<?Pub UDT _bookmark _target?><chapter id="useraccts-1"><?Pub Tag atict:info tracking="off" ref="10"?><?Pub Tag
atict:user user="sharonr" fullname="Sharon Veach"?><title>Users, Rights, and
Roles in Trusted Extensions (Overview)</title><highlights><para>This chapter describes essential decisions that you must make before
creating regular users, and provides additional background information for
managing user accounts. The chapter assumes that the initial setup team has
set up roles and a limited number of user accounts. These users can assume
the roles that are used to configure and administer Solaris Trusted Extensions. For details,
see <olink targetptr="txconf-14" remap="internal">Creating Roles and Users
in Trusted Extensions</olink>.</para><itemizedlist remap="jumplist"><listitem><para><olink targetptr="manageusers-34" remap="internal">User Security Features in
Trusted Extensions</olink></para>
</listitem><listitem><para><olink targetptr="manageusers-21" remap="internal">Administrator Responsibilities
for Users</olink></para>
</listitem><listitem><para><olink targetptr="manageusers-15" remap="internal">Decisions to Make Before
Creating Users in Trusted Extensions</olink></para>
</listitem><listitem><para><olink targetptr="manageusers-20" remap="internal">Default User Security Attributes
in Trusted Extensions</olink></para>
</listitem><listitem><para><olink targetptr="usermgr-15" remap="internal">Configurable User Attributes
in Trusted Extensions</olink></para>
</listitem><listitem><para><olink targetptr="manageusers-27" remap="internal">Security Attributes That
Must Be Assigned to Users</olink></para>
</listitem>
</itemizedlist>
</highlights><sect1 id="manageusers-34"><title>User Security Features in Trusted Extensions</title><itemizedlist><para>Trusted Extensions software adds the following security features to users,
roles, or rights profiles:</para><listitem><para>A user has a label range within which the user can use the
system.</para>
</listitem><listitem><para>A role has a label range within which the role can be used
to perform administrative tasks.</para>
</listitem><listitem><para>A Trusted Extensions rights profile can include CDE administrative
actions. Like commands, actions can have security attributes.</para>
</listitem><listitem><para>Commands and actions in a Trusted Extensions rights profile have
a label attribute. The command or action must be performed within a label
range, or at a particular label.</para>
</listitem><listitem><para>Trusted Extensions software adds privileges and authorizations
to the set of privileges and authorizations that are defined by the Solaris OS.</para>
</listitem>
</itemizedlist>
</sect1><sect1 id="manageusers-21"><title>Administrator Responsibilities for Users</title><para><indexterm><primary>users</primary><secondary>creating</secondary></indexterm>The System Administrator role creates user accounts. The Security
Administrator role sets up the security aspects of an account.</para><para>If you are using the Sun <trademark>Java</trademark> System Directory Server for the LDAP naming service, check that
the initial setup team configured the <filename>tsol_ldap.tbx</filename> toolbox.
For the procedure, see <olink targetptr="confsys-10" remap="internal">Configuring the Solaris Management Console for LDAP
(Task Map)</olink>.</para><itemizedlist><para>For details on setting up users and roles, see the following:</para><listitem><para><olink targetdoc="group-sa" targetptr="smcover-96" remap="external"><citetitle remap="section">How to Create the First Role (Primary Administrator)</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink></para>
</listitem><listitem><para><olink targetdoc="group-sa" targetptr="usersetup-129" remap="external"><citetitle remap="section">Setting Up User Accounts (Task Map)</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink></para>
</listitem><listitem><para><olink targetdoc="group-sa" targetptr="prbactm-1" remap="external">Part&nbsp;III, <citetitle remap="chapter">Roles, Rights Profiles, and Privileges,</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</listitem>
</itemizedlist><sect2 id="manageusers-22"><title>System Administrator Responsibilities for
Users</title><itemizedlist><para>In Trusted Extensions, the System Administrator role is responsible for
determining who can access the system. The system administrator is responsible
for the following tasks:</para><listitem><para>Adding and deleting users</para>
</listitem><listitem><para>Adding and deleting roles</para>
</listitem><listitem><para>Modifying user and role configurations, other than security
attributes</para>
</listitem>
</itemizedlist>
</sect2><sect2 id="manageusers-23"><title>Security Administrator Responsibilities
for Users</title><itemizedlist><para>In Trusted Extensions, the Security Administrator role is responsible for
all security attributes of a user or role. The security administrator is responsible
for the following tasks:</para><listitem><para>Assigning and modifying the security attributes of a user,
role, or rights profile</para>
</listitem><listitem><para>Creating and modifying rights profiles</para>
</listitem><listitem><para>Assigning rights profiles to a user or role</para>
</listitem><listitem><para>Assigning privileges to a user, role, or rights profile</para>
</listitem><listitem><para>Assigning authorizations to a user, a role, or rights profile</para>
</listitem><listitem><para>Removing privileges from a user, role, or rights profile</para>
</listitem><listitem><para>Removing authorizations from a user, role, or rights profile</para>
</listitem>
</itemizedlist><para>Typically, the Security Administrator role creates rights profiles.
