sets to display the Object Sets dialog.

    2. Click Create to display the Object Set Create dialog.

    The Object Sets Create dialog is organized in the following two groups: Objects and Operations.

    3. In Object Set Name, enter a name for the object set as you want to see it listed in the Object Sets dialog.

    4. Specify the types of objects to be included in the object set as follows:

    • Click Types, select an object type from the list, click Add, and then click Close.
    • Alternatively, type in the name of the object type in the text field next to the Types button.

    5. Specify object instances to be included in the object set as follows:

    • Click Instances, select an object instance from the list, click Add, and then click Close.
    • Alternatively, type in the name of the object instance in the text field next to the Instances button.
    The Object Instances do not bear any relationship to the Object Types.

    6. Specify the Scope (Base Object).

    Click the scope selection box to display the available options. If you select either Base to the Nth Level or Nth Level, you must also specify the level in the number field next to the selection list. Use the up and down arrows to select the correct level.

    7. (Optional) Define a CMIS filter by clicking Filter to display the CMIS Filter dialog.

    Using the CMIS Filter dialog, you can create and save a new CMIS filter definition, or load an existing filter. See CMIS Scoping and Filtering in the Developing Applications guide for more information.

    8. On the Operations Group tab, select either All Operations, or select the operations individually.

    9. (Optional) Create a CMIS filter by clicking Event Discriminator to display the CMIS Filter dialog.

    10. Click OK.

     

    To Define Object Sets by Duplication

    1. In the Security window, click Actions->Privilege Components->Object Sets to display the Object Sets dialog.

    2. Select an object set in the list and click Duplicate to display the Object Sets Duplicate dialog.

    3. Enter the name of the new object set.

    4. Make any other changes as necessary.

    5. Click OK.

     

    To Create CMIS Filters

    1. In the Security window, click Object->Object Sets to display the Object Sets [Create] dialog.

    See CMIS Scoping and Filtering in the Developing Applications guide for more information.

    2. Click Filter to display the CMIS Filter dialog.

    3. Enter the filter definition as follows:

      1. Click Item to display the CMIS Filter Item dialog.
      2. Select the Operator for the item.
      3. Type the Attribute ID.
      4. Click Search to display the CMIS Filter Item Search dialog.
      5. Type the Attribute Value.
      6. Add the item to the CMIS filter definition.
      7. Click OK to add the item to the filter definition and return to the CMIS Filter dialog.

    4. (Optional) Click Save to name and save the filter.

    5. Click OK.

    6.6.4 Defining Security Rules for Object Sets

    When you do not want to give all users the same level of access to managed objects, you can use the predefined rules and add your own. With security rules you can refine user access to the object level and exclude specific users from accessing designated objects.


    Note – Individual users derive their privileges from the group to which they belong. Security rules only apply to users belonging to user groups. Users who do not belong to any groups (an unlikely event) derive their access privileges from the default rule.

    As explained in Section6.6.1.1 Security Rules for Controlling Access to Managed Objects you can control user access in the following ways.

    Using the Object Access Rule dialog:

    • Deny groups access to all sets of objects.
    • Deny groups access to specific objects.
    • Grant groups access to all sets of objects.
    • Deny groups access to specific sets of objects.

    Using the Defaults dialog specify access defaults applicable to all users when no other access rule prevails.

    Detailed steps for creating these security rules are provided in the following sections.

    If necessary, see Section6.1.1 Understanding the Solstice EM Access Control Model for information about security rules and the logic used for enforcing them.

     

    To Deny Groups Access to All Sets of Objects

    This type of rule is also referred to as the global deny rule.

    1. In the Security window, click Actions->Privilege Components->Object Access Rules to display the Object Access Rule dialog.

    2. Click Create to display the Object Access Rule Create dialog.

    3. In Rule Name, type the name of the custom access rule.

    4. In Privilege Groups Using Rule, click Edit List to display the Edit Privilege Groups List dialog.

    5. Select one, several, or all user groups listed in All Groups and click Add.

    6. Click OK to return to the Rule Create dialog.

    7. Do not specify any sets of objects.

    8. Select one of the three Deny options.

    9. When finished creating rules, click OK, otherwise click Apply.


    FIGURE 6-2   Rule Denying Group Access to All Objects

    FIGURE 6-2 Illustrates a rule that denies the members of the groups "Group_A" and "Group_B" access to all objects. When users attempt to access the objects, an informational message will be displayed.

