Comparison of Communication Manager

Comparison of
Communication Manager
Administrator Account Management
CM3.1 vs. CM4.0
Issue 0.0
March 2007
Contents
1. Introduction
2. Organization
3. Reference Material
4. CM3.0 and CM4.0 Screen Comparison
4.1 Adding a Default Super User Login
4.2 Adding A Default Non-Super-User Login
4.3 Changing Access Permissions
4.3.1 SAT Permissions
4.3.2 Web Permissions
4.4 Changing SAT Access Permissions Comparison
4.5 Customer Super User Login with Go Shell Permissions
4.6 Changing Web Access Permission Comparison
5. User Account Components
6. User Account Creation Overview
7. Upgrades
8. Administrator Accounts
8.1 Primary Group
8.2 Secondary Group
9. Special Administrator Accounts
9.1 Remote Logins
9.2 CDR Logins
10. Example
1
1
1
1
2
3
3
4
4
6
7
7
8
9
10
10
10
11
12
12
12
13
1. Introduction
This document contains an abbreviated comparison of the process for adding a local host administrator login and
setting its access permissions in Communication Manager (CM) Release 4.0 (CM4.0) with adding the same login in
CM3.0.
This material is intended as a sort of "cheat-sheet" only. Full descriptions of screens and fields are provided in the
documents referenced in section 3.
Local host logins are those logins whose entire account profile is maintained on the same server where the login occurs.
Only processes for local host logins are provided; logins authenticated by an external service such as LDAP cannot be
administered on the CM server.
2. Organization
Information is presented in the following order:
1.
2.
3.
A side by side comparison is given for screens/forms in CM3.1 and CM4.0 with little background information.
Following the side by side comparison, limited background information is provided for logins and profiles.
An example is provided for adding a new login.
3. Reference Material
The following white paper describes Communication Manager support for external Authentication, Authorization,
and Accounting servers such as LDAP.
• http://support.avaya.com/elmodocs2/white_papers/CM_Administrator_Logins.pdf
These sections
• AAA Services
• SAT Profiles
• Extended profiles
• Profile access to restricted objects
• Administrative logins
• CDR logins
• Business Partner login: dadmin• Remote logins
• Recommended procedure for adding web profiles
in the following documents provide a much more thorough description of this material.
• Feature Description and Implementation for Avaya Communication Manager, 555-245-205, and
• Maintenance Commands for Avaya Communication Manager, 03-300431
4. CM3.0 and CM4.0 Screen Comparison
The screens in this document were obtained from R013x.01.3.640.2 and R014x.00.0.730.5. Some differences may
appear on other builds. Note also that pictures of web screens were cropped to show only the data portion of the
screen, omitting the menus and frames. This was done to maximize information readability on a limited page size.
Issue 0.0
Communication Without Boundaries
1
4.1 Adding a Default Super User Login
Figure 1 contains a side-by-side comparison for adding a customer super user login taking all default settings in CM3.1 with CM4.0. In CM3.1 this action is done via
the Communication Manager SAT interface. In CM4.0 the same action is done via the server web pages. If the SAT form shown in the figure is submitted with all default
values, the login will have access to all SAT forms that a customer login may have; by default, the login will NOT have access to the "go shell" command in the SAT. If
the web form is submitted as shown, the login will have EXACTLY these same permissions. In both cases, the user will have access to the shell via port 22 (ssh) but not
via the SAT "go shell". That is, the CM3.1 login screen field, "Shell Access ?" only governs the "go shell" command. It does not govern shell access via port 22.
CM 3.1 SAT form
Figure 1. Adding a Super User Login
CM 4.0 web page (cropped)
The permissions for profile 18 in CM4.0 exactly match the default permissions for the customer super user login in CM3.1. The SAT screens available to the login in
CM3.1 are the same screens available to the login in CM4.0 with differences due to different releases excepted. The web page access in both cases is also identical, again
with differences due to different releases excepted.
There is no other administration that needs to be done to add a default super user login; one screen is required in each case. If "go shell" access is desired, a custom
user profile must be created as described section 4.3 on page 3.
