SlideShare a Scribd company logo
Security Management User Administration and System Security
Security Management Outline User Management Users Groups Account and password management LDAP Authentication Uses Typical Configuration Security Policy Login page Auditing Security at the CLI
User Management
Security Administration: Overview Administration > Security User management Authentication setup and management View active sessions UI audit log searching
Security Administration: Adding Users Set the username and password Select groups to assign to users Permissions are additive
Security Administration: Managing Users Unlock, unblock, deactivate, delete, edit and set a new password
Security Administration: Default Groups Default groups: admin  appmodel cmdb-export-administrator discovery public readonly system unlocker
Security Administration: Adding Groups Can make custom groups Choose a name for the group Select the permissions to add to the group
LDAP Integration
LDAP Why Use It? Configuring a large number of Atrium Discovery UI users can be tedious and error prone Most organisations already have a LDAP capable authentication   system
LDAP Authentication Requirements Supported LDAP Capabilities and Systems Official support for Microsoft AD and SunONE DS Also will work with other LDAP servers (eg Novell) May (optionally) support client side certificate authentication Commissioning Tasks Configure Foundation’s connection to your LDAP system Map LDAP defined groups to Atrium Discovery groups
LDAP User Configuration Administration ->LDAP ->LDAP Setup the connection: Server URI: Specify server name and port eg ldap://10.0.0.1:3268/ Bind Username/Password
LDAP Search Configuration Search Base Where in the directory to start searching for users Search Template Search “query” to find a user node given the username entered on the Atrium Discovery login screen
LDAP Group Configuration Group Mode Select Microsoft Active Directory, SunONE Directory Server or Other as appropriate for your LDAP server If Other is chosen you will need to provide further configuration Refer to our online documentation
LDAP Configuration: Example
LDAP Group Mapping (1) Without Group Mapping the appliance will expect the users in the LDAP directory to be assigned to LDAP Groups that exactly match the  default groups Much more convenient to map existing LDAP Groups to the appliance groups admin public admin public TWF LDAP admin public root users all
LDAP Group Mapping (2) Administration ->LDAP -> Group Mapping
Security Policy
Security Policy: Accounts and Passwords Admin > Security Policy > Accts & Passwords Change setting to suit customer policies
Security Policy: Login Page Configuration Admin > Security Policy > Login Page
Security Policy: Plain Login Page Used if your organization requires a plain unbranded login screen Any Legal Notice text will still be displayed
Security Policy: Login Page Legal Notice Used if your organization requires a legal notice displayed to users prior to login
Security Administration: Active Sessions Administration > Security > Active Sessions Monitor who is currently using the appliance Good Practise to check this page before restarting
Security Administration: Audit Administration > Security > Audit > Audit Logs Search audit logs Logins Actions Configuration Changes Search queries etc Use the form to help narrow the search
UI Accounts at the CLI
Security Warning The appliance CLI accounts should be treated as a root level account Keep knowledge of the password to a minimum of people Comply with your organisation’s policy on root or super user passwords Change the password when people leave the team
Unlocking the system account The ‘system’ account can become locked with the default settings and you may end up with no other admin level account to unlock it The ‘system’ account can be unlocked from the CLI Login to the Appliance CLI as the user ‘tideway’ Run ‘tw_upduser --active system’
Online Documentation: http://www.tideway.com/confluence/display/81/Managing+System+Users Further Information Tideway Foundation Version 7.2 Documentation Title
OpenLDAP Online Documentation: http://www.openldap.org/software/man.cgi?query=ldapsearch&apropos=0&sektion=0&manpath=OpenLDAP+2.3-Release&format=html Further Information Tideway Foundation Version 7.2 Documentation Title
Security Management Exercises

More Related Content

PPTX
IAM Password
PPTX
Dell Password Manager Introduction
PPTX
Dell Password Manager Architecture - Components
PDF
Vm ware view manager training in hyderabad
PPTX
Azure role based access control (rbac)
ODP
Synapse india reviews on security for the share point developer
PDF
Windows Server 2008 Active Directory Components
PDF
Cache Security- The Basics
IAM Password
Dell Password Manager Introduction
Dell Password Manager Architecture - Components
Vm ware view manager training in hyderabad
Azure role based access control (rbac)
Synapse india reviews on security for the share point developer
Windows Server 2008 Active Directory Components
Cache Security- The Basics

