HP WBEM Services for HP-UX and Linux System Administrator's Guide
Security Considerations
Chapter 6 61
6 Security Considerations
This chapter describes HP WBEM Services security.
Security is checked first at the communication path. HP WBEM Services
has three pathways:
• Local users with requests: If the user is on the same system as the
HP WBEM Services, HP WBEM Services accepts the authentication
already done by the system itself. See Local Authentication, below.
• Remote users with requests: If the user is coming from a remote
system, he enters through the HP WBEM Services HTTP Server. The
embedded HTTP server receives only valid CIM requests; all other
requests are rejected. User information is included in the
XML-encoded HTTP message header. The CIM Server checks the
user-password information. See Remote Authentication, below.
• Providers: HP WBEM Services interacts with its registered providers
through shared libraries.
NOTE CIM providers run as privileged users. Be very careful installing a
provider that does not come from a trusted source.
After HP WBEM Services passes on a request to a provider, the provider
is responsible for checking its own security. The provider sets the rules
about which requests it considers, and the conditions for granting or
refusing them. If a provider requires authorization beyond that checked
by HP WBEM Services, the provider supplier is responsible for
documenting its own rules.
HP WBEM Services uses dedicated ports for CIM-XML traffic. Two ports
are specified by DMT and registered with IANA for CIM-XML
communications between remote clients and the CIM Server:
• HTTP TCP/IP communication on port 5988 (wbem_http)
• HTTPS TCP/IP communication on port 5989 (wbem_https)
Hewlett-Packard supports only these two port configurations.