14 Managing User Accounts and Access
To manage user accounts and access, you can use both the command line and the Audit Vault Server console.
14.1 About Oracle Audit Vault and Database Firewall Administrative Accounts
Oracle Audit Vault and Database Firewall administrative accounts help you manage user access.
When administrators log in to Oracle Audit Vault and Database Firewall, they have access only to administrative functions, whereas auditors have access only to the auditing functions.
Oracle Audit Vault and Database Firewall has three types of administrative user accounts:
-
Audit Vault Server Super Administrator:
-
Manages system-wide settings
-
Creates user accounts for super administrators and administrators
-
Has access to all targets and target groups
-
Grants access to targets or target groups to administrators
-
-
Audit Vault Server Administrator: Has access to specific targets or target groups granted by a super administrator. Administrators cannot manage system-wide settings.
After installing Oracle Audit Vault and Database Firewall, a post-installation configuration page lets you create and specify passwords for one super administrator account and one super auditor account for the Audit Vault Server. This super administrator and super auditor created during post installation are Audit Vault Server database users. There is at least one Audit Vault Server database user as super administrator and one as super auditor.
Thereafter, the Audit Vault Server super administrator can create other administrative users, and the super auditor can create other auditor users, for the server.
This chapter describes managing user accounts and passwords for the Oracle Audit Vault and Database Firewall administrator user interfaces.
See Also:
-
Oracle Audit Vault and Database Firewall Installation Guide for information on post-installation configuration.
-
Oracle Audit Vault and Database Firewall Auditor's Guide for information on managing auditor accounts.
14.2 Security Technical Implementation Guides and Implementation for User Accounts
Oracle Audit Vault and Database Firewall follow STIG guidelines for user accounts.
Oracle Audit Vault and Database Firewall follows the Security Technical Implementation Guides (STIG) and implementation rules for user accounts.
-
The default Oracle Audit Vault and Database Firewall user accounts must have custom passwords.
-
The number of consecutive failed login attempts is 3.
-
When a user exceeds the maximum number of unsuccessful login attempts, the account is locked until a super administrator releases it.
-
Account lockouts will persist until a super administrator resets the user account.
See Also:
Security Technical Implementation Guides for more information about STIG compliance
14.3 Configuring Administrative Accounts for Oracle Audit Vault Server
Learn how to configure administrative accounts for Oracle Audit Vault Server.
14.3.1 Guidelines for Securing Oracle Audit Vault and Database Firewall User Accounts
Review the guidelines for securing Oracle Audit Vault and Database Firewall user accounts.
As a best practice, use the installed Oracle Audit Vault and Database Firewall user accounts only as back-up accounts. Add new user accounts, with unique user names and passwords, for the users who are responsible for the day-to-day Oracle Audit Vault and Database Firewall operations.
Note:
Oracle Audit Vault and Database Firewall does not accept user names with quotation
marks. For example, "jsmith"
is
not a valid user name for an Oracle Audit Vault
and Database Firewall user account, or an account
created on a target for use by Oracle Audit Vault
and Database Firewall.
14.3.2 Creating Administrative Accounts for Audit Vault Server
You can create Audit Vault Server administrative accounts to manage administration.
14.3.3 Viewing the Status of Administrator User Accounts
Learn how to view the status of administrator accounts.
As a super administrator, you can view the status of administrator accounts by clicking the Settings tab. The Manage Admins sub tab lists all administrator and super administrator accounts, with their statuses, password expiry dates, the targets and target groups they have access to, etc.
14.3.4 Changing User Account Types for Audit Vault Server
You can change Audit Vault Server administrative account type from administrator to super administrator, or vice versa.
You can change an administrative account type from administrator to super administrator, or vice versa.
Note:
If you change a user's account type from administrator to super administrator, then the user will have access to all targets and target groups.-
Log in to the Audit Vault Server as a super administrator.
-
Click the Settings tab.
The Manage Admins section appears by default. It displays existing users and the targets or groups to which they have access.
-
Click the name of the user account that you want to change.
-
In the Modify Admin dialog, click the edit icon against the Type field.
-
You can change the type from Admin to Super Admin. If you want to change the type from Super Admin to Admin.
-
You can also grant or revoke access to any targets or groups as necessary for this user.
Release Oracle AVDF 20.1 and 20.2 Release Oracle AVDF 20.3 and later -
Select the targets or groups to which you want to grant or revoke access.
-
Click Grant or Revoke button.
A green check mark indicates access granted. A red cross mark (X) indicates access revoked.
-
Select the targets or groups to which you want to grant or revoke access. You can also search for the targets or groups in the field under Targets & Target Groups.
