Changes between Initial Version and Version 1 of ALL__accounts_roles


Ignore:
Timestamp:
11/13/14 13:36:59 (10 years ago)
Author:
lttoth@…
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • ALL__accounts_roles

    v1 v1  
     1= All Account Roles = 
     2 
     320081114 sxelm          Accounts/Roles/Groups Utilized by UPDATE/EDIR/AUTHSERV 
     4 
     5The following accounts are utilized in some manner by UPDATE, EDIR, or AUTHSERV batch processing  
     6or the web gateway(s).  They are grouped by category: directory or registry. 
     7 
     8== IPLANET ACCOUNTS/ROLES/ACIS == 
     9 
     10=== iPlanet Accounts === 
     11 
     12        * uid=edirbatch03,ou=resource,dc=alaska,dc=edu 
     13                credentials utilized by UPDATE interface for batch processing 
     14 
     15        * uid=edirgw03,ou=resource,dc=alaska,dc=edu 
     16                credentials utilized by EDIR web gateway for "anonymous" access 
     17 
     18        * uid=edirpriv03,ou=resource,dc=alaska,dc=edu 
     19                credentials utilized by EDIR web gateway to access privileged information  
     20                not expected to be visible to "anonymous" access but need for functions  
     21                like the "This is me! Log In" link. 
     22 
     23        * uid=authserv03,ou=resource,dc=alaska,dc=edu 
     24                credentials utilized by the AUTHSERV web gateway  
     25 
     26        * uid=authpriv03,ou=resource,dc=alaska,dc=edu 
     27                credentials utilized by AUTHSERV web gateway to access privileged information  
     28 
     29        * uid=updategw03,ou=resource,dc=alaska,dc=edu 
     30                credentials utilized by UPDATE back end to access privileged information  
     31                and perform privileged tasks 
     32 
     33Note: Most likely, AUTHSERV needs only one set of credentials. 
     34 
     35=== iPlanet Roles === 
     36         
     37        cn=directoryGatewayRole,ou=people,dc=alaska,dc=edu 
     38        cn=directoryGatewayRole,ou=resource,dc=alaska,dc=edu 
     39                roles associated with ACIs allowing gateway access to non-privileged information 
     40 
     41        cn=directoryPrivilegedRole,ou=people,dc=alaska,dc=edu 
     42        cn=directoryPrivilegedRole,ou=resource,dc=alaska,dc=edu 
     43                roles associated with ACIs allowing gateway access to privileged information 
     44 
     45        cn=authserviceRole,ou=people,dc=alaska,dc=edu 
     46        cn=authserviceRole,ou=resource,dc=alaska,dc=edu 
     47                roles associated with ACIs allowing gateway access to non-privileged information 
     48 
     49        cn=authservicePrivilegedRole,ou=resource,dc=alaska,dc=edu 
     50        cn=authservicePrivilegedRole,ou=people,dc=alaska,dc=edu 
     51                roles associated with ACIs allowing gateway access to privileged information 
     52 
     53        (future) cn=superUserRole,ou=resource,dc=alaska,dc=edu 
     54                role associated with ACIs allowing the update back end access to privileged information 
     55 
     56=== iPlanet ACIs === 
     57 
     58        * EDIRGWANYCOMPARE 
     59        * EDIRGWANYREAD 
     60        * EDIRGWEMPREAD 
     61        * EDIRGWSTUREAD 
     62                ACIs that provide the non-privileged gateway role with read access to non-privileged 
     63                information  
     64 
     65        * EDIRGWCOMPARE 
     66        * EDIRGWEMPCOMPARE 
     67        * EDIRGWSTUCOMPARE 
     68                ACIs that provide the privileged gateway role the ability to ask true/false 
     69                questions about attributes that are not otherwise visible 
     70 
     71        * EDIRGWPRIVREAD 
     72                ACIs that provide the privileged gateway role with read access to privileged  
     73                information 
     74 
     75        * AUTHSERVICEREAD 
     76                ACIs that provide the non-privileged authservice role with read access to non-privileged  
     77                information 
     78 
     79        * AUTHSERVICEPRIVCOMPARE 
     80                ACIs that provide the privileged gateway role the ability to ask true/false 
     81                questions about attributes that are not otherwise visible 
     82 
     83        * AUTHSERVICEPRIVREAD 
     84                ACIs that provide the privileged authservice role with read access to privileged information 
     85 
     86        (future) SUADDDEL 
     87        (future) SUDENYREADSEARCHCOMPARE 
     88        (future) SUDENYWRITE 
     89        (future) SUREADWRITE 
     90                ACIs that provide (or deny) the privileged superuser role with read/write access 
     91                to privileged information 
     92 
     93 
     94 
     95== UNIX ACCOUNT/GROUPS == 
     96 
     97=== Directory Servers === 
     98        ==== account: ldapgw ====        
     99        UNIX account owning CGI scripts representing the EDIR/AUTHSERV web gateways. 
     100                * member of group ldapgw (primary group) 
     101                * member of group edirgw (used to expose password files to nobody during CGI script execution) 
     102                        * any files opened during execution of CGI scripts 
     103                        * <GW>/logs directory where output is written 
     104                * member of group other   
     105                * member of group UA_Korn (on toklat only) 
     106                * .shosts file must allow access by  
     107                        * <<directory servers>> iplanet 
     108                * ldapgw must be listed in ~ua?synch/.shosts file to facilitate transfer of UA? specific "style" elements utilized by EDIR/AUTHSERV 
