Changes between Initial Version and Version 1 of LDAP_acct_mgmt


Ignore:
Timestamp:
02/04/15 17:10:01 (10 years ago)
Author:
lttoth@…
Comment:

--

Legend:

Unmodified
Added
Removed
Modified
  • LDAP_acct_mgmt

    v1 v1  
     1= EDIR Account Management Processes and Associated Utilities = 
     2 
     3== Account Creation == 
     4Creating an account generates a new EDIR LDAP record. 
     5 
     6        REGISTRY: EDIR Banner Extract (includes restore of previously purged entities) 
     7 
     8                employees with active assigments 
     9 
     10                students with current or preenrolled credit hours 
     11 
     12        AUTHSERV: Sponsor Account Page 
     13 
     14                Banner entities with recorded SSN not qualifying for EDIR Banner Extract 
     15                (seed information must tie to Banner on SSN and birth date; 
     16                 identical input ties to only one or no Banner entities,  
     17                 if multiples matches found, no EDIR record is created) 
     18 
     19                guest accounts 
     20                (seed information never tied to Banner;  
     21                 identical input generates multiple unique guest accounts) 
     22 
     23        Note: Birth date being added to matching criteria.  Currently matching to Banner only on SSN. 
     24 
     25 
     26== Account Activation == 
     27 Account activation establishes a default password, i.e., the presence of password signifies an "active" account. 
     28 
     29        Note: EDIR accounts are created **with out** passwords because we have not had the opportunity  
     30        to create a robust account claiming page based on highly privileged information only the user  
     31        is likely to know.  Our "First Time" login page (sometimes refered to as account claiming)  
     32        requires only that you know the users identifier (UID, UAUsername or UAUserID), last 4 of ssn  
     33        and birth date.  Those pieces of information are readily available to many people. 
     34 
     35        AUTHSERV/EDIR: Bulk Update Page 
     36 
     37                activate and silent activate functions 
     38                (activate establishes default password only if password *not* already present) 
     39 
     40                reset and silent reset functions (including "trusted" form of function) 
     41                (reset establishes default password whether or not password already present) 
     42                (trusted reset clears password history first) 
     43 
     44        Notes:  
     45        1) The "silent" functionality was for UAA which did not want it's users receiving AUTHSERV/EDIR 
     46        notifications.  The non-silent versions will, under the appropriate circumstances, notify the  
     47        user of the account activation or password reset. 
     48 
     49        2) The "trusted" functionality was implemented in support of support of (MAU)->AUTHSERV  
     50        password synchronization (see Password Synchronization below). 
     51 
     52        AUTHSERV: Account Activation Page 
     53 
     54                calls bulk update page for noisy activate function 
     55 
     56        AUTHSERV: Password Reset Page 
     57 
     58                calls bulk update for noisy reset function 
     59 
     60 
     61== Account Inactivation ==  
     62IInactivating an account removed passwords, so the absence of passwords signifies an "inactive" account). 
     63 
     64        AUTHSERV/EDIR: Bulk Update Page 
     65 
     66                purge attribute function for userPassword 
     67                (removes userPassword, making account "inactive") 
     68 
     69        AUTHSERV: Account Activation Page 
     70 
     71                calls bulk update to purge userPassword 
     72 
     73 
     74== Account Claiming == 
     75EDIR, unlike ELMO, has the notion of claiming an account by changing the password from default to a user chosen password..   
     76 
     77        AUTHSERV: First Time Login Page 
     78 
     79                calls bulk update update function with default and new userPassword values 
     80                (must successfully answer weak challenge questions) 
     81 
     82        Note: See note concerning Account Activation. 
     83 
     84        AUTHSERV: Log In with Password Change Page 
     85 
     86                calls bulk update update function with old (default) and new userPassword values 
     87 
     88 
     89== Account Locking/Unlocking == 
     90 
     91        AUTHSERV: Account Lock Page 
     92        AUTHSERV: Administrative Lock Page 
     93 
     94                both call bulk update lock/unlock function  
     95                (executes iPlanet ns-[in]activate script which enables/prevents directory BINDs; 
     96                 writes/removes accountStatusFlag attribute value indicating type of lock) 
     97 
     98                        accountStatusFlag=L     (regular lock) 
     99                        accountStatusFlag=AL    (admin lock) 
     100 
     101        Note: Only individuals with EDIRadmin role can add/remove administrative locks.  The  
     102        reason for the 2 types of locks originates from ZUAUSR in which a user might request his  
     103        account be locked (as during sabatical - regular lock) or an administrative security  
     104        action might be taken (prevent the user from having Oracle/UNIX access - admin lock).   
     105 
     106 
     107== Password Resets == 
     108 
     109        AUTHSERV: Password Reset Page 
     110 
     111                calls bulk update for noisy reset function 
     112 
     113        AUTHSERV: Self Reset Page 
     114 
     115                calls bulk update for noisy reset function 
