224 Appendix A: Password security

553-3001-358/555-4001-135 Standard 02.00 July 2006

Access permissions

ICB Release 4 provides strict password protections and other

mechanisms to restrict access from unauthorized personnel (see Tab le

58).

Tabl e 58

Access permissions

Access type Description of permissions
BUI
(HTTP server
web access)
1Login name and password. The login name is a combination of letters and digits
up to 10 characters in length. The password consists of digits only. Define the
length according to the parameter “minimum password length”. Users and
administrators can change their passwords at any time.
2The system does not permit multiple, simultaneous BUI sessions for the same
user. When a user logs into the BUI, no one else can login with the same user
ID, until the session terminates (that is, the user logs out).
The system permits only one administration session at a time. Therefore, if
there is an active administrator session, the system does not permit another
administrator log in.
3You can access only the initial login window when you enter the BUI’s URL from
your web browser. You cannot access any other page or file directly.
4The system times out and closes the session after a period of inactivity. The
administrator defines the time-out parameter.
CLI
(direct
connection)
1There are two login levels. Each level has a login name and password, both of
which are changeable through the CLI. The name and password can contain
letters and digits.
2The CLI does not print the password when it is being entered.
3The system records every successful login as an information message in the
error log.
4Upon a successful login, the CLI prints the login date and time.
5The system times out and closes the session after a period of inactivity. The
administrator defines the time-out parameter.
Telnet
(server access)
1Remote access using telnet requires a dedicated login name and password.
Successful login provides access to the CLI, which, in turn, requires its own
access and login as described above. The name and password can contain
letters and digits.
2The system records every successful login as an informational message in the
error log. The CLI terminal prints this message.
3The system times out and closes the session after a period of inactivity. The
administrator defines the time-out parameter.