Trusted Solaris Administration Overview

Chapter 2 Quick Tour of the Admin Tools

This chapter presents an overview of the tools available in the Trusted Solaris environment, how they are accessed, and the databases on which they operate.

Introduction to Trusted Solaris Administration

Administration in the Trusted Solaris operating environment uses many of the same tools available in the Solaris operating environment and offers security-enhanced tools as well. The difference between the environments lies in how administration tools are accessed and how this access is restricted.

Accessing Tools in a Role Workspace

To use the Trusted Solaris administration tools, you must be in a role account with the assigned rights profiles that contain the desired trusted applications.The following procedure describes how to access a role workspace.

To Access a Role Workspace
  1. Log in as a normal user.

  2. Assume a role using the Trusted Path menu. If a role workspace already exists, click the role workspace button in the Front Panel.

  3. Supply the role password.

    Note that the default label for a role workspace is the role's minimum label, usually ADMIN_LOW. If desired, you can switch labels by choosing Change Workspace Label from the Trusted Path menu while the pointer is over the role workspace button.

To leave a role workspace temporarily, click any other workspace button. To destroy the workspace, choose Delete from the Trusted Path menu while the pointer is over the role workspace button.

Within the role workspace, you can access four types of trusted applications:

Remote Administration

You can perform remote administration in the Trusted Solaris operating environment using the Solaris Management Console. You can also log into a remote host from another Trusted Solaris host in the system. Depending on your site's security policy, you can make adjustments to log in from a non-Trusted Solaris system, although this will make your system somewhat less secure. See "Administering Remote Systems" under "Administering Systems in an Administrative Role" in Trusted Solaris Administrator's Procedures.

Solaris Management Console Tools

The Solaris Management Console (SMC) provides access to families of GUI-based administration tools. These tools enable you to edit items in various configuration databases.

SMC Toolboxes

The SMC tools are stored in sets referred to as toolboxes. For the security-related tools in the Trusted Solaris environment, you need to open the Trusted Solaris Management Console toolbox. Within the Trusted Solaris toolbox, you can access tools according to scope, that is, the name service for the administration files accessed by the tools: local host, NIS, or NIS+.

Organization of the Solaris Management Console

The SMC is shown in the following figure, with the Trusted Solaris toolbox loaded and the Users tool open.

Figure 2-1 Typical Trusted Solaris SMC

Graphic

SMC Documentation

The main source of documentation for using the SMC and its tools is the online help system. There are two forms of online help: context-sensitive help and expanded help topics. The context-sensitive help is tied to the currently selected feature and is displayed in the information pane. The expanded help topics are available from the Help menu or by clicking cross reference links in the context-sensitive help. The help topics appear in a separate viewer.

Trusted CDE Actions

This section presents the CDE actions available to roles and describes how to use or change the restricted editor used in these actions.

To Access Trusted CDE Actions
  1. Right-click the background to bring up the Workspace Menu.

  2. Press Applications, then click Application Manager.

  3. In the Application Manager, double-click the System_Admin icon.

    The CDE action icons display in the Application Manager window.

  4. Invoke the desired action by double-clicking its icon.

    A window or dialog box for the appropriate action appears.

The trusted CDE actions are listed in the following table.

Table 2-1 Administrative Actions, Purposes, and Default Roles
 Action Name Purpose of Action Default Rights Profile

Add Allocatable Device

Creates devices by putting entries in device_allocate(4), and device_maps(4). See add_allocatable(1M).

Device Security 

Admin Editor

Edits any specified file 

Object Access Management 

Audit Classes

Edits audit_class(4)

Audit Control 

Audit Control

Edits audit_control(4)

Audit Control 

Audit Events

Edits audit_event(4)

Audit Control 

Audit Startup

Edits the audit_startup.sh script. See audit_startup(1M).

Audit Control 

Check Encodings

Runs chk_encodings(1M) on specified encodings file

Object Label Management 

Check TN Files

Runs tnchkdb(1M) on local tnidb(4), tnrhdb(4), and tnrhtp(4) files

Network Security 

Check TN NIS+ Tables

Runs tnchkdb(1M) on tnrhdb(4), and tnrhtp(4) NIS+ trusted network maps

 Network Management

Configure Selection Confirmation

Edits /usr/dt/config/sel_config. See sel_config(4).

