 |
» |
|
|
|
To enter the Security Configurator, at the MPE/iX prompt enter:
After verifying the user's capability, the program presents the user
with the main menu:
HP Security Monitor B3175A.00.01 (c) Hewlett-Packard Co. 1993
0. Exit
1. Global Security Options
2. Device Password Configuration
3. Commands Logging and Access
4. User Security Options
5. List Current Security Configuration
6. Reset Security Configuration
Please enter your choice (0-6):
|
After the user is finished with any function, the program always
exits to a higher level menu. The user will then have a choice of
exiting or going to another menu selection.
At the main menu level, if the EXIT option is specified, the program
will update both the security data file and the security information
table. At this time the new configuration will immediately take effect.
(All changes made during this session will be logged in
the system log file and generate a message on the
system console).
Global Security Options |  |
If the user selects the "Global Security Options" in the main menu,
the "Global Security Options" menu will be displayed.
GLOBAL SECURITY OPTIONS
0. Exit to Main Menu
1. Password Encryption
2. Minimum Length for Passwords
3. Maximum Invalid Logons per Device
4. Mandatory Password Prompt
5. Idle Session Timeout
6. Generic Logon Message Option
7. UDC Failure Termination Option
8. File Open Logging Option
9. Global Password Management Values
10. Batch Submission Security Options
11. Assurance of Auditability Option
12. File Maximum Protection Option
13. Maximum Invalid User Logons
14. Set all options to maximum protection
Please enter your choice (0-14):
|
For each of the choices, the program will display the current option
or value ( which may be the default if it was not configured), and prompts
the user for the new value.
This option produces following screen:
You have just selected the function to specify
PASSWORD ENCRYPTION option. This function allows
you to turn the encryption ON or OFF.
Encryption is currently ON.
Please specify your new choice (ON/OFF):
|
2. Minimum Length for Passwords
This option produces the following screen:
This function allows the user to specify the value for the minimum
password length. This value is applicable to USER, ACCOUNT, GROUP and
device passwords (but not lockwords).
Minimum password length currently is: 0
Please enter your choice (0-8):
|
3. Maximum Invalid Logons per DeviceThis option produces the following screen:
This function allows you to specify the maximum number
of invalid logons that a device can tolerate before it
becomes unavailable (DOWNed). You can specify a number
between 1 and 32766, or a zero (0) which is unlimited.
Maximum invalid attempts currently is: 4
Please enter your choice (0-32766):
Since you just set the maximum invalid logon count, you
may want to configure a timeout interval, during which a
violated device would be in the DOWN state. After that
interval expires, MPE will automatically UP the device.
The interval can be from 1 to 32766 seconds, or Zero (0).
A zero means there is no automatic timeout, and the
Operator must :UP the device manually.
The currently configured device timeout is: 0
Please enter your choice (0-32766):
|
4. Mandatory Password Prompt
This option produces the following screen:
You have just selected the function to specify whether
password prompts are mandatory for interactive logons.
When this option is ON, MPE will not accept logon
commands with embedded passwords, such as
:HELLO USER/UPASS.ACCT/APASS
Mandatory Password Prompt is currently OFF (i.e. embedded passwords OK).
Please specify your new choice (ON/OFF):ON
Mandatory Password Prompt is now ON.
Since you've just enabled the mandatory password prompt option, you may
want to consider exempting REMOTE HELLO from this rule. You might have
applications which log on remotely from within a job, or do REMOTE HELLO
programmatically. These applications will fail if the DS/NS terminals are
not exempted.
Do you want to exempt DS/NS terminals from forced prompting (Yes/No) ?yes
DS/NS terminals are now EXEMPT.
Do you want to exempt DS/NS terminals from forced prompting (YES/NO)
|
This function allows you to specify the system-wide
timeout value for CI reads and application timeout. When a non-zero
value is specified, all idle sessions will be terminated after
that time expires without a user response. A zero (0)
means no timeout.
The Global Timeout value currently is: 0
Please enter your choice (0 - 546):
|
6. Generic Logon Message Option
This option produces the following screen:
You have just selected the function to specify the
logon message option. Your choice is between using
existing MPE friendly messages, or the generic,
no-hint logon interface, which only say * INVALID *
when logon error exists.
Generic Logon Message is currently OFF.
