Securing the Configuration Files
This section describes the program (pr0pass) used to encrypt passwords for parameters in the configuration files.
If the administrator has set up file permissions as described in Securing the Products, only the owner, members of the group that includes the owner, and the root user can view (read) the configuration files, and only the owner or the root user can update (write) the configuration files.
The user account used to start pr0svce must have read access to the pstserv.cfg file, while the Command Line Utility (pr0cmnd) must have read access to the pstlocal.cfg file. (For details about the configuration files, refer to Pstserv Configuration File and Pstlocal Configuration File for the Command Line Utility.)
Password File
Parameters in both configuration files may include system user ids (i.e., filelogon, webserver, server, and tivoliavail), DBMS logons (i.e., pstdir and dbalias) with passwords. To secure passwords for configuration parameters, you can use an encrypted password file, separate from the configuration files. The pr0pass program maintains the password file, encrypting passwords for parameters in the configuration files.
By default, the password file “pstpass” is created in subdirectory
etc of directory PSTHOME. However, you can override the
location of the file by providing the full path in the environment variable PSTPASS. Note that
“etc/” is catenated to the end of the value provided in PSTPASS, so be sure that subdirectory
etc exists under what is specified in the environment variable PSTPASS.
(Refer to RTSETENV Shell Script for a description of the PSTPASS environment variable.) Users that can start pr0svce or
execute pr0cmnd or pr0coms must have permission to read the password file and users that use
pr0pass must be able to write to the password file.
To use encrypted passwords:
- Execute pr0pass from the Command Line to add the passwords. You must be logged on to the Install directory as the owner, as a user within the fenced group, or as the root user.
- Within the configuration files, specify a question mark (?) for the password to retrieve the password from the password file.
Commands
This section describes the commands you can use with a password file.
The following command line actions are available to help you edit an encrypted password file.
- pr0pass -l
- List the type, name, and user id for passwords in the file.
- pr0pass -h
pr0pass -? - Display the help for the pr0pass program.
- pr0pass -a type name userid password
- Add a password entry. The password is encrypted
until passed to the DBMS or system for validation.
- type
- A valid password type:
- filelogon
- webserver
- server
- tivoliavail
- pstdir
- dbalias
- user
Note: "User" is not a parameter in a configuration file; it refers to any system user id. Specify the "user" parameter type for any parameter referring to a system user account.If type is pstdir, the default "%" indicates any Optim Directory. If type is dbalias, use the form pstdir:dbalias. The default "%" indicates any Optim Directory or DB Alias, as in %:%, pstdir:%, or %:dbalias.
- name
- The name of the configuration file parameter. Names not associated with other types are system; use "%" for the name value to prevent an error.
- userid
- The user id is used to verify that the password matches the parameter name. To protect changes to the password file or the configuration file, the two keywords must match.
- password
- The password that matches the user id.Note: If you do not enter a password on the Command Line, pr0pass prompts for one.
- pr0pass -d type name userid
- Delete a password entry.
- type
- A valid password type:
- filelogon
- webserver
- server
- tivoliavail
- pstdir
- dbalias
- user
- name
- The name of the configuration file parameter.Note: Use the wildcard character "%" as described for adding a password entry.
- userid
- The user ID used to verify that the password matches the parameter name. To protect changes to the password file or the configuration file, the two keywords must match.
Examples
This section includes examples of using the Add command.
The following examples demonstrate using the Add command for the pr0pass program and indicating encrypted passwords in the configuration file.
Protecting the Password File
This section describes how to protect the password file.
By default, the owner and the root user
have write access to the password file and can use the commands, pr0pass
-a or pr0pass -d, to update the password
file.
To allow other members of the group to update the password file, you must use the chmod command to change permissions to the password file. For example, the following command adds write permission to the group for the pstpass file.
chmod g+w <installdir>/etc/pstpassThis allows members of the group to maintain passwords for their accounts. However, if members of the group other than the owner have write permission, anyone in the group can delete a password or the password file, at the risk of disabling the product or requiring reentry of all affected passwords.
Protecting the Configuration Files
This section describes how to protect the configuration files.
It is recommended that you allow only the owner or the root user to update the configuration files. Maintenance of the configuration file does not require knowledge of the actual passwords if group members are allowed to update the password file since the character “?” can be specified for the passwords.