|
|
Essentials provides two levels of security:
This appendix describes Essentials security, and contains the following sections:
There are two aspects of Essentials server security:
Essentials uses the security mechanisms of the UNIX system to protect the code and data files that reside on the server.
The Essentials server provides the following security mechanisms:
To maximize the effectiveness of the Essentials server security, follow these UNIX system administration guidelines:
Essentials provides application level security that allows the Essentials administrator to dictate which applications an Essentials user can access. Essentials provides this security through a set of five built-in roles:
Each role allows access to a predetermined set of applications, tools and product features. Refer to the Essentials online help for a detailed chart showing the relationship of user role to application functionality.
When you create an Essentials login (every Essentials user must log in to the application to use its features), you assign one or more roles to the login. The role or combination of roles dictates which of the Essentials applications are available to the user in the Essentials navigation tree (refer to "Setting Up Essentials" for an explanation of the navigation tree).
Only the system administrator user can assign roles to Essentials logins. Essentials users can use the administrative tools to change their own password or other aspects of their login.
Essentials comes with two predefined logins:
It is highly recommended that you change all of the passwords for these predefined logins immediately after installation. Unless you want to allow everyone read-only access to Essentials, change the guest login password to something other than the default null string.
To prevent someone from typing a full path to an Essentials URL in an attempt to avoid the security system, Essentials applications will only run in the presence of an authenticated session between the server and client. The session is authenticated as a part of the login process so any attempt by a user to avoid the login by going directly to a URL will fail and the user will be returned to the Essentials Login Manager dialog box. The Essentials desktop terminates a login session after a period of no use. When this termination happens, the next operation that the user performs will return them to the Login Manager dialog box.
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Sep 30 10:06:49 PDT 1999
Copyright 1989-1999©Cisco Systems Inc.