     

    To Deny Groups Access to Specific Sets of Objects

    This type of rule is also referred to as the item deny rule.

    1. In the Security window, click Actions->Privilege Components->Object Access Rules to display the Object Access Rule dialog.

    2. Click Create to display the Object Access Rule Create dialog.

    3. In Rule Name, type the name of the custom access rule.

    4. In Privilege Groups Using Rule, click Edit Group List to display the Edit Privilege Groups List dialog.

    5. Select one, several, or all user groups listed in All Groups and click Add.

    6. Click OK to return to the Rule Create dialog.

    7. In Objects Sets Affected By Rule, click Edit List to display the Edit Object Sets List dialog.

    8. In All Object Sets, select the objects to which access is to be denied and click Add.

    9. Click OK to return to the Rule Create dialog.

    10. Select one of the three Deny options.

    11. When finished creating rules, click OK, otherwise click Apply.


    FIGURE 6-3   Rule Denying Group Access to Specific Objects
    FIGURE 6-3 Illustrates a rule that denies the members of the groups "Group_A" and "Group_B" access to the objects "Object_A" and "Oject_B". When attempting to access these two objects, no informational message will be displayed.
     

    To Grant Groups Access to All Sets of Objects

    This type of rule is sometimes referred to as the global grant rule.

    1. In the Security window, click Actions->Privilege Components->Object Access Rules to display the Object Access Rule dialog.

    2. Click Create to display the Object Access Rule Create dialog.

    3. In Rule Name, enter the name of the custom access rule.

    4. In Privilege Groups Using Rule, click Edit Group List to display the Edit Privilege Groups List dialog.

    5. Select one, several, or all user groups listed in All Groups and click Add.

    6. Click OK to return to the Rule Create dialog.

    7. In Objects Sets Affected By Rule, click Edit List to display the Edit Object Sets List dialog.

    8. Click Select All and then click Add.

    9. Click OK to return to the Rule Create dialog.

    10. Select Allow.

    11. When finished creating rules, click OK, otherwise click Apply.


    FIGURE 6-4   Rule Granting Access to All Objects
    FIGURE 6-4 Illustrates a rule that grants the members of the groups "Group_A" and "Group_B" access to all objects.
     

    To Grant Groups Access to Specific Sets of Objects

    This type of rule is sometimes referred to as the item grant rule.

    1. In the Security window, click Actions->Privilege Components->Object Access Rules to display the Object Access Rule dialog.

    2. Click Create to display the Object Access Rule Create dialog.

    3. In Rule Name, type the name of the custom access rule.

    4. In Privilege Groups Using Rule, click Edit Group List to display the Edit Privilege Groups List dialog.

    5. Select one, several, or all user groups listed in All Groups and click Add.

    6. Click OK to return to the Rule Create dialog.

    7. Click Edit Target List to display the Edit Targets List dialog.

    8. In All Object Sets, select the objects to which access is to be granted and click Add.

    9. Click OK to return to the Rule Create dialog.

    10. Select Allow.

    11. When finished creating rules, click OK, otherwise click Apply.


    FIGURE 6-5   Rule Granting Access to Specific Objects
    FIGURE 6-5 Illustrates a rule that grants the members of the groups "Group_A" and "Group_B" access to the objects "Object_A" and "Object_B".
     

    To Create Security Rules by Duplication

    1. In the Security window, click Actions->Privilege Components->Object Access Rules to display the Object Access Rules dialog.

    2. Select the rule to duplicate and click Duplicate to display the Object Access Rule Duplicate dialog.

    3. In Name, type the name of the new custom access rule.

    4. (Optional) Enter your modifications.

    5. Click OK.

     

    To Specify Default User Access

    This type of rule is sometimes referred to as the default rule.

    1. In the Security window, click Actions->Security Defaults to display the Defaults dialog.

    2. Verify that Security is turned on.

    3. Define the access defaults for each operation type.

    4. Choose the desired access level for the logging of security and audit events.

    5. If users will access remote MIS servers, add the names of these servers and click Add.

    6. Click OK.


    FIGURE 6-6   Default Rule

    FIGURE 6-6 Illustrates the default rule that applies to groups in the absence of any other security rules, and to users who do not belong to any groups.