However, if a profile needs capabilities that the Security Administrator role
cannot grant, then superuser or the Primary Administrator role can create
the profile.</para><para>Before creating a rights profile, the security administrator needs to
analyze whether any of the commands or actions in the new profile need privilege
or authorization to be successful. The man pages for individual commands list
the privileges and authorizations that might be needed. For examples of actions
that require privileges and authorizations, see the <filename>exec_attr</filename> database.</para>
</sect2>
</sect1><sect1 id="manageusers-15"><title>Decisions to Make Before Creating Users
in Trusted Extensions</title><indexterm><primary>users</primary><secondary>planning for</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>users</secondary>
</indexterm><para>The following decisions affect what users are able to do in Trusted Extensions and
how much effort is required. Some decisions are the same as the decisions
that you would make when installing the Solaris OS. However, decisions that are
specific to Trusted Extensions can affect site security and ease of use.</para><itemizedlist><listitem><para>Decide whether to change default user security attributes
in the <filename>policy.conf</filename> file. User defaults in the <filename>label_encodings</filename> file were configured by the initial setup team. For a description
of the defaults, see <olink targetptr="manageusers-20" remap="internal">Default User Security
Attributes in Trusted Extensions</olink>.</para>
</listitem><listitem><para>Decide which startup files, if any, to copy or link from each
user's minimum-label home directory to the user's higher-level home directories.
For the procedure, see <olink targetptr="manageusers-11" remap="internal">How to Configure
Startup Files for Users in Trusted Extensions</olink>.</para>
</listitem><listitem><para>Decide if users can access peripheral devices, such as the
microphone, CD-ROM drive, and JAZ drive.</para><para>If access is permitted
to some users, decide if your site requires additional authorizations to satisfy
site security. For the default list of device-related authorizations, see <olink targetptr="managedev-38" remap="internal">How to Assign Device Authorizations</olink>. For
a finer-grained set of device authorizations, see <olink targetptr="managedev-16" remap="internal">Customizing Device Authorizations in Trusted Extensions (Task Map)</olink>.</para>
</listitem>
</itemizedlist>
</sect1><sect1 id="manageusers-20"><title>Default User Security Attributes in Trusted Extensions</title><para>Settings in the <filename>label_encodings</filename> and the <filename>policy.conf</filename> files together define default security attributes for user accounts.
The values that you explicitly set for a user override these system values.
Some values that are set in these files also apply to role accounts. For security
attributes that you can explicitly set, see <olink targetptr="usermgr-15" remap="internal">Configurable
User Attributes in Trusted Extensions</olink>.</para><sect2 id="manageusers-46"><title><filename>label_encodings</filename> File
Defaults</title><para>The <filename>label_encodings</filename> file defines a user's minimum
label, clearance, and default label view. For details about the file, see
the <olink targetdoc="group-refman" targetptr="label-encodings-4" remap="external"><citerefentry><refentrytitle>label_encodings</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man page. Your site's <filename>label_encodings</filename> file
was installed by your initial setup team. Their decisions were
based on <olink targetptr="ovw-16" remap="internal">Devising a Label Strategy</olink>,
and examples from <olink targetdoc="trsollbladmin" remap="external"><citetitle remap="book">Solaris Trusted Extensions Label Administration</citetitle></olink>.</para><para>Label values that the security administrator explicitly sets for individual
users in the Solaris Management Console are derived from the <filename>label_encodings</filename> file.