Please specify your new choice (ON/OFF):
|
7. UDC Failure Termination Option
This option produces the following screen:
You have just selected the function to specify whether
a job/session is to be terminated if the initiation of
UDC at logon time fails for any reason. When this
option is ON, it prevents users from bypassing your
system logon UDC.
UDC Failure Termination is currently OFF (disabled).
Please specify your new choice (ON/OFF):
|
8. File Open Logging Option
This option produces the following screen:
You have just selected the function to specify whether
to log all FOPENs or only the ones that failed.
FOPEN LOGGING OPTION is currently: FOPEN FAILURE ONLY
Do you want to keep this option: 'logging FOPEN FAILURES ONLY' (Yes/No):
|
9. Global Password Management Values
The Global Password Management Values can be configured
with the Security Options menu, by selecting item 9. By
entering the desired values, a system administrator may
set a global password expiration date, and the time
intervals for a global password aging policy.
After selecting the Global Password Management Values, the
security administrator is presented with the
following menu:
GLOBAL PASSWORD MANAGEMENT VALUES
0. Exit to Global Security Menu
1. Global User Password Expiration Date
2. Global User Password Maximum Lifetime
3. Global User Password Minimum Time
4. Global User Password Warning Time
5. Global User Password Expiration Time
Please enter your choice (0-5):
|
(1.) Global User Password Expiration Date
This option produces the following screen:
The Global Password Expiration function allows you to
activate automatic password expiration for all users
who are required to have password. When this option
is enabled, MPE will expire all the REQUIRED user
passwords on the (same) global expiration date.
To enable this function, you specify the number of
days between expirations. This value can range
from 1 to 365; or a zero (0) which means no automatic
expiration. Optionally, you can specify a date for the
expiration cycle to start (default is today); and the
number of days to warn the user prior to expiration.
Automatic global password expiration has not been configured.
Please specify your new choice (0-365 days):
Number of days between expirations is now: 365
Since you have just set the number of days for
automatic expiration, you may want to set or reset a
specific date to start the expiration cycle.
The next global expiration date is: today (by default).
To change, enter new MM/DD/YY (CR = no change):01/01/93
The global expiration date accepted is: FRI, JAN 1, 1993
Number of days to warn prior to expiration currently is: 0
Please specify your new choice (0-364 days):5
Number of days to warn prior to expiration is now: 5
|
The following options, affect system wide password aging policy for all users.
(2.) Global User Password Maximum Lifetime
This option produces the following screen:
This option sets the maximum lifetime for a user password.
This value can range from 1 to 365 days, or optionally 0
for no password expiration.
The global user password maximum lifetime currently is: 0
Please enter your choice (0-365 days):90
The global user password maximum lifetime is now: 90
|
(3.) Global User Password Minimum Time
This option produces the following screen:
This option sets the minimum time after setting a
password before the password can be changed. This
value can range from 1 to 364 days, or optionally 0 for no
minimum password time.
The global user minimum lifetime currently is: 0
Please enter your choice (0-364 days):5
The global user password minimum time is now: 5
|
(4.) Global User Password Warning Time
This option produces the following screen:
This option sets the time a user is warned before the
user password expires. This value can range from 1 to 364
days, or optionally 0 to prevent warning.
The global user warning time currently is: 0
Please enter your choice (0-364 days):5
The global user password warning time is now: 5
|
(5.) Global User Password Expiration Time
This option produces the following screen:
This option sets expiration period for a user password.
When this time period expires, the user is no longer
able to log on to the system. This value can range
from 1 to 364 days, or optionally 0 for no password
expiration.
The global user expiration time currently is: 0
Please enter your choice (0-364 days):5
The global user password expiration time is now: 15
|
10. Batch Submission Security Options
The Batch Submission Security Options can be configured with the
Global Security Option menu, by selecting item 10. From the Batch Submission
Security menu,
the security administrator will be able to select
various options. Selecting the Batch Submission Security Options
from the Global Security Options menu, the following screen is displayed:
BATCH SUBMISSION SECURITY
0. Exit to Global Security Menu
1. Embedded Password Disallowed Option
2. Cross Streaming Restriction Option
3. Stream Privileges Option
Please enter your choice (0-3):
|
Embedded Password Disallowed Option
This option produces the following screen:
You have just selected the function to configure whether
embedded passwords in job card are allowable. When this
option is ON, MPE will reject any !JOB command with passwords
embedded in it.
