HP UX 11i Role-based Access Control (RBAC) Software manual Or launch policy

Page 53

Table 4-3 Available Privileges (continued)

Privilege

Description

PRIV_LIMIT

Allows a process to set resource and priority limits beyond the maximum

 

limit values.

PRIV_LOCKRDONLY

Allows a process to set the locks of files with read-only permissions.

PRIV_MKNOD

Allows a process to create character or block special files using mknod(2).

PRIV_MLOCK

Allows a process to access the plock system call.

PRIV_MOUNT

Allows a process to mount and unmount a file system.

PRIV_MPCTL

Allows a process to change processor binding, locality domain binding,

 

or launch policy.

PRIV_NETADMIN

Allows a process to perform network administrative operations including

 

configuring the network routing tables and querying interface information.

PRIV_NETPRIVPORT

Allows a process to bind to a privileged port. By default, port numbers

 

0-1023 are privileged ports.

PRIV_NETPROMISCUOUS

Allows a process to configure an interface to listen in promiscuous mode.

PRIV_NETRAWACCESS

Allows a process to access the raw Internet network protocols.

PRIV_OBJSUID

Allows a process to set the suid or sgid bits on a file.

PRIV_OWNER

Allows a process to override all restrictions with respect to UID matching

 

the owner of the file or resource.

PRIV_PSET

Allows a process to change the system pset configuration.

PRIV_REBOOT

Allows a process to perform reboot operations.

PRIV_RTPRIO

Allows a process to access the rtprio system call.

PRIV_RTPSET

Allows a process to control RTP psets.

PRIV_RTSCHED

Allows a process to set POSIX.4 real-time priorities.

PRIV_RULESCONFIG

Allows a process to add and modify compartment rules on the system.

PRIV_SELFAUDIT

Allows a process to generate auditing records for itself using audwrite(2).

PRIV_SERIALIZE

Allows a process to force a target process to run serially with other

 

processes configured with the PRIV_SERIALIZE privilege.

PRIV_SPUCTL

Allows a process to do certain administrative operations in the Instant

 

Capacity product.

PRIV_SYSATTR

Allows a process to manage system attributes, including the setting of

 

tunables, modifying the host name, domain name, and user quotas.

PRIV_SYSNFS

Allows a process to perform NFS operations like exporting a file system,

 

the getfh(2) system call, NFS file locking, revoking NFS authentication,

 

and creating an NFS kernel daemon thread.

PRIV_TRIALMODE

Allows a process to log trial mode information to the syslog file.

Configuring Applications with Fine-Grained Privileges

Applications that are written or modified to support fine-grained privileges are called privilege-awareapplications. You must register privilege-aware applications using the setfilexsec command. Complete this registration process when you install and configure privilege-aware applications using the SD-UX utilities.

Older HP-UX applications, or legacy applications, are not privilege-aware. You can configure legacy applications that run with UID=0 to run with fine-grained privileges. To configure legacy