Explicitly set values override the values in the <filename>label_encodings</filename> file.</para>
</sect2><sect2 id="manageusers-45"><title><filename>policy.conf</filename> File Defaults
in Trusted Extensions</title><indexterm><primary>files</primary><secondary><filename>/etc/security/policy.conf</filename></secondary>
</indexterm><indexterm><primary><filename>/etc/security/policy.conf</filename> file</primary>
</indexterm><indexterm><primary><filename>policy.conf</filename> file</primary><secondary>defaults</secondary>
</indexterm><para>The Solaris <filename>/etc/security/policy.conf</filename> file
contains the default security settings for the system. Trusted Extensions adds
two keywords to this file. You can add these keyword-value pairs to the file
if you want to change the system-wide value. These keywords are enforced by Trusted CDE.</para><table frame="topbot" id="manageusers-tbl-3"><title>Trusted Extensions Security
Defaults in <filename>policy.conf</filename> File</title><tgroup cols="4" colsep="0" rowsep="0"><?PubTbl tgroup dispwid="6.97in"?><colspec colname="colspec7" colwidth="43.25*"/><colspec colname="colspec0" colwidth="44.80*"/><colspec colname="colspec3" colwidth="68.74*"/><colspec colname="colspec1" colwidth="68.92*"/><thead><row rowsep="1"><entry><para>Keyword</para>
</entry><entry colname="colspec0"><para>Default Value</para>
</entry><entry><para>Possible Values</para>
</entry><entry><para>Notes</para>
</entry>
</row>
</thead><tbody><row><entry colname="colspec7"><para>IDLECMD</para>
</entry><entry colname="colspec0"><para>LOCK</para>
</entry><entry><para>LOCK | LOGOUT</para>
</entry><entry><para>Does not apply to roles.</para>
</entry>
</row><row><entry colname="colspec7"><para>IDLETIME</para>
</entry><entry colname="colspec0"><para>30</para>
</entry><entry><para>0 to 120 minutes</para>
</entry><entry><para>Does not apply to roles.</para>
</entry>
</row>
</tbody>
</tgroup>
</table><para>The authorizations and rights profiles that are defined in the <filename>policy.conf</filename> file are <emphasis>in addition</emphasis> to any authorizations
and profiles that are assigned to individual accounts. For the other fields,
the individual user's value overrides the system value.</para><para><olink targetptr="ovw-18" remap="internal">Planning User Security in
Trusted Extensions</olink> includes a table of every <filename>policy.conf</filename> keyword.