Embedded Password Disallowed is currently OFF (disabled).
Please specify your new choice (ON/OFF):
|
Cross Streaming Restriction Option
This option produces the following screen:
You have just selected the function to configure whether
streaming of other people's jobs is allowable. When this
option is ON, a person will not be allowed to stream another
person's job, unless specifically authorized.
Cross Streaming Restriction is currently OFF (i.e., cross stream allowed).
Please specify your new choice (ON/OFF):ON
Cross Streaming Restriction is now ON (Enabled).
Since you have just enabled the cross streaming restriction
feature, you may want to also enable the Authorization option
to allow limited cross streaming of protected jobs. When
enabled, this option allows those with EXECUTE access to
"protected" job files to stream them.
Cross Streaming Authorization is currently OFF (Disabled)
Please specify your new choice (ON/OFF):
|
This option produces the following screen:
You have just selected the function to configure whether
SM, AM and a job owner is allowed to stream jobs without
the need for passwords.
Stream Privilege is currently OFF (disabled).
Please specify your new choice (ON/OFF):ON
Stream Privilege in now ON (Enabled)
Since you have just enabled the stream privilege feature,
you may want to extend this privilege to other users to
allow limited password omission in streaming of protected
jobs. This extension allows those with EXECUTE access to
"protected" job files to stream them without passwords.
Stream Privilege Authorization is currently OFF (Disabled)
Please specify your new choice (ON/OFF):
|
11. Assurance of Auditability Option
This option produces the following screen:
You have just selected the function to configure whether
the auditability is to be assured when there is a system
logging error. When this option is ON, MPE will execute
a CONTROL-A LOGOFF if a system logging error occurs. At
that time, only users with OP or SM capability can log on
to the system and try to correct the problem and resume
logging or shutdown the system.
Assurance of Auditability is currently OFF
Please specify your new choice (ON/OFF):
|
12. Maximum Protection Option
This option produces the following screen:
You have just selected the function to configure whether
a NEWLY created object is going to be maximally protected.
When this option is ON, MPE will configure the CREATOR of
the object to be the only user who can access the object
if no ACD is attached to that object.
Maximum Protection is currently OFF
Please specify your new choice (ON/OFF):
|
13. Maximum Invalid User Logons
This option produces the following screen:
This function allows you to specify the maximum number
of invalid user logons before the user ID becomes invalid.
You can specify a number between 1 and 32766, or zero (0)
which is unlimited.
Maximum invalid attempts currently is: 4
Please specify your new choice (0-32766):
Since you just set the maximum invalid logon count,
you may want to configure a timeout interval, during
which a user ID will remain invalid. After that time
interval expires, MPE will automatically change the user
ID to valid. The interval can be from 1 to 32766
seconds, or zero (0). A zero means there is no automatic
timeout, and the account manager or system manager must
re-activate the user.
The timeout is currently : 0
Please enter your choice (0-32766)
|
14. Set All Options To Maximum Protection
This option provides the following screen:
This function allows you to set the maximum protection for all
of the Global Security Options. Use the LIST command to verify
the selections are acceptable.
Do you want to set all Global Security Options to maximum
protection (YES/NO):YES
Maximum protection has been set to maximum.
|
Device Password Configuration |  |
For the "Device Password Configuration" selection, the program will let the user enter the
device number and password for that device.
Multiple groups of classes or LDEV's can be entered on one line,
separated by a comma, providing the line does not exceed 72 characters.
The same password will be assigned to all LDEV's or device classes on that
line. LDEV's and device classes can not be mixed on the same line. This option produces the following screen:
This function allows you to configure the device password
for terminals. Following the ">" prompt, please enter the
"LDEV;PASSWORD" that you want to configure in, for example:
> 20; SECRET
or > 21,22,23; DEVPASS
or > TERM; TERMPASS (TERM is a device class)
The prompt will be repeated until you end your input
with a "//" or a CR only. If you want a list of currently
configured (passworded) devices, enter "@". To remove
password for any LDEV, enter a blank/empty password, e.g. "21; ".
If you want your password input echo-suppressed, enter only
the LDEVs, then we will prompt you for the password with
the echo turned off.