Configuring Applications with Fine-Grained Privileges

53

Image 53
Contents HP-UX 11i Security Containment Administrators Guide Copyright 2007 Hewlett-Packard Development Company, L.P Table of Contents Fine-Grained Privileges Index Page List of Figures Page List of Tables Page List of Examples Page Intended Audience About This DocumentNew and Changed Information in This Edition Publishing HistoryUserInput Typographic ConventionsHP-UX Release Name and Release Identifier HP-UX 11i Releases Related InformationHP Encourages Your Comments Page HP-UX 11i Security Containment Introduction AuthorizationConceptual Overview Account Policy ManagementDefined Terms Features and BenefitsIsolation AuditingFeatures Benefits Prerequisites and System Requirements InstallationInstalling HP-UX 11i Security Containment # swlist -d @ /tmp/securitycontainmentbundle.depot Verifying the HP-UX 11i Security Containment Installation# swverify SecurityExt # swlist -a state -l fileset SecurityExtVerifying the HP-UX Role-Based Access Control Installation Installing HP-UX Role-Based Access ControlInstalling HP-UX Standard Mode Security Extensions # swverify RbacUninstalling HP-UX Rbac Uninstalling HP-UX 11i Security Containment# swverify TrustedMigration # swlist -a state -l fileset TrustedMigration# swremove TrustedMigration Uninstalling HP-UX Standard Mode Security Extensions# swremove Rbac Page Overview HP-UX Role-Based Access ControlHP-UX Rbac Versus Other Rbac Solutions Example of Authorizations Per User Access Control BasicsSimplifying Access Control with Roles HP-UX Rbac Components Example of Authorizations Per RoleHP-UX Rbac Configuration Files HP-UX Rbac Access Control Policy SwitchHP-UX Rbac Commands HP-UX Rbac Configuration FilesHP-UX Rbac Manpages HP-UX Rbac CommandsHP-UX Rbac Architecture HP-UX Rbac ManpagesHP-UX Rbac Architecture HP-UX Rbac Example Usage and OperationPlanning the Roles Planning Authorizations for the RolesPlanning the HP-UX Rbac Deployment HP-UX Rbac Limitations and Restrictions Planning Command MappingsConfiguring HP-UX Rbac Example Planning Results Configuring RolesCreating Roles Assigning Roles to Groups Configuring AuthorizationsAssigning Roles to Users Configuring Additional Command Authorizations and Privileges Is mainly intended for scripts Hierarchical Roles Example Roles Configuration in HP-UX Rbac B.11.23.02Overview Examples of Hierarchical RolesExample 3-1 The authadm Command Syntax Changes to the authadm Command for Hierarchical RolesExample 3-2 Example of the authadm Command Usage Hierarchical Roles ConsiderationsConfiguring HP-UX Rbac with Fine-Grained Privileges Matches the following /etc/rbac/cmdpriv entries Configuring HP-UX Rbac with CompartmentsCommand GID Configuring HP-UX Rbac to Generate Audit TrailsProcedure for Auditing HP-UX Rbac Criteria Following is the privrun command syntax Using HP-UX Rbac# privrun ipfstat HP-UX Rbac in Serviceguard Clusters Customizing privrun and privedit Using the Acps Privrun -v Information Troubleshooting HP-UX RbacRbacdbchk Database Syntax Tool Fine-Grained Privileges Commands CommandsFine-Grained Privileges Fine-Grained Privileges ComponentsManpages Available PrivilegesFine-Grained Privileges Manpages Available PrivilegesOr launch policy Configuring Applications with Fine-Grained Privileges# setfilexsec options filename Privilege ModelCompound Privileges Troubleshooting Fine-Grained Privileges Fine-Grained Privileges in HP Serviceguard ClustersSecurity Implications of Fine-Grained Privileges Privilege Escalation# getprocxsec options pid Compartment Architecture CompartmentsCompartment Architecture Planning the Compartment Structure Default Compartment ConfigurationActivating Compartments Modifying Compartment Configuration# setrules -p # cmpttune -eCompartment Components Compartment Configuration FilesChanging Compartment Rules Changing Compartment NamesCompartment Configuration Files Compartment CommandsCompartment Commands Compartment ManpagesFile System Rules Compartment Rules and SyntaxCompartment Definition Permissionlist IPC RulesIPC mechanism in the current compartment Network RulesAccess Interface Miscellaneous RulesExample Rules File Configuring Applications in CompartmentsTroubleshooting Compartments # vhardlinks Configured rules are loaded into the kernelDo not configure standby LAN interfaces in a compartment Compartments in HP Serviceguard ClustersStandard Mode Security Extensions Configuration Files Configuring Systemwide AttributesSecurity Attributes and the User Database System Security AttributesManpages CommandsAttributes Troubleshooting the User Database Configuring Attributes in the User DatabaseAuditing Auditing ComponentsAuditing Your System Audit CommandsPlanning Your Auditing Implementation Enabling AuditingAUDEVENTARGS1 = -P -F -e admin -e login -e moddac # audevent -P -F -e admin -e login -e moddacMonitoring Audit Files #audsys -n -c primaryauditfile -sAuditing Users Guidelines for Administering Your Auditing SystemPerformance Considerations #audsys -fAuditing Events Audevent command optionsStreamlining Audit Log Data # /usr/sbin/userdbset -u user-nameAUDITFLAG=1Self-auditing processes Audit Log Files#/usr/sbin/audisp auditfile Configuring Audit Log FilesViewing Audit Logs Examples of Using the audisp Command Page Index SymbolsSecurity attribute defining
Related manuals
Manual 10 pages 36.76 Kb