Symantec Product Authentication and Authorization Volume I

d n
2n itio
Ed
Symantec Product
Authentication and
Authorization
Volume I
Securely deploy Symantec products using the
appropriate deployment configuration for your
enterprise environment
Provides an overview of the Symantec Product
Authentication and Authorization Service
Describes the role of Symantec Product
Authentication and Authorization Service in
your enterprise
Includes guidelines and best practices for
deploying Symantec products with Symantec
Authentication and Authorization Service
Symantec Product Authentication and Authorization
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Documentation version 2.0
Legal Notice
Copyright © 2008 Symantec Corporation. All rights reserved.
Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec
Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks
of their respective owners.
Microsoft, Windows, Active Directory, Excel, JScript, Outlook, PowerPoint, SharePoint, and
Windows server are trademarks or registered trademarks of Microsoft Corporation.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. Please see the Third Party Legal Notice Appendix
to this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
20330 Stevens Creek Blvd.
Cupertino, CA 95014
http://www.symantec.com
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
Acknowledgments
Symantec thanks the following people for their contribution to the Symantec Yellow Book™:
Principal Authors
Aloysius Lau
Hoang Nguyen
The principal authors and Symantec would like to thank the following contributors:
Trung Nguyen
Kathryn Cheng
David Hartman
Mette Wadleigh
Dhiren Chandvania
Virginie Carle
John Belz
Frances Heddings
Don Brinkley
Vuthipong "Don" Angspatt
Bruce Naegel
Kyle Gleed
Chris Leffel
Thomas Stephens
Gaurav Khanna
Contents
Chapter 1
About the Symantec Product Authentication and
Authorization Yellow Book ............................................ 9
About the volumes in the Symantec Product Authentication and
Authorization Yellow Book ........................................................ 9
Who should use this Yellow Book .................................................... 10
Chapter 2
Symantec authentication and authorization
services ............................................................................ 13
About this document ....................................................................
Difference between this document and product guides .................
This document's scope ............................................................
Acronyms and definitions ..............................................................
About authentication and authorization ...........................................
Benefits of using authentication and authorization ............................
Chapter 3
13
14
14
16
22
23
Overview of the Symantec Product Authentication
Service ............................................................................. 27
Authentication service overview .....................................................
Authentication hierarchy ..............................................................
Authentication principal .........................................................
Authentication components ..........................................................
Root broker ...........................................................................
Authentication broker .............................................................
Authentication plug-ins and mechanisms ...................................
Authentication entities ...........................................................
Authentication user interface ...................................................
Authentication broker communication port ................................
How the authentication process works .............................................
About acquiring a product credential ........................................
Authentication brokers in a high availability environment ..................
Root plus authentication broker in a high availability
environment ...................................................................
Authentication broker in a high availability environment ..............
Authentication expiry ...................................................................
27
28
29
29
29
30
30
32
32
32
33
34
36
36
36
36
6
Contents
Chapter 4
Overview of the Symantec Product Authorization
Service ............................................................................. 39
Authorization service overview ......................................................
Authorization components ............................................................
Authorization service .............................................................
Authorization client ...............................................................
Access control information data repository .................................
Master authorization service ....................................................
Local authorization service ......................................................
Resource management application ............................................
Authorization group or namespace ............................................
Authorization user interface ....................................................
Authorization service communication port .................................
Access control policy ....................................................................
Access control lists .......................................................................
Authorization service in a high availability environment .....................
How the authorization process works ..............................................
Chapter 5
How Symantec Product Authentication and
Authorization are used across Symantec
products ......................................................................... 47
About deploying an authentication hierarchy ....................................
About the need to create one authentication hierarchy for your
enterprise .......................................................................
How AT provides secure communication ...................................
About assimilating AT into your enterprise .................................
About upgrading AT ...............................................................
About deploying an authorization service .........................................
How AZ provides access control ................................................
About assimilating AZ into your enterprise .................................
About upgrading AZ ...............................................................
Chapter 6
39
40
41
41
41
42
42
42
43
43
43
43
44
44
45
47
48
49
49
55
56
56
57
57
Deployment guidelines and best practices .................... 59
Multiple product deployment approach ............................................
About application servers ........................................................
About management servers ......................................................
About management agents and clients .......................................
How to determine the broker architecture ........................................
Root and authentication brokers placement ................................
About an isolated root broker ...................................................
About multiple root brokers .....................................................
59
62
63
63
64
67
69
70
Contents
Root brokers consolidation ......................................................
About the availability of brokers ...............................................
About brokers in different time zones ........................................
About implementing AT and AZ services in your enterprise .................
AT and AZ administration tasks ......................................................
AT administrator responsibilities ..............................................
AZ administrator responsibilities ..............................................
Platform-specific considerations ...............................................
AT and AZ installation considerations .......................................
About the AT and the AZ upgrades ............................................
AT and AZ backup and recovery strategy ..........................................
Backup and recovery of AT data ................................................
Backup and recovery of AZ data ................................................
Empirical use cases ......................................................................
UNIX/Linux use cases .............................................................
Windows use cases .................................................................
Recommended approach to the use cases ....................................
Use cases verification steps and troubleshooting tips ..........................
Index
72
75
76
76
79
79
81
81
83
88
90
91
92
92
93
93
93
94
.................................................................................................................... 95
7
8
Contents
Chapter
1
About the Symantec
Product Authentication and
Authorization Yellow Book
This chapter includes the following topics:
■
About the volumes in the Symantec Product Authentication and Authorization
Yellow Book
■
Who should use this Yellow Book
About the volumes in the Symantec Product
Authentication and Authorization Yellow Book
In the second edition of the Symantec Product Authentication and Authorization
Yellow Book, the document contains three volumes (I, II, and III). Each volume is
a book.
Table 1-1 lists the title of each volume and its content.
10
About the Symantec Product Authentication and Authorization Yellow Book
Who should use this Yellow Book
Table 1-1
The document set for the Symantec Product Authentication and
Authorization Yellow Book
Volume Title
Content description
Symantec Product Authentication and
Authorization Volume I
Contains the following information:
■
■
■
■
■
Describes the value that authentication
and authorization adds to the security
infrastructure in your organization.
Provides an overview of Symantec
Product Authentication Service (AT).
Provides an overview of Symantec
Product Authorization Service (AZ).
Discusses the integration approach the
Symantec products use to integrate with
the authentication and the authorization
services.
Defines the deployment guidelines and
best practices that are suggested by the
Symantec Corporation. You can use the
deployment guidelines and best practices
to deploy multiple products in your
enterprise with AT and AZ enabled.
For more information, see the Symantec
Product Authentication and Authorization
Volume I.
Symantec Product Authentication and
Authorization Volume II
Describes the use cases that are deployed on
the UNIX/Linux and the Windows platforms.
For more information, see the Symantec
Product Authentication and Authorization
Volume II.
Symantec Product Authentication and
Authorization Volume III
Contains the procedures that are commonly
used in the UNIX/Linux and the Windows
use cases.
For more information, see the Symantec
Product Authentication and Authorization
Volume III.
Who should use this Yellow Book
There are three primary groups who can benefit by reading this Yellow Book.
At an enterprise level, the following groups benefit:
About the Symantec Product Authentication and Authorization Yellow Book
Who should use this Yellow Book
■
Chief information officers (CIOs), chief security officers, and security architects.
