Question & Answer
A security change in QRadar modifies how the admin user account can log in when external authentication is unavailable in several software versions. This article provides administrators information on how to change this functionality.
Users that have the Administrator user role assigned to them are unable to log in due to a security change in QRadar for how fallback passwords function with external services, such as LDAP, Active Directory, TACAS, or Radius. The 'Admin' named user can always log in, but administrator user roles, such as 'user.lastname' would not be able to authenticate to QRadar when the external authentication server is unavailable.
In these versions, a LOCAL_FALLBACK_FOR_ALL_ADMINS parameter can be added to allow administrator to log in when external authentications servers are unavailable or unresponsive.
- QRadar 7.2.8 Patch 8 (220.127.116.1170707222831)
- QRadar 7.2.8 Patch 9 (18.104.22.16870726184122)
- All future QRadar 7.2.8 versions
- QRadar 7.3.0 Patch 4 (22.214.171.12470830160510)
- All future QRadar 7.3.0 versions
In the versions listed below, fall back to the local password works for all administrator accounts. In these versions, there is no core code change to allow the use of the LOCAL_FALLBACK_FOR_ALL_ADMINS parameter.
- QRadar 7.3.0 (126.96.36.19970315023309)
- QRadar 7.3.0 Patch 1 (188.8.131.5270503143306)
- QRadar 7.3.0 Patch 2 (184.108.40.20670620100024)
- QRadar 7.3.0 Patch 3 (220.127.116.1170727172058)
Historically, QRadar has always used fallback passwords for all administrator accounts. A security change in this policy was released starting with QRadar 7.2.8 Patch 8 (18.104.22.16870707222831) and QRadar 7.3.0 Patch 4 (22.214.171.12470830160510) to only the 'Admin' named user account can log in until a configuration change is made to QRadar. This change requires root access to the Console appliance.
Updating your QRadar Console
This procedure allows administrators to enable fallback authentication to the local password stored in QRadar when external authentication is disabled. When the LOCAL_FALLBACK_FOR_ALL_ADMINS value is configured to FALSE, only the 'Admin' named user can authenticate. To allow all administrators to use their local fallback passwords, a value must be added to the nva.conf as a new parameter. For example, LOCAL_FALLBACK_FOR_ALL_ADMINS=TRUE.
- Log in to the QRadar Console as an administrator.
- To make a copy of your existing nva.conf file, type: cp /opt/qradar/conf/nva.conf /root/nva.conf.bak
- Add the following files to change the LOCAL_FALLBACK_FOR_ALL_ADMINS=TRUE
Important: Depending on your version, you might be required to add or edit this line to nva.conf. The line position does not matter when making this change, the new line can be added to the top, bottom, or in alphabetical order to the QRadar Console. Do not edit the backup file you created as nva.conf.bak from the root directory as administrators can restore this file if an issue occurs.
- Save the changes to the files.
- Log in to the Console as an administrator.
- Click the Admin tab.
- Click Deploy Changes.
After the Deploy Changes completes, all managed hosts are provided with an updated nva.conf file that contains the change to allow all administrators the ability to log in the Console when external authentication is unavailable.
This change will persist through QRadar patches/updates. After you have made this configuration change one time, there should be no reason to have to repeat this procedure in future software versions. If you need assistance with this change, administrators can contact QRadar Support to open a software ticket or they can ask additional questions in our forums using the Community questions and discussion field below.
30 August 2019