    As shown, users are allowed to do the following:

    • From the Action setting - Request an agent to invoke a specific behavior that is supported by the managed object that receives the request.
    • From the Get setting - Request information from an agent.
    • From the Filter setting - Request an agent to perform a test on a managed object before carrying out a request.
    • From the Events setting - To request an agent to send event report messages.
    • From the Multiple Object Selection - Request an agent to send a single request to several managed objects.
    • Users logging in from the dugout and zirconium systems can, for example, connect to the server on which the MIS resides.
      Users are not allowed to do the following:
    • From the Create setting - Request an agent to create a managed object.
    • From the Delete setting - Request an agent to delete one or more managed objects.
    • From the Set setting - Request an agent to change attribute values of a managed object.
    • From the Security Logging setting - Request an agent to generate service or mechanism violation notifications or events to allow the logging of all security violations.
    • From the Audit Logging setting - Request an agent to generate Service Report notifications or events to log all authorized access to management information at the object level.

    6.6.5 Assigning Objects and Security Rules to Groups

    After you have defined object sets and created security rules, you are ready to assign these objects and rules to the appropriate user groups.

     

    To Assign Objects and Security Rules to Groups

    1. In the Security window, click the Privilege Groups tab.

    2. Select the group and click Actions->Properties to display the Properties dialog for the selected group.

    3. On the Object Access Rules tab, specify the group's security rules as follows:

    From the All Rules list, select one, several or all security rules that will apply to the group and its members, and then click Add.

    4. On the Database Objects tab, specify the managed objects accessible to the group folder as follows:

    From the All Database Object list, select one, several or all database objects, and then click Add. The selected objects are listed in Group Database Objects on the right.

    5. Click OK.

    6. Repeat steps 2 to 5 for every group until you are finished.

    The group profiles in the MIS are automatically updated with the object sets and security rules.

    6.6.6 Viewing Access Privileges to Managed Objects

    Individual Solstice EM users can view the privileges that control their access to managed objects.

    Users whose access to managed objects is controlled view their privileges as follows:

    • On the Access Rules tab of the Properties dialog, when rules that deny or grant access to managed objects are put in place.
    • In the Defaults dialog, when rules that deny or grant access to managed objects have not been put in place, or for any managed objects not governed by any grant or deny rules.

    Users who do not belong to any groups view their access privileges to managed objects in the Defaults dialog.

     

    To View Privileges to Managed Objects

    1. In the Security window, click the Groups tab.

    2. Select the user or the group whose properties are to be viewed.

    3. Click Actions->Properties to display the Properties dialog for the selected group.

    4. Click the Object Access Rules tab to view the list of rules that control the group's access to managed objects.

    5. Click the Database Object tab to view the managed objects subject to access control.

    6. Click OK if changes were made, otherwise click Cancel.

     

    To View Privileges From the Default Rule

    1. In the Security window, click View->Security Defaults to display the Default dialog.

    2. Click Cancel when you are finished.

    6.6.7 Maintaining Object Sets

    Maintaining object sets includes the following activities:

    • Updating object sets
    • Deleting object sets

    The dialogs for creating and updating object sets are identical, except for their titles. As such, the procedures for creating and modifying objects are very similar.


    Caution – Security does not display warning messages when you delete object sets. Deleting object sets removes the instances representing the object sets from the MIS immediately and irrevocably.

    To make any changes you must be a user who can grant all privileges, or be logged in as root.

     

    To Update Object Sets

    1. In the Security window, click Actions->Privilege Components->Object Sets to display the Object Sets dialog.

    2. Select an object set in the list and click Edit to display the Object Sets (Edit) dialog.

    3. Enter your changes.

    4. Click OK.

     

    To Delete Object Sets

    1. In the Security window, click Actions->Privilege Components->Object Sets to display the Object Sets dialog.

    2. Continue as follows:

    • To delete an object set listed in the Object Sets dialog, select it and click Delete.
    • To delete object types and instances associated with a selected object set, click Edit to display the Target Edit dialog.

    3. Working in the Object Set Edit dialog, continue as follows:

    • To delete an object type, select it in the Objects list and click Delete.
    • To delete an object instance, select it in the Instances list and click Delete.

    4. Click OK.

    6.6.8 Maintaining Object Privileges

    Maintaining privileges for managed objects includes the following activities:

    • Updating security rules
    • Deleting security rules

    The dialogs for creating and updating privileges are identical, except for their titles. As such, the procedures for creating and modifying custom security rules are very similar.

