Previous PageNext Page

Chapter 8 - Managing User Security

Overview of Login Security

Password length and life
Forced change of password when password expires
Users' ability to change their passwords and user profiles
Types of workstations from which users can log in
Maximum number of simultaneous logins
Login times
Forced logout
Login locations

Managing user profiles
Changing user passwords
Enabling and disabling user names
Deleting users
Adding nicknames
Changing user descriptions
Changing the expiration date for user names

General Login Security Rules

Do not assign any settings. The Security Service assigns all users the default. See the next section, "Accepting Default Settings," for a complete description of the default settings.

Customize settings for each group. These settings become defaults for all the users in the group. You do not have to enter all the login security settings. The settings you do enter override the corresponding default settings. For those settings you do not enter, the default settings remain in effect.

Customize settings for each user. As with group settings, you do not have to enter all of the settings. The ones you enter override the corresponding group or default settings. For those you do not enter, the group or default settings remain in effect.

Accepting Default Settings

Table 8-1. Default Security Settings

Setting Default

 Minimum length of passwords (in characters)

 Password life (in number of weeks)

 Maximum number of simultaneous logins allowed per user

 Force user to change password on expiration

 Allow user to edit own profile

 Allow user to change own password

 Confine user logins to particular types of workstations (DOS1, OS/2,  Macintosh)

 Confine user logins to specific days and times of the week

 Request user to log out or log user out forcibly if user is logged in at an  unauthorized time

 Confine user logins to specific locations in the network (servers, server  links, and workstations)

1 The DOS option includes Windows workstations.

 No minimum

 Never expires

 Unlimited

 No

 Yes

 Yes

 Allows user to log in from any type of workstation

 Allows logins on all days at all times

 Request user to log out

 Allows user to log in from any location on the  network 

Customizing Security Settings

Example Customizing User Security

Figure 8-1. User Login Security Settings Worksheet Sample

Accessing Security Settings Menus

1. In the right pane, right-click the user or group whose security setting you want to modify, and select Properties from the shortcut menu. The property sheet appears.

2. Click the Password, Login Restriction, or Login Times tab.

Note: To access the security settings menu for a group, right-click the group in the right or left pane and select Properties from the shortcut menu.

1. Enter MGROUP or MUSER.

2. Choose the name of the group or user whose security settings you want to modify.

For a shortcut, enter MGROUP groupname or MUSER username at the system prompt. For groupname, enter the StreetTalk name of the group you want to manage, and for username, enter the StreetTalk name of the user you want to manage.

3. At the next menu, choose either MANAGE security for group (MGROUP), or SECURITY settings (MUSER).

4. When the Security Settings menu appears, choose the appropriate option for the security settings you want to modify.

User-specific
Group
None (the Security Service defaults)

Managing Password Security

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Click the Password tab.

3. Enter the appropriate information for each field.

4. Click Apply.

Preventing User Changes

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Click the Password tab.

3. Select Edit own login profile or Change own password, or both.

4. Click OK to save the changes.

1. At the Security Settings menu, choose Prevent User Changes.

2. At the Prevent User Changes screen, type Y or N in the appropriate fields. Y is the default for both.

3. To save the settings and return to the Security Settings menu, press F10.

Specifying Workstation Types

Note: If you use a 5.xx or greater workstation to set login security for users whose StreetTalk group is on a server running VINES software, revision 4.00(5) and greater 4.xx revisions, it is important to remember that these earlier releases of VINES recognize only PCs (DOS, Windows, and OS/2) and Macintosh workstations. Anything you set for DOS users also affects OS/2 users.

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Click the Login Restrictions tab.

3. In the Workstations Type area, select the DOS, OS/2, or Macintosh workstation checkbox.

4. Click OK.

1. Run MUSER, select a user, and display the Security Settings menu.

2. At the Security Settings menu, choose Specify Workstation Types to display the Specify Workstation Types screen.

3. At the Specify Workstation Types screen, move the cursor to the appropriate field(s) and enter Y or N as appropriate.

4. Press F10 to save your changes and return to the Security Settings menu.

Specifying Login Settings

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

Figure 8-2. Login Restrictions Folder

2. Click the Login Restrictions tab.

3. Select the Limit sessions checkbox. Leave the checkbox blank if you do not want to impose a limit.

4. Enter the maximum number of concurrent sessions that a user can have at one time. The number can range from 1 to 100.

5. Click OK to save the changes.

1. At the Security Settings menu, choose Specify Login Settings.

2. At the Specify Login Settings screen, type the number of workstations that a user can log in to at any given time. Enter U if you do not want to impose a limit.