These individuals are responsible for the security infrastructure within an
enterprise and the deployment of Symantec Product Authentication and
Authorization Services.
■
Security administrators and application administrators who are typically
responsible for the deployment of Symantec products in their enterprise.
■
System programmers who are responsible for process automation.
Table 1-2 lists the chapters that pertain to these job roles.
Table 1-2
Applicable sections to read
Role
What to read
Chief Information
Officers
Refer to Symantec Product Authentication and Authorization
Volume I, which provides an overview to the Symantec Product
Authentication and Authorization Services. It also describes the
deployment guidelines and the best practices for the Symantec
products to be deployed with the AT and the AZ services.
Security Officers
Security Architects
For more information, see the Symantec Product Authentication
and Authorization Volume I.
See “About the volumes in the Symantec Product Authentication
and Authorization Yellow Book” on page 9.
Security
administrators
Application
administrators
Refer to Symantec Product Authentication and Authorization
Volume I for information about the integration of AT and AZ across
Symantec products. The deployment guidelines and best practices
describe the approaches that give security and application
administrators an understanding of how to plan and deploy
Symantec products in their enterprise environments.
Refer to Symantec Product Authentication and Authorization
Volume II for information about the use cases that are provided
for the UNIX/Linux platform and the Windows platform.
Refer to Symantec Product Authentication and Authorization
Volume III for information on the common verification procedures
that can help you verify the setup in your environment.
For more information, see the Symantec Product Authentication
and Authorization Volumes I, II, and III.
See “About the volumes in the Symantec Product Authentication
and Authorization Yellow Book” on page 9.
11
12
About the Symantec Product Authentication and Authorization Yellow Book
Who should use this Yellow Book
Table 1-2
Applicable sections to read (continued)
Role
What to read
System programmers
Refer to the appropriate use cases in Symantec Product
Authentication and Authorization Volume II for specific
implementation information. The use cases show you how to
implement AT and AZ for the Symantec products that are deployed
in your environments.
Refer to the appropriate appendixes in Symantec Product
Authentication and Authorization Volume III for specific
verification information. The appendixes show you how to verify
the Symantec products that are enabled with the AT and the AZ
services. You can use the troubleshooting tips for repairing the
particular Symantec products. The appendixes also show you how
to perform the tasks that are common to the UNIX/Linux platform
and the Windows platform.
For more information, see the Symantec Product Authentication
and Authorization Volumes II and III.
See “About the volumes in the Symantec Product Authentication
and Authorization Yellow Book” on page 9.
Chapter
2
Symantec authentication
and authorization services
This chapter includes the following topics:
■
About this document
■
Acronyms and definitions
■
About authentication and authorization
■
Benefits of using authentication and authorization
About this document
The Symantec Product Authentication Service (AT) and the Symantec Product
Authorization Service (AZ) allow you to integrate these services with multiple
Symantec software products. General security concepts, public key infrastructure
(PKI) security concepts, the Symantec approach to set up AT and AZ, and how to
implement these solutions in your environment are also included.
You can refer to deployment guidelines, best practices, and use cases to help you
plan and implement AT and AZ across Symantec products. You can choose a
deployment configuration suitable for your enterprise.
See “Multiple product deployment approach” on page 59.
You can begin by establishing the infrastructure for your environment, then
deploying a single Symantec product with AT and AZ (if used by the product). You
can integrate additional Symantec products with AT and AZ by following the
UNIX, Linux, and Windows use cases.
14
Symantec authentication and authorization services
About this document
For more information on deploying Symantec products with the security feature
on UNIX/Linux and Windows, see the following sections in Symantec Product
Authentication and Authorization Volume II:
■
Deployment of Symantec products with security on UNIX/Linux
■
Deployment of Symantec products with security on Windows
Difference between this document and product guides
Every Symantec product includes user guides that describe the procedures that
install the product with Symantec Product Authentication Service (AT) and
Symantec Product Authorization Service (AZ). The user guides, however, do not
contain information on how those products behave when they are deployed with
other Symantec products.
In a multiple product environment, AT and AZ are shared among many Symantec
products. Each product may have a different requirement for use with
authentication and authorization. Tested and certified use cases, and approaches
for deploying multiple Symantec products along with authentication and
authorization enable you to implement a variety of product configurations, across
multiple operating systems, in a single, secure environment.
Note: This Yellow Book is not a replacement for product documentation. Refer to
the appropriate installation, administration, and user guides for detailed
information about your Symantec product.
This document's scope
The deployment complexity and architectural demands on Symantec Product
Authentication and Authorization Services can best be demonstrated by the
guidelines and practices in an enterprise environment that are proven and certified
in the Symantec product testing lab. This document disseminates deployment
information to Symantec customers for best use in their own enterprises. In this
way, customers can use Symantec's best deployment scenarios in their own
enterprises.
Figure 2-1 lists the Symantec products that integrate with authentication and
authorization.
Symantec authentication and authorization services
About this document
Figure 2-1
Products that use one or more Common Core Services
The edition of a Yellow Book applies to the Symantec products that are certified
to successfully integrate with Symantec Product Authentication and Authorization
Services.
Table 2-1 lists the products documented in this edition.
See “Acronyms and definitions” on page 16.
Future editions will contain information on additional Symantec products when
they complete their integration with Symantec Product Authentication (AT) and
Symantec Product Authorization Service (AZ).
15
16
Symantec authentication and authorization services
Acronyms and definitions
Table 2-1
Symantec products addressed in this edition
Common core
services
Management
server
Application server Management
agent/client
AT
NetBackup
SFCFS
NetBackup
CC Storage & CC
Service
SF Oracle RAC
CC Storage & CC
Service
SLIM
NOM
SFEHA
SFWHA
VCS
SLIM
SFM (SFMS)
SFM (SFMS)
VCS MC (CMC)
VCS MC (CMC)
VBR
VBR
AZ
NetBackup
AT HA
NetBackup
SFCFS
SF Oracle RAC
SFEHA
SFWHA
VCS
AZ HA
NetBackup
Acronyms and definitions
Table 2-2 is a list of acronyms and their definitions.
Table 2-2
Acronym list
Acronym
Definition
AT
Symantec Product Authentication Service
AZ
Symantec Product Authorization Service
AT HA
Symantec Product Authentication Service for high availability.
Configuring AT with VCS improves the availability of this service by
failing or switching it over in a group of systems with a predefined
order to eliminate a single point of failure.
Symantec authentication and authorization services
Acronyms and definitions
Table 2-2
Acronym list (continued)
Acronym
Definition
AZ HA
Symantec Product Authorization Service for high availability.
Configuring AZ with VCS improves the availability of this service by
failing or switching it over in a group of systems with a predefined
order to eliminate a single point of failure.