Object Label Management 

Create NIS Client

Runs ypinit(1M), using both the specified hostname for the NIS master and the specified domain name

Name Server Security 

Create NIS+ Client

Runs nisclient(1M), using both the specified hostname for the NIS+ master and the specified domain name

Name Server Security 

Create NIS Server

Runs ypinit(1M) using the specified domain name

Name Server Security 

Create NIS+ Server

Runs nisserver(1M) using the specified domain name

Name Server Security 

Edit Encodings

Edits specified label_encodings(4) file and runs chk_encodings(1M)

Object Label Management 

Name Service Switch

Edits nsswitch.conf(4)

Network Management 

Populate NIS Tables

Runs nispopulate(1M) from the specified directory

Name Service Security 

Set Daily Message

Edits /etc/motd

Network Management 

Set Default Routes

Edits /etc/defaultrouter. See route(1M).

Network Management 

Set DNS Servers

Edits resolv.conf(4)

Network Management 

Set Mail Options

Edits /etc/mail/sendmail.cf. See sendmail(1M).

Mail Management 

Set Mount Attributes

Edits vfstab_adjunct(4)

File System Security 

Set Mount Points

Edits vfstab(4)

File System Management 

Set TSOL Gateways

Edits tsolgateways(4)

Network Management 

Shared Filesystem

Edits dfstab(4). Does not run share(1M).

File System Management 

View Table Attributes

Runs niscat(1) with the -o option on the specified NIS+ trusted network database to display the table's attributes.

Name Service Management 

View Table Contents

Runs niscat(1) on the specified NIS+ trusted network database to display the table's contents.

Name Service Management 

Admin Editor

The Admin Editor action, which can also be accessed from the command adminvi(1M), is a modified version of the vi(1) command. It restricts the user from executing shell commands and from writing to (saving to) any file other than the original file being edited. The Admin Editor action, which is assigned to the security administrator role by default, should be used in most cases instead of adminvi on the command line to edit or create administrative files. This is due to the fact that the Admin Editor is a wrapper for adminvi that incorporates auditing and allows an editor preference. You can assign the adminvi command to any users with the profile shell as their default if you need to provide them a text editor with the restrictions of adminvi.

Changing the Default Admin Editor

The Admin Editor is launched through the /usr/dt/bin/trusted_edit shell script, which brings up the editor specified in the EDITOR environment variable for the role account, restricts saves, and audits any changes made at the time the file is saved. The variable is set to adminvi(1M) by default, but the security administrator role can redefine the EDITOR variable to /usr/dt/bin/dtpad. When adminvi is specified, /bin/adminvi is invoked as root to edit the file. The adminvi command prevents the saving of the file with any other name. If dtpad(1) is specified, the New, Save, and Open options in the File menu are disabled when the action runs so that the file cannot be renamed.

Administering Users

You can administer users through either the SMC Users tool set or from the command line.


Note -

To administer users, you need to be in an administrative role with the User Manager rights profile for general user attributes and the User Security rights profile for security-related attributes.


Default User Attributes

The task of entering new users is greatly simplified by setting up default user attributes so that only those attributes unique to a specific user need be added. There are three mechanisms for setting up defaults:

To create new users, use the Add User With Wizard and Add User From Template menu options. The wizard approach offers simplicity but with these tradeoffs:

The user template approach offers a larger set of user properties, but requires you to set up one or more templates of default user attributes ahead of time. Both methods should be used in conjunction with the policy.conf(4) and the label_encodings(4) databases. The User Properties dialog box lets you make modifications after the initial user information has been entered.

User Attribute Databases

User information is held in the following databases:

These databases can be edited manually, although this practice is not generally recommended.

The following figure shows how the databases work together to provide user attributes.

Figure 2-2 User Database Relationships

Graphic

The user_attr database contains the attributes shown, including a comma-separated list of profile names. The contents of the profiles are split between the prof_attr file, which contains profile identification information, authorizations assigned to the profile, and subordinate profiles, and the exec_attr file, which contains commands and actions with their associated security attributes. The auth_attr file supplies available authorizations to the prof_attr file and the policy.conf file. (Note that although you can assign authorizations directly to users through user_attr, this practice is discouraged.) The policy.conf file supplies default attributes to be applied to all users. The label_encodings file supplies label defaults if they are not otherwise specified.

