Cisco Headend System Release 2.7 Guia Da Instalação
Appendix A
Managing DTACS User Accounts
138
78-4036705-01 Rev D
DTACS Security
Administrative Users
Administrative users (admins) are the only users who can assume the dtacs role.
Users who do not have administrative privileges cannot access the DTACS WUI. The
following sections include information about managing all types of users.
Users who do not have administrative privileges cannot access the DTACS WUI. The
following sections include information about managing all types of users.
Operating System Defaults
Operating System: Solaris 10
Security Features:
-
Secure by Default - OS is installed with minimal network services
-
Networking
SSH is the only network listening service installed by default for remote
access; others are set to off or configured for only local machine access
access; others are set to off or configured for only local machine access
X11 forwarding is also enabled for remote UI access using SSH
-
Restricted Network Resources - Authorized users have access to all network
resources, but the system itself has very little exposure to the network,
making unauthorized access very difficult
resources, but the system itself has very little exposure to the network,
making unauthorized access very difficult
-
System Monitoring - Basic Security Module (BSM) provides monitoring of
system events for logging and auditing
system events for logging and auditing
Operating system defaults are set up during system installation.
Important: We recommend that you do not change the system defaults to retain the
highest level of system security. Cisco Systems, Inc. is not responsible for any
damage that might occur to your DNCS or DBDS if you choose to change the system
defaults.
highest level of system security. Cisco Systems, Inc. is not responsible for any
damage that might occur to your DNCS or DBDS if you choose to change the system
defaults.
Role-Based Access Control
We have implemented role-based access control as part of the DTACS operating
system. Role-based access control allows system admins to assign control of parts of
the system to specific users. System admins can also limit system access to specific
users.
system. Role-based access control allows system admins to assign control of parts of
the system to specific users. System admins can also limit system access to specific
users.
A system admin can give users permissions to run certain commands or access to
certain files. They can also prevent users from running commands or accessing files.
Role-based access control allows increased flexibility in the assignment of system
permissions.
certain files. They can also prevent users from running commands or accessing files.
Role-based access control allows increased flexibility in the assignment of system
permissions.