[an error occurred while processing this directive]
HP OpenVMS Systems Documentation |
HP DECwindows Motif for OpenVMS
|
Previous | Contents | Index |
Enabling access control outside of a DECwindows Motif desktop session allows authorized OpenVMS users to run client applications on systems without a login process. This type of access control is used typically for systems that function as a standalone X display server, rather than an interactive DECwindows Motif workstation.
Use the server customization parameters and either the access allowed
file or X authority file to set access control.
3.3.6.2 Applying Access Control to Connections Inside a Desktop Session
Use the Security Options dialog box to set the access control scheme in effect inside a DECwindows Motif session. The options in the dialog box enable you to set the access control scheme used by the local X display server, to authorize other users access to the display server, and to specify the scheme local client applications use when connecting to a display server.
Accessed from the Session Manager (Traditional Desktop) or Style Manager (New Desktop), the settings in the Security Options dialog box are identical. Note, however, that each desktop stores the settings differently:
The following sections describe how to apply user-based access control to server connections outside and inside a desktop session.
Note that user-based access control over the TCP/IP Services transport uses the getnameinfo function to obtain the name of the peer system and matches this value against the values supplied by the user. If the address is an IPv4-mapped IPv6 address, the getnameinfo is called using the AF_INET family and the IPv4 address extracted from the IPv4-mapped IPv6 address. Otherwise, the getnameinfo function is called with AF_INET6 and the IPv6 address. IPv4 connections that fail reverse name translation are represented in IPv4 format. All other connections that fail reverse name translation are represented in IPv6 format.
If the address used is link local, a scope identifier is included in the string returned by the TCP/IP Services getnameinfo function. The server matches this against a host name in the authorized users list regardless of whether the enter contains a scope identifier or not. For example, a returned value of test12i6%WE1 matches either test12i6%WE1 or test12i6.
For Server Connections Outside a Desktop Session
To apply user-based access control to server connections made from outside of a DECwindows Motif session, do the following:
Authorizing TCPIP host connections to an X server using an access allowed file entry provides unauthenticated access to a DECwindows Motif system. This could leave the system vulnerable to unwanted intrusion, Denial of Service (DoS) attacks, and possible data loss. To ensure the proper level of system security, HP strongly recommends that a token-based scheme (such as Magic Cookie or Kerberos) be used to authorize remote access to an X server over TCP/IP. Not only do these schemes provide greater system protection, they also allow you to grant (or deny) access on a per-user basis. |
$ DECW$SERVER_ACCESS_ALLOWED == "SYS$MANAGER:DECW$SERVER1_ACCESS_ALLOWED.DAT" $ DECW$SERVER_ACCESS_TRUSTED == "SYS$MANAGER:DECW$SERVER1_ACCESS_TRUSTED.DAT" |
DECNET ZEPHYR JONES LOCAL 0 JONES . . . |
TCPIP ZEPHYR * . . . |
For Connections Inside a Desktop Session
To apply user-based access control to server connections made from inside a DECwindows Motif desktop session:
To disable user-based access control, you must remove all users from the Authorized Users list.
To remove a user name, first click on the names you want to remove.
Then click on the Remove button. Finally, click on OK or Apply. The
users will no longer have authorized access to the system.
3.3.8 Enabling Magic Cookie Access Control
The following sections describe how to apply Magic Cookie access control to server connections outside and inside a desktop session.
For Connections Outside a Desktop Session
To apply Magic Cookie access control to server connections made from outside of a DECwindows Motif session, do the following:
$ DECW$SERVER_XAUTHORITY == "SYS$MANAGER:SERVER_ZEPHYR.DECW$XAUTH" |
$ XAUTH -f SYS$SYSROOT:[SYSMGR]SERVER_ZEPHYR.DECW$XAUTH ADD - _$ :0 MIT-MAGIC-COOKIE-1 12345abcdef56789 |
For Connections Inside a Desktop Session
To apply Magic Cookie access control to server connections made from inside of a DECwindows Motif session, do the following:
To disable Magic Cookie, deselect the Magic Cookie option and click OK or Apply.
To prevent other users from accessing the current session using the current cookie value, click on the Create Cookie button. The new cookie value is added to your default X authority file.
Any client applications that are connected to the X display server when a new cookie is generated will remain connected. Authentication occurs only during the initial connection to the server. |
In order to enable Kerberos, you must first have performed the following on the server system:
The following sections describe how to apply Kerberos access control to server connections outside and inside a desktop session.
