Chapter 10
453
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
Database Security
Security of the database is controlled by the operating system and by the
database itself. Users must have an OS logon for either remote or local
access to the data. Once a user is logged on, security mechanisms of the
database control access to the database and tables.
For all other database security aspects see Using Relational Databases
with HP OpenView Network Node Manager and the vendor’s manuals
supplied with the database.
ITO Application Setup and Execution
Applications run under the account (user and password) specified by the
administrator during application configuration. The action agent uses
the information in this account before executing an application, that is, it
switches to the user specified and then uses the name and password
stored in the application request to start the application.
Application execution can be compromised by the use of password aging.
Password aging is a feature of C2 that expires passwords after:
❏
a specific period of time has passed
❏
a specific date has been reached
❏
a certain number of unsuccessful login attempts have been made
Administrators need to bear in mind that if this feature is enabled, it
could lead to application startup failures where the account that a given
application uses is temporarily inaccessible. In this case, the user or
system administrator has to change the password.
Remote Login and Command Execution
Security issues concerning remote login and command execution are
described here for ITO and for UNIX and MPE/iX platforms:
❏
If he does not apply the default user (setup by the ITO administrator)
for command broadcast or application startup, the ITO operator must
know the corresponding password. Otherwise, the
command/application will fail.
❏
When starting applications configured as Window (Input/Output):
• the password must be specified with the application attributes
-Or-
Summary of Contents for -UX B6941-90001
Page 6: ...6 ...
Page 8: ...8 ...
Page 27: ...27 1 Prerequisites for Installing ITO Agent Software ...
Page 43: ...43 2 Installing ITO Agents on the Managed Nodes ...
Page 115: ...115 3 File Tree Layouts on the Managed Node Platforms ...
Page 163: ...163 4 Software Maintenance on Managed Nodes ...
Page 183: ...183 5 Configuring ITO ...
Page 298: ...298 Chapter5 Configuring ITO Variables ...
Page 299: ...299 6 Installing Updating the ITO Configuration on the Managed Nodes ...
Page 315: ...315 7 Integrating Applications into ITO ...
Page 333: ...333 8 ITO Language Support ...
Page 352: ...352 Chapter8 ITO Language Support Flexible Management in a Japanese Environment ...
Page 353: ...353 9 An Overview of ITO Processes ...
Page 372: ...372 Chapter9 An Overview of ITO Processes Secure Networking ...
Page 373: ...373 10 Tuning Troubleshooting Security and Maintenance ...
Page 481: ...481 A ITO Managed Node APIs and Libraries ...
Page 499: ...499 B Administration of MC ServiceGuard ...
Page 513: ...513 C ITO Tables and Tablespaces in the Database ...
Page 520: ...520 AppendixC ITO Tables and Tablespaces in the Database ITO Tables and Tablespace ...
Page 521: ...521 D ITO Man Pages Listing ...