CCS
Common Core Services—typically refer to the Symantec Product
Authentication Service and Symantec Product Authorization Service
CMC
See VCS MC
CSF
Common Service Framework (the distribution name for these products
is Infrastructure Core Services—ICS)
DSU
Disk Storage Unit
FQHN
Fully Qualified Host Name (synonymous with FQDN—Fully Qualified
Domain Name); for example, jupiter.universe.com
GSSAPI
Generic Security Service Application Programming Interface
HA
High Availability (ensures that a service is accessible without
disruption)
ICS
Infrastructure Core Services (distribution name for AT, AZ, PBX, and
SMF)
LDAP
Lightweight Directory Access Protocol
MP
Maintenance Pack (a Symantec/Veritas product patch release)
NBAC
NetBackup Access Control (AT/AZ integration with NBU)
NBU
NetBackup
NOM
NetBackup Operations Manager
PAM
Pluggable Authentication Modules
PBX
Veritas Private Branch Exchange version 1.2
Symantec Private Branch Exchange version 1.3
PDR
The root private domain repository stores information about all
registered authentication brokers (used only by the root broker).
Another PDR is the authentication.
PKI
Public Key Infrastructure
17
18
Symantec authentication and authorization services
Acronyms and definitions
Table 2-2
Acronym list (continued)
Acronym
Definition
RDBMS
Relational Database Management System, such as Oracle or DB2
SAN
Storage Area Network
SF
UNIX/Linux Veritas Storage Foundation products, including VxVM,
VxFS, and VVR
SFCFS
Veritas Storage Foundation Cluster File System
SFDB2
Veritas Storage Foundation for DB2
SFEHA
Veritas Storage Foundation Enterprise High Availability
SFM
Veritas Storage Foundation Manager. Formerly Storage Foundation
Management Server (SFMS).
SFMS
Veritas Storage Foundation Management Server. See SFM.
SF Oracle
Veritas Storage Foundation for Oracle
SF Oracle RAC
Veritas Storage Foundation for Oracle RAC (Real Application Cluster)
SFW
Windows Storage Foundation products, including VxVM and VVR
SFWHA
Veritas Storage Foundation High Availability on Windows
SLIM
Symantec License Inventory Manager
SMF
Service Management Framework (SLIM makes use of this functionality)
SSL
Secure Sockets Layer protocol (each encrypted transaction generates
a session key, which is 128 bits)
SSO
Shared Storage Option (in the NetBackup context)
Single Sign-On (in the authentication context)
VAD
Veritas Application Director
VBR
Veritas Backup Reporter
VCS
Veritas Cluster Server
VCS MC
Veritas Cluster Server Management Console (formerly CMC)
VPAS
Veritas Process Automation Server
VVR
Veritas Volume Replicator
Symantec authentication and authorization services
Acronyms and definitions
Table 2-2
Acronym list (continued)
Acronym
Definition
VxFS
Veritas File System
VxSS
Veritas Security Services (superseded by “AT plus AZ”)
VxVM
Veritas Volume Manager
Table 2-3 is an alphabetical list of each special term followed by its definition.
Table 2-3
Terms and definitions
Term
Definition
application client
A client program that accesses a Symantec service or
function that is provided by the service program (called
an application service).
application server
A Symantec application that is deployed on a computer
that serves a specific purpose for an enterprise.
Synonymous with application service.
See “About application servers” on page 62.
application service
A program that is contacted by, and provides services to,
a Symantec application client. Synonymous with
application server.
authentication mechanism
The method by which authentication is conducted for the
principals within a specific namespace that is defined by
a domain type.
See “Authentication plug-ins and mechanisms” on page 30.
authentication plug-in
A component that is used by the authentication broker to
validate the identities within a particular domain.
See “Authentication plug-ins and mechanisms” on page 30.
authentication principal
An authentication principal is an entity that can
authenticate to Symantec Product Authentication Service
with a unique identity.
See “Authentication principal” on page 29.
19
20
Symantec authentication and authorization services
Acronyms and definitions
Table 2-3
Terms and definitions (continued)
Term
Definition
authentication service
Symantec Product Authentication Service is the act of
validating who an entity is. An entity can be a user with
a unique identity that accesses (logs on to) a Symantec
product.
Symantec Product Authentication Service is the act of
validating who an entity is. An entity can be a user with
a unique identity that accesses (logs on to) a Symantec
product.
authorization service
Symantec Product Authorization Service is the act of
checking what an entity can do. An ordinary entity can
be granted the administrative privileges and possess the
administrator responsibilities on a Symantec product.
backup
Refers to the process of copying and saving files,
directories, raw partitions, or file systems to secondary
storage such as tapes or disks.
broker
An agent whose function is to validate identities by using
the appropriate plug-in.
certificate
A type of electronic identification card (such as a passport
or a driver's license) that verifies the identity of its holder,
and binds the principal's name to that principal's public
key.
certificate authority
This authority issues a product credential to the
requesting authentication principal that is based on a
validity check from the registration authority.
cluster
A set of hosts that share a set of disks with software
coordination.
credential
An entitlement that is recognized as an authenticated
principal. A valid credential includes a certificate and the
principal’s private key.
high availability
Eliminates the single points of failure and improves the
availability of an application (such as AT, AZ, or
NetBackup). An application that is configured on a VCS
can fail or switch over the service among a group of
computers with pre-defiend order to make the application
always accessible.
login
Logons performed on UNIX and Linux platforms.
Symantec authentication and authorization services
Acronyms and definitions
Table 2-3
Terms and definitions (continued)
Term
Definition
logon
The procedure that is used to gain access to an operating
system or Web console of an application.
management agent
See management client.
management client
The client binaries of a management server that is
deployed on a client computer to manage that client
computer. Synonymous with management agent.
See “About management agents and clients” on page 63.
management server
An application server that manages distributed
agent/client computers.
See “About management servers” on page 63.
master node
A cluster node that is responsible for certain Cluster
Volume Manager activities. Only one node in a given
cluster can act as the master node.
master server
A NetBackup server that provides administration and
control for backing up and restoring for all clients within
a master and a media server configuration.
media manager
The NetBackup software that manages the storage devices
and removable media.
media server
A NetBackup server that provides storage within a master
server and media server cluster. The master server can
also be a media server. A media server that is not the
master server is called a remote media server.
NetBackup
A distributed backup and restore application.
NetBackup Operations
Manager
A GUI-based administrative tool that can manage all
NetBackup master servers that are deployed throughout
an enterprise.
node
A computer within a cluster.
registration authority
An application that determines whether authentication
principals are valid.
remote media server
A media server that is not the master server.
21
22
Symantec authentication and authorization services
About authentication and authorization
Table 2-3
Terms and definitions (continued)
Term
Definition
resource management
application
A Symantec product whose resources are protected by
Symantec Product Authentication and Authorization
Services. An example of a Symantec product would be
NetBackup.
restore
The process of retrieving saved files, directories, raw
partitions, or file systems to a system for online access.
self-signed certificate
A digital identity (certificate) that is signed by its creator.
See certificate.
storage area network
A fibre channel-based network that connects the servers
and the storage devices. The storage devices are attached
to the network, and they are visible to all of the servers
on the network.
Storage Foundation Manager
A management tool that can centrally monitor, visualize,
and administer hosts on which Storage Foundation
products are installed. Formerly Storage Foundation
Management Server (SFMS).
About authentication and authorization
Authentication is the act of proving whether an entity is who or what it declares
itself to be. An entity can be a user, an application process that runs on a computer,
or an application Web console. The authentication process is conducted on an
intranet of an enterprise through the use of a logon procedure. The logon procedure
is used to gain access to a Symantec application. The logon procedure requires a
valid user ID and password. To ensure that a user is authentic, a valid combination
of the user’s declared password and ID must be provided for the user to be granted
access.
