One Identity Privilege Manager for Unix Administration Guide
Total Page:16
File Type:pdf, Size:1020Kb
One Identity Privilege Manager for Unix 6.1 Administration Guide Copyright 2019 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written permission of One Identity LLC . The information in this document is provided in connection with One Identity products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of One Identity LLC products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, ONE IDENTITY ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON- INFRINGEMENT. IN NO EVENT SHALL ONE IDENTITY BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF ONE IDENTITY HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. One Identity makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. One Identity does not make any commitment to update the information contained in this document. If you have any questions regarding your potential use of this material, contact: One Identity LLC. Attn: LEGAL Dept 4 Polaris Way Aliso Viejo, CA 92656 Refer to our Web site (http://www.OneIdentity.com) for regional and international office information. Patents One Identity is proud of our advanced technology. Patents and pending patents may apply to this product. For the most current information about applicable patents for this product, please visit our website at http://www.OneIdentity.com/legal/patents.aspx. Trademarks One Identity and the One Identity logo are trademarks and registered trademarks of One Identity LLC. in the U.S.A. and other countries. For a complete list of One Identity trademarks, please visit our website at www.OneIdentity.com/legal. All other trademarks are the property of their respective owners. Legend WARNING: A WARNING icon highlights a potential risk of bodily injury or property damage, for which industry-standard safety precautions are advised. This icon is often associated with electrical hazards related to hardware. CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed. Privilege Manager for Unix Administration Guide Updated - July 2019 Version - 6.1 Contents One Identity Privileged Access Suite for Unix 18 About this guide 19 Introducing Privilege Manager for Unix 21 What is Privilege Manager for Unix 22 Benefits of Privilege Manager for Unix 22 How Privilege Manager for Unix protects 23 Partition root safely 23 Create an indelible audit trail 24 Encryption 24 How Privilege Manager for Unix works 25 Policy configuration file (pmpolicy security policy) 26 Policy group 28 Planning Deployment 30 System requirements 31 Supported platforms 32 Reserve special user and group names 33 Required privileges 33 Estimating size requirements 33 Privilege Manager licensing 34 Deployment scenarios 35 Single host deployment 35 Medium business deployment 36 Large business deployment 36 Enterprise deployment 37 Installation and Configuration 39 Downloading Privilege Manager for Unix software packages 40 Quick start and evaluation 40 Installing the Management Console 40 Uninstalling the Management Console 42 Configure a Primary Policy Server 42 Privilege Manager for Unix 6.1 Administration Guide 3 Checking the server for installation readiness 43 TCP/IP configuration 43 Firewalls 44 Hosts database 44 Reserve special user and group names 44 Applications and file availability 45 Policy server daemon hosts 45 Local daemon hosts 45 Installing the Privilege Manager packages 46 Modifying PATH environment variable 46 Configuring the primary policy server for Privilege Manager for Unix 46 pmpolicy server configuration settings 47 Verifying the primary policy server configuration 53 Recompile the whatis database 53 Join hosts to policy group 53 Joining PM Agent to a Privilege Manager for Unix policy server 54 Configure a secondary policy server 59 Installing secondary servers 59 Configuring a secondary server 60 Synchronizing policy servers within a group 60 Install PM Agent on a remote host 60 Checking PM Agent host for installation readiness 61 Installing a PM Agent on a remote host 61 Joining the PM Agent to the primary policy server 62 Verifying PM Agent configuration 63 Load balancing on the client 63 Remove configurations 64 Uninstalling the Privilege Manager