Next Topic: Simulate Access Attempt to Verify Access


How to Identify and Correct an Access Rights Problem

CA Chorus for Security and Compliance Management™

Version 03.0.00

 

CA Technologies

How to Identify and Correct an Access Rights Problem

As a security administrator, modifying access rights for resources within your scope is a task that you regularly perform. This task is important because it:

This example describes how you can use CA Chorus and CA Top Secret to identify and correct an access rights problem, and then verify that you have corrected the problem.

This illustration shows each of the steps the Security Administrator needs to perform to identify and correct an access rights problem.

In this example, you have just received a service desk ticket with the following information:

Your research indicates that the employee needs read access to a particular data set.

Perform these tasks to identify and correct the access problem:

  1. Identify the missing role.
  2. Modify access rights.
  3. Verify the New Access.

Identify the Missing Role

Use the Investigator to compare two users to identify which role a user requires to access a particular resource.

In CA Chorus a role is a collection of rules that define permissions for access to resources. Adding rules in groups helps you to administer security more efficiently and accurately.

Follow these steps:

  1. Add the Investigator module to your workspace and click Start New Investigation.
  2. Select Security.
  3. Select Definitions, Users from the Investigator tree.

    The Search Users view appears.

  4. Filter users by User ID or Group and click Search.
  5. Select each user to compare from the list and click Add to Visualizer under Actions.

    The Visualizer opens showing icons for each added user.

  6. Right-click each user icon, select Show Child Objects, Show Roles.

    The relationships between the roles for each user appear.

  7. Drill down into any unshared roles by clicking the role icon and selecting Show Rules on the Actions pane.

    Rules for that role appear in the bottom pane.

  8. Examine the rules until you find the rule that grants access appropriate access to the resource you are looking for.

    You have identified the access problem.

Modify the Access Rights

Add a profile to a user ACID using the Security Administration Interface. Adding a profile to an ACID adds all the rules contained in the profile to the ACID.

Follow these steps:

  1. Add the Quick Links module to your workspace and click Administer Security Definitions.

    The main Security Administration window opens.

  2. Click the applicable Security Administration instance from the Administration pane.

    One of the following occurs:

    You are logged in to the selected system.

  3. Select ACIDs, Modify an Acid on the Administration pane.
  4. Enter the user ACID to add the profile to in the ACID field and click Search.
  5. Select the ACID.
  6. Click the Profile/Group List subheading.
  7. Enter the profile name to add in the Profile/Group Name field.
  8. Enter the appropriate information in the remaining fields.
  9. Click Modify.

    The profile is added to the user ACID.

Simulate Access Attempt to Verify Access

Use the Simulator to test the access of a user to a data set. Simulating access verifies that a user ID has the appropriate access rights to a resource.

Follow these steps:

  1. Add the Quick Links module to your workspace and click Simulate Access Attempt.
  2. Select the correct system from the System drop-down list.
  3. Choose one of the following options:

    Note: After you select a system, CA Chorus generates a PassTicket to authorize your connection. If the PassTicket authorization fails, you can enter your password to access the system.

  4. Enter your user name.
  5. Enter the password for the selected system. The Password field appears in the following cases:
  6. Enter the appropriate information in the remaining fields and click Simulate.
  7. Review the simulation results to verify that the user now has appropriate access to the data set.