For example, an enterprise can use the NISPLUS mechanism to authenticate users
to access a CommandCentral Web console. On the logon screen, a user must enter
a valid ID and password in the NISPLUS authentication domain.
Assuming a valid user named Bob wants to access the application through the
Web console, the validation of Bob’s identity works, as follows:
Authentication: Who are you?
Bob: I am Bob.
Authentication: Prove yourself.
Bob: OK. Here are materials to prove that I am Bob.
Symantec authentication and authorization services
Benefits of using authentication and authorization
23
Authentication: You have proven yourself and I am convinced. Here is
a certificate to indicate that I believe you are Bob. Combine it with
your private key to make a valid credential to access the application.
The materials that are used in the example could be a user name and a password.
To enable intranet users to securely and privately exchange sensitive and
privileged information, users must be authenticated through the Symantec Product
Authentication Service (AT). Users are authenticated by using the authentication
mechanisms that are already established within an enterprise. Successfully
authenticated users communicate through the secure channel, and are coupled
with the public-key infrastructure (PKI) technology.
PKI technology uses both public and private key pairs for secure communication
to take place. PKI is the default standard on the Internet to authenticate and
transmit data, such as credit card numbers and online bill payments.
In the Symantec PKI implementation, authorization (provided by the Symantec
Product Authorization Service—AZ), is always preceded by authentication (provided
by AT). Authorization is the act of checking what an entity is allowed to do with
critical resources based on predefined rules, then granting permissions to the
entity to manipulate these resources.
Assuming a valid user named Bob wants to manipulate NetBackup policy, granting
access control works, as follows:
Bob: I have proven that I am Bob and I want to
manage NetBackup policies.
Authorization: I believe that you are Bob. Now, let me consult
the rules to see if you are allowed to perform NetBackup policy
manipulations.... Okay. Access Control on policy management is
now granted to you.
Suppose user Bob is also responsible for managing the NetBackup application.
The NetBackup administrator grants the policy manipulation privilege only to
Bob.
After Bob successfully authenticates to the NetBackup application, Bob is allowed
only to create, delete, or modify NetBackup policies, and perform backups and
restores. Bob is not allowed to manage other NetBackup tasks such as device
discovery, new volume pool creation, or other administrative tasks.
Benefits of using authentication and authorization
Symantec products typically require users to have either administrator (Windows)
or root (UNIX/Linux) access privileges to perform installation, configuration, and
24
Symantec authentication and authorization services
Benefits of using authentication and authorization
upgrade operations. Administrator and root are considered superusers of their
respective operating systems, and these superusers have the ability to change or
modify a system’s configuration. Users who are responsible for managing
Symantec products are also required to log on as a superusers.
Symantec products can be deployed on different platforms (UNIX/Linux and
Windows), or installed across multiple systems on the same platform in a data
center. Therefore, many individuals with different roles may be involved in
managing the deployed Symantec products. For example, NetBackup product
management responsibilities can be divided among administrators, security
administrators, users, and operators.
Enterprises typically assign a specific individual or group to be responsible for a
Symantec product. It is possible that the NetBackup, CommandCentral, and Cluster
Manager application administrators can be three different individuals. Giving
superuser privileges to all of the people who manage Symantec products can
increase the chance of exposing the password of the superuser, thus making the
systems more vulnerable to malicious attacks.
To reduce the risk of unauthorized access or change to systems, an enterprise
should implement a security policy to limit the number of people with superuser
privilege. By using AT and AZ, a user without superuser privileges can manage a
Symantec product that typically requires a superuser to manage.
Symantec products integration with AT and AZ, best practices, deployment
guidelines, and actual use cases illustrate the following enterprise benefits:
■
Allow authenticated and authorized users to manage Symantec products
without superuser privileges. After granting the appropriate privileges of a
Symantec product to a user, such as Bob, that user could then perform the
tasks that only the superuser was able to perform. At the operating system
level, user Bob is an ordinary user.
■
Limit the operating system superuser access to a small number of individuals.
Users granted sufficient privileges can manage Symantec products. Therefore,
fewer individuals within the enterprise would require superuser access.
■
Assign a user to be an administrator for each Symantec product. In an
enterprise where separation of responsibilities is required, users Bob, Mary,
and Lee could be assigned to exclusively manage NetBackup, Cluster Manager,
and CommandCentral Storage, respectively. At the operating system level,
these three people are non-privileged users.
■
Selectively grant application roles (administrators, operators) to users. To
restrict the privilege of a night shift NetBackup operator to only launch backup
jobs, the NetBackup administrator can assign the appropriate role to that
operator’s login.
Symantec authentication and authorization services
Benefits of using authentication and authorization
■
Use existing mechanisms (such as NIS, NISPLUS, UNIXPWD, Windows NT
domain, or LDAP) to authenticate users. In the logon session, the non-privileged
user only needs to pick the appropriate authentication mechanism and the
associated authentication domain. NIS, NISPLUS, and UNIXPWD are applicable
to UNIX/Linux platforms. The Windows NT mechanism is specific to the
Windows platform. LDAP, when configured correctly, can authenticate
UNIX/Linux and Windows clients and users residing on UNIX/Linux and
Windows. This eases user management and does not require the enterprise
administrator to manage users separately across all Symantec products.
AT is implemented by PKI technology that uses public and private key pairs to
produce valid user credentials. All messages are encrypted with a session key and
transmitted by using the secure sockets layer (SSL) protocol.
A user’s public key certificate is accessible openly over the network, but the private
key is exclusively known to the credential requestor. The requestor’s private key
is not transmitted over the network. For the requestor to read the encrypted
message, the encrypted message is first decrypted by using the SSL session key,
and then the requestor's private key must be used to read the message.
Because the private key is not accessible on the network, the following types of
threats are avoided by those Symantec products that make use of AT:
■
Casual network snooping (including secretly capturing passwords or other
confidential information, for example)
■
Communication replay attacks on your intranet
■
Session hijacking
Most management client and agents of Symantec products have a command-line
or Web-based interface that can access their management and application servers
by using this secure protocol.
AT offers single sign-on functionality for the Symantec products that implement
this service. Symantec products are all installed with AT enabled, except for earlier
versions of NetBackup (requires additional configuration steps to be enabled).
25
26
Symantec authentication and authorization services
Benefits of using authentication and authorization
Chapter
3
Overview of the Symantec
Product Authentication
Service
This chapter includes the following topics:
■
Authentication service overview
■
Authentication hierarchy
■
Authentication components
■
How the authentication process works
■
Authentication brokers in a high availability environment
■
Authentication expiry
Authentication service overview
The Symantec Product Authentication Service (AT) is deployed as a hierarchy of
components consisting of a root broker at the top level, one or more authentication
brokers, and including multiple authentication entities.
The root broker implements the functionality that is associated with a registration
authority. The registration authority is the entity that sends requests to the root
broker to determine whether the authentication brokers are valid. The
trustworthiness of authentication brokers is vouched with the valid authentication
entities (principals).
Authentication brokers implement the certificate authority functionality, which
follows a security model similar to the public key infrastructure (PKI). The
28
Overview of the Symantec Product Authentication Service
Authentication hierarchy
authentication brokers issue and sign the certificates that are used to prove the
identities of entities (such as computers, users, and services) that interact with
Symantec products. The certification authority issues the product credentials to
the requesting authentication entities (principals) based on the registration
authority's validity check.
