Chapter 10
437
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
Network Security
Network security involves the protection of data that is exchanged
between the management server and the managed node and is primarily
DCE related. ITO addresses the problem of network security by
controlling the authenticity of the parties, in this case the RPC client and
server, before granting a connection and ensuring the integrity of data
passed over the network during the connection.
Although ITO carries out its own, basic authorization checks when
communication between the management server and the managed nodes
is required, DCE allows the implementation of more stringent security at
process level between an RPC client and an RPC server, specifically in
the areas of authentication and privacy, or data protection.
The level of data protection is chosen by the client, although the server
has the option of deciding whether a chosen level is sufficient, and ITO
sees the concept of authentication in the context of either the RPC client
or the RPC server. For example, in the same way that an RPC server
needs to determine whether or not an incoming request is from a genuine
ITO client, an RPC client also needs to be sure that the server it is
calling really is an ITO server.
The section on network security covers the following areas:
❏
DCE Configuration
❏
Authentication
❏
Process names and passwords
❏
Port security
❏
Processes and port numbers
Basic DCE Configuration
If you want to protect communication between the ITO management
server and managed nodes using DCE’s security mechanisms, you need
to carry out some extra configuration steps. First of all, a DCE server
installation must be available in the local network. The DCE server
installation provides:
❏
Cell Directory Service (CDS)
❏
DCE security service
❏
DCE Distributed Time Service (DTS)
Содержание -UX B6941-90001
Страница 6: ...6 ...
Страница 8: ...8 ...
Страница 27: ...27 1 Prerequisites for Installing ITO Agent Software ...
Страница 43: ...43 2 Installing ITO Agents on the Managed Nodes ...
Страница 115: ...115 3 File Tree Layouts on the Managed Node Platforms ...
Страница 162: ...162 Chapter3 File Tree Layouts on the Managed Node Platforms File Tree Layout on Windows NT Managed Nodes ...
Страница 163: ...163 4 Software Maintenance on Managed Nodes ...
Страница 183: ...183 5 Configuring ITO ...
Страница 298: ...298 Chapter5 Configuring ITO Variables ...
Страница 299: ...299 6 Installing Updating the ITO Configuration on the Managed Nodes ...
Страница 315: ...315 7 Integrating Applications into ITO ...
Страница 333: ...333 8 ITO Language Support ...
Страница 352: ...352 Chapter8 ITO Language Support Flexible Management in a Japanese Environment ...
Страница 353: ...353 9 An Overview of ITO Processes ...
Страница 372: ...372 Chapter9 An Overview of ITO Processes Secure Networking ...
Страница 373: ...373 10 Tuning Troubleshooting Security and Maintenance ...
Страница 481: ...481 A ITO Managed Node APIs and Libraries ...
Страница 499: ...499 B Administration of MC ServiceGuard ...
Страница 512: ...512 AppendixB Administration of MC ServiceGuard Troubleshooting ITO in a ServiceGuard Environment ...
Страница 513: ...513 C ITO Tables and Tablespaces in the Database ...
Страница 520: ...520 AppendixC ITO Tables and Tablespaces in the Database ITO Tables and Tablespace ...
Страница 521: ...521 D ITO Man Pages Listing ...