HP rp3440 HP Integrity and HP 9000 iLO MP Operations Guide, Fifth Edition - Page 123

Creating Multiple Restrictions and Roles, Multiple Restriction Roles

Page 123 highlights

iLO MP device as a directory user, the iLO MP device attempts authentication to the directory as that user, which means that address restrictions placed on the user account apply when accessing the iLO MP device. However, because the user is proxied at the iLO MP device, the network address of the authentication attempt is that of the iLO MP device, not that of the client workstation. Creating Multiple Restrictions and Roles The most useful application of multiple roles includes restricting one or more roles so that rights do not apply in all situations. Other roles provide different rights under different constraints. Using multiple restrictions and roles enables you to create arbitrary, complex rights relationships with a minimum number of roles. For example, an organization might have a security policy in which iLO MP administrators are allowed to use the iLO MP device from within the corporate network, but are only able to reset the server outside of regular business hours. Directory administrators might be tempted to create two roles to address this situation, but extra caution is required. Creating a role that provides the required server reset rights and restricting it to an after-hours application might allow administrators outside the corporate network to reset the server, which is contrary to most security policies. In Figure 7-24, security policy dictates that general use is restricted to clients within the corporate subnet, and server reset capability is additionally restricted to after hours. Figure 7-24 Multiple Restriction Roles Alternatively, the directory administrator could create a role that grants the login right and restrict it to the corporate network and create another role that grants only the server reset right and restrict it to after-hours operation. This configuration is easier to manage but more dangerous because ongoing administration can create another role that grants users from addresses outside the corporate network the login right, which could unintentionally grant the iLO MP administrators in the server Reset role the ability to reset the server from anywhere, provided they satisfy the time constraints of that role. The previous configuration satisfies corporate security policy. However, adding another role that grants the login right can inadvertently grant server reset privileges from outside the corporate subnet after hours. Figure 7-25 shows a more manageable solution that restricts the Reset role, as well as the General Use role. Directory-Enabled Management 123

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140

iLO MP device as a directory user, the iLO MP device attempts authentication to the directory
as that user, which means that address restrictions placed on the user account apply when
accessing the iLO MP device. However, because the user is proxied at the iLO MP device, the
network address of the authentication attempt is that of the iLO MP device, not that of the client
workstation.
Creating Multiple Restrictions and Roles
The most useful application of multiple roles includes restricting one or more roles so that rights
do not apply in all situations. Other roles provide different rights under different constraints.
Using multiple restrictions and roles enables you to create arbitrary, complex rights relationships
with a minimum number of roles.
For example, an organization might have a security policy in which iLO MP administrators are
allowed to use the iLO MP device from within the corporate network, but are only able to reset
the server outside of regular business hours.
Directory administrators might be tempted to create two roles to address this situation, but extra
caution is required. Creating a role that provides the required server reset rights and restricting
it to an after-hours application might allow administrators outside the corporate network to reset
the server, which is contrary to most security policies.
In
Figure 7-24
, security policy dictates that general use is restricted to clients within the corporate
subnet, and server reset capability is additionally restricted to after hours.
Figure 7-24 Multiple Restriction Roles
Alternatively, the directory administrator could create a role that grants the login right and
restrict it to the corporate network and create another role that grants only the server reset right
and restrict it to after-hours operation. This configuration is easier to manage but more dangerous
because ongoing administration can create another role that grants users from addresses outside
the corporate network the login right, which could unintentionally grant the iLO MP
administrators in the server Reset role the ability to reset the server from anywhere, provided
they satisfy the time constraints of that role.
The previous configuration satisfies corporate security policy. However, adding another role
that grants the login right can inadvertently grant server reset privileges from outside the corporate
subnet after hours.
Figure 7-25
shows a more manageable solution that restricts the Reset role,
as well as the General Use role.
Directory-Enabled Management
123