Issue 0.0
Communication Without Boundaries
2
4.2 Adding A Default Non-Super-User Login
Figure 2 contains a side-by-side comparison for adding a customer non-super-user login taking all default permissions in CM3.1 with CM4.0. In CM3.1 this action is
done via the Communication Manager SAT interface. In CM4.0 the same action is done via the server web pages. This user will NOT have access to ANY SAT forms
in both cases, but will have access to a subset of the web screens in both cases. See also figure 8 on page 11.
CM3.1 SAT Form
Figure 2. Adding a Default Non-Super-User Login
CM4.0 Web Page (Cropped)
In both cases only one screen is needed to create the login. In both cases additional work is required to give this user SAT access.
4.3 Changing Access Permissions
Beginning in CM4.0, the ability for the customer to specify access permissions for individual logins has increased greatly. As a result, the number of screens involved has
increased from basically a single SAT screen in CM3.1 to over 40 SAT screens plus several web pages in CM4.0. These additional screens are required in order to be
able to specify permissions for every single SAT form and every web form individually. Fortunately, permissions are associated with profiles and not logins; multiple
logins can be assigned the same profile if desired. Additionally, permissions for profiles are generally established to match business process needs and do not change as
Issue 0.0
Communication Without Boundaries
3
frequently as logins. The access permissions for profiles 18 and 19 cannot be changed. A new profile must be created first. This new profile can be duplicated from profile
18 or 19 or created new. This step has no parallel in CM3.1 because CM3.1 does not have as rich a capability for permission administration as does CM4.0 in either
the web interface or the SAT interface.
The permissions associated with a profile are specific to an application. CM4.0 has two such applications, the Communication Manager SAT interface and the server
web interface. Permissions for each application must be defined separately. Permissions can be defined independently from logins -- no login using the profile need
exist for the permissions to be configured for the profile within the application.
4.3.1 SAT Permissions
Since permissions for profiles 18 and 19 cannot be changed, a new profile must first be created if different permissions are desired. Figure 3 illustrates a "duplicate
user-profile 18" SAT command form. When creating a new profile, any unused profile number 20-69 may be used; The "list user-profiles" SAT form may be used to see
Figure 3. CM4.0 Duplicate User-Profile SAT form Page 1
which profiles have permissions assigned for access to the CM SAT. The form shown in figure 3 (41 pages) can then be used to precisely define the permissions for SAT
access for the new profile as described in the Feature Description and Implementation for Avaya Communication Manager Manual.
4.3.2 Web Permissions
Profiles for access to server web pages are named "access masks" rather than profiles to emphasize the fact that there is an interaction with primary group (users, susers)
membership and web pages access. A login with web page access must be assigned to either the users or susers group. A web access mask can only be used to REDUCE
access permissions for users or susers. Because of this, it is best to create new web masks by copying either mask 18 or 19. Copy mask 18 when the access mask will be
used by logins assigned the primary group susers, and copy mask 19 when the access mask will be used by logins assigned to group users. Figure 4 illustrates how to copy
Issue 0.0
Communication Without Boundaries
4
mask 18 to a new mask and then edit its permissions.
Step 1: Click add to
add a new mask
Step 2: Enter new mask number
and mask to copy from, then click
submit.
Step 3:Click the box next
to the new profile to edit
and click change and
then edit permissions by
unchecking boxes as
desired.
Figure 4. Creating a New Web Access Mask
Issue 0.0
Communication Without Boundaries
5
4.4 Changing SAT Access Permissions Comparison
Figure 5 contains a side-by-side comparison for changing access permissions for the Communication Manager SAT in CM3.1 and CM4.0. In CM3.1 permissions are
Change SAT Permissions for a Login in CM3.1
Change Profile Permissions in CM4.0
Figure 5. Changing Access Permissions for the SAT
associated with logins and the ability to change permissions is very limited. If the field, "Additional Restrictions" on the first page of the CM3.1 "change Permissions"
Issue 0.0
Communication Without Boundaries
6
form is set to yes (y), then two additional pages become available to add the names of up to 40 SAT forms that user may NOT use. In CM4.0, permissions are NOT
assigned to logins. Permissions are assigned to a profile and the user is in turn assigned a profile and thus inherits the permissions of the profile. Multiple users may be
assigned the same profile and thus the same access permissions. Permissions must be set for every SAT form in CM. Additionally, permissions are set independently for
read, write and maintenance access. Read/write and maintenance permissions are somewhat new concepts in CM4.0. Table 1 cross references the SAT commands
associated with each operation. For example, reading from the table, an "r" next to a SAT form’s name in figure 5 for CM4.0 means that a user assigned that profile can
use the display, get, list, monitor, notify, status and upload commands AS THEY APPLY to the particular form whose access permissions are being set. A dash (-) in the
permissions field indicates the profile has no access to the corresponding SAT form. Write implies the ability to view and change administration values whereas read
implies the ability to view but not change values.
