![]() |
![]() |
![]() |
![]() |
|
|
![]() |
A user's privileges are recorded in the user's UAF record in two privilege vectors. One vector stores the authorized privileges, and the other vector stores the default privileges. The default privileges are the subset of authorized privileges that a user process receives at login.
When a user logs in to the system, the user's privilege vector is stored in the header of the user's process. In this way, the user's privileges are passed on to the process created for the user. Users can use the DCL command SET PROCESS/PRIVILEGES to enable and disable privileges for which they are authorized.
The operating system monitors and audits the use of privilege. You can enable auditing for specific privileges and examine the audit log file to see what privileges were used to execute DCL commands or system services. See Security Auditing for further information.
Categories
of Privilege
Privileges are divided into the following seven categories
according to the damage that the user possessing them could cause
the system:
OpenVMS Privileges categorizes the privileges and includes a brief definition of the powers associated with each privilege.
Suggested
Privilege Allocations
Assigning Privileges lists all user
privileges and includes recommendations on when to grant them. When
allocating user privileges, be conservative.
The summary guidelines in Minimum Privileges for System Users indicate the minimum privilege requirements for common classes of system users.
Type of User | Minimum Privileges |
---|---|
General
|
TMPMBX, NETMBX
|
Operator
|
OPER
|
Group manager
|
GROUP, GRPPRV
|
System manager/administrator
|
SYSPRV, OPER, SYSNAM, CMKRNL1
|
Security administrator
|
SECURITY, AUDIT, READALL
|
Limiting User Privileges
Granting privileges allows users those privileges until you
remove them. To avoid such blanket permission, you may want to grant
privileges on an as-needed basis. For example, certain users may
need to run a program requiring one of the more powerful privileges.
You can install the program with the necessary privilege by using
the Install utility (INSTALL).
Installing Images with Privilege discusses installing privileged images in more
detail.
An alternative to granting blanket privileges is to set up emergency or specialized privileged accounts. Users would log in to these privileged accounts only to perform specific functions. You have two options with this technique:
With both options, you can place special restrictions on the privileged account, such as long passwords, brief password lifetimes, restricted hours, and limited modes of operation (no dialup, network, remote, or batch logins). In addition, limited account durations would force frequent consideration of privilege requirements.
Yet another alternative is to use protected subsystems, which are described in Using Protected Subsystems, and thereby eliminate the need for any system privileges.
Installing Images with Privilege
A user cannot execute an image that requires a privilege the
user does not possess unless the image is installed as a known image
with the privilege in question. (See the HP OpenVMS System
Management Utilities Reference Manual
for instructions
on installing known images.) Execution of a known image with privileges
grants those privileges to the user process executing the image
for the duration of the image's execution. Thus, you should install
images with amplified privileges (other than the normal HP-supplied configuration)
only after ensuring that the privileges are required by the image's
function and that the image operates safely. Also consider restricting
access to the image to a selected set of users.
Images installed with privileges are activated with all amplified privileges enabled. For maximum safety, images designed to run with amplified privilege should use the $SETPRV system service to disable all amplified privileges immediately on activation, and enable them only when they are needed.
Following is an example of installing an image with privilege. The System Dump Analyzer utility (SDA) requires CMKRNL privilege to analyze the running system.
$
INSTALL SDA.EXE /PRIVILEGED=CMKRNL
$
SET SECURITY/ACL=(IDENTIFIER=SDA,ACCESS=EXECUTE)-
_$
SYS$SYSTEM:SDA.EXE
$
SET SECURITY/PROTECTION=(WORLD) SYS$SYSTEM:SDA.EXE
Restricting Command Output
Some DCL commands behave differently depending on the privileges
that the user holds.
For example, unless a user holds the GROUP or WORLD privilege, the SHOW PROCESS command limits the display of process information to the user's process. A user with GROUP privilege can display other processes in the user's UIC group; a user with WORLD privilege can display any process on the system.
1 The general purpose system manager often needs an authorized privilege set consisting of all privileges except BYPASS.
( Number takes you back )
|
|