|
The Y2K Compliance Assessment Tool provides two levels of security:
This appendix describes both of these security levels.
There are two aspects of theY2K Compliance Assessment Tool server security:
The Y2K Compliance Assessment Tool relies on the security features and capabilities of the Windows NT operating system to protect the data and programs used by the Y2K Compliance Assessment Tool from unapproved access.
Caution Y2K Compliance Assessment Tool can provide security only when installed on an NTFS filesystem. |
The Y2K Compliance Assessment Tool server provides the following security mechanisms:
To maximize Y2K Compliance Assessment Tool server security, follow these system administration guidelines:
The Y2K Compliance Assessment Tool provides application-level security that allows the administrator to dictate which applications a user can access. The Y2K Compliance Assessment Tool provides this security through a set of five built-in roles:
Each role allows access to a predetermined set of applications, tools, and product features. Refer to the "Getting Started" section of the Y2K Compliance Assessment Tool online help for a detailed chart showing the relationship of user role to application functionality.
When you create a login (every user must log in to the application to use its features), you assign one or more roles to the login. The role or combination of roles dictates which applications are available to the user in the navigation tree (refer to the "Setting Up the Y2K Compliance Assessment Tool" chapter for an explanation of the navigation tree).
Only the system administrator user can assign roles to logins. Y2K Compliance Assessment Tool users can use the administrative tools to change their own password or other aspects of their login.
The Y2K Compliance Assessment Tool comes with two predefined logins:
To prevent anyone from typing a full path to a Y2K Compliance Assessment Tool URL to avoid the security system, applications will run only in the presence of an authenticated session between the server and client. The session is authenticated as a part of the login process so attempting to avoid the login by entering a URL will fail and the user will be returned to the Login Manager dialog box. The Y2K Compliance Assessment Tool desktop terminates a login session after a period of no use. After termination, attempting to perform any operation returns the user to the Login Manager dialog box.
Posted: Thu Sep 30 16:06:28 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.