Please enter password information in the form
LDEV [,ldev...][;PASSWORD].(up to a maximum of 72 characters)
If user enters "@" at the prompt, the format of the
display will be:
The following Ldevs have a device password:
68, 70, 71, 72, 73, 74, 75, 77, 78, 79, 200, 201, 202, 204,
205, 206, 207, 208, 209, 210, 69
|
If the user enters 71,72; the format of the display will be:
Removing Device Password for ldev 71
Removing Device Password for ldev 72
|
Commands Logging and Access |  |
For the "Commands Logging and Access" category, the following display will
appear:
COMMANDS LOGGING & ACCESS
0. Exit to Main Menu
1. Configure Logging & Disabling
2. Set Programmatic Access Level
Please enter your choice (0-2):
|
Configure Logging & Disabling
This option produces the following display:
Following the "Command >" prompt, please enter the
MPE COMMAND that you want to log or disable access.
Once the command is verified to be a valid command,
you will be asked for the logging and access options
for that command.
To terminate you input, enter "//" or a carriage return in response
to the "command>" prompt.
If you want a list of all commands that are currently
configured in the security table, enter "@".
Command > CONSOLE
CONSOLE Prog. Access ON General Execution ON Logging OFF
Programmatic Access Disabled (Yes/No) ?YES
General Execution Disabled (Yes/No) ?YES
Logging Enabled (Yes/No) ?YES
CONSOLE Prog. Access OFF General Execution OFF Logging ON
All Others: Prog. Access ON General Execution ON Logging OFF
Command>
|
If the user requests the list of configured commands by
entering "@", the following screen will be displayed:
Command > @
CONSOLE Prog. Access OFF General Execution OFF Logging ON
PURGEACCT Prog. Access OFF General Execution OFF Logging ON
ALTSEC Prog. Access OFF General Execution OFF Logging ON
|
Set Programmatic Access Level
This option produces the following screen:
Since Command disabling may affect the functioning of
your present programs and subsystems, you may want to
set the Programmatic Access to WARNING level first.
At warning level, a command, when executed
programmatically, will only cause the command to be
logged via the Command Logging facility and a message to be sent to
$STDLIST.
Then, after you have examined the system log files to
ascertain that the disabled commands do not adversely
affect your applications, you can reset the WARN flag
to go to full disabling level (execution causes an error).
PROGRAMMATIC ACCESS LEVEL is currently: FULL DISABLING.
Do you want to change this to 'WARNING LEVEL' (Yes/No) ?
|
User Security Options |  |
This option produces the following screen:
USER SECURITY OPTIONS
0. Exit
1. Enable User ID
2. Enable User Password
3. User Password Aging Values
4. Set User Passwords Required
5. Remove User Passwords Required
Please enter your choice (0-5):
|
Once the choice 1 or 2 is made, the system manager will then be able to
manipulate the user information.
This selection will allow a system to enable a
user that has been disabled and will display the following screen:
You have selected the choice to enable a disabled user ID.
The prompt will be repeated until you enter a (user.account) name
or end your input with a "//" or carriage return.
Enter the user ID to enable (user.account):mgr.test
Enable mgr.test (YES/NO):YES
User mgr.test has been enabled
|
This solution will allow a system manager to set an invalid user password to theexpired state. An invalid user password is one that went beyond the expiration time. Once the user password is in the expired state, the password can be changedby the user.
You have selected the choice to enable an invalid user password.
The prompt will be repeated until you enter a (user.account) name
or end your input with a "//" or a carriage return.
The password will be set expired.
Enter the invalid user ID (Name.Account):
Enable the password for Name.Account (Yes/No):
User Name.Account is now expired
|
3. User Password Aging Values
This selection describes the user level password aging values which allow System Managers to set the user password
aging values for a specific user. Aging values for individual users can be established only after the system wide password aging policy is established. The dialog for the expiration, minimum and
warning times will only
occur if the maximum time is not set to zero. The selected times are
checked in order to maintain consistency with the password aging scheme.
You have selected the choice to set the user password aging values.
Enter the user ID to set (name.account): mgr.test
Set the age values for MGR.TEST (YES/NO): yes
The maximum user password time currently is: 20
Enter the new maximum user password time (0-365 days) :50
The user expiration time currently is: 0
Enter the new user expiration time (0-20 days) : 10
The user minimum password time currently is: 0
Enter the new minimum user password time (0-30 days) : 10
The user password warning time currently is: 0
Enter new user password warning time (0-10 days) : 5
The user password aging values have been updated.
|
4. Set User Passwords Required
This option is used to specify that passwords are to be required for a specific account.
