home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!cs.utexas.edu!uwm.edu!linac!att!ucbvax!lrw.com!leichter
- From: leichter@lrw.com (Jerry Leichter)
- Newsgroups: comp.os.vms
- Subject: RE: operator accounts
- Message-ID: <9301210244.AA05110@uu3.psi.com>
- Date: 21 Jan 93 01:41:50 GMT
- Sender: daemon@ucbvax.BERKELEY.EDU
- Distribution: world
- Organization: The Internet
- Lines: 58
-
-
- Could anybody out there please tell me what the best way to set
- operator accounts up is, ie. should the different operators go though
- their own accounts, or should there be a common account with full
- privs. Is it possible to give privs only on request using com, exe
- programs without having to give the setprv priv initially .... ???
-
- Any thoughts on this subject would be greatly appreciated.
-
- There is no one best answer. It depends on what you use your system for,
- what you expect your operators to do, how much training you expect them to
- have, and many other things.
-
- There are some general rules:
-
- 1. Maintain accountability. If someone does something on the system,
- make sure you can track it back to them. This is partly a
- matter of security, on the "bull in the china shop" theory
- (you can always buy new china, but the bull is dead meat),
- but also just good management practice: When something goes
- wrong, it helps to find the person who changed things in
- order to understand what he did and why and possibly change
- it back.
-
- A single shared account instantly loses accountability. It
- also implies a shared password - usually a bad idea. A
- secret that's known by one person will stay secret; a secret
- that's known by two may soon spread; one known by four or
- five will quickly be known by yet more.
-
- Some sites use a single privileged account with an additional
- "sign in" in a forced login file. (Individual operators on
- such a system usually get individual non-privileged accounts
- as well.) The theory is to provide a central log of operator
- logins. Often, the "sign in" asks for a one-line comment
- about what the person intends to do. This can be useful IF
- you can convince everyone to give useful answers! In most
- cases, it quickly gets seen as just another pain in the neck
- and the logs fill with "reasons" like "Fix system".
-
- 2. Give the minimum privilege required to get the job done. An
- operator who will only be doing backups needs READALL, but
- really not much else.
-
- 3. Especially when dealing with untrained staff, it may be worth your
- while to create captive scripts to let them do their jobs,
- but nothing else. For example, many sites have a "backup"
- account which is runs a captive script. All it can do is
- backups.
-
- In answer to your general questions: Privileges can be associated with an
- executable image (using INSTALL), and you can restrict access to that image
- using either the SOGW (system/owner/group/world) protection mask or ACL's,
- which can give you very fine-grained control. Privileges CANNOT be directly
- associated with a command file (though for cases like the backup script, you
- can get a similar effect).
- -- Jerry
-
-