436
Chapter 10
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
General Security Guidelines in ITO
A C2-secure or “trusted” system uses a number of techniques to improve
security at system level. These techniques would include, amongst other
things, the following:
❏
Imposing strict password and user authentication methods for the
UNIX login
❏
Auditing networking, shared memory, file systems and so on
❏
Controlling access to terminals
❏
Managing access to files
For information about the implications these security recommendations
can have with regard to the configuration of ITO, see “Restrictions” on
page 436.
Restrictions
Running ITO in a C2-secure environment imposes a number of
important restrictions on the ITO configuration. Table 10-7 on page 436
lists those areas and provides a brief explanation of the cause of the
restriction. It is the administrator’s decision as to where security
priorities lie.
Table 10-7
Restrictions in a C2-secure Environment
Restricted Area
Explanation
ACLs
Although C2 recommends the use of ACLs, the OpenView
file tree does not support them. In addition,
opc_backup
and
opc_restore
are not aware of ACLs.
Agent Installation
If root-login over the network is not allowed, the ITO
agent has to be installed manually. For more information
about installing the agent manually, see the HP OpenView
IT/Operations Installation Guide for the Management
Server
Application Passwords
Password aging and changing can lead to problems with
remote application startup.
Содержание -UX B6941-90001
Страница 6: ...6 ...
Страница 8: ...8 ...
Страница 27: ...27 1 Prerequisites for Installing ITO Agent Software ...
Страница 43: ...43 2 Installing ITO Agents on the Managed Nodes ...
Страница 115: ...115 3 File Tree Layouts on the Managed Node Platforms ...
Страница 162: ...162 Chapter3 File Tree Layouts on the Managed Node Platforms File Tree Layout on Windows NT Managed Nodes ...
Страница 163: ...163 4 Software Maintenance on Managed Nodes ...
Страница 183: ...183 5 Configuring ITO ...
Страница 298: ...298 Chapter5 Configuring ITO Variables ...
Страница 299: ...299 6 Installing Updating the ITO Configuration on the Managed Nodes ...
Страница 315: ...315 7 Integrating Applications into ITO ...
Страница 333: ...333 8 ITO Language Support ...
Страница 352: ...352 Chapter8 ITO Language Support Flexible Management in a Japanese Environment ...
Страница 353: ...353 9 An Overview of ITO Processes ...
Страница 372: ...372 Chapter9 An Overview of ITO Processes Secure Networking ...
Страница 373: ...373 10 Tuning Troubleshooting Security and Maintenance ...
Страница 481: ...481 A ITO Managed Node APIs and Libraries ...
Страница 499: ...499 B Administration of MC ServiceGuard ...
Страница 512: ...512 AppendixB Administration of MC ServiceGuard Troubleshooting ITO in a ServiceGuard Environment ...
Страница 513: ...513 C ITO Tables and Tablespaces in the Database ...
Страница 520: ...520 AppendixC ITO Tables and Tablespaces in the Database ITO Tables and Tablespace ...
Страница 521: ...521 D ITO Man Pages Listing ...