- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Re: Login Restrictions
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 08:42 PM
тАО06-16-2004 08:42 PM
I am trying to find a way of restricting users to specfic nodes in our VAX/VMS 5.5 cluster.
There are 2 distinct groups of users who should only be logging in to their own specified node. Is there a way to ensure that if a user from one group tried to log into the incorrect node that they can simply be disconnected? I would imagine some additions to each users login.com may be able to do this but I was hoping for more global solution such as adding a flag to their entry in mc authorize for example. So far my own search has not helped other than finding ways to restrict the times that they are allowed to logon "modify username/[no]access" etc etc
cheers
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 09:04 PM
тАО06-16-2004 09:04 PM
SolutionAs you have already mentioned, modifying user login command procedure is one way. But if the user account is not captive or restricted, then he can always user /nocommand qualifier to bypass his login command procedure. Moreover, once logged in he can always telnet or set host to other node. So, I think, you need to modify sylogin.com for this (not user specific login command procedure ).
Another method I can think of (not tested), you can creat nodespecific sysuaf.dat . Simply defind logical SYSUAF to you node specific sysuaf.dat
For example, on node A, you can defind following :
define/system/exec SYSUAF sys$system:sysuaf_nodea.dat
and on node B, you can define,
define/system/exec SYSUAF sys$system:sysuaf_nodeb.dat
Then start adding user accounts to you node specific sysuaf files. Initially you can copy sysuaf.template to start with your node specific sysuaf file. Also, you need to define the above logicals in sylogicals.com too.
HTH,
Thanks & regards,
Lokesh Jain
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 09:07 PM
тАО06-16-2004 09:07 PM
Re: Login Restrictions
Also : be carefull with generic batch queues.
May be ACL's are possible too (e.g. only access for sys$node_node1).
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 09:09 PM
тАО06-16-2004 09:09 PM
Re: Login Restrictions
you can attach arbitrary identifiers to UAF records:
UAF> ADD/IDENTIFIER idname /VALUE=idvalue
UAF> GRANT/IDENTIFIER idname username
Unfortunately, AFAIK, there's no programmatic DCL way you can retrieve that information (short of parsing the output of SHOW PROCESS/ALL), so you'd have to write a small program that calls $FIND_HELD.
Hope it helps,
Martin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 09:10 PM
тАО06-16-2004 09:10 PM
Re: Login Restrictions
It isnt really an option we have to use local sysuaf.dat files. The reason is that the specific users do have logins on the other nodes just that there are a handful of accounts(approx 10 node A, 10 node B) that must ONLY login to these nodes. All other accounts can login across the cluster.
These specific user accounts run an application at logon which fires up a basic GUI environment which would cause problems if launched on wrong node. Therefore only these accounts need to be restricted.
Hope this explains things better.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 09:32 PM
тАО06-16-2004 09:32 PM
Re: Login Restrictions
go and code the logic into SYS$MANAGER:SYLOGIN.COM as Lokesh suggested. Dealing with multiple SYSUAFs and a single RIGHTSLIST is a big pain.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 09:46 PM
тАО06-16-2004 09:46 PM
Re: Login Restrictions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 10:50 PM
тАО06-16-2004 10:50 PM
Re: Login Restrictions
They had multiple SYSUAF, Que-files, RIGHTSLIST. Big pain in the ass.
I changed it to one SYSUAF, RIGHTSLIST etc. and created identifiers ACCESS_
The users who need to logon to both nodes need to have ofcourse both identifiers. Lateron there get more nodes, so more ACCESS_
Yes, another costumer of me had the problem of too much identifiers on one process during the upgrade to VMS 7.3-1. System crashes because of a fault in the kernel code of the F$GETJPI.
AvR
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-16-2004 11:14 PM
тАО06-16-2004 11:14 PM
Re: Login Restrictions
this looks like a minor subset of some functionality we have.
Many apps on 4-node cluster. Most apps are clusterwide, but various apps are for some reason bound to a single node; and sometimes we want to reserve a node for maintenance work, and restrict clusterwide apps to the 3 other nodes.
Some LAT connections, mostly telnet.
We have implemented this by having the users NEVER connect to a node or to the cluster, but instead having DNS have the names of ALL applics, with (round-robin) CNAME(s) to the node(s) that currently offer the service. Same, but even easier principle for LAT services.
On the nodes we define systemwide logicals of name NODE_
This not only gives you what you are asking, with any desired granularity, but also allows you to SHUFFLE your apps if desired for any reason (eg, maintenance, or new hardware).
Jan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-17-2004 12:32 AM
тАО06-17-2004 12:32 AM
Re: Login Restrictions
I haven't a cluster avaiable so I can't verify; my question is:
If they are logged as remote, I guess you can limit in SYSUAF the remote interactive access otherwise yuo can only update SYLOGIN.COM
Antonio Vigliotti
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-17-2004 12:52 AM
тАО06-17-2004 12:52 AM
Re: Login Restrictions
That means that if you want to restrict users to a specific machine, don't let them logon to the cluster but to a specific node.
(AKA Unix-cluster login)
But as suggested already:
If you want to restrict ANY access to the other node, put an ACL to any file that disallows users that do not hold that identifier. if possible, group the files onto seperate directories (or even disks)
To whic group a user belogs can be stored (the standard way) in SYSUAF.
an example:
Cluster consiste of NodeA and NodeB.
Some users are restricted to NodeA, some to NodeB, and a third group needs acces to both.
The first group has ACL for NodeA only.
The second group has ACL for NodeB only.
The third group has both.
The location for NodeA specific files allow acess for NodeA-Id holders only, nodeB specific files fro NodeB only, and shared files carry both. When access is blocked from the highest point (disk, or directory), you have the least trouble:
(ID=NodeA, access=Read+write+execute+delete)
(ID=*, access=none)
will allow NodeA holders to access the files below this root, but NodeB holders cannot access it.
(If you are running 7.3-2, you could even think of writing your own SYSUAF/LDAP extension)
Willem
OpenVMS Developer & System Manager
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-17-2004 06:40 AM
тАО06-17-2004 06:40 AM
Re: Login Restrictions
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-17-2004 12:54 PM
тАО06-17-2004 12:54 PM
Re: Login Restrictions
depending on your setup. If the users neatly separate along UIC groups or can be organized that way a simple test in sylogin using f$getjpi("","grp") would be
sufficient to grant or deny access.
Greetings, Martin
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-17-2004 07:45 PM
тАО06-17-2004 07:45 PM
Re: Login Restrictions
Terry.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-17-2004 07:55 PM
тАО06-17-2004 07:55 PM
Re: Login Restrictions
Since the flags are SYSUAF attibutes, that would imply multiple SYSUAF's, which was already rejected as a highly unwanted solution.
Jan
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-17-2004 08:41 PM
тАО06-17-2004 08:41 PM
Re: Login Restrictions
Use identifiers. Here's a simple mechanism. Suppose you have 2 nodes, A and B. Any process logged into node A will have a rights identifier SYS$NODE_A, those on B will have SYS$NODE_B. You can create an identifiers DISALLOW_A and DISALLOW_B and GRANT it to any users you want to deny access to a specific node. Now create a command procedure containing a LOGOUT command:
CHECK_NODE_ACCESS.COM
$ LOGOUT
Put an ACL on it:
(IDENTIFIER=SYS$NODE_A+DISALLOW_A,ACCESS=EXECUTE)
(IDENTIFIER=SYS$NODE_B+DISALLOW_B,ACCESS=EXECUTE)
(IDENTIFIER=*,ACCESS=NONE)
From SYLOGIN.COM simply add
$ @CHECK_NODE_ACCESS
Those users with the identifier pairs will be able to execute the procedure, anyone else will be denied access and therefore won't get logged out. You may want to place the lines:
$ DEFINE/USER SYS$OUTPUT NL:
$ DEFINE/USER SYS$ERROR NL:
immediately before the check to avoid error messages. One potential problem is anyone with BYPASS privilege will also get logged out (but then no one should have BYPASS by default!).
An alternative is to reverse the sense of the access and use the procedure to define a global symbol or logical name, then test its existence and logout anyone who doesn't have it.