cc/td/doc/product/rtrmgmt/cw2000/y2k
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Security

Security

The Y2K Compliance Assessment Tool provides two levels of security:

This appendix describes both of these security levels.

Server Security

There are two aspects of the Y2K Compliance Assessment Tool server security:

The Y2K Compliance Assessment Tool uses the security mechanisms of the UNIX system to protect the code and data files that reside on the server.

Server-Imposed Security

The Y2K Compliance Assessment Tool server provides the following security mechanisms:

All back-end processes are executed with a umask value of 027, which means that all files created by these programs are created with permissions equal to rwxr-x, with an owner and group of the user ID and group of the program that created it. Typically this will be bin and bin.
The Y2K Compliance Assessment Tool foreground processes (typically cgi-bin programs written in PERL) are executed under the control of the web server's children processes, which all run as the user bin.

Because the UNIX user bin is not a user ID that is typically enabled for login, the UNIX system administrator can more easily protect the Y2K Compliance Assessment Tool data and program files.

System Administrator-Imposed Security

To maximize Y2K Compliance Assessment Tool server security, follow these system administration guidelines:

Application Security

The Y2K Compliance Assessment Tool provides application-level security that allows the Y2K Compliance Assessment Tool administrator to dictate which applications a Y2K Compliance Assessment Tool user can access. The Y2K Compliance Assessment Tool provides this security through a set of five built-in roles:

Each role allows access to a predetermined set of applications, tools, and product features. Refer to the "Getting Started" section of the Y2K Compliance Assessment Tool online help for a detailed chart showing the relationship of user role to application functionality.

When you create a Y2K Compliance Assessment Tool login (every Y2K Compliance Assessment Tool user must log in to the application to use its features), you assign one or more roles to the login. The role or combination of roles dictates which Y2K Compliance Assessment Tool applications are available to the user in the Y2K Compliance Assessment Tool navigation tree (refer to the "Setting Up the Y2K Compliance Assessment Tool" chapter for an explanation of the navigation tree).

Only the system administrator user can assign roles to Y2K Compliance Assessment Tool logins. Y2K Compliance Assessment Tool users can use the administrative tools to change their own password or other aspects of their login.

The Y2K Compliance Assessment Tool comes with two predefined logins:


Note The login named admin is the equivalent of the superuser login for the Y2K Compliance Assessment Tool. This login provides access to all Y2K Compliance Assessment Tool tasks.

We recommended that you change the passwords for these predefined logins immediately after installation. Unless you want to allow everyone read-only access to the Y2K Compliance Assessment Tool, change the guest login password to something other than the default null string.

To prevent anyone from typing a full path to a Y2K Compliance Assessment Tool URL to avoid the security system, Y2K Compliance Assessment Tool applications will run only in the presence of an authenticated session between the server and client. The session is authenticated as a part of the login process so attempting to avoid the login by entering a URL will fail and the user will be returned to the Y2K Compliance Assessment Tool Login Manager dialog box. The Y2K Compliance Assessment Tool desktop terminates a login session after a period of no use. After termination, attempting to perform any operation returns the user to the Login Manager dialog box.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Sep 30 16:08:24 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.