software packages 64 Upgrade Privilege Manager for Unix 66 Before you upgrade 66 Upgrading Privilege Manager packages 66 Upgrading the server package 67 Upgrading the PM Agent package 67 Removing Privilege Manager packages 67 Removing the server package 67 Privilege Manager for Unix 6.1 Administration Guide 4 Removing the PM Agent package 68 System Administration 69 Reporting basic policy server configuration information 69 Checking the status of the master policy 70 Checking the policy server 70 Checking policy server status 71 Checking the PM Agent configuration status 71 Installing licenses 72 Displaying license usage 73 Listing policy file revisions 74 Viewing differences between revisions 74 Backup and recovery 75 Managing Security Policy 77 Security policy types 77 Specifying security policy type 79 pmpolicy type policy 79 Modifying complex policies 80 Viewing the security profile changes 81 The Privilege Manager for Unix Security Policy 83 Default profile-based policy (pmpolicy) 83 Policy profiles 83 Profile-based policy files 84 Profile selection 86 Profile variables 86 Exploring profiles 101 Customizing the default profile-based policy (pmpolicy) 104 Customization example - pf_forbidusers list 104 Policy scripting tutorial 106 Install the example policy file 107 Create test users 109 Set Lesson number variable 109 Introductory lessons 110 Lesson 1: Basic policy 111 Lesson 2: Conditional privilege 112 Privilege Manager for Unix 6.1 Administration Guide 5 Lesson 3: Specific commands 113 Lesson 4: Policy optimization with list variables 113 Lesson 5: Keystroke logging 114 Lesson 6: Conditional keystroke logging 115 Lesson 7: Policy optimizations 117 Advanced lessons 118 Lesson 8: Controlling the execution environment 118 Lesson 9: Flow control 119 Lesson 10: Basic menus 120 Sample policy files 121 Main policy configuration file 121 Lesson 1 Sample: Basic policy 123 Lesson 2 Sample: Conditional privilege 124 Lesson 3 Sample: Specific commands 125 Lesson 4 Sample: Policy optimizations with list variables 126 Lesson 5 Sample: Keystroke logging 127 Lesson 6 Sample: Conditional keystroke logging 128 Lesson 7 Sample: Policy optimizations 129 Lesson 8 Sample: Controlling the execution environment 131 Lesson 9 Sample: Flow control 133 Lesson 10 Sample: Basic menus 134 Advanced Privilege Manager for Unix Configuration 136 Privilege Manager shells 136 Privilege Manager shell features 137 Forbidden commands 138 Allowed commands 138 Allowed piped commands 138 Check shell built-in commands 139 Read-only variable list 139 Running a shell in restricted mode 139 Additional shell considerations 140 Configuring Privilege Manager for policy scripting 142 Configuration prerequisites 142 Configuration file examples 143 Example 1: Basics 144 Privilege Manager for Unix 6.1 Administration Guide 6 Example 2: Accept or reject requests 145 Example 3: Command constraints 146 Example 4: Lists 147 Example 5: I/O logging, event logging, and replay 147 Example 6: More complex policies 150 Example 7: Use variables to store constraints 150 Example 8: Control the run-time environment 151 Example 9: Switch and case statements 154 Example 10: Menus 154 Use the while loop 156 Use parallel lists 157 Best practice policy guidelines 157 Multiple configuration files and read-only variables 159 Mail 160 Environmental variables 161 NIS netgroups 161 Specify trusted hosts 161 Configuring firewalls 161 Privilege Manager port usage 162 Restricting port numbers for command responses 163 Configuring pmtunneld 163 Configuring Network Address Translation (NAT) 165 Configuring Kerberos encryption 165 Configuring certificates 166 Enable configurable certification 166 Configuring alerts 168 Configuring Pluggable Authentication Method (PAM) 169 Utilizing PAM authentication 169 Authenticate PAM to client 170 Administering Log and Keystroke Files 172 Controlling logs 172 Local logging 173 Event logging 174 Keystroke (I/O) logging 175 Keystroke (I/O) logging policy variables 176 Privilege Manager for Unix 6.1 Administration Guide 7 Central logging with Privilege Manager for Unix 178 Controlling log size with Privilege Manager for Unix 179 Viewing the log files using a web browser 180 Viewing the log files using command