What's hot (19)

PDF
Cache Security- Configuring a Secure Environment
PPTX
Windows Server 2008 Active Directory
PPTX
Secure Code Warrior - LDAP injection
PPT
Mule security - authorization using spring security
PPT
e-DMZ Products Overview
DOCX
Sccm 2012 Tool Training in Banglore
PDF
Sftp Public Key Based Authentication
PPTX
Isaca sql server 2008 r2 security & auditing
ODP
Authentication and Single Sing on
PDF
Doccept - Electronic Document Management System - Features List
PDF
Doccept feature-list
PPT
Mule security-jaas
PDF
Don't be tardy configure password expiration with open sso and identity mana...
PPTX
Active Directory security and compliance: Comprehensive reporting for key sec...
PDF
816isdfo
PPTX
MOSS2007 Security
PPTX
Assessing security of your Active Directory
PPTX
Truzztcar mvp
PPTX
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Cache Security- Configuring a Secure Environment
Windows Server 2008 Active Directory
Secure Code Warrior - LDAP injection
Mule security - authorization using spring security
e-DMZ Products Overview
Sccm 2012 Tool Training in Banglore
Sftp Public Key Based Authentication
Isaca sql server 2008 r2 security & auditing
Authentication and Single Sing on
Doccept - Electronic Document Management System - Features List
Doccept feature-list
Mule security-jaas
Don't be tardy configure password expiration with open sso and identity mana...
Active Directory security and compliance: Comprehensive reporting for key sec...
816isdfo
MOSS2007 Security
Assessing security of your Active Directory
Truzztcar mvp
Understanding Office 365’s Identity Solutions: Deep Dive - EPC Group
Ad

Viewers also liked (20)

PPT
Addmi 02-addm overview
PPT
Addmi 07-taxonomy
PPT
Addmi 03-addm prerequisites
PDF
The Power of Converged HP BAC and Operations Manager
PPT
Ucmdb DDM and DDMA
PDF
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
PPT
Addmi 04-va installation
PDF
Power of the Platform: Andy Walker, BMC Software
PPT
Addmi 09.5-analysis ui-host-grouping
PPT
Addmi 15-discovery scripts
PPT
Addmi 16.5-discovery troubleshooting
PPT
Addmi 09-analysis ui-reporting
PPT
Addmi 11-intro to-patterns
PPT
Addmi 12-basic scan
PPT
Addmi 14-discovery credentials
PPT
Addmi 17-snapshot
PPT
Addmi 16-discovery monitoring
PPT
Addmi 13-discovery overview
PPT
Addmi 18-appliance baseline
PDF
BMC Engage 2015 Breakout Session #420 - #ITSM_SUCCESS-Final_3.5 (1)
Addmi 02-addm overview
Addmi 07-taxonomy
Addmi 03-addm prerequisites
The Power of Converged HP BAC and Operations Manager
Ucmdb DDM and DDMA
Fannie mae bmc remedy its mv7 production infrastructure_v8_021009
Addmi 04-va installation
Power of the Platform: Andy Walker, BMC Software
Addmi 09.5-analysis ui-host-grouping
Addmi 15-discovery scripts
Addmi 16.5-discovery troubleshooting
Addmi 09-analysis ui-reporting
Addmi 11-intro to-patterns
Addmi 12-basic scan
Addmi 14-discovery credentials
Addmi 17-snapshot
Addmi 16-discovery monitoring
Addmi 13-discovery overview
Addmi 18-appliance baseline
BMC Engage 2015 Breakout Session #420 - #ITSM_SUCCESS-Final_3.5 (1)
Ad

Similar to Addmi 06-security mgmt (20)