3. You have a choice:

- To save the settings and return to the Security Settings menu, press ENTER or F10.

- To exit this screen and retain the original settings, press ESC.

Specifying Login Times

Specifying Time Ranges

Note: You can specify a time range from StreetTalk Explorer graphically using 15-minute intervals.

Monday: 17:00-23:59
Tuesday: 0:00-3:00

Intervals

If You Specify a Time Between... The User Can Log in Starting at...
11:00 and 11:14 11:00
11:15 and 11:29 11:15
11:30 and 11:44 11:30
11:45 and 11:59 11:45

If You Specify an End Time Between... The User Can Remain Logged in Until...
17:01 and 17:15 17:15
17:16 and 17:30 17:30
17:31 and 17:45 17:45
17:46 and 18:00 18:00

Procedure for Specifying Login Times

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Click the Login Times tab. This displays a time grid that divides each day into hourly and 15-minute periods. Group members or individual users may log in during the periods highlighted in green.

Figure 8-3. Login Times Folder

3. Use the mouse to blank out any day/time slots when group members can not log in.

4 To specify how the network should respond when a user session goes beyond the log in limits, select Ask User to Log Out or Force User to Log Out.

5 Click OK to save the settings.

1. Run MUSER, select a user, and display the Security Settings menu.

2. At the Security Settings menu, choose Specify Login Times. The Specify Login Times screen appears.

3. At the Specify Login Times screen, enter the time periods in the Default and Day fields, using the 24-hour clock format, HH:MM-HH:MM. Separate each time period with a comma.

4. Press F10 to save the settings and return to the Security Settings menu.

Example Specifying a Time Period

8:00-12:00,13:00-17:00

8:00-17:00

Specifying Logout Settings

LOGINMODE [ABORT] command
Expiration of user account
MLOGOUT command

Forcing Logout by Specifying Logout Settings

Time Ranges and Logout Settings

Macintosh Users and Logout Settings

Procedure for Specifying Logout Settings

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Click the Login Times tab.

3. Select Ask User to Log Out (default setting) or Force User to Log Out.

4. Click OK to save the settings.

1. At the Security Settings menu, choose Specify Logout Settings.

2. At the next menu, do one of the following:

- Choose YES to have the user logged out forcibly and immediately.

- Choose NO (the default) to request the user to log out.

3. Press F10 to save the setting and return to the Security Settings menu.

Logging Out Users

1. Open the property sheets for the user to be logged out.

2. On the Summary page, click Logout User.

Enter:

MLOGOUT username

where username is the StreetTalk name of the user to be logged out.

VAN1831 - Only an administrator of the group can log out this user.

VAN1832 - The user is not logged in.

Example Forcing Logout

MLOGOUT Duncan Fraser@Sales@WCTUS

Specifying Login Locations

Gathering Location Information

Server name
Slot numbers of the server links
Hexadecimal addresses of the workstations

To Locate Workstation Addresses

1. Right-click a neighbor server and select Communications from the shortcut menu.

2. Click the Neighbors tab. Workstations are identified as Clients and are listed by the communications interface or port through which the workstations are connected to the server. The workstation's network ID matches that of its routing server.

3. Record the address information or print the screen.

1. Display the Network Summary menu in one of two ways:

- Enter MNET servername, where servername is the name of neighbor server. If you do not specify a server name, you are prompted to choose from a list of available servers. You may choose more than one server at a time.

- From the server console of a native VINES server, choose Run Network Management. If you have the VNSM option, choose the server name from the list of available servers. Otherwise, the VINES Network Summary appears for the server at which you are working.

2. When the Network Summary menu appears, choose SHOW topology information.

3. At the Topology Information menu, choose VINES neighbors. The workstation addresses are listed by the communications interface or port through which the workstations are connected to the server. DOS and Windows workstations are identified as "PC" in this screen. In addition, the workstation' s network ID matches that of its routing server.

