13.12.2012 Views

HP OpenView Operations Administrator's Reference - filibeto.org

HP OpenView Operations Administrator's Reference - filibeto.org

HP OpenView Operations Administrator's Reference - filibeto.org

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

About Process Security<br />

About OVO Processes<br />

About Process Security<br />

When communication between the management server and the managed<br />

nodes is required, OVO carries out basic authorization checks<br />

independently of DCE. However, DCE enables you to implement a much<br />

more stringent security policy at process levels between, for example, an<br />

RPC client and an RPC server, specifically in the areas of authentication<br />

and data protection.<br />

The level of data protection is chosen by the client, although the server<br />

has the option of deciding whether a chosen level is sufficient. OVO<br />

handles authentication in the context of either the RPC client or the RPC<br />

server. For example, just as a server verifies that an incoming request is<br />

from a genuine OVO client, so an RPC client verifies that the server it is<br />

calling is a real OVO server.<br />

About Process Authentication<br />

During the authentication process, the OVO RPC obtains a login context.<br />

Every secure RPC process has a login context, which it either inherits<br />

from its parent process or establishes itself. The login context requires a<br />

name (or principal) and a password (or key). Since OVO processes<br />

usually run without any user interaction, reliance on an inherited login<br />

context is not sufficiently secure. For this reason, each process creates its<br />

own login context, with a name and password that must be registered at<br />

the DCE security service. However, as in UNIX, multiple OVO processes<br />

may run within the same login context. Management and maintenance<br />

of the login context is carried out internally by the control agent and<br />

control manager.<br />

After the authentication process has completed successfully, a connection<br />

is established, and the RPC request-reply sequence starts.<br />

Authentication can be limited to the connection, the first RPC<br />

client-server call, or all RPCs between the client and server.<br />

Chapter 10 389

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!