     109 
     110        ==== account: sxldap ==== 
     111        UNIX account owning CGI scripts representing the UPDATE back end gateway. 
     112 
     113                * Group Membership 
     114                member of group updategw (primary group) 
     115                member of group edirgw (used to expose password files to nobody during CGI script execution) 
     116                        any files opened during execution of CGI scripts 
     117                        <GW>/logs directory where output is written 
     118                member of group other   
     119                member of group UA_Korn (on toklat and summit only) 
     120         
     121                .shosts file must allow access by  
     122                        <<directory servers>>   iplanet 
     123         
     124        account: iplanet         
     125        UNIX account owning iPlanet directory and web update processes.   
     126                * Directory Locations 
     127                        ~iplanet/EDIR[TEST|PREP|PROD]/ 
     128                        ~iplanet/AUTH[TEST|PREP|PROD]/ 
     129                *All directory maintenance related source code is stored under this account  
     130                        ~iplanet/local/ldap/ 
     131                *.shosts file must allow access by 
     132                        <<registry servers>>    sxldap 
     133                * Group membership 
     134                  * iplanet (primary group) 
     135                  * other   
     136                  * edirgw (associated with files visible to all parties supporting gateways) 
     137                  * updategw (associated with password files read by CGI scripts) any files opened during execution of CGI scripts <GW>/ldap/web/log directory where output is written 
     138         
     139        account: nobody  
     140        UNIX account under which Apache httpd processes are started and under which EDIR CGI scripts are executed via the web. 
     141                * member of group nobody (primary group) 
     142                * member of group edirgw (facilitate reading of password files read by CGI scripts) 
     143                * member of group updategw (facilitate reading of password files read by CGI scripts) 
     144         
     145        account: ua?synch 
     146                UNIX accounts under which UAA specific "style" elements are maintained  
     147                for test and preproduction EDIR/AUTHSERV. 
     148                        ~ua?synch/[TEST|PREP]/ 
     149 
     150                Note: Production "style" elements are copied from preproduction to the gateway  
     151                directories; no reliance on links. 
     152         
     153                .shosts file must allow access by  
     154                        <<directory servers>>   iplanet         # may become obsolete with gw ownership change 
     155                        <<directory servers>>   ldapgw 
     156                        <<ua? entities>> 
     157         
     158                member of group other (primary group) 
     159                member of group edirsynch (facilitate transfer of LDIF to uaasynch account) 
     160 
     161        group: iplanet   
     162                default group of iplanet account 
     163 
     164        group: ldapgw    
     165                default group of ldapgw account 
     166 
     167        group: updategw 
     168                group used by iplanet to expose files that must be visible to 'nobody'  
     169                (future) group used by sxldap to expose files that must be visible to 'nobody' 
     170                (owner of Apache processes) when executing update process CGI scripts 
     171 
     172 
     173        group: edirgw 
     174                group used by ldapgw to expose files that must be visible to 'nobody'  
     175                (owner of Apache processes) when executing gateway CGI scripts 
     176 
     177 
     178Registry Servers: 
     179 
     180        account: oracle 
     181                UNIX account owning oracle processes on registry servers where DBMS_FILE  
     182                is used in LDIF generation.  oracle owns resulting files and must change the  
     183                file permissions before files can be copied by the registry account. 
     184         
     185                member of group SWLDAP (facilitate change owner on EDIR LDIF) 
     186                <<and member of many other groups not applicable to EDIR processing>> 
     187         
     188        account: sxldap 
     189                UNIX account under which EDIR Banner Extract processing occurs and from  
     190                which registry generated LDIF originates.  All EDIR registry related source  
     191                code is stored under this account 
     192                        summit:~sxldap/local/ldap/ 
     193         
     194                sxldap must be listed in ~iplanet/.shosts file to facilitate transfer  
     195                and application of registry generated LDIF 
     196         
     197                member of group SWLDAP (primary group) 
     198                member of group UA_Korn 
     199 
     200        group: SWLDAP 
     201                group used to share output of registry database batch processes where output is  
     202                owned by oracle and written to /tmp 
     203         
     204 
     205ORACLE ACCOUNTS/ROLES 
     206===================== 
     207 
     208        account: OPS$SXLDAP 
     209                Oracle schema owning EDIR registry and performing EDIR Banner Extract 
     210                processing. 
     211         
     212                granted role CONNECT  
     213                granted role LDAP_ROLE (role to which oracle SYS privs are granted) 
     214         
     215                Note: Table grants are made directly to the OPS$SXLDAP account which  
     216                in turn creates objects referencing those accounts.  See the following 
     217                files on toklat:  
     218         
     219                        /ODS/product/PROD/bin/grant_*_to_sxldap.sql 
     220 
     221        account: EDIR_GATEWAY 
     222                Oracle schema granted execute and select privilege on OPS$SXLDAP owned  
     223                registry procedures and views. 
     224 
     225                granted role EDIR_ROLE 
     226 
     227        role: EDIR_ROLE 
     228                Oracle role to which ops$sxldap can grant privileges so that EDIR_GATEWAY 
     229                has access. 
     230 
     231                Note: Historically, all grants on OPS$SXLDAP objects are made to the  
     232                EDIR_GATEWAY via the SQL source scripts for creating the objects.  We haven't 
     233                been utilizing the role.  See summit:~sxldap/local/ldap/registry/*.sql 
     234 
     235         
     236############## 
     237CHANGE HISTORY 
     238############## 
     23920071031 elm    added section about oracle_[en|dis]able_updates.ksh scripts 
     24020081114 elm    added reference to credentials, roles, ACIs soon to be associated  
     241                with update back end under sxldap ownership rather than iplanet ownership 
     242 
     243(eof)