cc/td/doc/product/rtrmgmt/cpc
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Administration

Administration

This chapter provides administration information for CPC. This includes the following:

Starting and Stopping CPC

The utility used to start, stop and control the Server processes is SYnpt.

usage:  SYnpt [ -s [ S C ] | -h | -r | -c | -q ]
 

where:

-sS--Starts the server part of the system.

-sC-- Starts the client part of the system.

-h-- Halts CPC if it is running.

-r-- Reconfigures CPC if it is running.

-c-- Displays the configuration variables and their values.

-q-- Queries the status of the system. If no option is specified, this is the default.

Server Startup and Shutdown

Manual Startup

Complete the following procedure to manually startup the CPC Server.


Step 1   Sign on to the admin account.

Step 2   Verify that Informix is running using the following Informix command:

dbaccess

Step 3   Start the Server:

SYnpt -sS
 

Manual Shutdown

Complete the following procedure to manually shutdown the CPC Server.


Step 1   Sign on as the admin account.

Step 2   Stop the Server:

SYnpt -h
 

This will also terminate all client applications.

Automating CPC Start-Up

It is recommended that you configure the CPC Server to start automatically when the Server host system is booted. After a successful Server installation, the S98Activator file will be created in the /opt/CPC/Server/mng/template directory--use this file as a template for your installation.


Note   Informix must be running before you start CPC. As well, if you are using the CORBA API provided with CPC, the CORBA daemon must be running before you start CPC.

Auto-Starting the CORBA Daemon

Complete the following procedure to auto-start the CORBA daemon.


Step 1   Login as the root account on the CPC Server host system.

Step 2   Copy the S97SYcorba file to the /etc/init.d directory:

cp /opt/CPC/Server/mng/template/S97SYcorba /etc/init.d
 

Step 3   Edit the /etc/init.d/S97SYcorba file and replace <Activator-login> with admin.

Step 4   Create start-up and shut-down links to /etc/init.d/S97SYcorba:

ln -s /etc/init.d/S97SYcorba /etc/rc2.d/S97SYcorba
ln -s /etc/init.d/S97SYcorba /etc/rc0.d/K97SYcorba
 

Auto-Starting the CPC Server (Without Informix)

Complete the following procedure if the Informix Server and the CPC Server do not run on the same host system:


Step 1   Login as the root account on the CPC Server host system.

Step 2   Copy the S98Activator file to the /etc/init.d directory:

cp /opt/CPC/Server/mng/template/S98Activator /etc/init.d

Step 3   Edit the /etc/init.d/S98Activator file and replace <Activator-login> with admin. The resulting file will resemble:

case $1 in
`start')
/bin/su - admin -c "\
          synptclean -s2 ; \
          SYnpt -sS"
  ;;
`stop')
  /bin/su - admin -c "\
         SYnpt -h ; \
         sleep 20"
  ;;
esac
exit 0

Step 4   Create start-up and shut-down links to /etc/init.d/S98Activator:

ln -s /etc/init.d/S98Activator /etc/rc2.d/S98Activator
ln -s /etc/init.d/S98Activator /etc/rc0.d/K98Activator
 

Auto-Starting the CPC Server (With Informix)

CPC's Server processes need to access the Informix database. Therefore, if the Informix Server and the CPC Server do run on the same host system, the Informix Server must be running before the CPC processes are started. In this case, complete the following procedure:


Step 1   Login as the root account on the CPC Server host system.

Step 2   Copy the S98Activator file to the /etc/init.d directory:

cp /opt/CPC/Server/mng/template/S98Activator /etc/init.d

Step 3   Edit the /etc/init.d/S98Activator file and replace <Activator-login> with admin and add lines to start and stop the Informix Server. The resulting file will resemble:

case $1 in
`start')
 
echo "Starting Informix Database"
/bin/su - informix -c "$INFORMIXDIR/bin/oninit"
sleep 60
 
/bin/su - admin "\
synptclean -s2 ; \
SYnpt -sS"
  ;;
`stop')
/bin/su - admin "c\
SYnpt -h ; \
sleep 20"
 
sleep 60
echo "Stopping Informix Database"
/bin/su - informix -c "$INFORMIXDIR/bin/onmode -ky"
 
  ;;
esac
exit 0
 

Step 4   Create start-up and shut-down links to /etc/init.d/S98Activator:

ln -s /etc/init.d/S98Activator /etc/rc2.d/S98Activator
ln -s /etc/init.d/S98Activator /etc/rc0.d/K98Activator
 


Table 5-1: Distribution Structure
Directory/File Function

docs

This directory contains the released documentation.

install

This directory contains all installation programs and archives.

scripts

This directory contains scripts to be used with CPC.

