Chapter 10
453
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
Database Security
Security of the database is controlled by the operating system and by the
database itself. Users must have an OS logon for either remote or local
access to the data. Once a user is logged on, security mechanisms of the
database control access to the database and tables.
For all other database security aspects see Using Relational Databases
with HP OpenView Network Node Manager and the vendor’s manuals
supplied with the database.
ITO Application Setup and Execution
Applications run under the account (user and password) specified by the
administrator during application configuration. The action agent uses
the information in this account before executing an application, that is, it
switches to the user specified and then uses the name and password
stored in the application request to start the application.
Application execution can be compromised by the use of password aging.
Password aging is a feature of C2 that expires passwords after:
❏
a specific period of time has passed
❏
a specific date has been reached
❏
a certain number of unsuccessful login attempts have been made
Administrators need to bear in mind that if this feature is enabled, it
could lead to application startup failures where the account that a given
application uses is temporarily inaccessible. In this case, the user or
system administrator has to change the password.
Remote Login and Command Execution
Security issues concerning remote login and command execution are
described here for ITO and for UNIX and MPE/iX platforms:
❏
If he does not apply the default user (setup by the ITO administrator)
for command broadcast or application startup, the ITO operator must
know the corresponding password. Otherwise, the
command/application will fail.
❏
When starting applications configured as Window (Input/Output):
• the password must be specified with the application attributes
-Or-
Содержание -UX B6941-90001
Страница 6: ...6 ...
Страница 8: ...8 ...
Страница 27: ...27 1 Prerequisites for Installing ITO Agent Software ...
Страница 43: ...43 2 Installing ITO Agents on the Managed Nodes ...
Страница 115: ...115 3 File Tree Layouts on the Managed Node Platforms ...
Страница 162: ...162 Chapter3 File Tree Layouts on the Managed Node Platforms File Tree Layout on Windows NT Managed Nodes ...
Страница 163: ...163 4 Software Maintenance on Managed Nodes ...
Страница 183: ...183 5 Configuring ITO ...
Страница 298: ...298 Chapter5 Configuring ITO Variables ...
Страница 299: ...299 6 Installing Updating the ITO Configuration on the Managed Nodes ...
Страница 315: ...315 7 Integrating Applications into ITO ...
Страница 333: ...333 8 ITO Language Support ...
Страница 352: ...352 Chapter8 ITO Language Support Flexible Management in a Japanese Environment ...
Страница 353: ...353 9 An Overview of ITO Processes ...
Страница 372: ...372 Chapter9 An Overview of ITO Processes Secure Networking ...
Страница 373: ...373 10 Tuning Troubleshooting Security and Maintenance ...
Страница 481: ...481 A ITO Managed Node APIs and Libraries ...
Страница 499: ...499 B Administration of MC ServiceGuard ...
Страница 512: ...512 AppendixB Administration of MC ServiceGuard Troubleshooting ITO in a ServiceGuard Environment ...
Страница 513: ...513 C ITO Tables and Tablespaces in the Database ...
Страница 520: ...520 AppendixC ITO Tables and Tablespaces in the Database ITO Tables and Tablespace ...
Страница 521: ...521 D ITO Man Pages Listing ...