This section contains the following topics:
Integrating with eTrust Access Control
Communication Protocol Security
CA NSM was developed with detailed security and now uses a role-based approach so that the management station is not a point of concern for today's security-conscious IT environments.
CA NSM and its options are unique in providing a security methodology that protects corporate assets and also makes the system easier to manage because CA NSM security lets you segregate security according to a user's role within the organization.
CA NSM can be secured at the following levels:
Note: For information about using the Security Management component to secure CA NSM objects such as calendar and event, see the chapter "Securing CA NSM Objects."
The Management Database (MDB) maintains information about all objects in your enterprise, including their properties and relationships to other objects. You must ensure the integrity and availability of this information.
The Management Database (MDB) creates a hierarchy that you must understand so that you can access it correctly from CA NSM and its components. The CA NSM database security model uses one of the following ways to connect to the MDB, depending on which database you are using:
All connections to the MDB require a valid operating system user ID and password. That user ID must also be defined to Ingres.
All connections to the MDB require either a valid operating system ID or Microsoft SQL Server user ID. Different applications require each method of authentication.
This section defines the preferred way of connecting to and accessing database objects in the MDB. Topics covered include the following:
For a CA NSM user to connect to the MDB, that user must be one of the following types of users:
A Microsoft SQL Server user can be set up with a password, or a Windows-authenticated user can be set up by a Microsoft SQL Server user who has the system administrator database role.
User group identifiers enable the database administrator (or user that has the security privilege) to grant identical privileges to a group of users, which simplifies the task of user ID administration. A group can contain any number of users.
As part of the MDB definition, the following user groups are defined for CA NSM:
By default, no users are defined for these groups. These groups are available if you want to protect tables at the component level.
Note: For detailed information about administering Enterprise Management Database privileges in Ingres on UNIX and Linux operating systems, see the Inside Event Management and Alert Management guide.
For a CA NSM user to connect to the MDB, that user must be one of the following types of users:
Ingres users are defined without Ingres passwords. Ingres verifies the operating system user before checking whether the user is defined to Ingres.
An Ingres user can be set up with a password, at the time the user is created or by an Ingres user who has the maintain_users privilege. This password has no connection with the operating system user's password. Ingres users with privileges can change their own passwords using the ALTER USER SQL command by specifying the old and new passwords. Only an Ingres user with the correct privileges can change another user's password. Ingres user passwords are not currently used to connect to the MDB.
Important! CA NSM components may not be able to connect if the Ingres user has been assigned a password.
An Ingres user can be set up with an expiration date. Once that date is past, the Ingres user cannot connect to Ingres until the expiration date is reset. Only an Ingres user with the correct privileges can reset the expiration date.
Note: Ingres user expiration dates are not currently used to connect to the MDB.
For security reasons, the Ingres user mdbadmin owns all database objects, does not have a corresponding operating system user ID, and should not be used by any application.
CA NSM prompts you to create a CA NSM administrator account with a password (Ingres databases) or a Microsoft SQL Server account with a password (Microsoft SQL Server databases). The default is nsmadmin.
Note: The WorldView Manager component must be installed on the MDB server computer.
When you install the CA NSM Server component, you are prompted to create a CA NSM Microsoft SQL Server account with a password. You can create another user who will have CA NSM administrator privileges for the MDB.
For example:
sp_adduser 'nsmadmin', 'uniadmin'
When you install the CA NSM Server component, you are prompted to create a CA NSM administrator account with a password. You can create another user who will have CA NSM administrator privileges for the MDB.
For example:
CREATE USER nsm_admin_user WITH group = uniadmin
Note: You can create an operating system user with a password expiration date, which may be a requirement for your organization. The Ingres VNODE entry on the client will not be able to connect to the server until the password entry for the VNODE is reset.
Important! For security reasons, do not create an operating system user called mdbadmin.
Remote connections to the MDB using Ingres use an Ingres VNODE.
During the CA NSM installation on UNIX and Linux operating systems, a VNODE called nsm_servername is created to provide connectivity to the MDB by daemons and other utilities running as root. Only processes running under the root ID have access to this VNODE.
WorldView
For WorldView on Windows, the following naming standard applies:
WV_servername
Each logical repository name in WorldView, which is created by running the Define Logical Repository utility, has a VNODE created with the same name.
When WorldView attempts to connect to the MDB, a connection dialog appears, which prompts for a server name to connect to.
The WorldView registry is scanned to look for a valid VNODE for the server and user combination. If one is found, WorldView connects with that VNODE.
If the connection fails, the connection dialog prompts for a user ID and password, and from this information the VNODE is updated and the connection is attempted again. If the connection fails again, this cycle is repeated until the connection succeeds, or the user clicks Cancel. If the connection succeeds, the VNODE is saved for subsequent connections to WorldView.
