Neoview User Management and Security Administration Guide (R2.5)

Table of Contents
About This Document.......................................................................................................11
Intended Audience................................................................................................................................11
New and Changed Information in This Edition...................................................................................11
Document Organization.......................................................................................................................11
Notation Conventions...........................................................................................................................11
General Syntax Notation.................................................................................................................11
Related Documentation........................................................................................................................13
Neoview Customer Library.............................................................................................................14
Publishing History................................................................................................................................15
HP Encourages Your Comments..........................................................................................................15
1 Introduction to Security on the Neoview Platform.....................................................17
Authentication and Authorization on the Neoview Platform..............................................................17
Granting and Revoking Privileges........................................................................................................18
LDAP Integration..................................................................................................................................18
Special Roles for HP Support and System Software.............................................................................19
User and Role Names and Associated Functions.................................................................................19
Database User Names and Roles.....................................................................................................19
Platform User Names and Roles.....................................................................................................20
Special Roles for Security Administration.......................................................................................20
Preconfigured Users and Roles.......................................................................................................20
Roles and Role Assignment..................................................................................................................22
Password Security.................................................................................................................................23
Passwords for Remotely Authenticated Database Users (LDAP Users).........................................24
Passwords for Locally Authenticated Database Users ...................................................................24
Passwords for Platform Users.........................................................................................................25
Role Passwords................................................................................................................................26
Use of Braces in Passwords.............................................................................................................27
LDAP Search User Password..........................................................................................................28
Safe Support..........................................................................................................................................28
Security Mode.......................................................................................................................................29
Security Administration Task Map.......................................................................................................29
2 Post-installation Security Setup Tasks..........................................................................33
Obtaining and Installing Client Software.............................................................................................34
Logging on as Security Administrator.................................................................................................35
Changing Passwords for Predefined Users and Roles.........................................................................35
Creating New Platform and Power Users............................................................................................36
Best Practices for Platform and Power User Management...................................................................37
SUPER.SUPER and Its Individual Accounts...................................................................................37
SUPER.SERVICES and Its Individual Accounts..............................................................................37
HP.SDI and Its Individual Accounts................................................................................................37
HP.VTS and Its Individual Accounts...............................................................................................37
ROLE.SECMGR and Its Individual Accounts.................................................................................37
ROLE.MGR and Its Individual Accounts........................................................................................38
Conventions for User Names..........................................................................................................38
Retaining Predefined Users.............................................................................................................39
Protecting the SUPER.SUPER and ROLE.SECMGR Passwords.....................................................39
Managing Security Policies...................................................................................................................39
Table of Contents 3