4. For details on the SHOW topology and VINES neighbors menus, see Monitoring and Optimizing Servers.

5. Either print the screen or record the information.

Accessing the Login Locations Checkbox or Menu

Add a Location - Add up to ten locations.

Modify a Location - Change a login location from one type to another.

Delete a Location - Remove a login location.

Adding and Modifying Login Locations

Server-level - Users can log in from any workstation on any link attached to a particular server.

Link-level - Users can log in from any workstation on a specific link of the server that you just named at the server level.

Workstation-level - Users can log in from specific workstations on a LAN segment.

Adding Server-level Restrictions

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Select the Login Restrictions tab.

3. Click Add Location to display a dialog box.

Figure 8-4. Add Login Locations Dialog Box

3. In the Server drop-down list, select the server and click OK.

The restriction displays in the Login Locations field.

4. Click Apply.

Note: Use the same procedure to specify links. To specify a LAN address on the link, type the hexadecimal NIC address of the workstation in the Node field. See "Adding Link-level Restrictions" and "Adding Workstation-level Restrictions" for more information.

1. Choose ADD a Location from the Login Locations menu.

2. At the Available Servers menu, choose the server to which you want to confine logins.

3. When prompted if you want to confine logins to a specific link on the server, choose:

- NO to allow logins to all links on the server. The system returns you to the Login Locations menu. If you have completed your task, press ESC to return to the Security Settings menu. If not, you can add, delete, or modify other login locations.

- YES to limit logins to a specific link on the server. Proceed to step 4 of the next section, "Adding Link-level Restrictions"

Adding Link-level Restrictions

Slot-line - Identifies the LAN card by the slot number/line number combination in the format:

slot number-0

where slot number is the number of the slot in which the LAN card is installed.

For asynchronous lines, the slot number/line number combination appears in the format:

slotnumber-linenumber

where slotnumber is the number of the slot in which the line' s serial communications card is installed, and linenumber is the line' s number on the card. The slot number/line number combination indicates the line' s assignment.

Type - Displays the link type for each link on the menu. For LAN segments, the type of LAN card appears (for example, an Ethernet card may have 3Com® EtherLink® II). For asynchronous lines, "Asynch" appears.

1. Choose ADD a Location from the Login Locations menu.

2. At the Available Servers menu, choose the server connected to the link to which you want to confine logins.

3. When prompted if you want to confine logins to a specific link on the server, choose YES.

The Available Links menu for the selected server appears. This menu displays all the LAN segments connected to that server.

4. At the Available Links menu, choose a link to which you want to confine logins.

5. When the system returns you to the Login Locations menu, you can add, delete, or modify other login locations, or you can press ESC to return to the Security Settings menu.

Adding Workstation-level Restrictions

Note: The address you need is the link-level node address of the workstation and cannot be validated when you enter it in the appropriate Login Locations menu. You must determine this address and specify it only if it is relevant for the LAN type.

1. From the Login Locations menu, choose ADD a Location.

2. At the Available Servers menu, choose the server associated with the link on which the specific workstation resides to confine logins to that workstation.

3. When prompted if you want to confine logins to a specific link on the server, choose YES.

The Available Links menu for the selected server appears, listing all the links on the server.

4. Choose the link on which the workstation resides.

5. When prompted if you want to confine logins to a specific workstation on the link, choose YES.

6. At the Confine Login to Node screen, enter the address of the workstation.

Workstation addresses are generally limited to 10 characters (without spaces), but you can enter the address using spaces, up to a total of 20 characters. When the system stores the address, it eliminates the spaces you enter.

For example, you could enter a workstation number in either of these ways:

- With spaces: 01 03 B6 84 A2

- Without spaces: 0103B684A2

7. When the system returns you to the Login Locations menu, you can add, delete, or modify other login locations; or you can press ESC to return to the Security Settings menu.

Modifying a Login Location

You previously defined a server-level restriction (for example, Server1,*) but now you want to confine logins to just some of the links that Server1 is on.
You previously defined a link-level restriction (for example, Server2,3-0) but now you want to allow logins to all links that Server2 is on.
You previously defined a link-level restriction (for example, Server4,3-0,*) but now you want to confine logins to a single workstation on the LAN segment connected to the LAN card in slot 3 of Server4.