When you are using the WorldView Classic GUI (Windows), the user ID and password you provide on the Repository Sign On dialog is saved and stored in the VNODE. When you start any additional WorldView component, such as Object Browser or Severity Browser, you are not prompted again for MDB credentials because the credentials saved in the VNODE are used.
For WorldView on UNIX and Linux, most WorldView components have input parameters that let you specify the server to connect to and the user name and password to use. Components that are run without specifying the server use the DefaultRepository registry entry, which is set at installation, to determine the server.
Security at the product level helps keep unauthorized users from causing problems with key infrastructure components. Component level security focuses on improving the following two aspects of security:
CA NSM security provides about 100 rules, 9 roles (also known as user groups), and about 100 assettypes. CA NSM provides embedded security, which is a DENY mode security engine that, by default, is turned on. The following components use CA NSM embedded security:
Note: Security is not installed by default, nor is it a selectable option. If you select any of the components that use security, the installation asks if you would like to enable security, and installs security if you answer "yes.” For Windows, the question appears only when you are installing CA NSM in non-Express mode.
Without specific "permit" security rules for a given role or user, access to a component is denied. Default permit rules are created and activated for each of the components that uses embedded security for the following roles and types of access:
Exceptions to the above rules are as follows:
Security Management provides a policy‑based security system that protects against unauthorized access to vital CA NSM components and products.
To protect your management systems, you must augment physical security with software that can do the following:
Enhanced and simplified Security Management means reduced errors, greater responsiveness, and increased flexibility in meeting the needs of your organization. Most importantly, it means you can implement thorough and effective security policies without disrupting your work environment.
Note: The CA NSM Security Management components no longer provide file access authorization. If you need this type of additional security, you may want to evaluate eTrust Access Control. For more information, see Integration with eTrust Access Control.
Certain CA NSM components and applications update configuration information. To run such components or applications, a user must be a member of the Windows Administrators or Power Users group, or root on UNIX/Linux. These components include the following:
Note: On UNIX and Linux, members of the Power Users group that have update, delete, insert, and select privileges can also run dscvrbe.
When CA NSM is installed on Windows, a prompt appears that lets you create a CA NSM operating system user ID and password.
To change the operating system password for this account, follow these steps:
Note: For more information about running modp, see the online CA Reference.
When CA NSM is installed, the Severity Propagation Service is registered and a SeverityPropagation user account with a strong password is automatically created. A RunAs user account with the same password is also added to the dcomcfg utility. These user IDs are created so that the Severity Propagation Engine can stay connected when the user logs off of the computer.
You may want to change the password for these user accounts for security reasons. To do this, you must deregister the Severity Propagation Service and re-register it with a new password.
Important! Failure to deregister and re-register the Severity Propagation Service correctly will result in a catastrophic failure of many CA NSM subsystems. Any errors that occur during registration and deregistration are written to the application event log in the operating system's event viewer.
To change the password for the SeverityPropagation and RunAs user accounts
sevpropcom /unregister
The Severity Propagation Service is removed from the dcomcfg utility and the SeverityPropagation user account is removed.
sevpropcom /regserver
Note: You can use the sevpropcom /regserver /password command to register the DCOM server with a user-defined password. You must ensure that all password requirements are met if you enter your own password.
Microsoft Windows 2003 Server has strict security controls in place for user accounts other than the user under which a product was installed. If you installed CA NSM while logged on as a particular user, for example, administrator, but want to run CA NSM using another user account, you may need to allow write permissions to the other user account from the administrator account.
By default, Windows Vista gives administrators only standard user privileges through its User Account Control. To install CA NSM and run most CA NSM commands, admin privileges are required; therefore, you may receive an 'Access is Denied' message when trying to run utility commands from a command prompt on Windows Vista even if you are an administrator.
To override User Access Control without disabling it completely and obtain admin level privileges required to run CA NSM utilities, we recommend launching a command prompt with "Run as Administrator" on Windows Vista systems.
To run utilities requiring administrator privileges on Windows Vista
The User Account Control dialog opens asking you to confirm the action.
The command prompt appears with Administrator: Command Prompt in the title.
You can run all CA NSM utilities requiring administrator privileges in this command prompt.
Only nsmadmin, or the CA NSM administrator that was used to install the Ingres server on the MDB server, can run Discovery after CA NSM is installed. You may want to give other administrative users authority to run Discovery.
To create a user with administrator privileges
addntgroup -a "TNDUsers" -s repository_name -u "userid" -p "password" -b mdb -g uniadmin
The Microsoft SQL Server user is created as a member of the uniadmin role.
modp -r repository_name -u nsmadmin -n nsmadmin_password
Note: You only need to run the modp command if Discovery is run on a new remote MDB, that is, a different MDB than the one used during installation.
The user ID you created has the authority to run Discovery.
|
Copyright © 2010 CA.
All rights reserved.
|
|