Table 1. SAT Command Permissions
SAT
Command
Administration
r
add
w
Maintenance
(m)
x
SAT
Command
get
busyout
x
go
campon-busyout
x
list
cancel
x
mark
change
x
clear
x
disable
display
duplicate
x
netstat
x
notify
r
w
Maintenance
(m)
x
x
x
remove
x
reset
x
x
x
x
x
Administration Maintenance
(m)
r
w
x
x
resume
x
rp
x
save
x
x
SAT
Command
x
x
set
x
status
x
x
x
x
ping
x
test
x
x
recycle
x
trace-route
x
enable
erase
monitor
x
Administration
x
x
refresh
release
x
upload
x
wp
x
x
4.5 Customer Super User Login with Go Shell Permissions
SAT profile 18 does not permit access to the "go shell" SAT command in keeping with the default configuration for a "super-user" login. If "go shell" access is desired for
a login that would otherwise be assigned to profile 18, a new profile must be created by copying profile 18 and then enabling "go shell" access.
4.6 Changing Web Access Permission Comparison
In releases prior to CM4.0, web access was controlled simply by membership in one of two Linux groups, susers or users. In CM4.0 web access is further constrained by
a web access mask as illustrated in section 4.3.2 on page 4.
Issue 0.0
Communication Without Boundaries
7
5. User Account Components
A user account on a Communication Manager server requires 4 components:
1.
2.
3.
4.
A user name
Membership in a primary Linux Group (See section 8.1 on page 10)
Optionally, assignment to a role for role based access to server applications such as the SAT
interface or server web pages. A role is assigned by adding the account as a member of an
additional, secondary Linux Group known as a profile group (See section 8.2 on page 11).
If a role is assigned, then permissions associated with a role within each application that
defines role based access.
Figure 6 illustrates the relationship between these components. The standard Linux password and group files contain
Linux PAM
/etc/passwd
/etc/shadow
/etc/group
user name, ro
le
Application’s interface
to use the application
Application’s interface
to administer its
permissions
profile
#
user name, group
membership stored
here.
Identifiers passed to
application on each use
Application
permissio
ns
Figure 6. Account Components
application
permissions
stored here.
the user name and group membership. When an application is started, these parameters are retrieved by the
application. Inside the application, the user’s group membership is used to select a profile within the application; this
profile contains the permissions within the application for that role.
Figure 7 shows a more complete picture with 3 common Communication Manager server applications, the Command
Line Interface (CLI), the Web Interface, and the application that provides telephony services (TS), sometimes also just
Issue 0.0
Communication Without Boundaries
8
called CM, not to be confused with the platform or product which is also called CM. Referring to the figure, a web
add station next
USE A SAT FORM
> swversion
change user-profile
Manage SAT Permissions
USE A CLI COMMAND
Shell Application
ofile #
ID, Pr
ID,
gro
Linux PAM
up
profile
#
/etc/passwd
/etc/shadow
/etc/group
ID
,g
Add Login:
ID, Group #
TS Application
ro
u
p,
pr
of i
le
permissio
ns
XLN
#
Web Application
#
file
pro
issio
perm
Administrator Logins Web page
MANAGE LOGINS
ns
Each Web Page
USE A WEB PAGE
Web Mask Page
MANAGE WEB MASKS
Figure 7. Applications, Profiles and Logins Overview
interface is provided to create logins in Linux and assign those logins to groups. A separate web interface is provided
to assign web permissions within the web application. SAT forms are used to define permissions within the SAT as
already described.