Managing Users from the Command Line

The user files can also be managed from the command line. The smuser(1M) command adds, modifies, deletes, and lists user information. You can use smmultiuser(1M) to enter a batch of users.

Managing Users Through the SMC

This section describes the SMC Users tool set and selected dialog boxes as follows:

For complete descriptions of elements in the Users tool set, refer to the online help.

Users Tool Summary

The SMC Users tool set is shown in the following figure.

Figure 2-3 SMC Users Tool

Graphic

The six dialog boxes in the Users tool set are:

User Properties Dialog Box

The User Properties dialog box is shown below with the General tab selected.

Figure 2-4 User Properties Dialog Box

Graphic

The following table describes the purpose of each tab in the User Properties dialog box.

Table 2-2 User Properties Summary

Tab  

Description 

General  

Specifies the user, the default login shell, and the account availability.  

Group  

Sets the user's primary and secondary groups for the purpose of accessing and creating files and directories.  

Home Directory 

Specifies the user's home directory, home directory server, automounting, and directory access. 

Password  

Specifies whether the user or the administrator will select the first password and whether the selection and changes will be manual or from the password generator.  

Password Options  

Sets the time limits and requirements for password changes. 

Mail  

Specifies the server that provides email and the mailbox in which it is received. 

Rights 

Used to assign rights profiles to the user. The precedence of the assigned rights profiles can be changed.  

Roles 

Allows available roles to be assigned to the user.  

Trusted Solaris Attributes  

Specifies the clearance and minimum label at which the user can operate and how labels are displayed to the user. Also specifies a time limit for which a computer may remain idle and the action taken when the limit is reached. 

Audit  

Specifies the audit classes for which the user is to be audited.  

Right Properties Dialog Box

The Rights Properties dialog box is shown below with the General tab selected.

Figure 2-5 Rights Properties Dialog Box

Graphic

The following table describes the purpose of each tab in the Right Properties dialog box

Table 2-3 Rights Manager Dialog Box Summary

Tab  

Description 

General  

Identifies and describes the rights profile and provides the name of the help file used to explain it.  

Commands  

Assigns commands to the rights profile and adds security attributes (effective and real UIDs and GIDs; minimum label and clearance; and inheritable privileges) to specific commands in the profile.  

Actions  

Assigns CDE actions to the rights profile and adds security attributes (effective and real UIDs and GIDs; minimum label and clearance; and inheritable privileges) to specific actions in the profile. 

Authorizations  

Assigns authorizations to the profile.  

Supplementary Rights  

Specifies other rights profiles to be contained within the current rights profile. 

Administering Hosts and Networks

The Computers and Networks tool set administers hosts and networks. A typical set is shown in the following figure.

Figure 2-6 Computers and Networks Tool

Graphic

Computers and Networks gives you access to three tools:

Security Families Tool Set

A security family is a group of hosts that use a common networking protocol and have the same security requirements. As a result, you can apply the same template of network security attributes to them for the purpose of receiving and transmitting data. Trusted networking and templates are explained in more detail in Chapter 3, Administering Trusted Networking.

When the Security Families tool is opened, all available templates display as icons. You can modify either the templates or the host assignments as follows:

Figure 2-8 Modify Template Dialog Box

Graphic

The tabs in the Modify Template dialog box are described in the following table.

Table 2-4 Template Dialog Box Summary

Tab  

Description 

General  

Specifies templates, host types, and minimum/maximum labels.  

Access Control Attributes  

Specifies security attributes to be applied to incoming data from hosts to which this template is applied. The potential incoming security attributes include minimum label, maximum label, default label, and default clearance. 

Advanced Security Attributes 

Specifies security attributes to be applied to outgoing data to hosts to which this template is applied. The potential outgoing security attributes include DOI, IP label type, forced privileges, allowed privileges, RIPSO send class, RIPSO send PAF, RIPSO return PAF, and CIPSO domain.  

Administering Other Aspects of the Trusted Solaris Environment

This section lists other commands available for administering the Trusted Solaris operating environment.

File Management Commands

File privileges and labels can be administered either through the File Manager or the following commands:

File System Management Commands

The following commands are for administering attributes on file systems.

Mount Management

The following commands are for mounting file systems. Check the Trusted Solaris Summary section of each man page for differences from the Solaris operating environment.

Process Commands

The following commands are for managing processes: