
222
Novell eDirectory 8.8 Administration Guide
n
ov
do
cx (e
n)
11
Ju
ly 20
08
Level 1 is the default because many administrators do not have supervisory access to every
server in the tree but might need to use the iMonitor service on a server that their servers
interact with.
NOTE:
There are several features of iMonitor, such as Repair and Trace, that require
supervisor equivalency to access regardless of the LockMask setting.
Access Level
Description
0
Require no authentication before iMonitor processes URLs. In this case,
the eDirectory rights of the .[Public]. identity are applied to any request,
and information displayed by iMonitor is restricted to the rights of the
.[Public]. user. However, because no authentication is required to send
URLs to iMonitor, iMonitor might be vulnerable to DoS attacks that are
based on sending garbage in the URL.
1 (Default)
Before iMonitor processes URLs, require successful authentication as
some eDirectory identity. In this case, the eDirectory rights of that identity
are applied to any request and are, therefore, restricted by those rights.
The same DoS vulnerability as level 0 exists, except the attack must be
launched by someone who has actually authenticated to the server. Until a
successful authentication occurs, the response to any iMonitor URL
request is a login dialog box, so iMonitor should be impervious to attacks
by unauthenticated users when it is configured in this state.
2
Before iMonitor processes URLs, require successful authentication as an
eDirectory identity that has supervisor equivalency on the server that
iMonitor is authenticating to. The same DoS vulnerability as level 1 exists,
except the attack must now be launched by someone who has actually
authenticated as a supervisor of the server. Until a successful
authentication occurs, the response to any iMonitor URL request is a login
dialog box, so iMonitor should be impervious to attacks by unauthenticated
users and non-supervisor authenticated users when it is configured in this
state.
Содержание EDIRECTORY 8.8 SP3
Страница 4: ...novdocx en 11 July 2008...
Страница 72: ...72 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 120: ...120 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 132: ...132 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 190: ...190 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 238: ...238 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 262: ...262 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 288: ...288 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 320: ...320 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 348: ...348 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 388: ...388 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 492: ...492 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 586: ...586 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 599: ...The eDirectory Management Toolbox 599 novdocx en 11 July 2008 Click Help for details...
Страница 600: ...600 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...
Страница 614: ...614 Novell eDirectory 8 8 Administration Guide novdocx en 11 July 2008...