6. User Account Creation Overview
Customer user accounts for a new system are created using the following process:
1.
2.
Issue 0.0
Analyze the business needs and policies of the enterprise and define the access roles that will be necessary.
This is a very important step and omitting it will cause unnecessary changes and likely a good deal of confusion later. One business might be satisfied with a single role that will be able to perform all administration
activities. Another business might require separation of duties such as a station administrator, a trunk administrator, a server administrator, a maintenance role with global access, an auditor, a backup operator, etc.
Using the business roles defined in step 1, examine the user-profile SAT form and assign access to SAT
forms for each role. This might be done by first creating a new SAT user profile by copying profile 18, and
then exporting the profiles. The resulting file can be imported into a spread sheet where permissions can be
compared side-by-side. Similarly, examine the web access mask web page and determine which pages each
profile needs access to.
Communication Without Boundaries
9
3.
Using the super user login created during installation, create new user-profiles in the SAT based on the
above analysis. If a spread sheet was used, it may be saved as a text file in the EXACT format of the export file
and then re-imported to CM. Similarly, create a parallel set of web masks for each SAT profile setting permissions appropriate to the role.
IMPORTANT: A user can be assigned only one user-profile. For example, lets say a user is assigned profile 22. If that
user attempts to access the SAT, that user will be able to access whatever SAT forms are allowed for profile 22. If that
same user attempts to access the server web pages, the user will have access to those pages permitted by web access mask
22. It is important to understand that all applications use the same profile number, but each application must define
its own permissions for that number.
The above steps apply regardless of how or where individual logins are authenticated. These steps apply equally to local
host logins and to logins processed in external AAA servers such as LDAP. What has been accomplished in the first 3
steps is simply to assign permissions to user profiles and web access masks according to the roles defined for the
business.
4.
Using the super user login created during installation, create the needed local host logins using the server
administrator accounts web page, assigning membership in primary and secondary Linux groups as described
in the following sections.
7. Upgrades
When a system is upgraded to CM4.0 from an earlier release, the upgrade software automatically creates user profiles
and web access masks when CM translations are loaded the first time. In releases prior to CM4.0, CM maintained
permissions associated with logins. During the upgrade CM examines the permissions for each login. If the login is a
super user login and has all default permissions, then the login is assigned profile 18 in CM4.0. Similarly, if the login
is a non-super-user login and still has all default permissions, it is assigned profile 19 in CM4.0.1 If a login has
permissions other than defaults, then a new profile is created automatically and its permissions set to match the
permissions in the earlier release. A new web access mask is also created. If the login is a super user login, then the new
web access mask will be a copy of mask 18. If the login is a non-super-user login, the mask will be a copy of mask 19.
8. Administrator Accounts
This section will describe the most frequently used administrator accounts on a Communication Manager server.
There are other special accounts that will be described beginning in section 9 on page 12.
An administrator account requires the following components:
1.
2.
3.
A user name: A user name is the same as a login name is the same as an ID or login ID.
Primary Group: All logins must be members of at least one Linux group, which we note as a primary group.
This group is identified as "login group" on the web page for creating logins. The primary group is identified
as "gid" in the Linux CLI "id" command.
Secondary or Profile Group: Logins which access certain applications (CM or server web pages), must also be
a member of a second group. This group is identified as "other groups" on the web page for creating logins
and is identified as "groups" in the Linux CLI "id" command.
8.1 Primary Group
Membership in a primary Linux group controls access permissions for the account in the Linux shell (bash) and also
influences access to some web pages. Two login groups are important to the most frequently used type of administrator
logins, groups susers and users.
In CM3.1 and earlier releases, membership in susers corresponds to customer-super-user logins and grants as much
access as is possible for a customer login. Membership in users corresponds to a non-super-user login with very
1. This would be very rare since a non-super-user in release prior to CM40 has no SAT access unless permissions are changed.
