Changes between Initial Version and Version 1 of ALL__security_account_admin


Ignore:
Timestamp:
11/20/14 14:53:57 (10 years ago)
Author:
lttoth@…
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • ALL__security_account_admin

    v1 v1  
     120081103 elm          Directory Account Administration 
     2 
     3See also: 
     4 
     5        https://donnelly.alaska.edu/docs/LDAP/ALL__security 
     6        https://donnelly.alaska.edu/docs/LDAP/ALL__security_access_control 
     7 
     8The Enterprise Directory is utilized not just as an electronic white pages, it  
     9is also utilized to authentication and in some cases authorize user access to  
     10external applications.  The EDIR and AUTHSERV web gateways, MyUA and OnBase are  
     11examples of external applications relying on directory authentication and  
     12authorization. 
     13 
     14Directory records that can be used for authentication/authorization are those  
     15associated with people or applications.  Records for people and applications  
     16differ from other directory records in that they have passwords used in binding  
     17to the directory (the ability to bind successfully to the directory results in  
     18successful authentication).  People and application records reside in branches  
     19of the directory clearly identifiable ou= in the RDN: 
     20 
     21        uid=*,ou=people,dc=alaska,dc=edu 
     22        uid=*,ou=resource,dc=alaska,dc=edu 
     23 
     24Because ou=people and ou=resource directory records can be used for directory  
     25authentication, they are often referred to as "accounts". 
     26 
     27Additional branches of the directory exist to store other directory records  
     28but those records are not associated with passwords and can not be used to  
     29bind to the directory: 
     30 
     31        uid=*,ou=routing,dc=alaska,dc=edu 
     32        uid=*,ou=departments,dc=alaska,dc=edu 
     33        uid=*,ou=group,dc=alaska,dc=edu 
     34 
     35 
     36###################### 
     37## Account Creation ## 
     38###################### 
     39 
     40# ou=people 
     41 
     42Accounts for people are created via one of two mechanisms; the EDIR Banner Extract  
     43process and the AUTHSERV sponsor_account CGI script/web page.  The vast majority  
     44of people accounts originate from the Banner Extract and/or are tied to Banner  
     45entities.  However, the web page for sponsoring accounts allows for the creation of  
     46"guest" accounts; accounts that do not correspond to any Banner entity. 
     47 
     48Account sponsorship (including guest account creation) is ultimately performed at  
     49the update back-end and only after first confirming that the requesting party is  
     50entitled to sponsor accounts. 
     51 
     52# ou=resource 
     53 
     54Accounts utilized by applications are created only via the AUTHSERV seed_resource CGI 
     55script/web page.  Ultimately it is the update back-end which generates the resource  
     56account after first confirming that the requesting party is entitled to request  
     57resource account creation.. 
     58 
     59 
     60##################################### 
     61## Account Activation/Inactivation ## 
     62##################################### 
     63 
     64# ou=people 
     65 
     66The presence of a password signifies that an account is active.  Prior to the advent 
     67of ELMO, a directory account could not be claimed, and user known password established, 
     68unless the account had first been activated (given a default password).  With the  
     69advent of ELMO, an account need no longer be activated prior to claiming.  However, it  
     70is still true that the old AUTHSERV form for account claiming - first_time - is  
     71dependent on prior account activation. 
     72 
     73Accounts for people generated via the EDIR Banner Extract are created inactive.   
     74Those accounts are claimed and given a user known password via the UAS written and  
     75maintained ELMO interface: 
     76 
     77        https://elmo.alaska.edu 
     78 
     79Accounts for people generated via the AUTHSERV sponsor_account page are activated on  
     80creation (i.e. given a default password).  The reason is based on the historical need  
     81for an account to be activated before it could be claimed and the fact that accounts  
     82being sponsored were expected to be claimed for the purpose of accessing external  
     83applications.  
     84 
     85        https://authserv.alaska.edu/cgi-bin/sponsor_account 
     86 
     87For the most part, these accounts too can be claimed via ELMO.  However, there are known  
     88issues with claiming guest accounts via ELMO and those users are directed to use the old  
     89AUTHSERV first_time page as an alternate method of account claiming: 
     90 
     91        https://authserv.alaska.edu/cgi-bin/first_time 
     92 
     93Accounts can be activated/inactivated by authorized staff using the AUTHSERV activate  
     94CGI script/web page. 