     

    To Update Object Privileges

    1. In the Security window, click Actions->Privilege Components->Object Access Rules to display the Rules dialog.

    2. Select a rule from the list and click Edit to display the Object Access Rule Edit dialog.

    3. Make the necessary changes.

    4. Click OK.

     

    To Delete Object Privileges

    1. In the Security window, click Actions->Privilege Components->Object Access Rules to display the Rules dialog.

    2. Select the rule to delete and click Delete.

    3. Click Close.

    6.6.9 Importing/Exporting Access Control Objects

    Use previously configured access control files and parameters for the following:

    • Importing object files
    • Exporting object files
     

    To Import Access Control Objects

    1. In the Security Window, click File->Import to display the Import dialog.

    2. Enter the filename to import.

    3. Click OK.

     

    To Export Access Control Objects

    1. From the Security Window, click File->Export to display the Export dialog.

    2. Choose from the following export options:


      • All Access Control Objects
      • Users, Groups, Trusted Hosts and Application List
      • Targets, Rules and Security Defaults

    3. Enter a filename in the field to export a file.

    4. Click OK.

    6.7 Using the em_accesscmd Utility

    A number of tasks pertaining to access control can be performed from the command line. This is particularly useful when you want to automate security tasks by loading existing files.

    Solstice EM provides the em_accesscmd utility for the purpose of performing the most important security tasks.

    Instructions for the following tasks are provided in this section:

    • Creating user profiles
    • Creating group profiles
    • Assigning users to groups
    • Deleting user profiles
    • Deleting group profiles
    • Adding applications under Solstice EM control
    • Assigning user access to application features
    • Exporting files

    For a complete list of em_accesscmd commands see Section 6.8.1.3 The em_accesscmd Commands

     

    To Create User Profiles

    1. Start the em_accesscmd utility by executing the following command at a system prompt:

    em_accesscmd [-help] [-host hostname]

    2. Enter the following command:

    createUser login_name "full_name"
    For example: createUser jdoe "Jane Doe"
     

    To Create Group Profiles

    1. Start the em_accesscmd utility by executing the following command:

    em_accesscmd [-help] [-host hostname]

    2. Create the user group by entering the following command:

    createGroup group_name "group_description"
    For example: createGroup OmegaSysAdmins "System Administrations of host omega"
     

    To Assign Users to Other Groups

    1. Start the em_accesscmd utility by executing the following command:

    em_accesscmd [-help] [-host hostname]

    2. Add the user to another group by executing the following command:

    addMembers "group_name" login_name
    For example, to add Jane Doe to the Operators group, enter: addMembers "Operators" jdoe

    3. If necessary, remove the user from another user group by executing the following command:

    removeMembers "group_name" login_name
    For example: removeMembers "Operators" jdoe
     

    To Delete User Profiles

    1. Start the em_accesscmd utility by executing the following command:

    em_accesscmd [-help] [-host hostname]

    2. Delete the user by executing the following command:

    deleteUser login_name
    For example: deleteUser jdoe
     

    To Delete Group Profiles

    1. Start the em_accesscmd utility by executing the following command:

    em_accesscmd [-help] [-host hostname]
    See The em_accessmgr Command for more information.

    2. Delete the privilege group by executing the following command:

    deleteGroup "group_name"
    For example: deleteGroup "Boston_SysAdmins"
     

    To Place Tools under Solstice EM Control

    1. Start the em_accesscmd utility by executing the following command from a system prompt:

    em_accesscmd [-help] [-host hostname]

    2. Add the application by executing the following command from a system prompt:

    createApplication "app_name" "app_description"
    For example: createApplication "Wizbang" "Monitor Wiz"
     

    To Specify Tool Tasks

    1. Start the em_accesscmd utility by executing the following command from a system prompt:

    em_accesscmd [-help] [-host hostname]

    2. Specify a tool task by executing the following command:

    createFeature "app_name" "task_name" "task_description"
    For example: createFeature "Wizbang" "feature_add" "Add Wizbang objects"
     

    To Assign Tool Tasks to a Group

    1. Start the em_accesscmd utility by executing the following command from a system prompt:

    #em_accesscmd [-help] [-host hostname]

    2. Assign a tool task to a group by executing the following command:

    assignAppFeatures "privilege_group_name" "app_name" ["task_name"] "<task_description>"
    For example: assignAppFeatures "BostonAdmins" "Wizbang" "feature_add" "Add Wizbang objects to Boston network views"
     

    To get a list of Authorized Tasks for a User

    1. Start the em_accesscmd utility by executing the following command from a system prompt:

    em_accesscmd [-help] [-host hostname]

