Cisco Headend System Release 2.7 Installation Guide

Page of 188
 
Appendix A 
Managing DTACS User Accounts 
138 
78-4036705-01 Rev D 
DTACS Security 
Administrative Users 
Administrative users (admins) are the only users who can assume the dtacs role. 
Users who do not have administrative privileges cannot access the DTACS WUI. The 
following sections include information about managing all types of users.  
 
Operating System Defaults 
 
Operating System: Solaris 10 
 
Security Features: 
Secure by Default - OS is installed with minimal network services 
Networking 
 
SSH is the only network listening service installed by default for remote 
access; others are set to off or configured for only local machine access 
 
X11 forwarding is also enabled for remote UI access using SSH 
Restricted Network Resources - Authorized users have access to all network 
resources, but the system itself has very little exposure to the network, 
making unauthorized access very difficult 
System Monitoring - Basic Security Module (BSM) provides monitoring of 
system events for logging and auditing 
Operating system defaults are set up during system installation.  
Important: We recommend that you do not change the system defaults to retain the 
highest level of system security. Cisco Systems, Inc. is not responsible for any 
damage that might occur to your DNCS or DBDS if you choose to change the system 
defaults. 
 
Role-Based Access Control 
We have implemented role-based access control as part of the DTACS operating 
system. Role-based access control allows system admins to assign control of parts of 
the system to specific users. System admins can also limit system access to specific 
users.  
A system admin can give users permissions to run certain commands or access to 
certain files. They can also prevent users from running commands or accessing files. 
Role-based access control allows increased flexibility in the assignment of system 
permissions.