See also the <olink targetdoc="group-refman" targetptr="policy.conf-4" remap="external"><citerefentry><refentrytitle>policy.conf</refentrytitle><manvolnum>4</manvolnum></citerefentry></olink> man page.</para>
</sect2>
</sect1><sect1 id="usermgr-15"><title>Configurable User Attributes in Trusted Extensions</title><para>The Solaris Management Console 2.1 is your tool for creating and modifying user accounts. For
users who can log in at more than one label, you might also want to set up <filename>.copy_files</filename> and <filename>.link_files</filename> files in each
user's minimum&ndash;label home directory.</para><itemizedlist><para>The User Accounts tool in the Solaris Management Console works as it does in the Solaris OS,
with two exceptions:</para><listitem><para>Trusted Extensions adds attributes to user accounts.</para>
</listitem><listitem><para>Home directory server access requires administrative attention
in Trusted Extensions.</para><itemizedlist><listitem><para>You create the home directory server entry the same as you
do on a Solaris system.</para>
</listitem><listitem><para>Then, you and the user perform additional steps to mount the
home directory at every user label.</para>
</listitem>
</itemizedlist>
</listitem>
</itemizedlist><para>As described in <olink targetdoc="group-sa" targetptr="usersetup-21" remap="external"><citetitle remap="section">How to Add a User With the Solaris Management Console&rsquo;s Users Tool</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>, a wizard enables you to create user
accounts quickly. After using the wizard, you can modify the user's default Trusted Extensions attributes.</para><para>For more information about the <filename>.copy_files</filename> and <filename>.link_files</filename> files, see <olink targetptr="manageusers-28" remap="internal">.copy_files
and .link_files Files</olink>.</para>
</sect1><sect1 id="manageusers-27"><title>Security Attributes That Must Be Assigned
to Users</title><para>The Security Administrator role must specify some security attributes
for new users, as the following table shows. For information about the files
that contain default values, see <olink targetptr="manageusers-20" remap="internal">Default
User Security Attributes in Trusted Extensions</olink>.</para><table frame="topbot" id="usermgr-tbl-11"><title>Security Attributes That
Are Assigned After User Creation</title><tgroup cols="4" colsep="0" rowsep="0"><colspec colname="colspec0" colwidth="74.47*"/><colspec colname="colspec2" colwidth="109.45*"/><colspec colname="colspec4" colwidth="74.33*"/><?PubTbl tgroup dispwid="6.97in"?><colspec colname="colspec1" colwidth="222.28*"/><thead><row rowsep="1" valign="top"><entry colname="colspec0" colsep="1"><para>User Attribute</para>
</entry><entry colsep="1"><para>Location of Default Value</para>
</entry><entry colsep="1"><para>Is Action Required</para>
</entry><?PubTbl row rht="0.65in"?><entry colname="colspec1" colsep="1" rowsep="1"><para>Effect of Action</para>
</entry>
</row>
</thead><tbody><row><entry colname="colspec0" colsep="1" rowsep="1"><para>Password</para>
</entry><entry colsep="1" rowsep="1"><para>None</para>
</entry><entry colsep="1" rowsep="1"><para>Required</para>
</entry><?PubTbl row rht="0.46in"?><entry colname="colspec1" colsep="1" rowsep="1"><para>User has password</para>
</entry>
</row><row><entry colsep="1" rowsep="1"><para>Roles</para>
</entry><entry colsep="1" rowsep="1"><para>None</para>
</entry><entry colsep="1" rowsep="1"><para>Optional</para>
</entry><entry colsep="1" rowsep="1"><para>User can assume a role</para>
</entry>
</row><row><entry colsep="1" rowsep="1"><para>Authorizations</para>
</entry><entry colsep="1" rowsep="1"><para><filename>policy.conf</filename> file</para>
</entry><entry colsep="1" rowsep="1"><para>Optional</para>
</entry><entry colsep="1" rowsep="1"><para>User has additional authorizations</para>
</entry>
</row><row><entry colname="colspec0" colsep="1" rowsep="1"><para>Rights Profiles</para>
</entry><entry colsep="1" rowsep="1"><para><filename>policy.conf</filename> file</para>
</entry><entry colsep="1" rowsep="1"><para>Optional</para>
</entry><entry colname="colspec1" colsep="1" rowsep="1"><para>User has additional rights profiles</para>
</entry>
</row><row><entry colsep="1" rowsep="1"><para>Labels</para>
</entry><entry colsep="1" rowsep="1"><para><filename>label_encodings</filename> file</para>
</entry><entry colsep="1" rowsep="1"><para>Optional</para>
</entry><entry colsep="1" rowsep="1"><para>User has different default label or accreditation range</para>
</entry>
</row><row><entry colname="colspec0" colsep="1" rowsep="1"><para>Privileges</para>
</entry><entry colsep="1" rowsep="1"><para><filename>policy.conf</filename> file</para>
</entry><entry colsep="1" rowsep="1"><para>Optional</para>
