skip book previous and next navigation links
go up to top of book: HP OpenVMS Guide to System SecurityHP OpenVMS Guide to System Security
go to beginning of part: Security for the System AdministratorSecurity for the System Administrator
go to beginning of chapter: Securing a ClusterSecuring a Cluster
go to previous page: Overview of ClustersOverview of Clusters
go to next page: Synchronizing Authorization DataSynchronizing Authorization Data
end of book navigation links

Building a Common Environment  



Within a cluster, access control is mediated by individualnodes using a common set of authorization information. In the singlesecurity domain model, a process, acting on behalf of an authorizedindividual, requests access to a cluster-visible object, and a coordinatingnode determines the outcome by comparing its copy of the commonauthorization database with the security profile for the objectbeing accessed. This model enforces security only when the authorizationinformation and the object security profiles are consistent acrossall nodes in the cluster.

To achieve data consistency within the cluster, a site needsto:

Required Common System Files  

The easiest way to ensure a single security domain is to maintaina single copy of each of the files listed in System Files That Must Be Common in a Cluster on one or more cluster-mounted disks. As soon asany required file is created on one node, it must be created orcommonly referenced on all remaining cluster members. When a clusteris configured with multiple system disks, you can use system logicalnames to ensure that only a single copy of each file exists.

The files in System Files That Must Be Common in a Cluster contain data that must be synchronized. If your site choosesto maintain multiple versions of these files, you must synchronizethe data, as Synchronizing Multiple Versions of Files explains.

Table 1   System Files That Must Be Common in a Cluster
File Description
NETOBJECT.DAT
Contains the DECnet objectdatabase. Among the information contained in this file is the listof known DECnet server accounts and passwords.
NETPROXY.DAT NET$PROXY.DAT
Contains the network proxydatabase. This file is maintained by the Authorize utility (AUTHORIZE).
QMAN$MASTER.DAT
Contains the master queuemanager database. This file contains the security information forall shared batch and print queues. If two or more nodes intend toparticipate in a shared queuing system, a single copy of this filemust be maintained on a shared disk.
RIGHTSLIST.DAT
Contains the rights identifierdatabase. This file is maintained by AUTHORIZE and by various rightsidentifier system services.
SYSALF.DAT
Contains the system autologinfile. This file is maintained by the System Management utility (SYSMAN).
SYSUAF.DAT
Contains the system userauthorization file. This file is maintained by AUTHORIZE and modifiablethrough the Set User Authorization Information ($SETUAI) systemservice.
SYSUAFALT.DAT
Contains the system alternateuser authorization file. This file serves as a backup to SYSUAF.DATand is enabled through the SYSUAFALT system parameter.
VMS$OBJECTS.DAT
Contains the cluster-visible object database.Among the information contained in this file are the security profilesfor all cluster-visible objects.

Recommended Common System Files  

Although HP does not require that the files listed in System Files Recommended to Be Common be common to allcluster members, it does recommend that the data in the files befully synchronized. Using Multiple Versions of Required Cluster Files explainshow to coordinate these files and suggests possible consequencesof poor synchronization.

Some of the recommended files are created only on requestand may not exist in all configurations. Note that a file may beabsent on one node only if it is absent on all other nodes. As soonas any required file is created on one node, it must be createdor commonly referenced on all remaining cluster members.


Synchronizing Multiple Versions of Files  

Using shared files is not the only way of achieving a singlesecurity domain. Some sites may have requirements for multiple copiesof one or more of these system files on different nodes in a cluster.As long as the security information available to each node in thecluster is exactly the same, these sites operate in a single securitydomain.

Using Multiple Versions of Required Cluster Files lists the filesthat require coordination, explains when to update these files,and suggests possible consequences of poor synchronization.

Table 3   Using Multiple Versions of Required Cluster Files
File Coordination Required Result of Poor Synchronization
VMS$AUDIT_SERVER.DAT
Update afterany SET AUDIT command.
Possible partitioning ofauditing domains
NETOBJECT.DAT
Update allversions after any NCP SET OBJECT or DEFINE OBJECT command.
Unexplained network login failuresand unauthorized network access
NETPROXY.DATNET$PROXY.DAT
Update allversions after any AUTHORIZE proxy command.
Unexplained network login failuresand unauthorized network access
RIGHTSLIST.DAT
Update allversions after any change to any identifier or holder records.
Possible unauthorized system accessand unauthorized access to protected objects
SYSALF.DAT
Update allversions after any SYSMAN ALF command.
Unexplained login failuresand unauthorized system access
SYSUAF.DAT
Update allversions so the fields listed in Fields in SYSUAF.DAT Requiring Synchronization are synchronized for each user record.
Possible unexplained loginfailures and unauthorized system access.
SYSUAFALT.DAT
Update allversions after any change to any authorization records in this file.
Possible unexplained loginfailures and unauthorized system access
VMS$OBJECTS.DAT
Update allversions after any change to the security profile of a cluster-visibleobject or after new cluster-visible objects are created. (See Protecting Objects for details.)
Possible unauthorized accessto protected objects
VMSMAIL_PROFILE.DATA
Update allversions after any changes to mail forwarding parameters.
Possible authorized disclosureof information
VMS$PASSWORD_HISTORY.DATA
Update allversions after any password change.
Possible violation of thesystem password policy
VMS$PASSWORD_DICTIONARY.DATA
Update allversions after any site-specific additions.
Possible violation of thesystem password policy
VMS$PASSWORD_POLICY
Install common version onall nodes.
Possible violation of the system passwordpolicy


go to previous page: Overview of ClustersOverview of Clusters
go to next page: Synchronizing Authorization DataSynchronizing Authorization Data