     95 
     96        https://authserv.alaska.edu/cgi-bin/activate 
     97 
     98In addition, a nightly batch process looks for an inactivates directory accounts  
     99previously activated but still unclaimed after 14 days. 
     100 
     101        ~iplanet/local/ldap/scripts/account_managementProd.ksh 
     102 
     103# ou=resource 
     104 
     105Application accounts are created inactive via the AUTHSERV seed resource CGI script/ 
     106web page. 
     107 
     108        https://authserv.alaska.edu/cgi-bin/seed_resource 
     109 
     110An individual with shell access to the "e" boxes must activate application accounts  
     111by generating and running a script that establishes a known password (using Directory  
     112Manager credentials) and then changes that known password using the application account  
     113credentials.  The same scripts are used to reset an application account password  
     114should the password expire or be forgotten.  For that reason, the scripts are named  
     115with a reset_ prefix. 
     116 
     117See ~iplanet/local/ldap/schema/RESET/ for examples of those scripts. 
     118 
     119NOTE: Application account passwords are set initially to expire in 2020.   
     120 
     121 
     122############################# 
     123## Password Changes/Resets ## 
     124############################# 
     125 
     126# ou=people 
     127 
     128Account passwords for most people can be changed via the ELMO interface.  This is  
     129true whether the password is active or has expired, is known or is unknown.  As  
     130stated earlier about account claiming, some guest accounts will be unsuccessful  
     131utilizing ELMO and will be directed to the old AUTHSERV password change or self  
     132reset CGI scripts/web pages: 
     133 
     134        https://authservtest.alaska.edu/cgi-bin/passwd_chg 
     135        https://authservtest.alaska.edu/cgi-bin/self_reset 
     136        https://authservtest.alaska.edu/cgi-bin/post_reset 
     137 
     138When using the old AUTHSERV pages, the user either changes a known password or resets an  
     139unknown/expired password.  When reset, passwords are set to a default value based on a  
     140number and date (generally SSN and birthdate) supplied to the account creation process.   
     141The post reset page prompts for that number and date and allows the user to establish a  
     142new password. 
     143 
     144# ou=resource 
     145 
     146Application account passwords can be changed by the account holder only by using the old  
     147EDIR change_passwd CGI script/web page.  Application account password changes result in a  
     148standard 400 day expiration, not the 2020 expiration established when the account is first  
     149activated.  It is the application account holder's responsibility to insure the password  
     150is changed before expiration.   
     151 
     152There is currently no mechanism by which an application accounts can perform a self reset  
     153should a password expire or become forgotten.  Expired application account passwords must  
     154be reset/changed by an individual with shell access to the "e" boxes where the "reset_"  
     155scripts are maintained. 
     156 
     157 
     158##################### 
     159## Account Locking ##  
     160##################### 
     161 
     162# ou=people  
     163 
     164Accounts for either people or applications can be locked via the AUTHSERV lock and  
     165administrative lock CGI scripts/web pages: 
     166 
     167        https://authservtest.alaska.edu/cgi-bin/lock 
     168        https://authservtest.alaska.edu/cgi-bin/admin_lock 
     169 
     170The difference between the two lock types is in the privilege necessary to add or remove  
     171the lock.  Any one with the HelpDesk or EDIRadmin EDIRrole grants may establish or remove  
     172a normal lock.  Only people with the EDIRadmin EDIRrole grant may establish or remove  
     173an administrative lock.  The type of lock can be identified by the accountStatusFlag 
     174attribute: 
     175 
     176        accountStatusFlag=L     (regular lock, writable by HelpDesk or EDIRadmin EDIRrole) 
     177        accountStatusFlag=AL    (administrative lock, writable by EDIRadmin EDIRrole) 
     178 
     179Administrative locks are most likely placed on an account in the advent of a security action  
     180which results in the immediate suspension of account access. 
     181 
     182# ou=resource 
     183 
     184Existing forms for locking accounts were designed to support locking of people accounts  
     185and do not currently support the locking of application accounts. 
     186 
     187####################### 
     188DOCUMENT CHANGE HISTORY 
     189 
     19020081031 elm    corrected typos 
     19120081103 elm    added "See also:" section with links to other security related docs 
     192 
     193# eof