</entry><entry colname="colspec1" colsep="1" rowsep="1"><para>User has different set of privileges</para>
</entry>
</row><row><entry colname="colspec0" colsep="1" rowsep="1"><para>Account Usage</para>
</entry><entry colsep="1" rowsep="1"><para><filename>policy.conf</filename> file</para>
</entry><entry colsep="1" rowsep="1"><para>Optional</para>
</entry><entry colname="colspec1" colsep="1" rowsep="1"><para>User has different setting for computer when it is idle</para>
</entry>
</row><row><entry colname="colspec0" colsep="1" rowsep="1"><para>Audit</para>
</entry><entry colsep="1" rowsep="1"><para><filename>audit_control</filename> file</para>
</entry><entry colsep="1" rowsep="1"><para>Optional</para>
</entry><entry colname="colspec1" colsep="1"><para>User is audited differently from the system audit settings</para>
</entry>
</row>
</tbody>
</tgroup>
</table><sect2 id="usermgr-11"><title>Security Attribute Assignment to Users in Trusted Extensions</title><para>The Security Administrator role assigns security attributes to users
in the Solaris Management Console after the user accounts are created. If you have set up correct
defaults, your next step is to assign security attributes only for users who
need exceptions to the defaults.</para><para>When assigning security attributes to users, the security administrator
considers the following information:</para><variablelist termlength="wholeline"><varlistentry><term><emphasis role="strong">Assigning Passwords</emphasis></term><listitem><para><indexterm><primary>users</primary><secondary>assigning passwords</secondary></indexterm><indexterm><primary>passwords</primary><secondary>assigning</secondary></indexterm>The Security Administrator role assigns passwords
to user accounts after the accounts have been created. After this initial
assignment, users can change their passwords.</para><para>As in the Solaris OS, users can be forced to change their passwords at
regular intervals. The password aging options limit how long any intruder
who is able to guess or steal a password could potentially access the system.
Also, establishing a minimum length of time to elapse before changing a password
prevents a user with a new password from reverting immediately to the old
password. For details, see the <olink targetdoc="group-refman" targetptr="passwd-1" remap="external"><citerefentry><refentrytitle>passwd</refentrytitle><manvolnum>1</manvolnum></citerefentry></olink> man
page.</para><note><para>The passwords for users who can assume roles must not be subject
to any password aging constraints.</para>
</note>
</listitem>
</varlistentry><varlistentry><term><emphasis role="strong">Assigning Roles</emphasis></term><listitem><para><indexterm><primary>users</primary><secondary>assigning roles to</secondary></indexterm>A user is not required to have a role. A single
user can be assigned more than one role if doing so is consistent with your
site's security policy.</para>
</listitem>
</varlistentry><varlistentry><term><emphasis role="strong">Assigning Authorizations</emphasis></term><listitem><para><indexterm><primary>authorizations</primary><secondary>assigning</secondary></indexterm><indexterm><primary>users</primary><secondary>assigning authorizations to</secondary></indexterm>As in the Solaris OS, assigning authorizations directly
to a user adds those authorizations to existing authorizations. In Trusted Extensions,
you add the authorizations to a rights profile, then assign the profile to
the user.</para>
</listitem>
</varlistentry><varlistentry><term><emphasis role="strong">Assigning Rights Profiles</emphasis></term><listitem><para><indexterm><primary>users</primary><secondary>assigning rights</secondary></indexterm><indexterm><primary>roles</primary><secondary>assigning rights</secondary></indexterm><indexterm><primary>rights profiles</primary><secondary>assigning</secondary></indexterm><indexterm><primary>assigning</primary><secondary>rights profiles</secondary></indexterm>As in the Solaris OS, the order of profiles is important. The profile
mechanism uses the first instance of the command or action in an account's
profile set.</para><para>You can use the sorting order of profiles to your advantage. If you
want a command to run with different security attributes from those attributes
that are defined for the command in an existing profile, create a new profile
with the preferred assignments for the command. Then, insert that new profile
before the existing profile.</para><note><para>Do not assign rights profiles that include administrative actions
or administrative commands to a regular user. The profile would not work because
a regular user cannot enter the global zone.</para>
</note>
</listitem>
