SunVTS 3.0 User's Guide

Security

The SunVTS user interface running on one host can control the SunVTS kernel running on a system under test, often referred to as SUT. The user interface has to connect to the SunVTS kernel before it can control the SunVTS kernel (see "Host (Connect to) Button" for more information).

The SunVTS kernel authenticates connect requests from the SunVTS interfaces based on one of the following attributes:

The list of hosts, groups, and users are specified in the security file, .sunvts_sec, which is installed in the <SunVTS3.0 install directory> /bin. A plus (+) entry in one of these lists means all hosts, groups, or users, respectively. A template of the security file (.sunvts_sec) is located in the <SunVTS3.0 install directory> /bin.


Note -

To enable security checking, remove the plus (+) sign in the HOST section of .sunvts_sec, the default.


The following table shows a security file template.

Security File Template


#This file should be <SunVTS3.0
install directory>/bin/.sunvts_sec
#
#Any line beginning with a # is a comment line
#
# Trusted Hosts entry
# One hostname per line.
# A "+" entry on a line indicates that ALL hosts are Trusted
Hosts.
# No password authentication is done.
# The line with the label HOSTS: is required to have the
list of hosts
#
#HOSTS:
+
#host1
#host2
#
# Trusted Groups entry
# One groupname per line.
# A "+" entry on a line indicates that ALL groups are Trusted Groups.
# User password authentication is done.
# The line with the label GROUPS: is required to have the
list of groups
#
#GROUPS:
#group1
#
# Trusted Users entry
# One username per line.
# A "+" entry on a line indicates that ALL users are Trusted
Users.
# User password authentication is done.
# The line with the label USERS: is required to have the
list of users.
#USERS:
#user1
#user2

The SunVTS kernel authenticates the requests based on the entries in the security file. All access except root is denied on the local machine if the security file entry is invalid or if there is no entry in the file. You can correct an entry in this file even when the SunVTS kernel is running. When you specify the -e option with the SunVTS kernel, then the SunVTS kernel accepts Connect to requests from any host, regardless of the user identification of the SunVTS User Interface process that is initiating it.


Note -

The user password needed for authentication purposes by vtsk is the same password used to log in to the system you are testing.