224 Appendix A: Password security
Access permissions
ICB Release 4 provides strict password protections and other mechanisms to restrict access from unauthorized personnel (see Table 58).
Table 58
Access permissions
Access type | Description of permissions | |
|
|
|
BUI | 1 | Login name and password. The login name is a combination of letters and digits |
(HTTP server |
| up to 10 characters in length. The password consists of digits only. Define the |
web access) |
| length according to the parameter “minimum password length”. Users and |
|
| administrators can change their passwords at any time. |
| 2 | The system does not permit multiple, simultaneous BUI sessions for the same |
|
| user. When a user logs into the BUI, no one else can login with the same user |
|
| ID, until the session terminates (that is, the user logs out). |
|
| The system permits only one administration session at a time. Therefore, if |
|
| there is an active administrator session, the system does not permit another |
|
| administrator log in. |
| 3 | You can access only the initial login window when you enter the BUI’s URL from |
|
| your web browser. You cannot access any other page or file directly. |
| 4 | The system times out and closes the session after a period of inactivity. The |
|
| administrator defines the |
|
|
|
CLI | 1 | There are two login levels. Each level has a login name and password, both of |
(direct |
| which are changeable through the CLI. The name and password can contain |
connection) |
| letters and digits. |
| 2 | The CLI does not print the password when it is being entered. |
| 3 | The system records every successful login as an information message in the |
|
| error log. |
| 4 | Upon a successful login, the CLI prints the login date and time. |
| 5 | The system times out and closes the session after a period of inactivity. The |
|
| administrator defines the |
|
|
|
Telnet | 1 | Remote access using telnet requires a dedicated login name and password. |
(server access) |
| Successful login provides access to the CLI, which, in turn, requires its own |
|
| access and login as described above. The name and password can contain |
|
| letters and digits. |
| 2 | The system records every successful login as an informational message in the |
|
| error log. The CLI terminal prints this message. |
| 3 | The system times out and closes the session after a period of inactivity. The |
|
| administrator defines the |
|
|
|