HP StorageWorks P9000 Command View Advanced Edition Software Common Component Security Guide
Contents
Contents
1 Overview of security setup and operation
1-1 How to use this guide..................................................................................................................................... 6
1-1-1 Intended readers ................................................................................................................................... 6
1-1-2 Reading sequence................................................................................................................................. 6
1-2 Overview of the system to be created or operated ........................................................................................ 7
1-2-1 Overall view of the system..................................................................................................................... 7
1-2-2 Overview of security functions of Common Component........................................................................8
1-3 Security policy for creating and operating the system.................................................................................... 8
1-3-1 Selecting administrators ........................................................................................................................ 9
1-3-2 Hardware management ....................................................................................................................... 10
1-3-3 Software management ........................................................................................................................ 10
1-3-4 Network management ......................................................................................................................... 10
1-3-5 Management of user authentication information ................................................................................. 11
1-3-6 Warning policy management ............................................................................................................... 12
1-4 Creation and operation procedure ............................................................................................................... 12
2 Examining the system configuration
2-1 Hardware configuration ................................................................................................................................ 13
2-1-1 In Windows .......................................................................................................................................... 14
2-1-2 In Linux ................................................................................................................................................ 14
2-2 Software configuration ................................................................................................................................. 15
3 Preparations before system creation
3-1 Selecting the storage management software............................................................................................... 18
3-2 Installing hardware ....................................................................................................................................... 18
3-3 Setting up the operating system................................................................................................................... 19
3-4 Determining the rules related to security functions ...................................................................................... 19
4 Creating a system
4-1 Overview of system creation ........................................................................................................................ 20
4-1-1 System creation procedure.................................................................................................................. 20
4-2 Installation .................................................................................................................................................... 20
4-2-1 In Windows .......................................................................................................................................... 21
4-2-2 In Linux ................................................................................................................................................ 21
4-3 Setting up an environment ........................................................................................................................... 23
4-4 Settings required after installation of Common Component......................................................................... 24
4-5 Setting up the Common Component management functions ...................................................................... 27
4-6 Setting up user authentication information................................................................................................... 28
4-6-1 Adding users........................................................................................................................................ 28
4-6-2 Setting up permissions for the user ..................................................................................................... 29
4-7 Setting up external authentication servers ................................................................................................... 30
4-7-1 Linking to an external authentication server ........................................................................................ 30
4-7-2 Providing security equivalent to internal authentication....................................................................... 31
5 Preparations before system operation
5-1 Notification from the system integrator......................................................................................................... 33
5-2 Determining and updating rules related to security functions ...................................................................... 33
5-3 Notifying users ............................................................................................................................................. 34
6 Operating the system
6-1 Overview of system operations .................................................................................................................... 35
6-2 Managing the Common Component Security Parameters...........................................................................35
6-3 Managing user authentication information ................................................................................................... 35
4