</varlistentry><varlistentry><term><emphasis role="strong">Changing Privilege Default</emphasis></term><listitem><para><indexterm><primary>users</primary><secondary>changing default privileges</secondary></indexterm><indexterm><primary>privileges</primary><secondary>changing defaults for users</secondary></indexterm><indexterm><primary>assigning</primary><secondary>privileges to users</secondary></indexterm>The default privilege set can be too liberal for many sites. To
restrict the privilege set for any regular user on a system, change the <filename>policy.conf</filename> file setting. To change the privilege set for individual
users, use the Solaris Management Console. For an example, see <olink targetptr="manageusers-38" remap="internal">How
to Restrict a User's Set of Privileges</olink>.</para>
</listitem>
</varlistentry><varlistentry><term><emphasis role="strong">Changing Label Defaults</emphasis></term><listitem><para><indexterm><primary>users</primary><secondary>assigning labels</secondary></indexterm>Changing a user's label defaults creates an exception to the user
defaults in the <filename>label_encodings</filename> file.</para>
</listitem>
</varlistentry><varlistentry><term><emphasis role="strong">Changing Audit Defaults</emphasis></term><listitem><para>As in the Solaris OS, assigning audit classes to a user creates
exceptions to the audit classes that are assigned in the <filename>/etc/security/audit_control</filename> file on the system. For more information about auditing, see <olink targetptr="audtask-1" remap="internal">Chapter&nbsp;24, Trusted Extensions Auditing (Overview)</olink>.</para>
</listitem>
</varlistentry>
</variablelist>
</sect2><sect2 id="manageusers-28"><title><filename>.copy_files</filename> and <filename>.link_files</filename> Files</title><indexterm><primary><command>updatehome</command> command</primary>
</indexterm><indexterm><primary><command>dtsession</command> command</primary><secondary>running <command>updatehome</command></secondary>
</indexterm><indexterm><primary><filename>.copy_files</filename> file</primary><secondary>description</secondary>
</indexterm><indexterm><primary>files</primary><secondary><filename>.copy_files</filename></secondary>
</indexterm><indexterm><primary><filename>.link_files</filename> file</primary><secondary>description</secondary>
</indexterm><indexterm><primary>files</primary><secondary><filename>.link_files</filename></secondary>
</indexterm><para>In Trusted Extensions, files are automatically copied from the skeleton
directory <emphasis>only</emphasis> into the zone that contains the account's
minimum label. To ensure that zones at higher labels can use startup files,
either the user or the administrator must create the files <filename>.copy_files</filename> and <filename>.link_files</filename>.</para><para>The Trusted Extensions files <filename>.copy_files</filename> and <filename>.link_files</filename> help to automate the copying or linking of startup files into
every label of an account's home directory. Whenever a user creates a workspace
at a new label, the <command>updatehome</command> command reads the contents
of <filename>.copy_files</filename> and <filename>.link_files</filename> at
the account's minimum label. The command then copies or links every listed
file into the higher-labeled workspace.</para><para>The <filename>.copy_files</filename> file is useful when a user wants
a slightly different startup file at different labels. Copying is preferred,
for example, when users use different mail aliases at different labels. The <filename>.link-files</filename> file is useful when a startup file should be identical
at any label that it is invoked. Linking is preferred, for example, when one
printer is used for all labeled print jobs. For example files, see <olink targetptr="manageusers-11" remap="internal">How to Configure Startup Files for Users in Trusted
Extensions</olink>.</para><para>The following lists some startup files that you might want users to
be able to link to higher labels or to copy to higher labels:</para><simplelist columns="3"><member><filename>.acrorc</filename></member><member><filename>.aliases</filename></member><member><filename>.cshrc</filename></member><member><filename>.dtprofile</filename></member><member><filename>.emacs</filename></member><member><filename>.login</filename></member><member><filename>.mailrc</filename></member><member><filename>.mime_types</filename></member><member><filename>.newsrc</filename></member><member><filename>.profile</filename></member><member><filename>.signature</filename></member><member><filename>.soffice</filename></member><member><filename>.Xdefaults</filename></member><member><filename>.Xdefaults-<replaceable>hostname</replaceable></filename></member>
</simplelist>
</sect2>
</sect1>
</chapter><?Pub *0000027579 0?>