- Choose the access rights in the Available column and move them to the Selected column, to grant access. Choose the access rights in the Selected column and move them to the Available column, to revoke access.
-
-
Click Save.
14.3.5 Unlocking User Accounts
This procedure explains how to unlock user accounts.
14.4 Configuring sudo Access for Users
Learn about configuring sudo access for users.
14.4.1 About Configuring sudo Access
Learn about configuring sudo access.
The sudo
command enables trusted users to have administrative access to systems without having to log in using root
user passwords.
When users have sudo
access, they can precede an administrative
command with sudo
, and then be prompted to enter their password. After
authentication is complete, and assuming that the command is permitted, the command is
processed as if it had been run by the root
user.
14.4.2 Configuring sudo Access for Users
Learn about configuring sudo access for users.
You need root
privileges to configure sudo
access for users.
-
Log in to the system as the
root
user. -
Create a normal user account using the
useradd
command.For example, to create a normal user account for the user
psmith
:# useradd psmith
-
Set a password for the user using the
passwd
command.For example:
# passwd psmith Changing password for user psmith. New password: new_password Retype new password: new_password passwd: all authentication tokens updated successfully
-
Run the
visudo
utility to edit the/etc/sudoers
file.# visudo
The
sudoers
file defines the policies that thesudo
command applies. -
Find the lines in the
sudoers
file that grant access to users in the wheel group when enabled.## Allows people in group wheel to run all commands # %wheel ALL=(ALL) ALL
-
Remove the comment character (
#
) at the start of the second line, which begins with%wheel
.This enables the configuration option.
-
Save your changes and exit the editor.
-
Add the user account that you created earlier to the
wheel
group using theusermod
command.For example:
usermod -aG wheel psmith
-
Test that the updated configuration enables the user that you created to run commands using
sudo
.-
Use the
su
command to switch to the new user account that you created.# su psmith
-
Use the
groups
command to verify that the user is in the wheel group.$ groups psmith wheel
-
Use the
sudo
command to run thewhoami
command.Because this is the first time that you have run a command using
sudo
from this user account, the banner message is displayed. You will be prompted to enter the password for the user account.$ sudo whoami
The following output should appear:
We trust you have received the usual lecture from the local System Administrator. It usually boils down to these three things: #1) Respect the privacy of others. #2) Think before you type. #3) With great power comes great responsibility.
Enter the password when prompted:
[sudo] password for psmith: password root
The last line of the output is the user name that is returned by the
whoami
command. Ifsudo
access has been configured correctly, then this value isroot
.
-
14.5 Managing User Access Rights to Targets and Groups
Learn about managing users access rights to targets and groups.
14.5.1 About Managing User Access Rights
Learn about managing user access rights.
Super administrators have access to all targets and target groups and can grant access to specific targets and groups to administrators.
You control access to targets or groups in two ways:
-
Modify a target or group to grant or revoke access for one or more users.
-
Modify a user account to grant or revoke access to one or more targets or groups.
14.6 Changing User Passwords in Oracle Audit Vault and Database Firewall
Learn how to manage password changes.
14.6.1 Password Requirements
There are several password requirements that you must meet for Oracle Audit Vault and Database Firewall.
You should have a policy in place for changing passwords for Oracle Audit Vault and Database Firewall user accounts. For example, you may require that users change their passwords on a regular basis, such as every 120 days, and that they create passwords that are not easily guessed.
Requirements for Passwords Containing Unicode Characters
If your password contains unicode characters (such as non-English characters with accent marks), then the password requirement is that it:
-
Be between 8 and 30 characters long.
Requirements for English-Only (ASCII) Passwords
If you are using English-only ASCII printable characters, then Oracle AVDF requires that passwords:
-
Be between 8 and 30 characters long.
-
Contain at least one of each of the following:
-
Lowercase letters: a-z.
-
Uppercase letters: A-Z.
-
Digits: 0-9.
-
Punctuation marks: comma (,), period (.), plus sign (+), colon(:), exclamation mark (!), and underscore (_)
-
-
Not contain double quotes ("), back space, or control characters.
In addition, Oracle recommends that passwords:
-
Not be the same as the user name.
-
Not be an Oracle reserved word.
-
Not be an obvious password (such as welcome, account, database, and user).
-
Not contain any repeating characters.
14.6.2 Changing the Audit Vault Server Administrator Password
Learn how to change the password of an administrator.
Administrators can change their own password. A super administrator can also change the password of other administrators. If a super administrator changes the password of another administrator, then the password automatically expires immediately after it is changed.
14.6.2.1 Changing Your Own Password
Learn how to change your own password as an administrator.
- Log in to the Audit Vault Server as an administrator.
