HPlogo HP Security Monitor/iX Manager's Guide: HP 3000 MPE/iX Computer Systems > Chapter 8 Using the Security Configurator (SECCONF)

Running the Security Configurator (SECCONF)

» 

Technical documentation

Complete book in PDF
» Feedback

 » Table of Contents

 » Index

To enter the Security Configurator, at the MPE/iX prompt enter:

:RUN SECCONF.PUB.SYS

After verifying the user's capability, the program presents the user with the main menu:

         

HP Security Monitor B3175A.00.01 (c) Hewlett-Packard Co. 1993



         0. Exit

         1. Global Security Options

         2. Device Password Configuration

         3. Commands Logging and Access

         4. User Security Options

         5. List Current Security Configuration

         6. Reset Security Configuration



            Please enter your choice (0-6):


After the user is finished with any function, the program always exits to a higher level menu. The user will then have a choice of exiting or going to another menu selection.

At the main menu level, if the EXIT option is specified, the program will update both the security data file and the security information table. At this time the new configuration will immediately take effect. (All changes made during this session will be logged in the system log file and generate a message on the system console).

Global Security Options

If the user selects the "Global Security Options" in the main menu, the "Global Security Options" menu will be displayed.

            GLOBAL SECURITY OPTIONS



         0. Exit to Main Menu

         1. Password Encryption

         2. Minimum Length for Passwords

         3. Maximum Invalid Logons per Device

         4. Mandatory Password Prompt

         5. Idle Session Timeout

         6. Generic Logon Message Option

         7. UDC Failure Termination Option

         8. File Open Logging Option

         9. Global Password Management Values

        10. Batch Submission Security Options

        11. Assurance of Auditability Option

        12. File Maximum Protection Option

        13. Maximum Invalid User Logons

        14. Set all options to maximum protection



            Please enter your choice (0-14):




For each of the choices, the program will display the current option or value ( which may be the default if it was not configured), and prompts the user for the new value.

1. Password Encryption

This option produces following screen:



You have just selected the function to specify 

PASSWORD ENCRYPTION option. This function allows 

you to turn the encryption ON or OFF.



Encryption is currently ON.

Please specify your new choice (ON/OFF):


2. Minimum Length for Passwords

This option produces the following screen:



This function allows the user to specify the value for the minimum 

password length. This value is applicable to USER, ACCOUNT, GROUP and 

device passwords (but not lockwords). 



Minimum password length currently is: 0

Please enter your choice (0-8):


3. Maximum Invalid Logons per Device

This option produces the following screen:



This function allows you to specify the maximum number 

of invalid logons that a device can tolerate before it 

becomes unavailable (DOWNed). You can specify a number 

between 1 and 32766, or a zero (0) which is unlimited.

 

Maximum invalid attempts currently is: 4

Please enter your choice (0-32766):



Since you just set the maximum invalid logon count, you 

may want to configure a timeout interval, during which a 

violated device would be in the DOWN state. After that 

interval expires, MPE will automatically UP the device. 

The interval can be from 1 to 32766 seconds, or Zero (0). 

A zero means there is no automatic timeout, and the 

Operator must :UP the device manually.



The currently configured device timeout is: 0 

Please enter your choice (0-32766):


4. Mandatory Password Prompt

This option produces the following screen:



You have just selected the function to specify whether 

password prompts are mandatory for interactive logons.  

When this option is ON, MPE will not accept logon 

commands with embedded passwords, such as 



:HELLO USER/UPASS.ACCT/APASS



Mandatory Password Prompt is currently OFF (i.e. embedded passwords OK).

Please specify your new choice (ON/OFF):ON



Mandatory Password Prompt is now ON.



Since you've just enabled the mandatory password prompt option, you may 

want to consider exempting REMOTE HELLO from this rule. You might have 

applications which log on remotely from within a job, or do REMOTE HELLO 

programmatically. These applications will fail if the DS/NS terminals are 

not exempted.



Do you want to exempt DS/NS terminals from forced prompting (Yes/No) ?yes



DS/NS terminals are now EXEMPT.





Do you want to exempt DS/NS terminals from forced prompting (YES/NO)


5. Idle Session Timeout

This function allows you to specify the system-wide timeout value for CI reads and application timeout. When a non-zero value is specified, all idle sessions will be terminated after that time expires without a user response. A zero (0) means no timeout.





The Global Timeout value currently is: 0

Please enter your choice (0 - 546):




6. Generic Logon Message Option

This option produces the following screen:



You have just selected the function to specify the 

logon message option. Your choice is between using 

existing MPE friendly messages, or the generic, 

no-hint logon interface, which only say * INVALID * 

when logon error exists.



Generic Logon Message is currently OFF.

Please specify your new choice (ON/OFF):


7. UDC Failure Termination Option

This option produces the following screen:



You have just selected the function to specify whether 

a job/session is to be terminated if the initiation of 

UDC at logon time fails for any reason.  When this 

option is ON, it prevents users from bypassing your 

system logon UDC.



UDC Failure Termination is currently OFF (disabled).

Please specify your new choice (ON/OFF):


8. File Open Logging Option

This option produces the following screen:



You have just selected the function to specify whether 

to log all FOPENs or only the ones that failed.

FOPEN LOGGING OPTION is currently: FOPEN FAILURE ONLY

Do you want to keep this option: 'logging FOPEN FAILURES ONLY' (Yes/No):


9. Global Password Management Values

The Global Password Management Values can be configured with the Security Options menu, by selecting item 9. By entering the desired values, a system administrator may set a global password expiration date, and the time intervals for a global password aging policy.

After selecting the Global Password Management Values, the security administrator is presented with the following menu:

          

            GLOBAL PASSWORD MANAGEMENT VALUES



         0. Exit to Global Security Menu

         1. Global User Password Expiration Date 

         2. Global User Password Maximum Lifetime

         3. Global User Password Minimum Time

         4. Global User Password Warning Time

         5. Global User Password Expiration Time

 

            Please enter your choice (0-5):

  

(1.) Global User Password Expiration Date

This option produces the following screen:



The Global Password Expiration function allows you to 

activate automatic password expiration for all users 

who are required to have password. When this option 

is enabled, MPE will expire all the REQUIRED user 

passwords on the (same) global expiration date.



To enable this function, you specify the number of 

days between expirations. This value can range 

from 1 to 365; or a zero (0) which means no automatic 

expiration.  Optionally, you can specify a date for the 

expiration cycle to start (default is today); and the 

number of days to warn the user prior to expiration.



Automatic global password expiration has not been configured.



Please specify your new choice (0-365 days):

Number of days between expirations is now: 365



Since you have just set the number of days for 

automatic expiration, you may want to set or reset a 

specific date to start the expiration cycle.



The next global expiration date is: today (by default).



To change, enter new MM/DD/YY (CR = no change):01/01/93



The global expiration date accepted is: FRI, JAN 1, 1993



Number of days to warn prior to expiration currently is: 0



Please specify your new choice (0-364 days):5

Number of days to warn prior to expiration is now: 5


The following options, affect system wide password aging policy for all users.

(2.) Global User Password Maximum Lifetime

This option produces the following screen:



This option sets the maximum lifetime for a user password.

This value can range from 1 to 365 days, or optionally 0 

for no password expiration.



The global user password maximum lifetime currently is: 0

Please enter your choice (0-365 days):90



The global user password maximum lifetime is now: 90


(3.) Global User Password Minimum Time

This option produces the following screen:



This option sets the minimum time after setting a 

password before the password can be changed.  This 

value can range from 1 to 364 days, or optionally 0 for no 

minimum password time.



The global user minimum lifetime currently is: 0

Please enter your choice (0-364 days):5



The global user password minimum time is now: 5


(4.) Global User Password Warning Time

This option produces the following screen:



This option sets the time a user is warned before the 

user password expires.  This value can range from 1 to 364 

days, or optionally 0 to prevent warning.



The global user warning time currently is: 0

Please enter your choice (0-364 days):5



The global user password warning time is now: 5


(5.) Global User Password Expiration Time

This option produces the following screen:



This option sets expiration period for a user password.  

When this time period expires, the user is no longer 

able to log on to the system.  This value can range 

from 1 to 364 days, or optionally 0 for no password 

expiration.



The global user expiration time currently is: 0

Please enter your choice (0-364 days):5



The global user password expiration time is now: 15


10. Batch Submission Security Options

The Batch Submission Security Options can be configured with the Global Security Option menu, by selecting item 10. From the Batch Submission Security menu, the security administrator will be able to select various options. Selecting the Batch Submission Security Options from the Global Security Options menu, the following screen is displayed:

         



            BATCH SUBMISSION SECURITY



         0. Exit to Global Security Menu

         1. Embedded Password Disallowed Option

         2. Cross Streaming Restriction Option

         3. Stream Privileges Option



            Please enter your choice (0-3):


Embedded Password Disallowed Option

This option produces the following screen:



You have just selected the function to configure whether 

embedded passwords in job card are allowable. When this 

option is ON, MPE will reject any !JOB command with passwords 

embedded in it.



Embedded Password Disallowed is currently OFF (disabled).

Please specify your new choice (ON/OFF):


Cross Streaming Restriction Option

This option produces the following screen:



You have just selected the function to configure whether 

streaming of other people's jobs is allowable.  When this 

option is ON, a person will not be allowed to stream another 

person's job, unless specifically authorized.



Cross Streaming Restriction is currently OFF (i.e., cross stream allowed).

Please specify your new choice (ON/OFF):ON 



Cross Streaming Restriction is now ON (Enabled).



Since you have just enabled the cross streaming restriction 

feature, you may want to also enable the Authorization option 

to allow limited cross streaming of protected jobs.  When 

enabled, this option allows those with EXECUTE access to 

"protected" job files to stream them.



Cross Streaming Authorization is currently OFF (Disabled)

Please specify your new choice (ON/OFF):


Stream Privileges Option

This option produces the following screen:



You have just selected the function to configure whether 

SM, AM and a job owner is allowed to stream jobs without 

the need for passwords.



Stream Privilege is currently OFF (disabled).

Please specify your new choice (ON/OFF):ON



Stream Privilege in now ON (Enabled)



Since you have just enabled the stream privilege feature,

you may want to extend this privilege to other users to 

allow limited password omission in streaming of protected 

jobs.  This extension allows those with EXECUTE access to 

"protected" job files to stream them without passwords.



Stream Privilege Authorization is currently OFF (Disabled)

Please specify your new choice (ON/OFF):


11. Assurance of Auditability Option

This option produces the following screen:



You have just selected the function to configure whether

the auditability is to be assured when there is a system 

logging error.  When this option is ON, MPE will execute 

a CONTROL-A LOGOFF if a system logging error occurs.  At 

that time, only users with OP or SM capability can log on 

to the  system and try to correct the problem  and resume 

logging or shutdown the system.



Assurance of Auditability is currently OFF

Please specify your new choice (ON/OFF):


12. Maximum Protection Option

This option produces the following screen:



You have just selected the function to configure whether 

a NEWLY created object is going to be maximally protected.  

When this option is ON, MPE will configure the CREATOR of 

the object to be the only user who can access the object 

if no ACD is attached to that object.



Maximum Protection is currently OFF

Please specify your new choice (ON/OFF):


13. Maximum Invalid User Logons

This option produces the following screen:



This function allows you to specify the maximum number 

of invalid user logons before the user ID becomes invalid.

You can specify a number between 1 and 32766, or zero (0)

which is unlimited.



Maximum invalid attempts currently is: 4

Please specify your new choice (0-32766):



Since you just set the maximum invalid logon count,

you may want to configure a timeout interval, during 

which a user ID will remain invalid.  After that time 

interval expires, MPE will automatically change the user

ID to valid.  The interval can be from 1 to 32766 

seconds, or zero (0).  A zero means there is no automatic

timeout, and the account manager or system manager must

re-activate the user.



The timeout is currently : 0



Please enter your choice (0-32766)


14. Set All Options To Maximum Protection

This option provides the following screen:



This function allows you to set the maximum protection for all

of the Global Security Options.  Use the LIST command to verify

the selections are acceptable.



Do you want to set all Global Security Options to maximum

protection (YES/NO):YES



Maximum protection has been set to maximum.


Device Password Configuration

For the "Device Password Configuration" selection, the program will let the user enter the device number and password for that device. Multiple groups of classes or LDEV's can be entered on one line, separated by a comma, providing the line does not exceed 72 characters. The same password will be assigned to all LDEV's or device classes on that line. LDEV's and device classes can not be mixed on the same line. This option produces the following screen:



This function allows you to configure the device password 

for terminals. Following the ">" prompt, please enter the 

"LDEV;PASSWORD" that you want to configure in, for example:

                > 20; SECRET

         or     > 21,22,23; DEVPASS

         or     > TERM; TERMPASS   (TERM is a device class)



The prompt will be repeated until you end your input 

with a "//" or a CR only.  If you want a list of currently 

configured (passworded) devices, enter "@".  To remove 

password for any LDEV, enter a blank/empty password, e.g. "21; ".



If you want your password input echo-suppressed, enter only 

the LDEVs, then we will prompt you for the password with 

the echo turned off.