Issue 0.0
Communication Without Boundaries
10
constrained access. In particular, the number of web pages that an suser login can see is very limited. Figure 8A
illustrates a portion of the web menu for an suser login and figure 8B illustrates the entire menu for a user login. In
(B) users Menu
Figure 8. Web Menus in CM3.1
(B) susers Menu
earlier releases, the users menu was even more restricted, but was expanded to satisfy needs for certain large customers.
In CM4.0 membership in a primary group does not affect SAT access at all. However, underlying code implementation
still restricts access to certain web objects based on this membership. For this reason, the advice is given that when
creating a new web mask, (1) a user is assigned to either group susers or users and then (2) the new mask is formed by
copying either mask 18 (susers) or mask 19 (users) and then REDUCING the permissions in the new mask. Not
following this procedure can result in a web mask that won’t grant the desired access.
8.2 Secondary Group
Membership in a secondary Linux group is not used prior to CM4.0. Beginning in CM4.0, membership in the
secondary or profile group associates the login with a set of permissions in the SAT and in the web pages within the
constraints described in the previous sections.
A user’s profile (or mask) is a number in the range 0-69. Numbers 0-17 are special profiles that customer logins cannot
use. The profile number is obtained from the Linux group number by subtracting 10,000 from the group number.
Thus, Linux group numbers 10,000 through 10,0691 correspond to user profiles (masks) 0-69.
1. The base number (10,000) can be changed by the customer via the server web pages.
Issue 0.0
Communication Without Boundaries
11
Note Carefully! Membership in a profile group is necessary but not sufficient for access to server web pages or the SAT.
Permissions must be assigned to the profile within each application as already illustrated.
9. Special Administrator Accounts
There are two special logins that are not used to access the SAT or the server web pages. The first special type of login
is used to access the server via its modem, and the second is used by CDR collector units to retrieve CDR records
stored on the CM server disk.
9.1 Remote Logins
When the CM server is accessed via its modem, a PPP connection is established between the user’s device and the
Communication Manager server. A separate login must be used to first establish the PPP connection. Once this
connection is established, an SSH or web session can then be established over the PPP connection using one of the
logins described in section 8 on page 10. Remote logins are created in the same way as other logins with the following
exceptions. See figure 9. On the Administrator Logins web page, under shell access, select "remote login". Selecting
this entry will "gray out" the login group and additional groups entry. The primary login group will be forced to be
"remote" and cannot be changed. Other fields on the page, e.g. password, may be entered normally. In releases prior
to CM4.0 this was accomplished in the SAT "add login" form by specifying the service level as "remote" instead of
super-user or non-super-user. This SAT form no longer exists in CM4.0 and the web page must be used.
Figure 9. Remote Logins
9.2 CDR Logins
To create a login used to access CDR records, use the Administrator Logins web page (figure 10) and make entries as
follows:
Issue 0.0
Communication Without Boundaries
12
•
•
•
•
Login Group = CDR_User
Additional Groups =
Shell Access = CDR Access Only.
Other fields may be used normally.
Leave the "Additional Groups" field blank.
The CDR feature using this login did not exist prior to CM4.0.
Figure 10. CDR Login
10. Example
This section contains a specific example to illustrate the mechanics of creating administrator logins.
Suppose that:
• You have just finished installing a new system (This was not an upgrade).
• You want to create a new super user login called "rick", that has a two less Maintenance Web Interface permissions than your typical customer super user login: you don't want rick to be able to do
"Configure Server" or "Restore Defaults" under the Server Configuration menu section.
• You want rick to have all the SAT permissions that a customer super user login may have except you
don’t want rick to be able to access any SAT forms related to adjuncts.
• Also, suppose it's to be the first new profile created after the server install. The first available
user-definable profile (i.e., a profile to implement rick's role) is 20, so you'll create profile 20.
Here's how you add the login:
Issue 0.0
Communication Without Boundaries
13
1.
2.
