Dell OpenManage Server Administrator Version 1.4 User's Guide
Disabling Guest and Anonymous Accounts in Supported Windows Operating Systems
X.509 Certificate Management Prerequisites
Firewall Configuration on Systems Running Supported Red Hat Linux Operating Systems
Server Administrator provides security through role-based access control (RBAC), authentication, and encryption for both the Web-based and command line interfaces.
RBAC manages security by determining the operations that can be executed by persons in particular roles. Each user is assigned one or more roles, and each role is assigned one or more user privileges that are permitted to users in that role. With RBAC, security administration corresponds closely to an organization's structure.
Server Administrator grants different access rights based on the user's assigned group privileges. The three user levels are: User, Power User, and Administrator.
Users can view most information.
Power Users can set warning threshold values, run diagnostic tests, and configure which alert actions are to be taken when a warning or failure event occurs.
Administrators can configure and perform shutdown actions, configure Auto Recovery actions in case a system has a hung operating system, and clear hardware, event, and command logs. Administrators can also send e-mail.
Server Administrator grants read-only access to users logged in with User privileges, read and write access to users logged in with Power User privileges, and read, write, and admin access to users logged in with Admin privileges. See Table 2-1.
User Privileges |
Access Type | ||
---|---|---|---|
| |||
Read access allows viewing of data reported by Server Administrator. Read access does not allow changing or setting values on the managed system.
Write access allows values to be changed or set on the managed system.
Admin access allows shutdown of the managed system.
Table 2-2 summarizes which user levels have privileges to access and manage Server Administrator Services.
Table 2-2. Server Administrator User Privilege Levels
Service |
User Privilege Level Required | |
---|---|---|
|
View |
Manage |
Table 2-3 defines the user privilege level abbreviations used in Table 2-2.
Table 2-3. Legend for Server Administrator User Privilege Levels
The Server Administrator authentication scheme ensures that the correct access types are assigned to the correct user privileges. Additionally, when the command line interface (CLI) is invoked, the Server Administrator authentication scheme validates the context within which the current process is running. This authentication scheme ensures that all Server Administrator functions, whether accessed through the Server Administrator home page or CLI, are properly authenticated.
For supported Microsoft Windows operating systems, Server Administrator authentication is based on the operating system's user authentication system using Windows NT® LAN Manager (NTLM) modules to authenticate. This underlying authentication system allows Server Administrator security to be incorporated in an overall security scheme for your network.
For supported Red Hat Linux operating systems, Server Administrator authentication is based on the Red Hat Linux Pluggable Authentication Modules (PAM) library. This documented library of functions allows an administrator to determine how individual applications authenticate users.
For supported Novell NetWare operating systems, Server Administrator authentication is based on the Novell Directory Service (NDS) library. This documented library of functions allows an administrator to determine how individual applications authenticate users.
Server Administrator is accessed over a secure HTTPS connection using secure socket layer (SSL) technology to ensure and protect the identity of the system being managed. Java Secure Socket Extension (JSSE) is used by supported Microsoft Windows, Red Hat Linux, and certain Novell NetWare operating systems to protect the user credentials and other sensitive data that is transmitted over the socket connection when a user accesses the Server Administrator home page. Supported Novell NetWare operating systems use operating system native Java SSL and Secure Authentication Services (SAS)-NetWare International Cryptographic Infrastructure (NICI).
You must properly assign user privileges to all Server Administrator users before installing Server Administrator in order to ensure critical system component security.
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. Additionally, users who do not have an assigned password cannot log into Server Administrator on a system running Windows Server 2003 due to operating system constraints. |
NOTICE: You should disable guest accounts for supported Microsoft Windows operating systems in order to protect access to your critical system components. See "Disabling Guest and Anonymous Accounts in Supported Windows Operating Systems" for instructions. |
NOTE: You must be logged in with Admin privileges to perform these procedures. |
NOTE: For questions about creating users and assigning user group privileges or for more detailed instructions, see your operating system documentation. |
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. Additionally, users who do not have an assigned password cannot log into Server Administrator on a system running Windows Server 2003 due to operating system constraints. |
New users can log into Server Administrator with the user privileges for their assigned group.
NOTE: For questions about creating users and assigning user group privileges or for more detailed instructions, see your operating system documentation. |
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. Additionally, users who do not have an assigned password cannot log into Server Administrator on a system running Windows Server 2003 due to operating system constraints. |
New users can log into Server Administrator with the user privileges for their assigned group.
NOTE: For questions about creating users and assigning user group privileges or for more detailed instructions, see your operating system documentation. |
NOTE: You must have Active Directory installed on your system to perform the following procedures. |
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. Additionally, users who do not have an assigned password cannot log into Server Administrator on a system running Windows Server 2003 due to operating system constraints. |
New users can log into Server Administrator with the user privileges for their assigned group and domain.
Admin access privileges are assigned to the user logged in as root. To create users with User and Power User privileges, perform the following steps.