Please enter password information in the form 

LDEV [,ldev...][;PASSWORD].(up to a maximum of 72 characters)



If user enters "@" at the prompt, the format of the 

display will be:



The following Ldevs have a device password: 

68, 70, 71, 72, 73, 74, 75, 77, 78, 79, 200, 201, 202, 204, 

205, 206, 207, 208, 209, 210, 69


If the user enters 71,72; the format of the display will be:



Removing Device Password for ldev 71

Removing Device Password for ldev 72


Commands Logging and Access

For the "Commands Logging and Access" category, the following display will appear:



             COMMANDS LOGGING & ACCESS



          0. Exit to Main Menu

          1. Configure Logging & Disabling

          2. Set Programmatic Access Level



             Please enter your choice (0-2):


Configure Logging & Disabling

This option produces the following display:

Following the "Command >" prompt, please enter the 

MPE COMMAND that you want to log or disable access.  

Once the command is verified to be a valid command,

you will be asked for the logging and access options 

for that command.



To terminate you input, enter "//" or a carriage return in response 

to the "command>" prompt.



If you want a list of all commands that are currently 

configured in the security table, enter "@".



Command > CONSOLE



CONSOLE    Prog. Access ON    General Execution ON  Logging OFF



        Programmatic Access Disabled (Yes/No) ?YES

        General Execution Disabled (Yes/No) ?YES

        Logging Enabled (Yes/No) ?YES



CONSOLE 	   Prog. Access OFF   General Execution OFF  Logging ON

All Others:        Prog. Access ON    General Execution ON   Logging OFF

Command>




If the user requests the list of configured commands by entering "@", the following screen will be displayed:



Command > @



CONSOLE    Prog. Access OFF   General Execution OFF    Logging ON

PURGEACCT  Prog. Access OFF   General Execution OFF    Logging ON

ALTSEC     Prog. Access OFF   General Execution OFF    Logging ON


Set Programmatic Access Level

This option produces the following screen:



Since Command disabling may affect the functioning of 

your present programs and subsystems, you may want to 

set the Programmatic Access to WARNING level first.



At warning level, a command, when executed 

programmatically, will only cause the command to be 

logged via the Command Logging facility and a message to be sent to 

$STDLIST.

Then, after you have examined the system log files to 

ascertain that the disabled commands do not adversely 

affect your applications, you can reset the WARN flag 

to go to full disabling level (execution causes an error).



PROGRAMMATIC ACCESS LEVEL is currently: FULL DISABLING.



Do you want to change this to 'WARNING LEVEL' (Yes/No) ?


User Security Options

This option produces the following screen:



         USER SECURITY OPTIONS



      0. Exit

      1. Enable User ID

      2. Enable User Password

      3. User Password Aging Values

      4. Set User Passwords Required

      5. Remove User Passwords Required



         Please enter your choice (0-5):


Once the choice 1 or 2 is made, the system manager will then be able to manipulate the user information.

1. Enable User

This selection will allow a system to enable a user that has been disabled and will display the following screen:



You have selected the choice to enable a disabled user ID.

The prompt will be repeated until you enter a (user.account) name 

or end your input with a "//" or carriage return.



Enter the user ID to enable (user.account):mgr.test

Enable mgr.test (YES/NO):YES

User  mgr.test  has been enabled


2. Enable User Password

This solution will allow a system manager to set an invalid user password to theexpired state. An invalid user password is one that went beyond the expiration time. Once the user password is in the expired state, the password can be changedby the user.

You have selected the choice to enable an invalid user password.

The prompt will be repeated until you enter a (user.account) name 

or end your input with a "//" or a carriage return.

The password will be set expired.

Enter the invalid user ID (Name.Account):

Enable the password for Name.Account (Yes/No):

User Name.Account is now expired


3. User Password Aging Values

This selection describes the user level password aging values which allow System Managers to set the user password aging values for a specific user. Aging values for individual users can be established only after the system wide password aging policy is established. The dialog for the expiration, minimum and warning times will only occur if the maximum time is not set to zero. The selected times are checked in order to maintain consistency with the password aging scheme.

You have selected the choice to set the user password aging values.

Enter the user ID to set (name.account): mgr.test

Set the age values for MGR.TEST (YES/NO): yes

The maximum user password time currently is: 20

Enter the new maximum user password time (0-365 days) :50 

The user expiration time currently is: 0

Enter the new user expiration time (0-20 days) : 10

The user minimum password time currently is: 0

Enter the new minimum user password time (0-30 days) : 10

The user password warning time currently is: 0

Enter new user password warning time (0-10 days) : 5

The user password aging values have been updated.


4. Set User Passwords Required

This option is used to specify that passwords are to be required for a specific account.

This option set all users to PASSWORD REQUIRED. A selected  account,

accounts selected with a wild card, or all accounts if you enter @ for

the selection.  Users with blank passwords will have their passwords

set expired.


5. Remove User Passwords Required

This option is used to remove required password protection from specified accounts.

This option removes the user password required option.  A selected

account, accounts selected with a wild card, or all accounts if you

enter @ for the selection.