Issue 0.0
Create the profile group for profile 20.
a. Login to the Maintenance Web Interface as "init" or as a customer super user login, such as the one
created during the system install.
b. Select Administrator Accounts and then fill in the group name "prof20" in the "Enter Login ID or
Group Name " field. You could enter most anything here, e.g., "profile20", "nosrvconfig", "mugclub",
"ricksgroup", etc. The name is just a label, and is pretty much arbitrary. It is primarily used for display or for easy identification by switch administrators. (Note: there is an advantage to the "profXX"
naming convention if you ever want to change the profile base number, i.e., 10,000, to something
else, but that doesn't concern us right now. By choosing prof20, we can use that capability later in
any case.)
c. Now select "Add login group" and click "submit".
d. Enter the Linux group number you want, a number between 10020 and 10069. You choose 10020,
because that is the Linux group number for profile 20. Click on "add", and confirm that the success
completion message appears.
Internal effects: The following procedures can be used to see the internal effect of the above steps:
• Login on the same server to port 22 (ssh) as "init" or a customer super user login.
• Execute "tail /etc/group", and you'll something similar to this:
init@labsrvr1> tail /etc/group
prof0:x:10000:init
prof1:x:10001:inads
prof2:x:10002:dadmin
prof3:x:10003:craft
prof17:x:10017:acpsnmp
prof18:x:10018:custsuper
prof19:x:10019:
prof20:x:10020:
• Note that prof20 appears in the /etc/group file but that no logins are members of this group
(yet).
Create the Login "rick" and assign groups
a. In the Web interface, select Administrator Accounts.
b. Enter "rick" in the "Enter Login ID or Group Name " field, select "Add Login" and click "submit".
c. Fill in fields on the Add Login form as follows:
• login group = susers
• additional groups = prof20 or 10020, either works and is a matter of preference
• shell access = select standard shell access (This allows access to port 22 via SSH. It has no
effect on access to the "go shell" command from the SAT.)
• Select password authentication and enter a password.
d. Click "add".
Internal effects: The following procedures can be used to see the internal effect of the above steps:
• Login on the same server to port 22 (ssh) as "init" or a customer super user login.
• Execute "tail /etc/group", and you'll something similar to this:
init@labsrvr1> tail /etc/group
prof0:x:10000:init
prof1:x:10001:inads
Communication Without Boundaries
14
3.
4.
Issue 0.0
prof2:x:10002:dadmin
prof3:x:10003:craft
prof17:x:10017:acpsnmp
prof18:x:10018:custsuper
prof19:x:10019:
prof20:x:10020:rick
• Notice that the login "rick" is now a member of group prof20.
• Now while still in your BASH session, execute "id rick", and you'll see something similar to
this:
init@labsrvr1> id rick
uid=1002(rick) gid=555(susers) groups=555(susers),10020(prof20)
• Note that rick is in Linux group 555, which is the susers Linux group.
• You can also grep the /etc/passwd file for rick to see home directory and shell assignment.
Define web permissions for login rick
a. In the Web interface, select Web Access Mask.
b. Click on "add". Enter 20 in the "Enter New Access Mask Number" box, select "Create by copying values from Access Mask number" radio button and enter 18 in the box (i.e., customer super user web
permissions). Note that profile or role numbers are being entered. The 20 corresponds to profile
group 10020 or prof20 that was created above.
c. Click "submit". We're creating mask 20 by cloning mask 18, and we'll then remove the desired capabilities selectively from mask 20. You are returned to the web page displaying the existing web masks,
but now mask 20 appears under "User-defined Access Masks and Names". At the moment mask 20 is
an exact copy of mask 18 from which it was copied. This mask is fully usable at this point, but we
want to reduce its permissions.
d. Click on the box for user defined profile 20, and then click on "change".
e. Enter a name for web access mask 20 in the box to the right of 20 at the top of the page. Enter "Customer Super user Without Server Config or Adjuncts" in the box; uncheck "Configure Server" and
"Restore Defaults" in the column of boxes for access mask 20, and then click "submit" at the bottom
of the form.
This mask gives rick all the super user Web capabilities except Configure Server and Restore
Defaults. Those two choices will not be available when the rick login access the Maintenance Web
Interface. Note that Access Mask 20 now has the label, "Customer Super user Without Server Config or Adjuncts" next to it. This tactic makes it easier for administrators to determine what roles profiles actually implement. (We have not defined SAT permissions for rick just yet.)
f. Open a new Maintenance Web Interface session, logging in as rick. Confirm that all the menus
appear on the left side of the frame except for those under "Server Configuration". Only one option
appears there: "Eject CD-ROM". The rick login has no access to "Configure Server" or "Restore
Defaults".
