Because of the prominent role played by the proxy users on your OES network, it is important that you understand your implementation options and the implications for each option. You can then plan an overall proxy user implementation strategy.
The first step in planning your proxy user implementation strategy is understanding the do’s and don’ts of proxy user creation.
Table J-2 presents information about the creation options for each OES proxy user.
Table J-5 Proxy User Creation Options
Associated Service |
Service Proxy User Name if Applicable |
Creation Information |
---|---|---|
CIFS |
OESCommonProxy_hostname Or CifsProxyUser-servername |
|
Clustering (NCS) |
OESCommonProxy_hostname Or installing admin user |
|
DHCP |
OESCommonProxy_hostname Or installing administrator |
|
DNS |
OESCommonProxy_hostname Or installing administrator |
|
Domain Services for Windows (DSfW) |
OESCommonProxy_hostname Or DNS |
|
Linux User Management |
OESCommonProxy_hostname Or LUM_proxy (optional) |
By default, no LUM proxy user is created.
|
NSS |
server_nameadmin |
This admin account must have full rights to administer NSS and must be unique to each server. The Common Proxy User does not apply to NSS. |
Best practices for most OES installation scenarios dictate that either the Common Proxy user be used or that proxy users be created in eDirectory prior to installing OES. For more information, see Common Proxy User and Limiting the Number of Proxy Users in Your Tree.
IMPORTANT:The information in the preceding and following sections only answers security questions and provides general information. It is not intended to be used for the manual configuration of proxy users.
Manually created proxy users must be configured for OES-rootservice use only by the YaST based install, not manually.
We recommend that you always use the special-purpose proxy user accounts described in this and the accompanying sections rather than specifying admin users as proxy users. Best practice dictates that proxy users have strictly limited functionality that supports only their specific system-level responsibilities. Proxy users should not be used for any other purposes.
Although specifying an admin user as the proxy user appears to be an easy way of setting up OES services (and is the install default in some cases if the Common Proxy user option isn’t selected), there are potential problems. Mixing actual users with system-level functionality always creates some risk.
The following is a real-life example of risks that can occur when admin users are assigned as proxy users:
Novell Support received a call from an administrator who was getting locked out due to intruder detection after changing the administrator password. The lockout happened several times each day and seemed to be coming from the OES servers. The support technician checked LUM and all of the services he could think of, and didn’t see the admin credentials anywhere.
Further investigation revealed that the administrator credentials had been used as the proxy user credentials for some of the OES service installations. Consequently, the credentials were stored in OCS for use when the OES services came up.
Because the Admin password had changed, the OCS credentials had expired and service authentication requests were failing, resulting in the intruder detection lockout.
Novell policy dictates that proxy users that function only as proxy users, are simply system users. Therefore, proxy users do not consume user connection licenses.
The main purposes of the common proxy users are to reduce the number of proxy users in a tree and simplify proxy user management. Therefore, the common proxy user is the default in all applicable scenarios.
Table J-6 outlines various alternative options for limiting the number of proxy users in your tree and summarizes the security and manageability considerations of each approach.
Table J-6 Options for Limiting the Number of Proxy Users
Approach |
Security Considerations |
Manageability Considerations |
---|---|---|
Per Service per Server |
For CIFS this is the most secure option. By default, the passwords for these are system-generated and not known by anyone. For LUM there is no option to have a system-generated password. For DNS and DHCP, the install admin’s credentials are used by default. This has separate security implications as outlined in Avoid Assigning an Admin User As a Proxy User. |
This approach requires no proxy user planning. Services are installed at the same time as the OES server. This is a good option for small organizations or installations where only a few services are used. This is not a good option if security policies dictate that all passwords must be reset periodically. |
Per Server |
This confines any security vulnerabilities to individual servers and is the scenario for which the Common Proxy User was developed. |
This requires that a proxy user for the server is created before the server is installed. If the Common Proxy User is not leveraged, then for the first server in the tree, eDirectory and iManager must be installed with the server. After the server installation finishes, a proxy user can be created. And finally the services can be installed and configured to use the proxy user for the server. This approach is useful when each OES server is managed by a separate administrator, or for enterprises where branch users access a server in the branch office. Knowing the proxy user password is not required unless additional services will be installed or password policies require periodic changing, in which cases the install admin must know the proxy user’s password. |
Per Partition |
This confines any security vulnerabilities to individual partitions. |
This is useful when users are co-located with the OES servers in a single partition, and cross-partition access of users to services is rare. This is a good approach for organizations where eDirectory administration is done at a partition level. This requires that a proxy user for the first server in the partition is created before services are installed in the partition. The install admin must know the proxy user’s password. |
Per Service |
This confines any security vulnerabilities to individual services. It also ensures that proxy user rights are not overloaded but are distributed so that there is a single proxy user for each type of service |
For example, you might have one proxy user for CIFS, one for DNS/DHCP, one for iPrint etc. This is useful in trees where the users and servers are not co-located, and different services are administered by different administrators. This requires that a proxy user for the service is created before the service is installed in the tree. The install admin must know the proxy user’s password. |
Per Tree |
This exposes all OES services and servers in the tree to any security vulnerabilities. |
A proxy user for the tree must be created before any OES services are installed in the tree. This is suitable for organizations that have
The install admin must know the proxy user’s password. |
Proxy user passwords must be stored on the individual OES servers where the services are installed because proxy users must be able to log in to eDirectory to perform their required functions.
Auto-Generated Passwords: These offer the highest security because the passwords are known only to the system.
The Common Proxy User and CIFS Proxy User use auto-generated passwords by default.
Manually Specified Passwords: Although you can change the auto-generated passwords for the various proxy users, this is not recommended because it is less secure and requires that someone keep track of the passwords. Also, manually specified passwords can easily lead to problems, such as service disruption. For a related example of the problems this can cause, see Avoid Assigning an Admin User As a Proxy User.
Of course all proxy user passwords are stored in eDirectory. Table J-7 explains where they are stored on the server and how they can be reset if needed.
Table J-7 Password Storage Locations
Associated Service |
Where the Password Is Stored Locally |
How the Password Can Be Reset |
---|---|---|
CIFS |
If the service-specific proxy user is used, the password is stored in either OCS or in an encrypted file, depending on the configuration option specified during service installation. |
You can use iManager to reset the password in OCS or in the encrypted file, or the oescredstore tool if it is stored in OCS. |
Common Proxy User |
This password is stored in OCS. |
We recommend that you only use the change_proxy_pwd.sh script to manage Common Proxy User passwords. |
DHCP |
The service-specific password is stored in OCS. |
You can set the password using the oescredstore tool. |
DNS |
If the service-specific proxy user is used, the service-specific password is stored in OCS if it is available. If OCS is not available, it is stored in an encrypted file. |
|
Linux User Management |
If the service-specific proxy user is used, the service-specific is stored in OCS. |
This can be changed in iManager through the Linux User Management plug-in. |
NSS |
This password is system-generated at install time and cannot be reset. |
IMPORTANT:Although the YaST based install can sometimes be used successfully to reconfigure some OES services, Novell neither recommends nor supports that practice.
Many organizations require that all network users have password policies to enforce regular password expiration and change.
Such policies create complications for the proxy user design. Proxy user passwords are stored on the local system to enable the OES services to log in to eDirectory. Every time a password change is forced in eDirectory, services stop working until the password is synchronized on the server.
These problems can be avoided by:
Not assigning proxy users a password policy that enforces password expiration.
Not using real user credentials for proxy users. See Avoid Assigning an Admin User As a Proxy User.
If password expiration policies cannot be avoided, or a security policy dictates that proxy user passwords must be changed periodically, we strongly urge you to implement an automatic password change routine as explained inChanging Proxy Passwords Automatically.
Otherwise you should probably do the following.
Ensure that the responsible administrator knows or has a record of each proxy user’s password and is aware of when each password expires.
Before passwords expire, change them in eDirectory and reset them on the server. See the information in Table J-7.
You can configure your server so that your proxy users are regularly assigned new system-generated passwords by doing the following:
Open the file /etc/opt/novell/proxymgmt/proxy_users.conf in a text editor.
List the FQDN of each proxy user on the server that you want to automatic password management set up for.
For example you might insert the following entries:
IMPORTANT:Users listed here must not be listed in the proxy_users.conf file on any other servers in the tree.
Save the file.
Enter the following commands:
cd /opt/novell/proxymgmt/bin
change_proxy_pwd.sh -A Yes
By default, the crontab job will run on the fifteenth (15th) day of each month.
The change_proxy_pwd.sh command can also be used to enter a proxy user password.
IMPORTANT:If you enter a password by using the change_proxy_pwd.sh command, the password cannot contain special shell variables ($#, $_, or #?). These characters are interpreted by the shell while processing service scripts.
The workaround is to enter the password within single quotes. For example, you can enter the password novell$$ as 'novell$$'. The shell doesn’t interpret content within single quotes.