role-based access Control in Aix, part 1th

Source: Internet
Author: User

Introduction: In this series of articles, we will introduce you and discuss with you the relevant content of role-based access control (role Based access controls). As a new security feature of AIX 6, RBAC provides users with fine-grained, more flexible security management methods. This article is excerpted from the IBM Red Book "AIX V6 Advanced security Features Introduction and Configuration."

AIX V6 and role-based access control (RBAC)

AIX V6 introduces enhanced RBAC, which is the way to delegate roles and authorizations to one or more ordinary user accounts.

RBAC allows system administrators to delegate certain tasks to ordinary users, and the traditional practice is that these tasks are performed by root or through Setuid/setgid.

One of the advantages of RBAC is that you can reduce the use of the Setuid/setgid program as much as possible by restricting the permissions assigned to a command (only the permissions necessary for the command to perform its tasks).

There is no specific installation package for legacy or Enhanced mode RBAC in the AIX V6. Most of the enhanced RBAC commands are included in the Bos.rte.security file set.

The following sections introduce and discuss in depth the components included in enhanced RBAC.

The traditional AIX management approach

Here, we'll introduce the traditional AIX management approach, as well as some of the tools for that purpose.

Super User admin Account

In the AIX operating system, the traditional privilege management approach relies on a single system administrator account named Root. We use the root account as a superuser because the root user account is authorized to perform all of the privileged system administration tasks in the AIX system. Typically, the user ID/uid of the root user is specified as 0.

Relying solely on a single superuser to complete all aspects of system management will create problems in the separation of management responsibilities. Although you can use only one administrative account in some business environments, many environments require multiple administrators, each of whom is responsible for performing different tasks.

If you use only one administrative account, you may need to share the role of using superuser among two or more system administrators. In some environments, the shared management approach may compromise the business audit guidelines in situations where you need to focus all of the privileged system administration tasks on a single individual.

An alternative to sharing the superuser role is to create another user with the same UID as the root user.

From a security standpoint, regardless of either of these approaches, there are a variety of problems that can arise because each administrator is granted full control of the system. There is no way to limit the actions that any given administrator can perform. Because the root user is the most privileged user, the user may perform unauthorized operations and remove any audit information for those activities, so it is almost impossible to track their management operations.

Discretionary access control (DAC)

Autonomous access Control (DAC) is a security feature that is controlled by the owner of a file or directory.

In AIX, the DAC can be implemented using the methods of the owner/group/other user and read/write/execute traditional file object permission bits.

By using the File object permission bits, each user can determine whether another user or group needs to access data in a particular file object. The DAC usually needs to understand the relevant standards and grant permissions or deny access accordingly. This type of access is based on the UID and GID to which the user belongs. All file system objects have relevant permissions to describe the access rights of the owner, group, and other users.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.