Security Management Guide (G06.24+, H06.03+)
Concerns for the System Administration Team
Security Management Guide—522283-008
7-16
Creating a Network User ID
Creating a Network User ID
The general procedure for creating a network user ID follows:
1. Establish identical user names and user IDs on all nodes to be accessed by the
network user.
2. Log on to each user ID on each node and establish both a local password (which
should be different for each node) and a set of remote passwords. For a given
user, all remote passwords designating a given node must be identical. For
example, all remote passwords that designate node \SYS1 must be identical, and
all remote passwords that designate node \SYS2 must be identical. However, the
remote passwords designating \SYS1 should differ from those designating \SYS2.
3. Instruct the user (or the owner of the application if the network user ID is strictly for
an application) to log on to each node and select a new password in accordance
with the password guidelines.
For more information about this operation, see the Safeguard Administrator’s Manual
and the Expand Network Management Guide.
The Safeguard software also supports the use of user aliases for network access, as
described in the Safeguard Reference Manual.
Managing the Network User IDs
Handling network user IDs requires careful planning and cooperation among (possibly)
geographically separated organizations. The Guardian environment requires that
network user IDs have the same user name and user ID on all affected nodes. This
condition requires advance networkwide planning.
You might reserve a range of group numbers (for example, 200 to 255) for network
user IDs, and assign network user IDs from these administrative groups. Then decide
on the networkwide names for those groups on an as-needed basis, maybe even
reserving a particular initial letter (such as N) for network groups. Also, you might
designate a particular organization to own each group name and group ID and make
that organization responsible for controlling the allocation of user IDs within its group.
Security Precautions
Treat a network user ID like a privileged ID because the network user has more access
than users confined to local nodes. If an intruder can access the ID, the intruder gains
access to virtually any N-secured file on the network, not just the N-secured files on the
nodes for which the user has matching remote passwords.