Procedures to Modify a Location

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Click the Login Restrictions tab.

3. Click Add Location to display a dialog box.

4. In the Server drop-down list, select the server.

5. To restrict the user to a specific link on the server, select the link from the Link drop-down list.

6. To restrict the user to a specific LAN address on the link, type the hexadecimal NIC address of the workstation in the Node field.

7. Click OK on the dialog box. The restriction displays in the Login Locations field.

8. Click Apply.

9. Repeat these steps to specify additional servers.

1. From the Login Locations menu, choose MODIFY a Location.

2. Choose the login location you want to modify.

3. At the Available Servers menu, choose the appropriate server.

4. When prompted if you want to confine logins to a specific link on this server, choose:

- NO to allow logins on any link on this server. You return to the Login Locations menu.

- YES to specify a particular link. The system displays the Available Links menu. Choose a link from the Available Links menu.

5. When prompted if you want to confine logins to a specific workstation, choose:

- NO to allow logins from any workstation on the link.

- YES to restrict logins to a particular workstation on the link. Enter a workstation address, using up to 20 characters. Spaces or dashes are allowed, but the system deletes them when it stores the address.

The system returns you to the Login Locations menu.

Deleting Login Locations

1. Right-click the user or group in the left or right pane and select Properties from the shortcut menu. The property sheet appears.

2. Click the Login Restrictions tab.

3. Select the location in the Login Locations field under NOS.

4. Click Remove Location.

5. Click Apply.

1. At the Login Locations menu, choose DELETE a Location.

2. Select the location you want to delete.

3. When prompted to confirm the deletion, choose YES to delete the location or NO to keep it. You return to the Login Locations menu.

Restricting Dial-in Access

Using StreetTalk Explorer or OPERATE, you create a user dial-in access list for a server but do not limit where users can log in through MUSER or MGROUP. Any user can still log in. If you do not limit login locations for groups or users, users can log in from anywhere.
Using StreetTalk Explorer, MUSER, or MGROUP, you specify that users can dial in to a specific server but you do not create a user dial-in access list for that server. Any user can still log in to that server because no dial-in access list exists.

Entries in a Dial-in Access List

StreetTalk name of an individual user
StreetTalk list
Pattern (using wildcard)

Theresa Carbone@Ven@WCTES

Dial-inList@Sal@WCTUS

*@[Group_Name]@[Organization_Name]

*@*@[Organization_Name]

*@*@*

Planning User Access

Figure 8-5. User Dial-in Access Worksheet

Setting Up a User Dial-in Access List

1. Right-click a server and select Properties from the shortcut menu.

2. Click the Dial-in Access tab.

3. Click the Browse button and select a user, list, or pattern name, using your User Access Worksheet. Click Add.

4. When you have finished adding names, click Apply.

1. Run the OPERATE program. If you did not specify a server name, choose the appropriate one from the menu that appears.

2. From the Operate a Server menu, select RESTRICT Access.

3. From the Restrict Access menu, select Restrict Dial-in Users.

4. At the Restrict Dial-in Users screen, enter the user, list, and pattern names, using your User Access Worksheet. Enter one name per line.

5. When you have completed entering the names, press F10.

Deleting Security Settings

1. Right-click a user and select Properties from the shortcut menu.

2. Click the Password, Login Restrictions, or Login Times tab.

3. In the Security in Effect section, select the Group Level Security radio button and click Apply.

1. At the Security Settings menu, choose the appropriate command for deleting security settings:

- MGROUP - Delete Security Settings for Group

- MUSER - Delete User Specific Security Settings

2. When prompted to confirm the deletion, choose YES.

Error Messages

On the 25th line of a DOS workstation
In the special VINES message box of a Windows workstation
At the system prompt

VANnnnn

Example Security Service Error Messages

VAN1804 Nonce provided for authentication is invalid.

VAN1810 Requested profile command not found.

Using On-line Help for Error Messages

VNSERR error-code

vnserr van1804

1. Assign LPT1 to a network print service using the VINES SETPRINT command.

2. Enter vnserr /p:van, where /p:van identifies all Security Service error messages.

Previous PageTop Of PageNext Page