All communications between brokers and entities use the secure socket layer (SSL)
protocol.
Authentication hierarchy
The authentication hierarchy is the physical arrangement, or structure, of the
Symantec Product Authentication Service components in your environment. This
includes the root broker, authentication broker, authentication principal, and
authentication entities. At the top level, the root broker can exist by itself or
co-exist with an authentication broker.
For more information on setting up an authentication hierarchy with stand-alone
brokers, see the Symantec Product Authentication and Authorization Volume III.
Figure 3-1 illustrates a typical authentication hierarchy.
Figure 3-1
Authentication hierarchy
Overview of the Symantec Product Authentication Service
Authentication components
Authentication principal
An authentication principal is any entity that can authenticate to the Symantec
Product Authentication Service with a unique identity.
An authentication principal is a logical term that typically represents a human
user, which can also be any of the following:
■
A computer
■
A service
■
A process (such as a command line interface)
Authentication principals are authenticated based upon their identities. Most
Symantec applications are represented by authentication principals. However,
the identities that are associated with the authentication principals are distinct
from the operating system login account identities.
Authentication components
The Symantec Product Authentication Service (AT) consists of the following
components:
■
Root broker
■
Authentication broker
■
Authentication plug-ins and mechanisms
■
Authentication entities
■
Authentication user interface
■
Authentication broker communication port
Root broker
The root broker is the first broker that is established. The root broker resides at
the top level of the authentication hierarchy. The root broker vouches for itself
with a self-signed root certificate, and is the most trusted certification authority.
The root broker implements a registration authority to validate authentication
brokers, and has a private domain repository with the authentication principals
that represent authentication brokers.
Figure 3-2 shows a root broker that is deployed on a host machine, which contains
a private domain repository that may contain one or more authentication brokers.
29
30
Overview of the Symantec Product Authentication Service
Authentication components
Figure 3-2
Root broker private domain repository
Authentication broker
An authentication broker differs from a root broker in that is serves as both an
intermediate registration authority and as a certification authority. As a
registration authority, it determines whether authentication principals are valid.
As a certification authority, it issues product credentials to the requesting
authentication clients (such as users or services) based on the registration
authority's validity check of a client's authentication principals.
The certificate of an authentication broker is signed by the root broker. The
authentication broker authenticates only clients—it cannot authenticate other
authentication brokers. The authentication broker resides one level below the
root broker in the authentication hierarchy.
Figure 3-3 shows an authentication broker that is installed on a host machine.
The authentication broker may contain multiple private domains where each
domain is provisioned by one of the application services.
Figure 3-3
Authentication broker private domain repository
Authentication plug-ins and mechanisms
An authentication plug-in is a component that is used by the authentication broker
to validate the identities within an authentication domain. A plug-in exists for
Overview of the Symantec Product Authentication Service
Authentication components
each supported authentication mechanism. A mechanism is a method by which
authentication is conducted for the authentication principals within a specific
namespace that is defined by a domain type (such as NIS, NISPLUS, Windows NT,
LDAP, or UNIXPWD).
Plug-ins and domain types are synonymous, and they have one-to-one mapping
with authentication mechanisms. An authentication mechanism encapsulates all
the details of the authentication algorithm that is specific to each domain type.
For example, the NIS plug-in can validate identities with a NIS login and password
combinations against a NIS database.
The following plug-ins are supported in various versions of AT:
■
NIS (formerly called YP – Yellow Pages)
■
NISPLUS (NIS+)
■
UNIXPWD – Password on UNIX and Linux systems
■
LDAP – OpenLDAP and iPlanet implementations
■
GSSAPI – Generic Security Service Application Programming Interface
■
NT – Windows NT domains and Active Directory (SSPI)
■
VX – Symantec Private Domain (used internally by AT)
Not all plug-ins exist on all platforms. For example, NIS, NISPLUS, and UNIXPWD
are available only on UNIX and Linux systems. The NT plug-in is available only
on Windows. So an authentication broker that is configured on a UNIX system
cannot use a Windows-specific plug-in to authenticate users on Windows. A
Symantec application client is typically required to authenticate against only one
or two domains.
Table 3-1 lists the plug-ins supported by the Symantec Product Authentication
Service versions on UNIX/Linux platforms.
Plug-ins supported on UNIX/Linux
Table 3-1
AT
NIS
NIS+
UNIXPWD
VX
LDAP
GSSAPI
4.1
4.2
4.3
Table 3-2 lists the plug-ins that are supported by the Symantec Product
Authentication Service versions on Windows.
31
32
Overview of the Symantec Product Authentication Service
Authentication components
Table 3-2
AT
Plug-ins supported on Windows
Windows NT
VX
LDAP
GSSAPI
4.1
4.2
4.3
Authentication entities
An authentication entity is any Symantec application that sends an authentication
request to the Symantec Product Authentication Service.
Application service
An application service is a program that is contacted by, and provides services
to, a Symantec application client. AT validates the application service identity.
Application client
An application client is a program that accesses a Symantec service or function
that is provided by another program called a Symantec application service. An
example of a secured application client is the NetBackup Operations Manager
GUI. A Symantec application client uses AT to validate the identity of the user of
that client.
Authentication user interface
The Symantec Product Authentication Service provides a command-line utility,
vssat to administer the product. On UNIX/Linux, the vssat utility is available in
the /opt/VRTSat/bin directory. On Windows, the default folder for vssat.exe is
C:\Program Files\VERITAS\Security\Authentication\bin
To list the vssat options from the command line, type vssat --help. On
UNIX/Linux, type man vssat to display the manual pages.
AT also provides a graphical user interface. To start the GUI, invoke the command
runvssatgui.sh on UNIX/Linux, or runvssatgui.bat on Windows.
Authentication broker communication port
The default communication port number that is used by the root broker or
authentication broker is 2821.
Overview of the Symantec Product Authentication Service
How the authentication process works
Starting with version 4.3, AT can be configured to use the Private Branch Exchange
(PBX) communication port, 1556.
How the authentication process works
For the application client and application service to communicate securely, the
client and the service entities must first be vouched for by the authentication
broker through a secure communication channel. The authentication broker
validates the authentication principals that are associated with these entities,
and then issues credentials to each of them.
After these principals are authenticated, an SSL-encrypted connection is
established between the Symantec application client and the Symantec application
service. The client and service interact over the SSL connection, sending, and
receiving messages as necessary until the client terminates the communication.
The root broker for the authentication broker can be installed on a remote system,
or on the same system as the authentication broker. Credentials that are delivered
to the client and service must contain the electronic signature of the root broker
through the intermediary authentication broker.
Figure 3-4 provides a high-level concept of the authentication process.
Figure 3-4
Authentication process flow
AT uses the secure sockets layer (SSL) technology to provide secured
communication among the Symantec application client, the authentication broker,
and the Symantec application service. During the authentication process, the
33
34
Overview of the Symantec Product Authentication Service
How the authentication process works
client uses the SSL layer for communicating with the authentication broker to
request a product credential.
The secure sockets layer is a public key protocol that was originally created by
Netscape, and used for secure communications between clients and servers over
the Web. When an SSL connection is used, all communication between client and
service is encrypted by the sender and decrypted by the receiver.
The protocol can offer both client authentication and service authentication. Each
encrypted transaction generates a session key. The longer the session key, the
stronger the security.
About acquiring a product credential
On a system with an application client, a user on client A sends authentication
materials to the authentication broker. Materials include the public part of
credential, name, authentication domain, and possibly other material.
The authentication broker is an intermediate certification authority and it has a
credential that is signed by the root broker. The authentication broker validates
the user (identity) by selecting the appropriate plug-in. The plug-in talks to the
OS mechanisms or the VX authentication domain type. The authentication broker
determines that the user on client A is valid and signs the public part of the
credential for the user.
Figure 3-5 illustrates the credential request that the user on client A sends to the
authentication broker.
Figure 3-5
Client credential request
The authentication broker creates a credential (in a form analogous to a passport
or ID card) that vouches for the identity of the user (holder). It then sends the
credential back to the user on client A through the SSL communication channel.
Figure 3-6 illustrates the process by which the signed public credential is sent to
the requesting authentication client.
Overview of the Symantec Product Authentication Service
How the authentication process works
Figure 3-6
Authentication broker response
A valid authentication (product) credential is then constructed by combining the
signed public credential with the user's own private key. The authentication
credential entitles the user (security principal) to be recognized as a valid identity
by Symantec products.
The authentication credential is stored and managed by the credential manager
on the system (client A) where the user resides. The authentication credential is
a single sign-on credential that is valid for all Symantec applications that
participate in a single sign-on environment.
Figure 3-7 illustrates the public key infrastructure (PKI) protocol where the user's
private key (including the user's name) is bound with the public certificate created
and signed by the authentication broker. The credential is then sent to the
authentication client.
Figure 3-7
Authentication credential
35
36
Overview of the Symantec Product Authentication Service
Authentication brokers in a high availability environment
Authentication brokers in a high availability
environment
One of the most important components in the Symantec Product Authentication
Service (AT) is the broker. A root broker is needed when you want to create
additional authentication brokers. An authentication broker provides the critical
function of authentication and must be available constantly. To make these brokers
highly available, they can be configured on a Veritas Cluster Server (VCS) as a
VCS service group.
VCS ensures that the AT service group is always online on one of the nodes. Access
to the high availability AT broker is accomplished through the virtual host name
that is assigned to the AT service group. By accessing the AT service through the
virtual host name, clients do not need to know the physical computer the AT
service is located on.
For more information on setting up an authentication hierarchy with high
availability brokers, see the Symantec Product Authentication and Authorization
Volume III.
Root plus authentication broker in a high availability environment
When you create an authentication hierarchy, you can configure the authentication
service to act as both a root broker and an authentication broker. This
configuration is referred to as the root-plus-authentication broker. The
root-plus-authentication broker can be configured as a high availability broker.
Access to the high availability broker is achieved through the virtual host name.
Unlike the stand-alone AT configuration, when you add an authentication
hierarchy with high availability brokers, additional configuration steps are needed.
Authentication broker in a high availability environment
You can configure an authentication broker in a high availability configuration.
Access to the high availability authentication broker is achieved through the
virtual host name. Unlike the stand-alone authentication broker, additional
configuration steps are needed to add a high availability authentication broker.
The root broker that is remote can be configured as either a stand-alone or a high
availability broker.
Authentication expiry
Each certificate that the Symantec Product Authentication Service issues has a
validity period. After a credential expires it is no longer usable, and the credential
Overview of the Symantec Product Authentication Service
Authentication expiry
must be reacquired. There are different types of certificates, and each type has
its own validity period.
Table 3-3 lists the authentication entities and their corresponding validity periods.
Table 3-3
Default expiry periods
Entity
Default expiry period
Root Broker
8 years
Authentication Broker
8 years
Service Principal
2 years
User Principal
1 year
Authorization Service
2 years
NetBackup System
1 year
NetBackup Login Session
24 hours
Web Session
8 hours
CommandCentral Web Session
30 minutes
37
38
Overview of the Symantec Product Authentication Service
Authentication expiry
Chapter
4
Overview of the Symantec
Product Authorization
Service
This chapter includes the following topics:
■
Authorization service overview
■
Authorization components
■
Access control policy
■
Access control lists
■
Authorization service in a high availability environment
■
How the authorization process works
Authorization service overview
The Symantec Product Authorization Service (AZ) is an access control
decision-making service. The Symantec Product Authentication Service (AT)
validates the identities of entities (principals) that work with Symantec software
applications. After the identities are validated, the authorization service is used
to make access control decisions. The authorization service determines which
entities have permission to perform specific tasks on specific resources. A resource
is a uniquely-identified object. For example, a NetBackup resource can be a tape
library or a volume pool.
The authorization service works within the policies that are established by a
product administrator. An administrator can view, set, or modify a policy through
40
Overview of the Symantec Product Authorization Service
Authorization components
the application user interfaces. These authorization policies are recorded in a
database. Access decisions are made by consulting this database. After making
an access decision, authorization allows each Symantec application to enforce
the decision.
Figure 4-1 shows a high-level overview of the authorization process.
Figure 4-1
Authorization overview
Authorization components
Symantec Product Authorization Service (AZ) consists of the following components:
■
Authorization service
■
Authorization client
■
Access control information data repository
Overview of the Symantec Product Authorization Service
Authorization components
■
Master authorization service
■
Local authorization service
■
Resource management application
■
Authorization group or namespace
■
Authorization user interface
■
Authorization service communication port
Authorization service
The Symantec Product Authorization Service (AZ) makes access control decisions
for the authentication entities (principals) after validating their identities. The
AZ service component enables the security administrator of a Symantec product
to create and manage the access control for the entries.
For more information on setting up a stand-alone authorization service for access
control, see the Symantec Product Authentication and Authorization Volume III.
Authorization client
An authorization client runs on a host that requests an access control decision
determined by the authorization service. For example, on a host that has a
NetBackup media server, the authorization client uses the main authorization
database on the master server to allow the media server to perform an
authorization check.
Access control information data repository
The data repository is a database that maintains the master copy of the
authorization service. The database contains the information required to make
authorization decisions. This information includes data on the resources that are
advertised by Symantec resource management applications (service access control
information), and data on the resources that are used by authorization
(administration access control information).
Figure 4-2 shows the structure of this type of data repository.
41
42
Overview of the Symantec Product Authorization Service
Authorization components
Figure 4-2
Authorization data repository
Master authorization service
The master authorization service holds and maintains the central access control
information data repository. In a distributed authorization environment, where
local authorization servers exist, certain information from the master ACL data
repository is periodically copied to, and synchronized with, the local authorization
server.
Local authorization service
The local authorization service is the host that holds and maintains a read-only
copy of access control information, which has been imported from the master
access control information data repository. Periodically, the local information is
synchronized with the information in the master repository.
Resource management application
This component is a Symantec product whose resources are being protected by
Symantec Product Authorization Service (AZ). Resource management applications
are made up of application clients and application services. Resource management
applications perform the following tasks, related to the Symantec Product
Authorization Service:
■
Advertise the existence of the resource they want to protect because AZ does
not have its own discovery function.
Overview of the Symantec Product Authorization Service
Access control policy
■
Ask the authorization service to make an access control decision for the
required service requests, and then enforce the decision by applying predefined
rules or policies.
Authorization group or namespace
An authorization group is a collection of entities (such as users). Entities in a
namespace can use different authentication domains. For example, a user (vegeta)
can employ the UNIXPWD domain type, while another user (trunk) employs the
NISPLUS domain type. Any authenticated entity is then granted the authorization
privileges that are based on the policy that is defined for the group.
Authorization user interface
The Symantec Product Authorization Service provides a command-line utility
(vssaz) to administer the product. On UNIX/Linux, the vssaz utility is available
in the /opt/VRTSaz/bin directory. On Windows, the default folder for vssaz.exe
is C:\Program Files\VERITAS\Security\Authorization\bin
To list the vssaz options, type vssaz --help from the command line. On
UNIX/Linux, type man vssaz to display the manual pages.
Authorization service communication port
The Symantec Product Authorization Service default communication port number
is 4032. You should specify this port number when you connect to the authorization
service.
Access control policy
An access control policy (ACP) is a set of rules that define how application resources
are protected from unauthorized use. Specifically, the policy states the permissions
that an authenticated entity (such as user) can have over secured objects. For
NetBackup, the ACP is defined as individual permission groups or namespaces.
NetBackup predefines five namespaces (for example, NBU_Operator and
NBU_Admin).
The security administrator assigns entities to each namespace. When an
authenticated entity tries to use a secured object, the NetBackup resource
management application invokes the decision-making service of Symantec Product
Authorization Service (AZ). AZ determines the access rights of the entity and
returns its decision to the application to be enforced.
43
44
Overview of the Symantec Product Authorization Service
Access control lists
For more information on NetBackup and AZ service, see the Symantec Product
Authentication and Authorization Volume III.
Access control lists
An access control list (ACL) is a collection of zero or more entries within an access
control policy (or permission namespaces). Each entry associates an authenticated
entity with a specific permission to perform tasks defined by the access control
policy. For example, the entities that are assigned to the NetBackup NBU_Operator
permission namespace have only the ability to mount or unmount tapes. Entities
that are assigned to the NBU_Admin permission namespace have NetBackup
administrative privileges.
Authorization service in a high availability
environment
The Symantec Product Authorization Service (AZ) provides the critical function
of access control and must be available constantly. To make the AZ service highly
available, it can be configured on a Veritas Cluster Server (VCS) as a VCS service
group.
VCS ensures that the AZ service group is always online on one of the nodes. Access
to the high availability AZ service is accomplished through the virtual host name
that is assigned to the AZ service group. By accessing the AZ service through the
virtual host name, clients do not need to know the physical computer the AZ
service is located on.
Unlike the stand-alone AZ configuration, additional configuration steps are needed
when you set up a high availability authorization service.
AZ service is dependent on the AT service (for the authentication broker) and
must be configured after the high availability AT service is setup. In a high
availability configuration, both the AT and the AZ services must be configured
with high availability.
In a non-securable VCS cluster, the AZ and the AT services must be configured in
the AT VCS service group. Access to the high availability AZ services must use
the AT's virtual host name.
In a securable VCS cluster, the high availability AZ service is configured in its own
VCS service group and has its own virtual host name. The AZ virtual host name
is dedicated to the AZ's VCS service group and must be used to access the AZ
service. AZ accesses the AT service through the AT's virtual host name.
Overview of the Symantec Product Authorization Service
How the authorization process works
For more information on setting up a high availability authorization service for
access control, see the Symantec Product Authentication and Authorization Volume
III.
How the authorization process works
For Symantec management applications that are integrated with the Symantec
Product Authorization Service (AZ), the product security administrator determines
which Symantec application resource to protect. The security administrator then
configures the access control rules for the resources that are used by the protected
applications.
When an entity wants to use a protected application resource, it goes through the
following authorization process:
■
The user logs on, is authenticated, and is allowed to start accessing a resource
management application.
■
The resource management application requests permission for an entity
(principal) to access a resource.
■
The AZ service consults established access control policy, and then checks the
access control list to determine whether the requested access is allowed.
■
The AZ service passes its decision back to the protected application.
■
The resource management application enforces the decision made by the AZ
service.
45
46
Overview of the Symantec Product Authorization Service
How the authorization process works
Chapter
5
How Symantec Product
Authentication and
Authorization are used
across Symantec products
This chapter includes the following topics:
■
About deploying an authentication hierarchy
■
About deploying an authorization service
About deploying an authentication hierarchy
Deploying Symantec products with Symantec Product Authentication Service
(AT) involves the following topics:
■
About the need to create one authentication hierarchy for your enterprise
■
How AT provides secure communication
■
About assimilating AT into your enterprise
■
About upgrading AT
Deploying a Symantec product that makes use of the Symantec Product
Authentication Service (AT) requires the implementation of an authentication
hierarchy tree. A hierarchy tree consists of a root broker and one or more
authentication brokers.
When Symantec products are integrated with AT and are deployed together, an
authentication broker is set up for each product in the authentication hierarchy.
48
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
The root broker and authentication brokers create their private domain
repositories (root domain and authentication domains), respectively.
For more information on AT use case, see the Symantec Product Authentication
and Authorization Volume III.
Deploying a Symantec product that makes use of the Symantec Product
Authorization Service (AZ) requires the implementation of an AZ server. You
typically configure an AZ server on the same system as the resource management
application (such as the NetBackup master server).
For more information on AZ use case, see the Symantec Product Authentication
and Authorization Volume III.
About the need to create one authentication hierarchy for your
enterprise
You plan the authentication hierarchy to which the authentication brokers belong,
according to the needs of your enterprise. Ideally, one authentication hierarchy
is sufficient and recommended. Within an authentication hierarchy, you can set
up authentication brokers across UNIX/Linux and Windows platforms.
The root broker in the authentication hierarchy holds the absolute power of
registration and certification. The root broker has the ultimate authority over the
validity of a certificate that an authentication broker issues to an authenticating
entity.
Authentication brokers are the intermediary registration and certification
authorities. Their role is to authenticate the client entities that must communicate
with the products' application services.
Authentication brokers that are created in separate authentication hierarchies
maintain distinct root certificates. Certificates from different authentication
hierarchies are not compatible. A secure communication channel between an
application client and an application service cannot be established unless the
client and the service use the authentication brokers that are descended from the
same root broker. Therefore, it is a hindrance when authentication brokers from
multiple authentication hierarchies are involved.
When you install certain Symantec products that have management servers or
application servers, the authentication service is automatically configured. Be
aware that some management servers implicitly create an authentication broker
in a new authentication hierarchy during installation, and inadvertently establish
a new root broker.
See Figure 3-4 on page 33.
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
How AT provides secure communication
The Symantec Product Authentication Service (AT) vouches for the identities of
the application client and the application service, and issues certificates to these
entities. After these entities establish a valid product credential, a secure
communication channel is created between the requesting client and the
application service. The application client can be on the computer with the
application service, or on a different computer.
See Figure 3-4 on page 33.
The Symantec products that are integrated with the AT require a dedicated
authentication broker. These Symantec products have the Symantec management
server and agent (or client) components that use the AT service. Examples of a
Symantec management server include NetBackup and CommandCentral Storage.