Manifest

This file contains version information which uniquely identifies a given release.

I
Table 5-2: Installed Structure
Directory/File Function

data

This directory maintains the internal CPC data files, such as those generated during the CR preparation phase (for example, configuration, activation, and control files).

log

This directory maintains CPC log files such as the Audit log.

mng

This directory maintains CPC management script files.

sys

This directory maintains CPC executable modules and registration files

user

This directory contains user files in the Client or combined installations only. This directory is empty in a Server only installation.

CPC Security

CPC security restricts access to the system to valid CPC users. For each valid CPC user, the CPC security system provides a mechanism to restrict what functions can be performed on which objects, based on the permissions and the security tags defined for each user.

To enforce security, an object which should not be globally accessible must be tagged. A tag is an attribute on the object whose value is used by the security system to restrict access to the object. Access is controlled to those Operators with then "same" security tags: those Operators have proper ownership of the object. An object can be defined with none, one, or two security tags. The two security tags that are supported by CPC are the MD (Management Domain) and VPN (Virtual Private Network).

CPC has a UNIX-based security system that uses a UNIX ASCII file to hold user information. CPC uses the UNIX user id as the CPC user id or username. For more information about creating users, refer to the chapter titled "Initial Installation". A CPC superUser is defined to have all UNIX file privileges and all CPC privileges in the default security file. Each user must be defined with explicit permissions to access specific MDs and/or VPNs. A user can be given access to multiple MDs and VPNs. In addition to names, MDs and VPNs can have two special tag values:

    1. The "*" tag matches all objects and is really the set of all tags.

    2. The "untagged" tag matches objects which are tagged with the "untagged" tag. A tag that has no assigned value is considered to be untagged. The value to represent the untagged value is configurable in the security file.


Note   If the MD or VPN is not specified for a specific permission, then it is defaulted with a value of "*". If an object has an untagged MD, then it is considered to be "not in any domain". If an object has an untagged VPN then it is considered to be in the "supply network".

Registration File

CPC has a security registration file in which an Administrator can define user roles, associate permissions with the roles, and then register users against the roles. The security rights are defined in the $CCP_REL/data/security/securityInfo file.

Permissions

CPC security supports the following permissions.


Table 5-3: Permissions
Permission Description and Supported Functions

Examine

Allows users to display but not modify configuration information.

Request

Allows users to create, modify, and
submit Transactions for approval.

Approve

Allows users to approve, re-approve, and reject Transactions.

Schedule

Allows users to abort, commit, delete, retry, and schedule Transactions.

Modify

Allows users to open a Transaction, perform all necessary modifications to the objects, not including profile objects, close the Transaction, and submit the Transaction.

Modify Profile

Allows users to perform all necessary modifications to profile objects, not including the objects to which they
profile.

User Permissions

Typically, an CPC system has three types of users: the Administrator, Operator, and Observer. They are normally defined as follows:

Administrator

An Administrator is given all rights to the CPC data. To create this user type, ensure that the security file contains the following type description in the USERTYPES BEGIN ... USERTYPES END section. If this is not present, add it anywhere within that section.

ActivatorAdministrator BEGIN
Examine domain/* vpn/*
Request domain/* vpn/*
Modify domain/* vpn/*
Approve domain/* vpn/*
Schedule domain/* vpn/*
ModifyProfile/* vpn/*
ActivatorAdministrator END

Modify the line for the user userid in the security file from:

userid superUser

to

userid ActivatorAdministrator

Operator

An Operator is given all rights to the CPC data except for the right to create/modify profiles. To create this user type, ensure that the security file contains the following type description in the USERTYPES BEGIN ... USERTYPES END section. If this is not present, add it anywhere within that section.

ActivatorOperator BEGIN
Examine domain/* vpn/*
Request domain/* vpn/*
Modify domain/* vpn/*
Approve domain/* vpn/*
Schedule domain/* vpn/*
ActivatorOperator END

Modify the line for the user userid in the security file from:

userid superUser

to

userid ActivatorOperator

Observer

An Observer is given only read privileges to the CPC data. To create this user type, ensure that the security file contains the following type description in the USERTYPES BEGIN ... USERTYPES END section. If this is not present, add it anywhere within that section.