PDF
Safeconsole admin guide
PPT
1556 a 02
PDF
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
PPTX
Introducing Oracle Audit Vault and Database Firewall
PPT
Securing Windows web servers
PPTX
server configuration concepts in system admin
PDF
Securing your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
PPT
Security
PDF
Business Solutions Using Office Share Point Server2007
PPT
Oracle 11i OID AD Integration
PDF
Lotus Sametime and Lotus Sametime Advanced Task Reference
PPTX
Peter wood – the ethical hacker
PDF
Ibm informix security functionality overview
PPT
1556 a 01
PPTX
chp unit 1 Provide Network System Administration.pptx
PPTX
providenetworksystemadministration.pptxhnnhgcbdjckk
PPT
Simplify Security And Device Management Final Pres10 23final
PPTX
Information Security: Advanced SIEM Techniques
PDF
Whats new in active directory window 2008 R2 server
PDF
Red hat enterprise_linux-6-identity_management_guide-en-us
Safeconsole admin guide
1556 a 02
CSF18 - The Night is Dark and Full of Hackers - Sami Laiho
Introducing Oracle Audit Vault and Database Firewall
Securing Windows web servers
server configuration concepts in system admin
Securing your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
Security
Business Solutions Using Office Share Point Server2007
Oracle 11i OID AD Integration
Lotus Sametime and Lotus Sametime Advanced Task Reference
Peter wood – the ethical hacker
Ibm informix security functionality overview
1556 a 01
chp unit 1 Provide Network System Administration.pptx
providenetworksystemadministration.pptxhnnhgcbdjckk
Simplify Security And Device Management Final Pres10 23final
Information Security: Advanced SIEM Techniques
Whats new in active directory window 2008 R2 server
Red hat enterprise_linux-6-identity_management_guide-en-us

Recently uploaded (20)

PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
1. Introduction to Computer Programming.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Hybrid model detection and classification of lung cancer
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
August Patch Tuesday
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
1. Introduction to Computer Programming.pptx
MIND Revenue Release Quarter 2 2025 Press Release
cloud_computing_Infrastucture_as_cloud_p
NewMind AI Weekly Chronicles - August'25-Week II
A comparative analysis of optical character recognition models for extracting...
Tartificialntelligence_presentation.pptx
Hindi spoken digit analysis for native and non-native speakers
Building Integrated photovoltaic BIPV_UPV.pdf
Hybrid model detection and classification of lung cancer
Group 1 Presentation -Planning and Decision Making .pptx
1 - Historical Antecedents, Social Consideration.pdf
TLE Review Electricity (Electricity).pptx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
A comparative study of natural language inference in Swahili using monolingua...
Univ-Connecticut-ChatGPT-Presentaion.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Encapsulation_ Review paper, used for researhc scholars
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
August Patch Tuesday

