5 Securing the Operations of the Recovery Appliance
The following steps harden the Recovery Appliance by reducing exposure to powerful users, like root and rasys and allowing improved auditing of maintenance actions. Although this procedure is optional for many installations and applications, establishing and using secure users is required for operations to be compliant with various regulatory mandates.
For purposes of example, the sample commands have three fictive users: bob, sue, and jim.
-
Create named users and assign them
db_userwith user typeadminwith administration rights.The
db_useruser typeadminreplaces the usage ofrasysfor configuration and day-to-day Recovery Appliance management operations. This account can issue certain SQLPlus commands within its assigned privileges.racli add db_user --user_type=admin --user_name=bob racli add db_user --user_type=admin --user_name=sueIn this example,
bobandsueare given--user_type=adminfor administration rights.Note:
Thedb_useruser typeadminhas limits of privileges, and cannot be used assysdbain SQLPlus. -
Create
sshusers for the Recovery Appliance.The
admin_useraccount is a role for new named users who manage the Recovery Appliance from an operation's perspective. It permits operating system level operations on the Recovery Appliance that previously requiredrootaccess, howeveradmin_useris notroot.racli add admin_user --user_name=bob racli add admin_user --user_name=jim racli add admin_user --user_name=sueIn this example,
bob,sueandjimare givenadmin_userwith administration rights. -
Disable
sshaccess forrootandoracle.racli disable ssh -
Disable
rootaccess forroot,oracle, andraadmin.racli disable root_access -
Disable
rasysaccess.Note:
Make sure that you have thedb_useruser typeadminaccounts andadmin_useraccounts before disablingrasysaccess.racli disable rasys_user -
Disable
sysremote access.racli disable sys_remote_access -
Validate the time service.
Refer to Changing the CHRONY Servers.
-
Validate that the Recovery Appliance is in compliance.
racli run check --check_name=check_ra_complianceThe above should return
TRUE. Thecheck_ra_compliancevalidates:-
sshaccess forrootandoracleis disabled on all nodes. -
rasysaccess is disabled. -
sysremote access is disabled. -
Time service is enabled.
-
Two or more
admin_usersfor the Recovery Appliance have been established. -
Two or more
db_userswho areadminhave been established.
If any of the above items are not completed,
check_ra_compliancefails, because one or more security gaps still exist on the Recovery Appliance. -
At the completion of the above steps:
- The initial set of administrative users have been configured.
- An audit trail of actions by administrative users is now possible.
- Various commands are restricted to users with the proper permissions.
- Certain commands are restricted to quorum operations requiring approval of others to finally be run.