This option set all users to PASSWORD REQUIRED. A selected account,
accounts selected with a wild card, or all accounts if you enter @ for
the selection. Users with blank passwords will have their passwords
set expired.
|
5. Remove User Passwords Required This option is used to remove required password protection from specified accounts.
This option removes the user password required option. A selected
account, accounts selected with a wild card, or all accounts if you
enter @ for the selection.
|
List Current Security Configuration |  |
This option produces the following screen:
SECCONF v.uu.ff (C) HEWLETT-PACKARD CO., 1986, 1991
GLOBAL SECURITY OPTIONS
1. Password Encryption: ON
2. Minimum Length for Passwords: 0
3. Maximum Invalid Logons per Device: UNLIMITED
4. Mandatory Password Prompt: ON
5. Idle Session Timeout (minutes): NO TIMEOUT
6. Generic Logon Message Option: OFF
7. UDC Failure Termination: OFF
8. File Open Logging: ALL
9. Global Password Management Values:
* Global Expiration Interval: 365 days
* Global Expiration Date: FRI, JAN 1, 1993
* Global Expiration warning: 5 days
* Global User Password Maximum 90 days
* Global User Password Minimum 5 days
* Global User Password Warning 5 days
* Global User Password Expired 15 days
10. Batch Submission Security
* Embedded Passwords in JOB card: Disallowed
* Cross Streaming: Allowed
* Stream Privilege: Enabled, with authorization.
11. Assurance of Auditability: ON
12. Maximum Protection Option: ON
13. Maximum Invalid User Logons: UNLIMITED
DEVICE LOGON PASSWORD
The following Ldevs have a device password: 68, 70, 71,
73, 74, 75, 76, 77, 78, 79, 200, 201, 202, 204, 205,
206, 207, 208, 209, 210, 69
COMMAND LOGGING AND ACCESS
CONSOLE Prog. Access ON General Execution ON Logging ON
NEWACCT Prog. Access OFF General Execution OFF Logging ON
NEWGROUP Prog. Access OFF General Execution OFF Logging ON
NEWUSER Prog. Access OFF General Execution OFF Logging ON
PURGEACCT Prog. Access OFF General Execution OFF Logging ON
PURGEGROUP Prog. Access OFF General Execution OFF Logging ON
PURGEUSER Prog. Access OFF General Execution OFF Logging ON
All Others: Prog. Access ON General Execution ON Logging OFF
(default)
Thank you for using the Security Configuration Utility.
|
Users can also run SECCONF with the LIST entry point to obtain security
configuration information. On MPE/iX command prompt, enter:
:RUN SECCONF.PUB.SYS ; INFO = 'LIST'
|
Output similar to the one described on the previous page, will be displayed on the user
terminal.
Reset Security Configuration |  |
This option produces a display
that allows users to reset all or part of the current security configuration:
SECCONF v.uu.ff (C) HEWLETT-PACKARD CO., 1986, 1992
RESET MENU
0. Exit
1. Hard Reset
2. Soft Reset - Reset Global Options
3. Soft Reset - Reset Command Options
4. Soft Reset - Reset Device Passwords
5. Soft Reset - Reset User Options
6. Suspend - Suspend Command Disabling
Please enter your choice (0-6):
|
For each of the choices, the program will
display a short warning describing
the function of each reset.
The user will then be asked if they want to continue.
This option will remove all of the
new security features from the system
(and clear the SECDATA file).
It will also replace ALL encrypted passwords with a
blank password and will remove all
encrypted, required, expired and warning
bits from the system directory. It will
essentially return the system to a pre-security state.
One thing the Hard Reset will not do
is to remove the new logging bits from
the system tables and from the system CONFIG file.
Soft Reset - Reset Global Options
This option will reset or turn off all of the features associated with the
Global Security Options menu.
Soft Reset - Reset Command Options This option will reset or turn off all of the features associated with the
Commands Logging and Access Menu. All commands will be re-enabled and all
command logging will be turned off. In addition, the warning level option
will be reset to the non-warning state.
Soft Reset - Reset Device Passwords This option will reset or turn off all of the features associated with the
Device Password Configuration menu. All device passwords will be reset to
blanks. Devices will no longer have passwords.
Soft Reset - Reset User Options This option will reset or turn off all of the security features associated
with the User Security Options menu.
|