- In the upper right corner, to the right of your login name, select the menu icon.
- Select Change Password from this menu.
- In the Change Password window, enter the following
fields:
- Current Password
- New Password
- Re-enter New Password
- Click Save.
Related Topics
14.6.2.2 Changing the Password of Another Administrator
Learn how to change the password of another administrator as a super administrator.
A super administrator can change the passwords of other administrators. However, the password automatically expires immediately after it is changed by the super administrator. The administrator must follow the instructions in the topic Changing the Expired Password of an Administrator.
- Log in to the Audit Vault Server as super administrator.
- Click the Settings tab and then if necessary, select Security in the left navigational menu.
- Under Manage Admins, select the name of the administrator whose password you want to change.
- In the Modify Admin window, click Change Password.
- In the Change Password window, enter the following
fields:
- New Password
- Re-enter New Password
- Click Save.
Related Topics
14.6.2.3 Changing the Expired Password of an Administrator
Your password might be expired if a super administrator changes your password, or if it passes the password expiry date.
For Oracle AVDF release 20.4 or earlier, follow these steps:
-
Log in to the Audit Vault Server through SSH and switch to the
root
user. -
Switch to the
dvaccountmgr
user.su - dvaccountmgr
-
Start SQL*Plus without the user name and password.
sqlplus /
-
If the account is locked, run the following command to unlock the account:
alter user <user name> account unlock;
-
Run the following command to change the password:
alter user <user name> identified by <new_password>;
For Oracle AVDF release 20.5 or later, follow these steps:
Related Topics
14.7 Unlocking and Locking the AVSYS User
When installing or administering Oracle Audit Vault and Database Firewall
(Oracle AVDF), you sometimes need to unlock and relock the AVSYS
user.
14.7.1 Unlocking the AVSYS User
Use these steps to temporarily unlock the AVSYS
user to
complete an installation or administration task.
Prerequisite
Log in to the Audit Vault Server through SSH and
switch to the root
user.
Procedure
-
Switch to the
dvaccountmgr
user.su - dvaccountmgr
-
Start SQL*Plus without the user name and password.
sqlplus /
-
Run the following command to unlock
avsys
:alter user avsys identified by <password> account unlock;
-
Exit SQL*Plus.
exit
14.7.2 Locking the AVSYS User
Use these steps to lock the AVSYS
user after you've unlocked
it to complete an installation or administration task.
Prerequisite
Log in to the Audit Vault Server through SSH and
switch to the root
user.
Procedure
-
Switch to the
dvaccountmgr
user.su - dvaccountmgr
-
Start SQL*Plus without the user name and password.
sqlplus /
-
Run the following command to lock
avsys
:alter user avsys account lock;
-
Exit SQL*Plus.
exit
14.8 Integrating Oracle Audit Vault and Database Firewall with Microsoft Active Directory or OpenLDAP
You can use Microsoft Active Directory or OpenLDAP to control access to Oracle Audit Vault and Database Firewall.
14.8.1 About Microsoft Active Directory or OpenLDAP Integration
You can integrate a Microsoft Active Directory or OpenLDAP server to authenticate users who connect to the Audit Vault Server console.
When users log in to the Audit Vault Server console, they're prompted to select a group from a list of groups. Users are authorized from the group to which they belong and select. After a user is authenticated, access is granted based on the Microsoft Active Directory or OpenLDAP groups to which the user belongs and selects.
A super user can assign the roles to the groups on Oracle Audit Vault Database Firewall. For example, super administrator, super auditor, administrator, or auditor. Oracle Audit Vault and Database Firewall release 20.1 and later supports Microsoft Active Directory and OpenLDAP.
Note:
- While other LDAP servers may work, they are not tested or certified with Oracle Audit Vault and Database Firewall release 20.1.
- Oracle AVDF does not support the default local accounts of Microsoft Active Directory (for example administrator). Refer to Microsoft documentation for complete information on default local accounts in Active Directory.
- Microsoft Active Directory and OpenLDAP users and groups must belong to the domain specified in the topic Configuring an LDAP Server.
14.8.2 Configuring an LDAP Server
You can configure an LDAP server to authenticate users by using Microsoft Active Directory or OpenLDAP.
14.8.3 Creating New Users
Create new users for Microsoft Active Directory or OpenLDAP authentication.
14.8.4 Logging In as an OpenLDAP or Microsoft Active Directory User
After OpenLDAP or Microsoft Active Directory is configured, users can log in to the Audit Vault Server console.
Note:
Microsoft Active Directory and OpenLDAP users can connect to the Audit Vault Server only through the Audit Vault Server console. They cannot connect to the Audit Vault Server through AVCLI or SQL*Plus.