Oracle® Argus Insight Minimum Security Configuration Guide Release 7.0.2 E39322-01 |
|
|
PDF · Mobi · ePub |
Minimum Security Configuration Guide
Release 7.0.2
E39322-01
February 2013
This document describes how to configure security settings for the Argus Insight application. You configure these settings after you install Argus Insight. For details about installing the application, see the Oracle Argus Insight Installation Guide.
You need to grant permissions to the PwReports.exe file, which is the executable for the Argus Insight application.
In addition, you need to create a domain user who will have access to the web servers and all network services that will be configured in Argus Insight. The instructions in this document use an example user, named safety_user. You need to substitute safety_user with the name of the domain user that you create.
Note:
You need to complete the instructions in this section for each web server and report server in your installation.To configure the permissions for the Argus Insight application:
Go to the web server or the report server.
Click Start and select Control Panel.
Double-click Administrative Tools.
Double-click Component Services.
Navigate to Console Root, Component Services, Computers, My Computer, and select DCOM Config.
Right-click PwReports (that is, Argus Insight application) and select Properties from the menu.
Click the Security tab.
Modify the Launch and Activation Permissions as follows:
Select the Customize option.
Click Edit. The Launch and Activation Permission dialog box opens.
Click Add to add the domain user who will have launch and activation permissions.
Select the Allow check box for the Local Launch option and the Local Activation option.
Select the Deny check box for the Remote Launch option and the Remote Activation option.
Click OK.
Click Yes in response to the message about Deny permissions.
Modify the Access Permissions as follows:
Select the Customize option.
Click Edit. The Access Permission dialog box opens.
Click Add to add the domain user who will have access permissions.
Select the Allow check box for the Local Access option.
Select the Deny check box for the Remote Access option.
Click OK.
Click Yes in response to the message about Deny permissions.
Modify the Configuration Permissions as follows:
Select the Customize option.
Click Edit. The Change Configuration Permission dialog box opens.
Click Add to add the domain user who will have configuration permissions.
Select the Allow check box for the Full Control option and the Read option.
Click OK.
Click OK to save your changes and close the PwReports Properties dialog box.
To configure permissions in the Windows system registry:
Open the Windows Registry Editor:
Click Start and select Run.
Enter regedit.
Click OK.
Navigate to the following folder:
HKEY_USERS\S-1-5-20
Right-click the S-1-5-20 folder and select Permissions. The Permissions for S-1-5-20 dialog box opens.
Click Add to add the domain user.
Select the Allow check box for the Full Control option.
Click OK.
To grant permission to IIS metabase:
Use the Run as administrator option to open and run Command Line.
Note:
Make sure you run the following command as administrator.Grant the safety_user permission to access IIS metabase:
C:\WINDOWS\Microsoft.NET\Framework\v2.0.50727>aspnet_regiis.exe -ga
"safety_user"
This section, which describes how to configure folder access to the web user account, includes the following topics:
The instructions in this section assume your installation has a domain server and all servers are configured in that domain.
On every web server, configure Anonymous access as follows:
Navigate to Internet Information Services (IIS) Manager.
Double-click Authentication.
Select Anonymous Authentication and click Edit. The Edit Anonymous Authentication Credentials dialog box opens.
Click Set to define the user credentials for the Safety domain user (safety_user).
Click OK to save your changes.
On every web server, you must configure the following virtual directories to connect as the Safety domain user (safety_user):
Cancel
InsightNet
PDFReports
Scheduled Reports
To configure these virtual directories:
Select one of the virtual directories and click Basic Settings. The Edit Application dialog box opens.
Click Connect as. The Connect As dialog box opens.
Select the Specific user option and click Set. The Set Credentials dialog box opens.
Enter the user name and password for the Safety domain user (safety_user).
Click OK until you close all the open dialog boxes.
Repeat the process for the other virtual directories.
You must configure the following application pools to run under the safety_user identity:
Argus Insight App Pool
CancelQuery Pool
InsightNet Pool
To configure these pools:
Select Application Pools to open the Application Pools page.
Select one of the application pools that you must configure.
Click Advanced Settings. The Advanced Settings dialog box opens.
Expand Process Model.
Edit the Identity.
Select the Custom account option and click Set. The Set Credentials dialog box opens.
Enter the user name and password for the Safety domain user (safety_user).
Click OK until you close all the open dialog boxes.
Repeat the process for the other application pools.
You must assign the Safety domain user (safety_user) the proper read, modify, and execute permissions for the following folders and files:
C:Windows\AI.ini
C:Windows\ArgusSecureKey.ini
C:\Temp
Insight_Installation_Directory\ArgusInsight\Bin\Log
Insight_Installation_Directory\ArgusInsight\Bin\Logs
Insight_Installation_Directory\ArgusInsight\CacheTemp
Insight_Installation_Directory\ArgusInsight\PDFReports
Insight_Installation_Directory\ArgusInsight\Scheduled Reports
Insight_Installation_Directory\ArgusInsight\Upload
To configure the permissions:
Navigate to the appropriate file or folder.
Open the Permissions dialog box.
Select the Allow check box for the following permissions:
Modify
Read & execute
Read
Note:
Do not provide Full control for any of these folders or files.Click OK to save your changes.
Repeat the process for the other files and folders.
To configure HTTPS:
Log in to the web server.
Start Internet Information Services (IIS) Manager.
Select the server node, select the Server Certificates icon in the IIS section, and click Open Feature.
Create or import your SSL certificate.
Wait until the certificate is created.
Navigate to Sites, select Argus Insight, and click Bindings.
Click Add. The Add Site Binding dialog box opens.
In the Type field, select https from the list.
In the Port field, enter the SSL port to bind.
In the SSL certificate field, select Argus Insight from the list.
Click OK to save your changes.
HTTPS is now enabled for Argus Insight.
To ensure the SSL connection is required:
Navigate to Sites and select Argus Insight.
Select the SSL Settings icon in the IIS section.
Click Require SSL.
Click Apply.
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc
.
Oracle customers have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info
or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs
if you are hearing impaired.
Oracle Argus Insight Minimum Security Configuration Guide, Release 7.0.2
E39322-01
Copyright © 2013 Oracle and/or its affiliates. All rights reserved.
This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited.
The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing.
If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, the following notice is applicable:
U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, the use, duplication, disclosure, modification, and adaptation shall be subject to the restrictions and license terms set forth in the applicable Government contract, and, to the extent applicable by the terms of the Government contract, the additional rights set forth in FAR 52.227-19, Commercial Computer Software License (December 2007). Oracle America, Inc., 500 Oracle Parkway, Redwood City, CA 94065.
This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications.
Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners.
Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group.
This software or hardware and documentation may provide access to or information on content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services.