Define SAT permissions for rick
• You now have created a fully-defined Web and BASH login called "rick" which is in Linux group 555
and profile 10020 and which has standard super user permissions in the Web, except for the ability
to configure the server or restore default server configuration. However, the rick login cannot be
used to login to the SAT yet. That comes next.
• Login to port 22 (ssh) as rick and try to use "rick" to login to a SAT, i.e., enter "SAT" in a BASH window, and note that the login attempt immediately fails with the error message, "Access Denied: User
ID/Profile unknown to Communication Manager".
Communication Without Boundaries
15
a.
b.
Now login as "init" or a customer super user login in an ssh BASH session, and execute "SAT".
Execute "list user-profiles", and confirm that only the default profiles exist. The SAT display will
show information similar to this:
list user-profiles
USER PROFILES
Extended
Profile
Profile User Profile Name
0
n
services super-user
1
n
services manager
2
n
business partner
3
n
services
16
n
call center manager
17
n
snmp
18
n
customer super-user
19
n
customer non-super-user
c.
d.
e.
f.
Execute "add user-profile 20" in the SAT
In the "User Profile Name" field, enter, "Cust super-user no server config no adjunct".
Enter "y" in "Facility Test Call Notification?", "Shell Access?", "Acknowledgement Required?".
Enter "y" in every field in the "Enbl" fields on page 1 of the form except the Adjuncts field. Enter a
"n" in the Adjuncts field.
submit the SAT form.
Execute "save translations"
In a new BASH ssh window, login as rick, and launch a SAT session. Confirm that the rick login is
no longer blocked from SAT access.
Execute "list user-profiles", and confirm that profile 20 appears:
g.
h.
i.
j.
Issue 0.0
Communication Without Boundaries
16
Glossary
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
AAA
CD
CM
FTP
LDAP
Local Host Account
Microsoft Active Directory
PAM
PAM Application
PC
PPP
RADIUS
RFC
RSA SecurID®
SASL
SAT
SSH
SafeWord®
Sun ONE
Telnet
ASG
Cron
NSCD
NSS
SU
SUDO
Tripwire
VSFTP
Issue 0.0
Authentication, Authorization and Accounting
Compact Disk
Communication Manager
File Transfer Protocol. A non-secure protocol for file transfer (RFC 0959, STD0009)
Lightweight Directory Access Protocol (RFC 2251)
A user login account for which all AAA information is maintained on the same
server the user is logging in to.
A Microsoft implementation of LDAP
Pluggable Authentication Module
A software module that has been enhanced to interact directly with the Linux PAM
subsystem
Personal Computer
Point to Point Protocol
Remote Authentication Dial In User Service (RFC 2865)
Request for Comment. An Internet standard
A token based authentication mechanism from RSA Security
Simple Authentication and Security Layer (RFC 2222)
Communication Manager System Administration Terminal interface
Secure Shell. A protocol for secure remote login and other secured network services
over an insecure network. (RFC 4251)
A token based authentication mechanism from Secure Computing
Sun ONE (Sun Open Net Environment) is a marketing strategy and set of products
from Sun Microsystems.
A non-secure protocol for interfacing terminal oriented processes to each other (RFC
855, STD0008)
Access Security Gateway. A one-time-password implementation proprietary to Avaya.
A process provided by Linux to run jobs periodically
Name Service Caching Daemon. A daemon that provides a cache for user variables
obtained via name service requests.
Name Service Switch. A module to obtain/search-for user authorization variables
from an order list of databases.
Substitute User. A command to allow one to run a shell as another user/group
Superuser Do. A command to allow a system administrator to give certain users or
groups of users the ability to run some or all commands as root or as another user.
An auditing program that monitors for file changes.
Very Secure File Transfer Protocol. A secure version of FTP.
Communication Without Boundaries
17