ActivatorObserver BEGIN
Examine domain/* vpn/*
ActivatorObserver END

Modify the line for the user userid in the security file from:

userid superUser

to

userid ActivatorObserver

Restricting Security Permissions

The security specifications above allow a given user access to all MDs and VPNs for their specific security rights. These rights can be further limited to selected domains and/or networks by adding a new user type description with a unique name and then associating that userid with that type.

Within the type description, the domain and/or vpn specifications can be modified according to the following rules:

Management Domain

The MD tag is available for selected CPC objects. It allows the managed network to be partitioned into administrative domains which have different users assigned to each domain. domain/* matches all domains. It can be replaced with one or more specifications of the form domain/myDomain. myDomain is the specific domain name to which the permissions apply. The special domain name untagged means a domain which is given no value.

For example, to restrict the user op55 to be an Operator for the MD "west," the following type description should be added to the USERTYPES BEGIN ... USERTYPES END section of the securityInfo file. If this is not present, add it anywhere within that section.

westOperator BEGIN
Examine domain/west vpn/*
Request domain/west vpn/*
Modify domain/west vpn/*
Approve domain/west vpn/*
Schedule domain/west vpn/*
westOperator END

Modify the line for the user userid in the security file from:

userid superUser
 

to

op55 westOperator

Virtual Private Network

The VPN tag is available for selected CPC objects. It specifies the name of the customer that owns the object. VPNs provide logical groupings of network devices and resources. vpn/* matches all networks. It can be replaced with one or more specifications of the form vpn/myVpn. myVpn is the specific network name to which the permissions apply. The special network name untagged means a network which is given no value.

For example, to restrict the user op75 to be an Observer for the VPN "chicago," the following type description should be added to the USERTYPES BEGIN ... USERTYPES END section of the securityInfo file. If this is not present, add it anywhere within that section.

chicagoObserver BEGIN
Examine domain/* vpn/chicago
chicagoObserver END

Modify the line for the user userid in the security file from:

userid superUser

to

op75 chicagoObserver

Changing Informix Password

CPC stores its persistent data in an Informix database. Access to this database is controlled via authentication mechanisms implemented by Informix. Informix uses a two tier authentication system:

    1. A user must first be permitted to access the Informix database server, and

    2. A user must then have permissions to access and manipulate data within the CPC database.

In order to implement the first tier, Informix uses UNIX password mechanisms. Specifically, if a user needs access to an Informix database server, they must have log in permissions on the UNIX host on which that server is executing. The second tier is implemented through SQL commands issued when the CPC database is created.

CPC uses two distinct types of processes to access an Informix database server:

    1. Informix-supplied tools, such as dbaccess.

    2. Syndesis-written processes, such as SYCCSServer.

Each process type has differing password requirements.

Informix-Supplied Processes

These processes do not permit specification of a password on the command line or in an environment variable. Instead, Informix relies on UNIX mechanisms to provide authentication.


Step 1   If the process is already executing on the server host, then no further authentication is required or done.

Step 2   If the process is executing on a remote workstation, then one of two mechanisms is used:

For more details on the use of these files, contact your UNIX system administrator or review the hosts.equiv(4) manual page (execute man rhosts).


Syndesis-Supplied Processes

These processes obtain their password from an environment variable CCPPASSWORD and provide this during server login for authentication.

Changing Informix Database Server Password

The following describes the procedure for modifying the Informix server password for the CPC Administrator. In the text that follows, this user will be referred to as admin.


Step 1   Ensure that CPC is shut down.

Step 2   Change the password for admin on the UNIX server acting as the database server host. If NIS is in use in the network, this can be done from any host using yppasswd(1). Otherwise, log in as admin or root to the server host and use passwd(1).

Step 3   Verify the previous step by signing on as admin and executing dbaccess -ds. If the password has been correctly modified, then this will show a list of databases. Otherwise, the error `956: Client host or user (xxx@xxx) is not trusted by the server' will appear. This test should be done twice: once while logged onto a workstation and once while logged onto the database server.

Step 4   Log into the host running the CPC Server as admin. Edit the file /opt/cpc/serverInstall/mng/utility/syccpenvsetup- where serverInstall is the directory into which the server is installed. Find the line which sets the environment variable CCPPASSWORD and change the password. On completion, the line will appear as:

CCPPASSWORD=newPassword

where newPassword is the new password. If this contains the " character then these should be preceded by a \ character.

Step 5   Restart CPC to verify that the password change has been correctly done.



hometocprevnextglossaryfeedbacksearchhelp
Posted: Thu Aug 3 16:37:08 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.