For Connections Outside a Desktop Session
To apply Kerberos access control to server connections made from outside of a DECwindows Motif session, do the following:
$ KERBEROS/INTERFACE=DECWINDOWS/ADMIN |
x0/system@ORG.COMPANY.COM |
$ DECW$SERVER_XAUTHORITY == "SYS$MANAGER:SERVER_ZEPHYR.DECW$XAUTH" $ DECW$SERVER_ACCESS_ALLOWED == "SYS$MANAGER:DECW$SERVER_ZEPHYR_ACCESS_ALLOWED.DAT" $ DECW$SERVER_ACCESS_TRUSTED == "SYS$MANAGER:DECW$SERVER_ZEPHYR_ACCESS_TRUSTED.DAT" |
$ XAUTH -f SYS$SYSROOT:[SYSMGR]SERVER_ZEPHER.DECW$XAUTH - _$ ADD :0 MIT-KERBEROS-5 - _$ """CS:X0,SYS$SYSROOT:[SYSMGR]DECW$X0.KEYTAB""" |
* SYSTEM 0 |
KERBEROS jones@ORG.COMPANY.COM ALL . . . |
For Connections Inside a Desktop Session
To apply Kerberos access control to server connections made from inside of a DECwindows Motif session, do the following:
To disable Kerberos, deselect the Kerberos option, remove all principals from the list, and click OK or Apply.
To prevent one or more principals from accessing your session, first click on the name(s) you want to remove. Then click on the Remove button. Finally, click on OK or Apply. The principal will no longer have authorized access to your workstation.
If you believe the current ticket has been compromised, you can deny
access to your session and force principals to repeat the login and
authentication process by clicking on the Revoke Ticket button.
3.3.10 Using the Security Extension
The Security extension (SECURITY) enables you to manually generate authorization keys using the xauth utility or the SET DISPLAY/GENERATE command. This allows you to specify one of the following additional attributes to apply to a server connection:
Client applications that have not been coded to allow for use over an untrusted connection may behave unexpectedly. See the specification for the Security extension from the X.Org Foundation for a description of the limitations of an untrusted connection. |
To enable the Security extension, modify the SYS$MANAGER:DECW$PRIVATE_SERVER_SETUP.COM file and redefine the DECW$SERVER_EXTENSIONS parameter so that it includes a value of "SEC_XAG." For example:
$ decw$server_extensions == "SEC_XAG" |
Save the file and restart the server.
3.3.10.2 Using the Security Policy File
The security policy file enables you to configure the server to allow certain actions (at the X atom level) to be performed over untrusted network connections. This file establishes one or more site policies that specify the set of allowable actions through a series of field definitions.
A sample file has been provided with DECwindows Motif and is located in DECW$EXAMPLES:DECW$SECURITY_POLICY.TXT. Use this file as a template when creating a policy file. Security policies are described in the Security Extension Specification published by the X.Org Foundation. Refer to this specification for details regarding the use and definition of security policies.
To establish a security policy file on a DECwindows Motif system, do the following:
Multihead systems enable you to connect multiple monitors to a system
to form a single display. The following sections describe the system
setup prerequisites and the supported methods for configuring multihead
systems.
3.4.1 System Setup
Before setting up a multihead system, you must first do the following:
If you install multiple video cards on a system without disabling VGA services on all but one of the cards, all of the cards will compete for control of the video subsystem at boot time, resulting in possible system damage. |
The DECW$PRIVATE_SERVER_SETUP.TEMPLATE file includes the following command to set up your system for multihead use:
$ IF DECW$DEVICE_COUNT .GT. 1 THEN DECW$MULTI_HEAD == 1 |
The template file is located in the SYS$MANAGER directory. To invoke
multihead support, copy the template file to
SYS$MANAGER:DECW$PRIVATE_SERVER_SETUP.COM. Editing of this file is not
needed.
3.4.3 Configuring a Multihead System Using XINERAMA
The Xinerama extension (XINERAMA) enables you to connect multiple monitors to a single system running to create a unified virtual display. In contrast to simple multihead systems, XINERAMA provides control over the arrangement of the screens and desktop. You can customize the number, order, and configuration of each screen in the display, and you can drag windows and text from screen to screen on the desktop.
The following sections describe how to configure a multihead system
using XINERAMA.
3.4.3.1 Hardware and Configuration Requirements
XINERAMA is supported only in a homogeneous graphics environment. Each multihead configuration must consist of common video cards, bit depths, visual classes, screen resolutions, and monitors of a similar size. The monitors must also be arranged into a rectangle--without gaps in between.
See the HP DECwindows Motif for OpenVMS Software Product Description for a list of the currently supported video graphics cards; see Section 3.1.2.4 for a description of the logicals you can use to change the default values for these graphics settings.
The display server supports up to 16 monitors in a multihead configuration. Note that the actual number of monitors you can use may be further limited by the number of available option card slots.
Previous | Next | Contents | Index |