Addmi 06-security mgmt

  • 1. Security Management User Administration and System Security
  • 2. Security Management Outline User Management Users Groups Account and password management LDAP Authentication Uses Typical Configuration Security Policy Login page Auditing Security at the CLI
  • 4. Security Administration: Overview Administration > Security User management Authentication setup and management View active sessions UI audit log searching
  • 5. Security Administration: Adding Users Set the username and password Select groups to assign to users Permissions are additive
  • 6. Security Administration: Managing Users Unlock, unblock, deactivate, delete, edit and set a new password
  • 7. Security Administration: Default Groups Default groups: admin appmodel cmdb-export-administrator discovery public readonly system unlocker
  • 8. Security Administration: Adding Groups Can make custom groups Choose a name for the group Select the permissions to add to the group
  • 10. LDAP Why Use It? Configuring a large number of Atrium Discovery UI users can be tedious and error prone Most organisations already have a LDAP capable authentication system
  • 11. LDAP Authentication Requirements Supported LDAP Capabilities and Systems Official support for Microsoft AD and SunONE DS Also will work with other LDAP servers (eg Novell) May (optionally) support client side certificate authentication Commissioning Tasks Configure Foundation’s connection to your LDAP system Map LDAP defined groups to Atrium Discovery groups
  • 12. LDAP User Configuration Administration ->LDAP ->LDAP Setup the connection: Server URI: Specify server name and port eg ldap://10.0.0.1:3268/ Bind Username/Password
  • 13. LDAP Search Configuration Search Base Where in the directory to start searching for users Search Template Search “query” to find a user node given the username entered on the Atrium Discovery login screen
  • 14. LDAP Group Configuration Group Mode Select Microsoft Active Directory, SunONE Directory Server or Other as appropriate for your LDAP server If Other is chosen you will need to provide further configuration Refer to our online documentation
  • 16. LDAP Group Mapping (1) Without Group Mapping the appliance will expect the users in the LDAP directory to be assigned to LDAP Groups that exactly match the default groups Much more convenient to map existing LDAP Groups to the appliance groups admin public admin public TWF LDAP admin public root users all
  • 17. LDAP Group Mapping (2) Administration ->LDAP -> Group Mapping
  • 19. Security Policy: Accounts and Passwords Admin > Security Policy > Accts & Passwords Change setting to suit customer policies
  • 20. Security Policy: Login Page Configuration Admin > Security Policy > Login Page
  • 21. Security Policy: Plain Login Page Used if your organization requires a plain unbranded login screen Any Legal Notice text will still be displayed
  • 22. Security Policy: Login Page Legal Notice Used if your organization requires a legal notice displayed to users prior to login
  • 23. Security Administration: Active Sessions Administration > Security > Active Sessions Monitor who is currently using the appliance Good Practise to check this page before restarting
  • 24. Security Administration: Audit Administration > Security > Audit > Audit Logs Search audit logs Logins Actions Configuration Changes Search queries etc Use the form to help narrow the search
  • 25. UI Accounts at the CLI
  • 26. Security Warning The appliance CLI accounts should be treated as a root level account Keep knowledge of the password to a minimum of people Comply with your organisation’s policy on root or super user passwords Change the password when people leave the team
  • 27. Unlocking the system account The ‘system’ account can become locked with the default settings and you may end up with no other admin level account to unlock it The ‘system’ account can be unlocked from the CLI Login to the Appliance CLI as the user ‘tideway’ Run ‘tw_upduser --active system’
  • 28. Online Documentation: http://www.tideway.com/confluence/display/81/Managing+System+Users Further Information Tideway Foundation Version 7.2 Documentation Title
  • 29. OpenLDAP Online Documentation: http://www.openldap.org/software/man.cgi?query=ldapsearch&apropos=0&sektion=0&manpath=OpenLDAP+2.3-Release&format=html Further Information Tideway Foundation Version 7.2 Documentation Title

Editor's Notes

  • #7: Note default administrative users: admin, system The system user cannot be deleted
  • #8: It’s a good idea not to edit the default groups. It is better to add a new group and select the permissions needed.
  • #9: To add a new group scroll to the bottom and click add and complete the “add group form”
  • #11: LDAP provides: Centrally managed user authentication Single unified logon
  • #12: You will have to work with your LDAP administrator
  • #14: Normally the Search Template can be left at default, consult the LDAP admin to see if any changes are needed.
  • #15: For Microsoft Active Directory and SunONE Directory Server Foundation can set the other group configuration attributes and these are the fully supported configurations. If Other is chosen then the other group configuration attributes can be set in consultation with the LDAP admin. For reference: Group Attribute on User node The LDAP attribute name to search for when running a group query. The attribute is on the User node, and provides a list of distinguished names of groups that the user belongs to Group Query The LDAP query that is used to find Group objects. It is usual to match the nodes' Object Class, for example: (objectclass=group). Membership Attribute on Group node The LDAP attribute name to search for to determine whether an individual is a member of a group. The attribute is on the Group nodes, and provides a list of names of users.
  • #18: Useful CLI test to show data from LDAP server Example: ldapsearch -b dc=bmc,dc=com -D n.smith@bmc.com –W -H ldap://adserver:389 -x '(userPrincipalName=n.smith@bmc.com)'
  • #20: the “Disabled Accounts can be reactivated” setting as this is how to allow locked or blocked acct to be reset from the UI (shown on slide 5)
  • #23: This slide is included as many users are not sure of where such text will be displayed. Of course the field can be used for things other than legal notices and can be usefully used to identify what multiple appliances are being used for; especially useful for admins that have to login to a number. Note also that the Foundation Version and Appliance Name are displayed bottom right; it is good practise to set a reasonable Appliance Name.
  • #28: If the user has followed best practise of *not* using the system account for general use they shouldn’t get to this situation. Note also that it is important that the CLI password is treated as a high level password and not general known.
  • #31: Optionally you may wish to complete the labs that have been prepared to accompany this module. Please download the lab zip file that should be available where you accessed this module. Make sure you have access to a running appliance before attempting the labs. It is best to use the training demo VA provided as it is set up to work with the labs. You may need to review tutorial material in order to work out the solutions.