13.12.2012 Views

HP OpenView Operations Administrator's Reference - filibeto.org

HP OpenView Operations Administrator's Reference - filibeto.org

HP OpenView Operations Administrator's Reference - filibeto.org

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

About OVO Security<br />

About Security in OVO <strong>Operations</strong><br />

Protecting Automatic and Operator-initiated Actions<br />

Action requests and action responses can contain sensitive information<br />

(for example, application password, application responses and so on) that<br />

might be of interest to intruders. In a secure system, this is not problem.<br />

However, if the requests and responses have to pass through a firewall<br />

system or over the Internet, where packets may be routed through many<br />

unknown gateways and networks, then you should take measures<br />

required to improve security.<br />

Protecting Shell Scripts<br />

In addition, automatic actions and operator-initiated actions are<br />

normally executed as root. To prevent security holes, it is essential that<br />

you protect any shell scripts (for example, those used to switch users) by<br />

assigning minimal rights and choose carefully the commands which an<br />

application uses.<br />

Switching the User for OVO Agents<br />

To further increase security, you can switch the user for OVO agents<br />

from user root to specified user account or group:<br />

❏ HTTPS-based managed nodes<br />

To switch the user for OVO HTTPS agents, use the command<br />

ovswitchuser.sh. For details, see the man page ovswitchuser(1M).<br />

❏ DCE-based managed nodes<br />

To switch the user for OVO DCE agents, use the command<br />

opcswitchuser.sh. For details, see the man page<br />

opcswitchuser(1M).<br />

Chapter 12 509

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!