List Current Security Configuration

This option produces the following screen:



SECCONF v.uu.ff (C) HEWLETT-PACKARD CO., 1986, 1991



             GLOBAL SECURITY OPTIONS



       1. Password Encryption:               ON

       2. Minimum Length for Passwords:      0

       3. Maximum Invalid Logons per Device: UNLIMITED

       4. Mandatory Password Prompt:         ON

       5. Idle Session Timeout (minutes):    NO TIMEOUT

       6. Generic Logon Message Option:      OFF

       7. UDC Failure Termination:           OFF

       8. File Open Logging:                 ALL

       9. Global Password Management Values:

          * Global Expiration Interval:      365 days

          * Global Expiration Date:          FRI, JAN 1, 1993

          * Global Expiration warning:         5 days

          * Global User Password Maximum      90 days

          * Global User Password Minimum       5 days

          * Global User Password Warning       5 days

          * Global User Password Expired      15 days

     10. Batch Submission Security

          * Embedded Passwords in JOB card:  Disallowed

          * Cross Streaming:                 Allowed

          * Stream Privilege:                Enabled, with authorization.

     11. Assurance of Auditability:          ON

     12. Maximum Protection Option:          ON

     13. Maximum Invalid User Logons:        UNLIMITED



            DEVICE LOGON PASSWORD



     The following Ldevs have a device password: 68, 70, 71, 

     73, 74, 75, 76, 77, 78, 79, 200, 201, 202, 204, 205, 

     206, 207, 208, 209, 210, 69



            COMMAND LOGGING AND ACCESS



     CONSOLE     Prog. Access ON    General Execution ON     Logging ON

     NEWACCT     Prog. Access OFF   General Execution OFF    Logging ON

     NEWGROUP    Prog. Access OFF   General Execution OFF    Logging ON

     NEWUSER     Prog. Access OFF   General Execution OFF    Logging ON

     PURGEACCT   Prog. Access OFF   General Execution OFF    Logging ON

     PURGEGROUP  Prog. Access OFF   General Execution OFF    Logging ON

     PURGEUSER   Prog. Access OFF   General Execution OFF    Logging ON



     All Others: Prog. Access ON    General Execution ON     Logging OFF

           (default)



Thank you for using the Security Configuration Utility.


Users can also run SECCONF with the LIST entry point to obtain security configuration information. On MPE/iX command prompt, enter:



       :RUN SECCONF.PUB.SYS ; INFO = 'LIST'


Output similar to the one described on the previous page, will be displayed on the user terminal.

Reset Security Configuration

This option produces a display that allows users to reset all or part of the current security configuration:



 SECCONF v.uu.ff (C) HEWLETT-PACKARD CO., 1986, 1992





               RESET MENU



      0. Exit

      1. Hard Reset

      2. Soft Reset - Reset Global Options

      3. Soft Reset - Reset Command Options

      4. Soft Reset - Reset Device Passwords

      5. Soft Reset - Reset User Options

      6. Suspend    - Suspend Command Disabling



         Please enter your choice (0-6):  

For each of the choices, the program will display a short warning describing the function of each reset. The user will then be asked if they want to continue.

Hard Reset

This option will remove all of the new security features from the system (and clear the SECDATA file). It will also replace ALL encrypted passwords with a blank password and will remove all encrypted, required, expired and warning bits from the system directory. It will essentially return the system to a pre-security state.

One thing the Hard Reset will not do is to remove the new logging bits from the system tables and from the system CONFIG file.

Soft Reset - Reset Global Options

This option will reset or turn off all of the features associated with the Global Security Options menu.

Soft Reset - Reset Command Options

This option will reset or turn off all of the features associated with the Commands Logging and Access Menu. All commands will be re-enabled and all command logging will be turned off. In addition, the warning level option will be reset to the non-warning state.

Soft Reset - Reset Device Passwords

This option will reset or turn off all of the features associated with the Device Password Configuration menu. All device passwords will be reset to blanks. Devices will no longer have passwords.

Soft Reset - Reset User Options

This option will reset or turn off all of the security features associated with the User Security Options menu.

Suspend - Suspend Command Disabling

This option will temporarily suspend the command disabling feature while saving the disabled command configuration. Upon activating this option, all command disabling will be suspended. Command disabling is re-enabled by re-running SECCONF or by re-booting the system.

NOTE: Users can also run SECCONF with the RESET entry point to reset the security configuration. On MPE/iX command prompt, enter:


       :RUN SECCONF.PUB.SYS ; INFO = 'RESET'


The RESET MENU will be displayed on the user terminal.