NOTE: You must be logged in as root to perform these procedures. |
NOTE: For questions about creating users and assigning user group privileges or for more detailed instructions, see your operating system documentation. |
NOTE: You must have the adduser utility installed on your system to perform this procedure. |
adduser -d <home-directory> -g <group> <username>
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. |
The new user can now log in to Server Administrator with User group privileges.
NOTE: You must have the adduser utility installed on your system to perform this procedure. |
adduser -d <home-directory> -g root <username>
NOTE: You must set root as the primary group. |
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. |
The new user can now log in to Server Administrator with Power User group privileges.
NOTE: For questions about creating users and assigning user group privileges or for more detailed instructions, see your operating system documentation. |
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. |
An icon labeled with the new user name appears in the current container.
By default there are three entries in the Assigned Rights category: Login Script, Print Job Configuration, and [All Attribute Rights].
New users can now log into Server Administrator with User privileges.
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. |
An icon labeled with the new user name appears in the current container.
New users can now log into Server Administrator with Power User privileges.
NOTICE: You must assign a password to every user account that can access Server Administrator to protect access to your critical system components. |
An icon labeled with the new user name appears in the current container.
By default there are three entries in the Assigned Rights category: Login Script, Print Job Configuration, and [All Attribute Rights].
New users can now log into Server Administrator with Admin privileges.
NOTE: You must be logged in with Admin privileges to perform this procedure. |
A red circle with an X appears over the user name. The account is disabled.
Server Administrator supports the Simple Network Management Protocol (SNMP) systems management standard on all supported operating systems. In most cases, SNMP is installed as part of your operating system installation. An installed supported systems management protocol standard, such as SNMP, is required before installing Server Administrator. See "Installation Requirements" for more information.
You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management applications such as the Dell OpenManage IT Assistant and Array Manager, perform the procedures described in the following sections.
NOTE: For IT Assistant to retrieve management information from a system running Server Administrator, the community name used by IT Assistant must match a community name on the system running Server Administrator. For IT Assistant to modify information or perform actions on a system running Server Administrator, the community name used by IT Assistant must match a community name that allows Set operations on the system running Server Administrator. For IT Assistant to receive traps (asynchronous event notifications) from a system running Server Administrator, the system running Server Administrator must be configured to send traps to the system running IT Assistant. |
The following procedures provide step-by-step instructions for configuring the SNMP agent for each supported operating system:
Configuring the SNMP Agent for Systems Running Supported Windows Operating Systems
Configuring the SNMP Agent on Systems Running Supported Red Hat Linux Operating Systems
Configuring the SNMP Agent on Systems Running Supported NetWare Operating Systems
Server Administrator uses the SNMP services provided by the Windows SNMP agent. You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management applications such as IT Assistant and Array Manager, perform the procedures described in the following sections.
NOTE: See your operating system documentation for additional details on SNMP configuration. |
Configuring the SNMP community names determines which systems are able to manage your system through SNMP. The SNMP community name used by management applications must match an SNMP community name configured on the Server Administrator system so that the management applications can retrieve management information from Server Administrator.
The Computer Management window appears.
The SNMP Service Properties window appears.
The SNMP Service Configuration window appears.
The SNMP Service Properties window appears.
The SNMP Service Configuration window appears.
The SNMP Service Properties window appears.
SNMP Set operations must be enabled on the Server Administrator system to change Server Administrator attributes using IT Assistant.
The Computer Management window appears.
The SNMP Service Properties window appears.
The SNMP Service Configuration window appears.
The SNMP Service Properties window appears.
Server Administrator generates SNMP traps in response to changes in the status of sensors and other monitored parameters. You must configure one or more trap destinations on the Server Administrator system for SNMP traps to be sent to a management station.
The Computer Management window appears.
The SNMP Service Properties window appears.
Type in the trap destination and click Add.
The SNMP Service Properties window appears.
Server Administrator uses the SNMP services provided by the ucd-snmp or net-snmp SNMP agent. You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management applications such as IT Assistant and Array Manager, perform the procedures described in the following sections.
NOTE: See your operating system documentation for additional details on SNMP configuration. |
Configuring the SNMP community names determines which systems are able to manage your system through SNMP. The SNMP community name used by management applications must match an SNMP community name configured on the Server Administrator system so that the management applications can retrieve management information from Server Administrator.
To change the SNMP community name used for retrieving management information from a system running Server Administrator, edit the SNMP agent configuration file, /etc/snmp/snmpd.conf, and perform the following steps:
com2sec publicsec default public
com2sec notConfigUser default public
com2sec publicsec default community_name
com2sec notConfigUser default community_name
service snmpd restart
SNMP Set operations must be enabled on the system running Server Administrator in order to change Server Administrator attributes using IT Assistant.
To enable SNMP Set operations on the system running Server Administrator, edit the SNMP agent configuration file, /etc/snmp/snmpd.conf, and perform the following steps:
access publicgroup "" any noauth exact all none
access notConfigGroup "" any noauth exact all none
access publicgroup "" any noauth exact all none
access notConfigGroup "" any noauth exact all none
service snmpd restart
Server Administrator generates SNMP traps in response to changes in the status of sensors and other monitored parameters. One or more trap destinations must be configured on the system running Server Administrator for SNMP traps to be sent to a management station.
To configure your system running Server Administrator to send traps to a management station, edit the SNMP agent configuration file, /etc/snmp/snmpd.conf, and perform the following steps:
trapsink IP_address community_name
where IP_address is the IP address of the management station and community_name is the SNMP community name
service snmpd restart
Server Administrator uses the SNMP services provided by the NetWare SNMP agent. You can configure the SNMP agent to change the community name, enable Set operations, and send traps to a management station. To configure your SNMP agent for proper interaction with management station applications such as IT Assistant and Array Manager, perform the following tasks.
NOTE: See your operating system documentation for additional details on SNMP configuration. |
The SNMP community name used by management applications must match an SNMP community name configured on the system running Server Administrator so that the management station applications can retrieve management information from Server Administrator.
To change the SNMP community name used for retrieving management information from a Server Administrator system, perform the following steps:
The Internetworking Configuration menu appears.
The Manage Configuration menu appears.
The SNMP Parameters menu appears.
The Monitor Community Handling menu choices are Any Community May Read, Leave as Default Setting, No Community May Read, and Specified Community May Read.
NOTE: Press <F1> for more information about the Monitor State menu item. Press <Esc> to clear the help window. |
A message box appears, prompting you to save changes.
The Manage Configuration menu appears.
The Internetworking Configuration menu appears.
SNMP Set operations must be enabled on the system running Server Administrator in order to change Server Administrator attributes using IT Assistant.
To enable SNMP Set operations on the system running Server Administrator, perform the following steps:
The Internetworking Configuration menu appears.
The Manage Configuration menu appears.
The SNMP Parameters menu appears.
The Control Community Handling menu choices are Any Community May Write, Leave as Default Setting, No Community May Write, and Specified Community May Write.
NOTE: Press <F1> for more information about the Control State menu item. Press <Esc> to clear the help window. |
A message box appears, prompting you to save changes.
The Manage Configuration menu appears.
The Internetworking Configuration menu appears.
Server Administrator generates SNMP traps in response to changes in the status of sensors and other monitored parameters. One or more trap destinations must be configured on the system running Server Administrator for SNMP traps to be sent to a management station.
To configure a system running Server Administrator to send SNMP traps to a management station, perform the following steps:
The Internetworking Configuration menu appears.
The Manage Configuration menu appears.
The SNMP Parameters menu appears.
The Trap Handling menu choices are Do Not Send Traps, Leave as Default Setting, and Send Traps With Specified Community.
NOTE: Press <F1> for more information about the Trap State menu item. Press <Esc> to clear the help window. |
A message box appears, prompting you to save changes.
The Manage Configuration menu appears.
The Internetworking Configuration menu appears.
The Protocol Configuration menu appears.
The TCP/IP Protocol Configuration menu appears.
The SNMP Manager Table menu appears.
NOTE: Press <F1> for more information about the SNMP Manager Table menu item. Press <Esc> to clear the help window. |
A message box appears, prompting you to update the database.
The TCP/IP Protocol Configuration menu appears.
The Internetworking Configuration menu appears.
Web certificates are necessary to ensure the identity of a remote system and to ensure that information exchanged with the remote system cannot be viewed or changed by others.
This section explains the administrative prerequisites for ensuring your ability to generate a new X.509 certificate, reuse an existing X.509 certificate, or import a root certificate or certificate chain from Certification Authority (CA) on each supported operating system.
The X.509 certificate management is provided through the Server Administrator home page for the following operating systems. The operating systems do not have any certificate management prerequisites.
The X.509 certificate management for systems running NetWare version 5.1 (Service Pack 3 or later) requires that the following procedures be performed before installing Server Administrator:
NOTE: PKIS, SAS, and NICI are installed by default. If any of these products are not currently installed, you must install the product from your Novell NetWare 5.1 operating system CD. After installation, you must reapply the correct support patch. |
After installing Server Administrator, go to "Secure Port Server and Security Setup" to complete the X.509 certificate management procedures.
If you select High or Medium firewall security when installing Red Hat Linux, the SNMP port on all external network interfaces is closed by default. To enable SNMP management applications such as IT Assistant to discover and retrieve information from Server Administrator, the SNMP port on at least one external network interface must be open. If Server Administrator detects that the SNMP port is not open in the firewall for any external network interface, Server Administrator displays a warning message and logs a message to the system log.
You can open the SNMP port by disabling the firewall, opening an entire external network interface in the firewall, or opening the SNMP port for at least one external network interface in the firewall. You can perform this action before or after Server Administrator is started.
To open the SNMP port using one of the previously described methods, perform the following steps:
The Choose a Tool menu appears.
The Firewall Configuration screen appears.
NOTE: Press <F1> for more information about the firewall security levels. The default SNMP port number is 161. |
The Firewall Configuration - Customize screen appears.
The Firewall Configuration screen appears.
The Choose a Tool menu appears.