    2. Get the list by executing the following command from a system prompt:

    getAuthFeatures login_name [ "app_name"+ ] ]
    For example: getAuthFeatures jdoe "Wizbang"
     

    To Get a List of Authorized Tools for a User

    1. Start the em_accesscmd utility by executing the following command from a system prompt:

    em_accesscmd [-help] [-host hostname]

    2. Get the list by executing the following command from a system prompt:

    getAuthApps [login_name]
    For example: getAuthApps jdoe
     

    To Export Access Control Objects

    1. In the Administration window, click Security to start the Security tool.

    2. Click File->Export to use the Export dialog.

    3. Select from the following options:


      • All Access Control Objects
      • Users, Groups, Trusted Hosts and Application List
      • Targets, Rules and Security Defaults

    4. Enter a file name to export.

    5. Click OK.

    6.8 Reference

    This section provides reference information about command-line options for security operations.

    For detailed information about dialogs, menus, and other user interface elements, refer to the Solstice EM Online Help. To access Online Help, click the Help button on any dialog box or select options from the Help menu located in the upper right corner of each Solstice EM tool window.

    6.8.1 Command-Line Options

    Reference information is available for the following:

    6.8.1.1 The em_accessmgr Command

    The em_accessmgr command is the executable to start the Security tool.

    em_accessmgr [-help] [-host hostname]

    For example: em_accessmgr -host omega. This command connects to the MIS on the server omega and starts the Security application.

    TABLE 6-5   Security Command Options 
    Option Description
    -help
    Print the list of options with descriptions for the em_accessmgr command.
    -host
    Specify the connection to a remote MIS.
    hostname
    Specifies the name of the MIS server.


    6.8.1.2 The em_accesscmd Utility

    The em_accesscmd utility is the command-line interface for creating security access profiles for users, privilege groups, and tools. You enter this command and its parameters to create users, user groups, assign users to user groups, add applications, specify access controls for tool tasks, and so on.

    When adding third-party applications to Solstice EM, you first must use em_accesscmd to define the application in the MIS. Once the application is defined, you can use either em_accesscmd or the Security tool to create access control objects and assign user access privileges.

    The em_accesscmd command uses the following syntax:

    em_accesscmd [-help] [-host hostname] [-import filename]
    [-exportall/-exportapp/-export
    filename].

    TABLE 6-6   Security em_accesscmd Parameters 
    Option Description
    -host hostname
    Specifies the <hostname> of a remote MIS.
    -help
    Prints a descriptive list of options for the em_accesscmd command.
    -import filename
    Imports a file containing a set of commands to be executed by the Access Control tool. If you start the tool without using the -import option, you must create access control objects and assign privileges from the command line.
    -exportall filename


    -exportapps filename


    -exportobj filename
    Exports a file containing all Access Control object.

    Exports application level objects.

    Exports object level objects.


    6.8.1.3 The em_accesscmd Commands

    After you start Security from the command line, you can use any of the commands documented in the following table. You can call these commands either from a file to be imported with the -import option, or directly on the em_accesscmd command line.

    Please note the following:

    • No quotes are required for the login_name option or the :ALL option. Quotes are required for all other options.
    • The + character following an option means you can enter multiple instances of that option. The delimiter is a space.

      TABLE 6-7   em_accesscmd Utility Commands 
      Commands Description
      createUser login_name "full_name"
      Creates a user.
      createGroup "group_name" "description"
      Creates a group.
      createApplication "app_name" "description"
      Adds a tool. You cannot control access privileges for a tool unless it has been created.
      createFeature "app_name" "feature_name" "description"
      Creates a tool task.
      addMembers "group_name" login_name+
      Adds users to a group. You can specify one or more login names separated by spaces. Do not use quotes to delineate the login names.


      assignApps "group_name"
      [ :ALL | "
      app_name"+]
      Defines tool access for a group. If you specify :ALL, then access is granted to all tools. Otherwise, you must specify one or more tools. Access is granted implicitly to all tasks (if any) of the specified tools.


      assignAppFeatures "group_name" "app_name" ["feature_name"]+
      Defines access to tool tasks for a group. The feature_name option defaults to all tool tasks if none is entered.


      deleteUser login_name
      Deletes a user. You must first remove the user from all groups to which the user belongs.


      deleteGroup "group_name"
      Deletes a group. This command does not delete the users belonging to the group.


