27.12.2012 Views

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

The Virtualization Cookbook for SLES 10 SP2 - z/VM - IBM

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

One rule that can be recommended is to only have as few virtual machines logged on (or<br />

disconnected) as possible to handle the workload being presented. Every virtual machine that<br />

is not required should be logged off where appropriate, as this will mean more memory <strong>for</strong> the<br />

other virtual servers which remain running.<br />

2.5 Password planning<br />

Good passwords are critical to good security. However, requiring many different passwords<br />

generally leads to people writing them down, which clearly detracts from good security.<br />

Sometimes it is difficult to balance these two extremes.<br />

This book considers different system administration roles:<br />

► <strong>The</strong> z/<strong>VM</strong> system administrator<br />

► <strong>The</strong> Linux system administrator<br />

► <strong>The</strong> Linux virtual server end users<br />

<strong>The</strong> z/<strong>VM</strong> and Linux system administrator may be the same person.<br />

<strong>The</strong> method of backing up z/<strong>VM</strong> data onto the Linux cloner means that the Linux<br />

administrator will have access to all z/<strong>VM</strong> passwords. <strong>The</strong>re<strong>for</strong>e, the examples in this book<br />

set all z/<strong>VM</strong> and Linux system administration passwords to the same value, lnx4vm. If the<br />

z/<strong>VM</strong> and Linux system administrator roles must be kept separate and the Linux administrator<br />

is not to have access to the z/<strong>VM</strong> passwords, then a different method of backing up z/<strong>VM</strong><br />

data must be chosen.<br />

You may want to define a finer granularity <strong>for</strong> passwords based on the following system<br />

administration roles:<br />

► <strong>The</strong> main z/<strong>VM</strong> system administrator (MAINT)<br />

► <strong>The</strong> z/<strong>VM</strong> network administrator (TCPMAINT)<br />

► <strong>The</strong> z/<strong>VM</strong> Linux administrator (LNXMAINT, Linux cloner, Linux virtual server user IDs)<br />

► <strong>The</strong> Linux virtual server end users (with or without access to 3270 sessions, with or<br />

without the root passwords)<br />

<strong>The</strong> sets of passwords that you define will depend on the roles that your organization will<br />

adopt.<br />

12 <strong>The</strong> <strong>Virtualization</strong> <strong>Cookbook</strong> <strong>for</strong> RHEL 6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!