• |
Section User account management presents the three main categories of appliance users (Administrative, General, and Guest) and their corresponding system types. Guest accounts are typically created for users whose only interest is viewing report sets that have been created by others.
By default, the Restrict guest account navigation option on the User Accounts page is disabled. This means the user’s menu options expand to include the viewing of metrics, resource lists, and the alarm log.
When Guest type users are not restricted, they can also view resources, metrics, and the alarm log.
You can enforce the use of strong passwords for all user accounts. On the User Accounts page, the Enforce strong passwords option allows you to require strong passwords whenever new accounts are created or existing users modify their passwords. If you modify this option after some user accounts have been created with passwords that are not considered strong, those users are still be able to log in to the system.
The default password only requires that passwords consist of five characters.
By default, the Expire passwords after X days option on the User Accounts page is disabled.
By default, the Expire web console, terminal, database and SSH session after X minutes of inactivity option on the User Accounts page is disabled.
Administrators can define a policy to enforce a minimum length for passwords for all user accounts.
By default, the Minimum password length option is set to 5.
Lockdown mode implements the following changes to the appliance software and the web console.
• |
Splits user account management. The user accounts setup and support are now special administrative accounts that cannot be managed through the web console. |
• |
Restricts access to the console program to the setup account only. |
• |
Restricts SSH access to the support account only. |
• |
Adds Change Setup Account Password and Change Support Account Password options to the account management page for the setup account. |
• |
Removes the option to grant web console access to the currently logged in user by hiding the Enable/Disable Web Access option. |
• |
Removes the ability to access the shell by hiding the Remove Shell Access From Console and Access Shell options. |
• |
• |
You activate lockdown mode by running a script from the command line.
• |
The setup user account exists. The account must have console program access enabled and web console access disabled. |
• |
The support user account exists. The account must have SSH access enabled. |
2 |
Log into the console program as the setup user. |
3 |
4 |
Select Access Shell. |
5 |
On the command line, run: /usr/local/ecrit/lockdown.sh |
6 |
When prompted for confirmation, select Yes to continue. |
After activating lockdown mode, the setup account no longer has SSH enabled, and the support account no longer has access to the console program. Therefore, the process for remotely accessing the appliance and its console program changes. Now when using SSH, you must log in as the support user, and then at the command line, switch to the setup account to launch the console program.
1 |
2 |
At the login prompt, log in as the support user. |
3 |
On the command line, type: su setup |
4 |
Log in as the setup user. |
You can manage security settings for the appliance on the Security page accessed by clicking Configure > Appliance > Security in the menu.
From this page you can configure the appliance web server to use Secure Sockets Layer (SSL).
For more information, see these topics:
This section outlines how to configure the appliance’s web server to use Secure HTTP. To configure the appliance to monitor secure HTTP traffic with the web servers it is monitoring, see Configuring SSL keys.
1 |
In the SSL Certificate Key File box, click Browse and locate the key file. |
2 |
In the SSL Certificate File box, click Browse and locate the certificate file. |
3 |
Once both files have been located, click Enable SSL to switch the appliance’s web server to use Secure Socket Layer. |
Use the Disable SSL button in the “Configure Web Server or SSL” section to reset the appliance’s web server to HTTP.
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy