Previous | Contents | Index |
External authentication allows the OpenVMS system manager to set up an OpenVMS user account for which login authentication is verified by the Advanced Server domain security. External authentication allows the Advanced Server to do the user authentication for both Advanced Server and OpenVMS user accounts.
External authentication is an option for users who have both OpenVMS and Advanced Server user accounts. It is not required. User host mapping provides the link between these two accounts, as described in Section 3.1.16, User Account Host Mapping.
With external authentication, users get automatic password
synchronization between their OpenVMS account and their corresponding
Advanced Server account. Externally authenticated users are considered to
have a single password and are not subject to OpenVMS password
policies, such as password expiration, password history, and minimum
and maximum password length restrictions. Users are, however, subject
to the Advanced Server account policy that is defined. All other OpenVMS
account restrictions remain in effect, such as disabled accounts, time
restrictions, and quotas. For information about setting up the system
and enabling OpenVMS user accounts for external authentication, refer
to the OpenVMS V7.2 Guide to System Security.
3.1.17.1 Configuring the Server Capacity for External Authentication
By default, the Advanced Server can support up to 10 simultaneous
external authentication logon requests (signons). You can modify this
maximum to suit the server requirements, using the Configuration
Manager. For more details, see Section 7.1.4.4, Specifying the Maximum Number of Concurrent Signons.
3.1.17.2 Synchronizing Passwords
The password of an externally authenticated OpenVMS user is automatically synchronized with the host mapped Advanced Server domain user, regardless of the role of the Advanced Server in the domain.
When a user changes the OpenVMS password using the OpenVMS command SET PASSWORD, and external authentication is set for the user, OpenVMS forwards the password change request to the Advanced Server. When the password change request is successfully processed, OpenVMS updates the OpenVMS user password. If Advanced Server is not running when the OpenVMS command SET PASSWORD is executed, the domain password is not changed.
When users change their passwords from their client workstations, or the server administrator changes a password with the Advanced Server command SET PASSWORD, the Advanced Server processes the password change as usual. The OpenVMS password is synchronized when the user next logs in to OpenVMS. All password changes are synchronized. When an OpenVMS user no longer has the external authentication flag set, the password for the OpenVMS user account is the same as the one that was last set by Advanced Server.
Password synchronization may fail due to the different sets of valid characters allowed by OpenVMS and Advanced Server. Keep this in mind when changing the password of an externally authenticated user. |
OpenVMS accepts the user name in one of the following formats for user accounts set for external authentication:
The form of the user name string determines the order in which OpenVMS verifies the logon:
Because external authentication depends on hostmapping information, it is important to set up user accounts and hostmapping carefully. For example, if the same user name exists in the Advanced Server and OpenVMS, but they are not the same user, external authentication may not work as you expect.
In the following examples, you have Advanced Server running on OpenVMS node VMS1 in the domain SaleOffice, with network users Smith and J_Smith and OpenVMS users Smith and V_Smith.
$ ADMINISTER ADD HOSTMAP SMITH V_SMITH $ ADMINISTER ADD HOSTMAP J_SMITH SMITH |
$ ADMINISTER ADD HOSTMAP SMITH V_SMITH |
You can set up an OpenVMS account to be externally authenticated by a trusted domain in your network. To enable this feature, you must include the trusted domain name in the data field for the server configuration parameter HostMapDomains in the OpenVMS Registry. Refer to Section 7.2, Managing Server Configuration Parameters.
For example, if your OpenVMS system is in the SaleOffice domain, and this domain trusts the Marketing domain, set up OpenVMS user Jones to be externally authenticated by the Marketing domain as follows:
Jones@Marketing Marketing\Jones |
Groups are collections of user accounts and other groups. When you add a user to a group, the user has all the rights and permissions granted to the group. This provides an easy way to grant common capabilities to sets of users. (For additional information about planning Advanced Server groups, see the Advanced Server for OpenVMS Concepts and Planning Guide.)
OpenVMS system groups are unrelated to Advanced Server domain groups. |
You use groups to manage access to resources like directories, files, and printers. To do this, assign permissions to the resource, specifying the group names, and add the user accounts to the groups. To change the permissions for a group, add or remove the permissions on the resource for the group, rather than for each user. Or, if you need to give a user access to specific resources (for example, certain directories and files), add the user's account to the appropriate group rather than changing permissions on each individual resource. Maintaining permissions for a group is simpler than maintaining permissions for individual user accounts.
Every group is either a global group or a local group.
Table 3-2, summarizes how local and global groups are used.
If... | Need to access a resource on... | You put them in a... |
---|---|---|
User accounts from this domain | The servers and workstations of this domain or of other domains | Global group |
User accounts from other domains | The servers of this domain | Local group |
Global groups from this domain | The servers of this domain | Local group |
Global groups from other domains | The servers of this domain | Local group |
Advanced Server creates several built-in groups automatically during installation. Built-in groups have certain access rights. To give the access rights to a user account, add the user to the appropriate group. By default, all users belong to the built-in group Domain Users.
Table 3-3 lists the built-in groups, with their group type (global or local), and their default members.
Group Name | Group Type | Description | Default Members |
---|---|---|---|
Account Operators | Local | Members can administer domain user and group accounts. | None |
Administrators | Local | Members can fully administer the domain and other domains. | Administrator, Domain Admins |
Backup Operators | Local | Members can bypass file security to back up files. | None |
Domain Admins | Global | Designated administrators of the domain. | Administrator |
Domain Guests | Global | All domain guests. | Guests |
Domain Users | Global | All domain users. | Administrator, user accounts |
Guests | Local | Users granted guest access to the domain. | Domain Guests |
Print Operators | Local | Members can administer domain printers. | None |
Server Operators | Local | Members can administer domain servers. | None |
Users | Local | Ordinary users. | Domain Users |
To set up a new user group, use the ADD GROUP command. If you do not specify the group type, the default is to add the group as a global group. To create a local group, include the /LOCAL qualifier on the command line. For example, to add the local group MUNCHINS, enter the following command. Note that the description of the group is enclosed in quotation marks.
LANDOFOZ\\TINMAN> ADD GROUP MUNCHKINS/DESCRIPTION="Oz local group"/LOCAL %PWRK-S-GROUPADD, group "MUNCHKINS" added to domain "LANDOFOZ" LANDOFOZ\\TINMAN> SHOW GROUPS Groups in domain "LANDOFOZ": Group Name Type Description --------------------- ----------- ------------------------------------- Account Operators Local Members can administer domain user and group accounts Administrators Local Members can fully administer the domain Backup Operators Local Members can bypass file security to back up files DEVAS Global DEVIS Global Domain Admins Global Designated administrators of the domain Domain Guests Global All domain guests Domain Users Global All domain users Guests Local Users granted guest access to the domain MONKEYS Global Users in the Land of Oz MUNCHKINS Local Oz local group Print Operators Local Members can administer domain printers Replicator Local Supports file replication in a domain Server Operators Local Members can administer domain servers Users Local Ordinary users Total of 15 groups LANDOFOZ\\TINMAN> |
You can add users to groups in any of the following ways:
Local groups can include users from domains other than the one currently being administered. To specify a user account from another domain, a trust relationship must be established that allows the domain being administered to trust the domain where the user account is defined.
To specify a user account or global group in a trusted domain, enter a domain-qualified name (domain-name\member-name), such as KANSAS\DOLE, where KANSAS is the name of the trusted domain, and DOLE is the user or group name defined in the trusted domain. If you omit a domain name, the user or group is assumed to be defined in the domain being administered.
To add members to a new group
Include the /MEMBERS qualifier on the ADD GROUP command. For example, to add a new group MUNCHKINS and specify the group members SCARECROW and STRAWMAN, enter the following command:
LANDOFOZ\\TINMAN> ADD GROUP MUNCHKINS/MEMBERS=(SCARECROW,STRAWMAN) %PWRK-S-GROUPADD, group "MUNCHKINS" added to domain "LANDOFOZ" LANDOFOZ\\TINMAN> |
To simplify creating a new group, you can use the COPY GROUP command to copy an existing group to the new group, with a new name, keeping the members and description from the previous group. For example, to form a new group called QUADLINGS from an existing group called MUNCHKINS, use the following command:
LANDOFOZ\\TINMAN> COPY GROUP MUNCHKINS QUADLINGS %PWRK-S-GROUPCOPY, group "MUNCHKINS" copied to "QUADLINGS" in domain "LANDOFOZ" LANDOFOZ\\TINMAN> |
This command copies the description and group members from MUNCHKINS to the new group, QUADLINGS. You can display information about the new group using the SHOW GROUPS/FULL command. For example:
LANDOFOZ\\TINMAN> SHOW GROUPS QUADLINGS/FULL Groups in domain "LANDOFOZ": Group Name Type Description ---------- ------ ----------------------------- QUADLINGS Local Oz local group Members: [US]LION,[US]SCARECROW Total of 1 group LANDOFOZ\\TINMAN> |
To change the group description, use the MODIFY GROUP/DESCRIPTION
command.
3.2.5 Modifying a Group
You can change the membership or description of an existing group.
To add a member to an existing group:
Use the MODIFY GROUP command with the /ADD_MEMBERS qualifier. For example, to add the user LION to the group MONKEYS, enter the following command:
LANDOFOZ\\TINMAN> MODIFY GROUP MONKEYS/ADD_MEMBERS=LION %PWRK-S-GROUPMOD, group "MONKEYS" modified on domain "LANDOFOZ" LANDOFOZ\\TINMAN> SHOW GROUP MONKEYS Groups in domain "LANDOFOZ": Group Name Full Name Type Description ---------- --------- ------- ------------------------ MONKEYS Global Winged monkeys Members: [US]LION Total of 1 group) LANDOFOZ\\TINMAN> |
To remove a member from a group:
Use the MODIFY GROUP command with the /REMOVE_MEMBERS qualifier. For example, to remove SCARECROW from the group MUNCHKINS, enter the following command:
LANDOFOZ\\TINMAN> MODIFY GROUP MUNCHKINS/REMOVE_MEMBERS=SCARECROW %PWRK-S-GROUPMOD, group "MUNCHKINS" modified on domain "LANDOFOZ" LANDOFOZ\\TINMAN> |
Deleting a group removes only that group; it does not delete user accounts or global groups that are members of the deleted group. You cannot recover a deleted group.
Internally, the Advanced Server recognizes every group by its security identifier (SID), which is used when assigning permissions to a resource. If you delete a group and then create another group with the same group name, the new group does not inherit access to any resources available to the old group because the groups have different SIDs.
To delete a group:
Use the REMOVE GROUP command. For example:
LANDOFOZ\\TINMAN> REMOVE GROUP QUADLINGS Each group is represented by a unique identifier which is independent of the group name. Once this group is deleted, even creating an identically named group in the future will not restore access to resources which currently name this group in the access control list. Remove "QUADLINGS" [YES or NO] (YES) : YES %PWRK-S-GROUPREM, group "QUADLINGS" removed from domain "LANDOFOZ" LANDOFOZ\\TINMAN> |
The command deletes the group QUADLINGS from the LANDOFOZ domain.
Previous | Next | Contents | Index |