      deleteApplication "app_name"
      Deletes a tool. You cannot delete a tool unless you first delete all tool tasks (if any).


      deleteFeature "app_name" "feature_name"
      Deletes a tool task.
      removeMembers "group_name" login_name+
      Removes users from a group. The users are not deleted.


      deassignApps "group_name"
      [ :ALL | "
      app_name"+ ]
      Denies a group access to a tool.If you specify :ALL, then group access will be denied for all tools. Otherwise, you must specify one or more tools. Access is denied to the group for all tool tasks (if any) of deassigned tools.


      deassignAppFeatures "group_name" "app_name" ["feature_name"]+
      De assigns access to specified tool tasks for a group. The feature_name option defaults to all tool tasks if none are entered.


      getAuthFeatures [ login_name
      [ "app_name"+ ] ]
      Gets the list of authorized tool tasks for the given user and the given tools.


      If you do not specify a login, then the user currently logged in is assumed and you can not specify any tools. If you specify a login name, then you can specify any number of tool names. If you do not specify any tools, then the authorized tool tasks for all tools are listed.


      getAuthApps [login_name]
      Gets the list of authorized tools for the specified user. If no login name is specified, then the current user is assumed.



    6.8.1.4 More About Object Sets

    The following table provides detailed descriptions about object sets.

    TABLE 6-8   Criteria Defining Object Sets 
    Criteria Description
    Object Classes
    Defines a specific type of managed object. GDMO object types are identified in the GDMO files shipped with the product. For a list of object types, see the Developing Applications guide.
    Object Instances
    The representations in the MIS of a specific object in the Management Information Tree. For example, the Object Type router defines what elements constitute an object of type router as recognized by the MIS. Suppose there exists a router called Router_A, and Router_A is declared to be of Object Type router, and thereby described to and registered in the MIS. The abstract representation of Router_A in the MIS is the Object Instance of that particular physical object.
    Objects instances are also objects in the MIS.
    Scope
    Specifies the level within the topology to which an object operation can apply.
    (Object) Filter
    Allows you to further refine the criteria used to evaluate to a set of objects to which access will be controlled. For example, after enumerating the list of Object Types in the Object Set Create dialog, you can use a CMIS filter to exclude objects with a given attribute value. The remaining objects will comprise the object set to which access is controlled. For example, if you choose the object type to be toponode, then you can use a filter to specify that only those toponodes with IDs greater than a certain value are to be protected.
    Operations (Get, Set, Action, Create, Delete, Filter, and Multiple Object Selection)
    Actions you can perform against the target currently being defined.
    Multiple Object Selection on an object means that the object is being selected as a result of some scoped operation. Get includes all variations of GET, including Multiple Object Selection and Filter.
    Event Discriminator
    Support CMIS filtering for access control, as well as for the Solstice EM components and applications PMI and the Log Manager Application. You use CMIS filters to define event discriminators. A CMIS filter consists of an assertion about the presence or values of attributes in objects being tested. If a CMIS filter contains more than one assertion, the assertions can be grouped using the AND, OR, and NOT operators. Filters can be complex, because you can nest filters within filters.


    6.8.2 More About the Solstice EM-config Configuration File

    When turning on security for the purpose of controlling user access, the assignments for the access control variables in the #EM_HOME/build/acct/EM-config configuration file needs to be edited. The following table describes the variables.

    TABLE 6-9   Security Control Variables 
    Variable Name Description Enable Disable
    EM_ACCESS_PASSWORD_CONTROL
    A TRUE value will prompt the users to enter their login password.
    TRUE
    FALSE
    EM_ACCESS_CONNECTION CONTROL
    A TRUE value will grant the non-privileged users access to the MIS server.
    TRUE
    FALSE
    EM_ACCESS_BACKWARD_COMPATIBILITY
    A TRUE value allows users to connect to an Solstice EM MIS with applications linked with Solstice EM libraries. You must be running the applications as root on a trusted host.
    TRUE
    FALSE


    You can also modify the access control variables in the /var/opt/SUNWconn/em/conf/EM-config configuration file. When you run em_services -r, your changes will not be saved, and the access control settings revert to the assignments in $EM_HOME/build/acct/EM-config.
    See the Developing C++ Applications guide for details concerning this configuration file.

    Sun Microsystems, Inc.
    Copyright information. All rights reserved.
    Doc Set  |   Contents   |   Previous   |   Next   |   Index