450
Chapter 10
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
ITO Security
The administrator needs to investigate the security implications and
possibilities that are addressed during the configuration of ITO itself.
For example, managed nodes will only allow those management servers
that it recognizes as action-allowed managers to execute
operator-initiated actions. ITO security looks at the security-related
aspects of application set up and execution, operator-initiated actions,
and so on. The section on ITO security covers the following areas:
❏
Accessing ITO
❏
Program security
❏
Database security
❏
Application setup and execution
❏
Executing and forwarding actions
❏
The location of queue files
Accessing ITO
Only ITO registered users can access the ITO GUI. By default, the users
opc_adm and opc_op are available. The ITO user names and
passwords have no direct relation to UNIX user names and passwords.
However, it is possible to use UNIX user names, and if the user name is
defined in the ITO database, the user is not prompted for a password.
This is the fastest way to open an ITO GUI. Furthermore, it is
recommended that system administrators map unix user names (1:1) to
ITO operator names. In addition, The ITO administrator can change
operators’ passwords, but cannot see any new password an operator
sets—the characters are masked by asterisks. By default, operators can,
of course, change their own passwords.
To remove the change password functionality from all operators,
comment the following lines:
Action “Change Password”
{
}
in
/etc/opt/OV/share/conf/OpC/mgmt_sv/appl/registration/\
C/opc_op/opcop
Summary of Contents for -UX B6941-90001
Page 6: ...6 ...
Page 8: ...8 ...
Page 27: ...27 1 Prerequisites for Installing ITO Agent Software ...
Page 43: ...43 2 Installing ITO Agents on the Managed Nodes ...
Page 115: ...115 3 File Tree Layouts on the Managed Node Platforms ...
Page 163: ...163 4 Software Maintenance on Managed Nodes ...
Page 183: ...183 5 Configuring ITO ...
Page 298: ...298 Chapter5 Configuring ITO Variables ...
Page 299: ...299 6 Installing Updating the ITO Configuration on the Managed Nodes ...
Page 315: ...315 7 Integrating Applications into ITO ...
Page 333: ...333 8 ITO Language Support ...
Page 352: ...352 Chapter8 ITO Language Support Flexible Management in a Japanese Environment ...
Page 353: ...353 9 An Overview of ITO Processes ...
Page 372: ...372 Chapter9 An Overview of ITO Processes Secure Networking ...
Page 373: ...373 10 Tuning Troubleshooting Security and Maintenance ...
Page 481: ...481 A ITO Managed Node APIs and Libraries ...
Page 499: ...499 B Administration of MC ServiceGuard ...
Page 513: ...513 C ITO Tables and Tablespaces in the Database ...
Page 520: ...520 AppendixC ITO Tables and Tablespaces in the Database ITO Tables and Tablespace ...
Page 521: ...521 D ITO Man Pages Listing ...