     116                (must successfully complete private challenge/response dialog) 
     117 
     118 
     119== Password Changes == 
     120 
     121        AUTHSERV: First Time Login Page 
     122        AUTHSERV: Post Reset Login Page 
     123 
     124                calls bulk update update function with default and new userPassword values 
     125                (must successfully answer weak challenge questions) 
     126 
     127        Note: See note concerning Account Activation. 
     128 
     129        AUTHSERV: Log In with Password Change Page 
     130 
     131                calls bulk update update function with old (default) and new userPassword values 
     132 
     133 
     134== Password Expiration Warning == 
     135 
     136        AUTHSERV: (following successful authentication - MAU "style" specific behavior) 
     137 
     138        REGISTRY: Account Management Process  
     139 
     140        looks for passwords about to expire and unclaimed accounts  
     141        (unclaimed: default password present 14 days after default password established) 
     142        sends email warning, if mailRoutingAddress present, 14, 7, 3 and 1 days prior to password expiration 
     143        calls bulk update purge function to inactivate (delete userPassword for) unclaimed accounts 
     144 
     145== Directory Purges == 
     146 
     147        REGISTRY: Directory Purge Process 
     148 
     149        generates ldapdelete statements to drop the directory records for registry records with  
     150        a record state of "BAD" or "INACTIVE"  
     151         
     152 
     153        Note: EDIR registry "record state" and EDIR directory account state are two different things. 
     154        Registry record state is used to regulate account lifecyle.  EDIR account state indicates  
     155        whether or not a password is present and if the user is allowed to BIND to the directory. 
     156 
     157 
     158== Password Syncronization == 
     159Formerly, password synchronization occurred when via a password push received clear text value for new password.  ELMO now handles all Banner active accounts.  The AUTHSERV interface manages guest passwords, only. 
     160 
     161        UAA->AUTHSERV  
     162        UAS(ELMO)->AUTHSERV  
     163 
     164                UAA and UAS have been granted resource credentials with helpDesk, passwordSync and twoStepBind  
     165                EDIR roles.  These credentials and their administrative access are used to push their MAU specific  
     166                password down to our directory. 
     167 
     168                The password push is a three step process: 
     169 
     170                1) Resource credentials are used to reset userPassword to it's default value.  This is done  
     171                by calling the bulk update trusted reset function.  During a trusted reset, passwordHistory  
     172                is cleared to insure differences in recorded historys do not prevent the directory from  
     173                accepting an otherwise good password. 
     174 
     175                2) Resource credentials are used to look up defaultPassword which is used in step 3. 
     176 
     177                3) The account holder's credentials (UID and defaultPassword) are used during call to the  
     178                bulk update update function with old (default) and new userPassword values. 
     179 
     180 
     181        AUTHSERV->UAS(ELMO) 
     182 
     183                UAS has created a restricted access web page that can be called to push a new directory  
     184                password to UAS.  AUTHSERV calls this web page only on completion of a successful password  
     185                *change* and only if the change request does not originate from the UAS->AUTHSERV password  
     186                process.  The call to the UAS web page is "blind"; we don't care if it fails and no status  
     187                is returned to the end user. 
     188 
     189                Since all password changes (not resets) must be made as the account owner, we could not use  
     190                the UAS resource credentials to identify when the UAS push process had originated the request. 
     191                Instead, UAS has provided us with an IP/domain list to exclude from AUTHSERV->UAS password  
     192                synchronization.  Requests originating from those IPs/domains are assumed to have originated 
     193                from the UAS(ELMO)->AUTHSERV synchronization.  This prevents us from getting into a password 
     194                change loop. 
     195 
     196                The AUTHSERV->(MAU) push process is designed to be extensible and so is parameter driven.   
     197                The password push to UAS can be modified by editing UAS specific configuration parameters in  
     198                "e":~ldapgw/AUTHPROD/config/runtime.cfg.  Likewise, a push to UAA could be implemented by  
     199                adding UAA specific configuration parameters to the same config file. 
     200 
     201                Note: The runtime.cfg file resides on each "e" box.  AUTHSERV->(MAU) password push parameters  
     202                must be added to runtime.cfg on every "e" box. 
     203 
     204########################################################[[br]] 
     205LEGACY CHANGE HISTORY - NOTE: All subsequent changes are recorded in TracWiki[[br]] 
     206########################################################[[br]] 
     207 
     20820081028 elm    Expanded on processes for disabling updates particularly since change that allows userPassword, uakSecQuestion and uakSecResponse updates to bypass the registry.[[br]] 
     20920081031 elm    corrected typos 
     21020070815 sxelm updated to include password synchronization 
     21120070814 sxelm original doc