19.08.2013 Views

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

RMX 2000 Administrator's Guide Version 7.6.1 - Polycom

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Polycom</strong> <strong>RMX</strong> 1500/<strong>2000</strong>/4000 Administrator’s <strong>Guide</strong><br />

For enhanced security reasons it is necessary for the <strong>RMX</strong> to process user connection<br />

requests in the same manner, whether they be from regular users accessing the <strong>RMX</strong> via<br />

the <strong>RMX</strong> Web Browser / <strong>RMX</strong> Manager or from application-users representing applications<br />

such as CMA and DMA.<br />

Regular users can connect from any workstation having a valid certificate while applicationusers<br />

representing applications can only connect from specific servers. This policy ensures<br />

that a regular user cannot impersonate an application-user to gain access to the <strong>RMX</strong> in order<br />

to initiate an attack that would result in a Denial of Service (DoS) to the impersonated<br />

application.<br />

The connection process for an application-user connecting to the <strong>RMX</strong> is as follows:<br />

1 The application-user sends a connection request, including its TLS certificate, to the<br />

<strong>RMX</strong>.<br />

2 The <strong>RMX</strong> searches its records to find the FQDN that is associated with the applicationuser’s<br />

name.<br />

3 If the FQDN in the received certificate matches that associated with application-user, and<br />

the password is correct, the connection proceeds.<br />

<strong>Guide</strong>lines<br />

• Application-users are only supported when TLS security is enabled and Request peer<br />

certificate is selected. TLS security cannot be disabled until all application-user accounts<br />

have been deleted from the system.<br />

• For Secure Communications, an administrator must set up on the <strong>RMX</strong> system a machine<br />

account for the CMA system with which it interacts. This machine account must include<br />

a fully-qualified domain name (FQDN) for the CMA system.<br />

• Application-user names are the same as regular user names.<br />

Example: the CMA application could have an application-user name of CMA1.<br />

• The FQDN can be used to associate all user types: Administrator, Operator with the<br />

FQDN of a server.<br />

• Multiple application-users can be configured the same FQDN name if multiple<br />

applications are hosted on the same server<br />

• If the system is downgraded the application-user’s FQDN information is not deleted<br />

from the <strong>RMX</strong>’s user records.<br />

• A System Flag, PASS_EXP_DAYS_MACHINE, enables the administrator to change the<br />

password expiration period of application-user’s independently of regular users. The<br />

default flag value is 365 days.<br />

• The server hosting an application-user whose password is about to expire will receive a<br />

login response stating the number of days until the application-user’s password expires.<br />

This is determined by the value of the<br />

PASSWORD_EXPIRATION_WARNING_DAYS System Flag. The earliest warning<br />

can be displayed 14 days before the password is due to expire and the latest warning<br />

can be displayed 7 days before passwords are due to expire. An Active Alarm is created<br />

stating the number of days before the password is due to expire.<br />

• The MIN_PWD_CHANGE_FREQUENCY_IN_DAYS System Flag does not effect<br />

application-user accounts. Applications typically manage their own password change<br />

frequency.<br />

• If an application-user identifies itself with an incorrect FQDN, its account will not be<br />

locked, however the event is written to the Auditor Event File.<br />

14-2 <strong>Polycom</strong>, Inc.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!