All of the management servers have an accompanying authentication broker.
Symantec recommends that an authentication broker be set up on the same
computer as the management server.
In addition to the authentication broker, a Symantec management server must
also create one or more private authentication domains. For example,
CommandCentral creates the cc_users authentication domain with principals
for the CommandCentral users to log in. NetBackup creates the NBU_Machines
authentication domain. The NetBackup domain holds all the NetBackup-related
authentication principals (clients, master, and media).
Entities (such as users) who want to establish an authentication session must
authenticate by using the authentication principals that are created in the
authentication domain. The authentication broker that is exclusively configured
for a management server is then used to authenticate all the entities.
See Figure 3-3 on page 30.
About assimilating AT into your enterprise
The Symantec Product Authentication Service (AT) supports many authentication
mechanisms that are available on UNIX, Linux, and Windows.
See “Authentication plug-ins and mechanisms” on page 30.
The AT product provides a plug-in for each of the supported authentication
mechanisms. Symantec products that are integrated with AT use the plug-in to
authenticate entities (such as users) who access the products.
Enterprises that set up one or more of these authentication mechanisms (such as
NIS+ or LDAP) make it possible to deploy Symantec products with AT. These
49
50
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
mechanisms allow the users of Symantec management servers and the clients to
reuse the existing authentication infrastructure in an enterprise.
NetBackup
NetBackup is integrated with Symantec Product Authentication Service (AT).
Table 5-1 lists the plug-ins that are supported by NetBackup on UNIX, Linux, and
Windows platforms.
Table 5-1
Plug-ins supported by NetBackup
NetBackup version UNIX/Linux
platform
Windows platform Cross platform
6.0MP4
NIS
Windows NT
6.0MP5
NISPLUS
6.5
UNIXPWD
6.5.1
The use cases show the specific version of the NetBackup product that is tested.
For more information on NetBackup use case on UNIX/Linux and Windows, see
the following sections in Symantec Product Authentication and Authorization
Volume II:
■
NetBackup use case for UNIX/Linux
■
NetBackup use case for Windows
NetBackup Operations Manager
NetBackup Operations Manager (NOM) is integrated with Symantec Product
Authentication Service (AT).
Table 5-2 lists the plug-ins that are supported by NOM on UNIX, Linux, and
Windows platforms.
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
Table 5-2
Plug-ins supported by NOM
NOM version
UNIX/Linux
platform
Windows platform Cross platform
6.0MP4
NIS
Windows NT
6.0MP5
NISPLUS
6.5
UNIXPWD
6.5.1
The use case shows the specific version of the NOM product that is tested.
For more information on NOM use case, see the Symantec Product Authentication
and Authorization Volume II.
Veritas Backup Reporter
Veritas Backup Reporter (VBR) is integrated with Symantec Product Authentication
Service (AT).
Table 5-3 lists the plug-ins that are supported by VBR on UNIX, Linux, and
Windows platforms.
Table 5-3
Plug-ins supported by VBR
VBR version
UNIX/Linux
platform
5.0
NIS
5.0MP1
NISPLUS
Windows platform Cross platform
AL: verify the plug-in
UNIXPWD
The use case shows the specific version of the VBR product that is tested.
For more information on VBR use case, see the Symantec Product Authentication
and Authorization Volume II.
Veritas Storage Foundation
The Veritas Cluster Server (VCS) that is distributed in the following Veritas Storage
Foundation products are integrated with Symantec Product Authentication Service
(AT):
■
Storage Foundation Enterprise HA (SFEHA)
■
Storage Foundation for Oracle RAC (SF RAC)
51
52
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
■
Storage Foundation Cluster File System (SFCFS)
■
Storage Foundation for Windows HA (SFWHA)
See Table 5-4 on page 52.
The use cases show the specific version of the VCS products that are tested.
For more information on Storage Foundation products use case on UNIX/Linux
and Windows, see the following sections in Symantec Product Authentication and
Authorization Volume II:
■
Storage Foundation products use case for UNIX/Linux
■
Storage Foundation products use case for Windows
Veritas Cluster Server
Veritas Cluster Server (VCS) is integrated with Symantec Product Authentication
Service (AT).
Table 5-4 lists the plug-ins that are supported by the VCS product on UNIX, Linux,
and Windows platforms.
Table 5-4
Plug-ins supported by VCS
VCS version
UNIX/Linux
platform
4.1
NIS
4.1MP2
NISPLUS
5.0
UNIXPWD
Windows platform Cross platform
5.0MP1
4.3MP1
Windows NT
4.3MP2
5.0
5.1
The use cases show the specific version of the VCS products that are tested.
For more information on VCS use case on UNIX/Linux and Windows, see the
following sections in Symantec Product Authentication and Authorization Volume
II:
■
Veritas Cluster Server use case for UNIX/Linux
■
Veritas Cluster Server use case for Windows
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
Storage Foundation Manager
Storage Foundation Manager (SFM) is integrated with Symantec Product
Authentication Service (AT).
Note: Storage Foundation Manager was formerly known as Storage Foundation
Management Server (SFMS).
Table 5-5 lists the plug-ins that are supported by SFM on UNIX, Linux, and
Windows platforms.
Table 5-5
Plug-ins supported by SFM
SFM version
UNIX/Linux
platform
1.0MP1
NIS
1.1
NISPLUS
Windows platform Cross platform
UNIXPWD
The use case shows the specific version of the SFM product that is tested.
For more information on the SFM use case, see the Symantec Product
Authentication and Authorization Volume II.
Veritas Cluster Server Management Console
Veritas Cluster Server Management Console (VCS MC) is integrated with Symantec
Product Authentication Service (AT).
Note: Veritas Cluster Server Management Console was formerly known as Cluster
Management Console (CMC).
Table 5-6 lists the plug-ins that are supported by VCS MC on UNIX, Linux, and
Windows platforms.
53
54
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
Table 5-6
Plug-ins supported by VCS MC
VCS MC version
UNIX/Linux
platform
5.0
NIS
5.0MP1
NISPLUS
Windows platform Cross platform
UNIXPWD
The use case shows the specific version of the VCS MC product that is tested.
For more information on the VCS MC use case, see the Symantec Product
Authentication and Authorization Volume II.
CommandCentral Storage and Service
CommandCentral Storage and Service are integrated with Symantec Product
Authentication Service (AT).
Table 5-7 lists the plug-ins that are supported by CommandCentral Storage on
UNIX, Linux, and Windows platforms.
Table 5-7
Plug-ins supported by CommandCentral Storage
CC Storage version UNIX/Linux
platform
Windows platform Cross platform
4.2FP1
NIS
Windows NT
4.3
NISPLUS
5.0
UNIXPWD
LDAP
Table 5-8 lists the plug-ins that are supported by CommandCentral Service on
UNIX, Linux, and Windows platforms.
Table 5-8
Plug-ins supported by CommandCentral Service
CC Service version UNIX/Linux
platform
Windows platform Cross platform
4.2FP1
Windows NT
NIS
LDAP
NISPLUS
UNIXPWD
The use cases show the specific version of the CommandCentral Storage and
Service products that are tested.
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authentication hierarchy
For more information on the CommandCentral storage and service use case on
UNIX/Linux and Windows, see the following sections in the Symantec Product
Authentication and Authorization Volume II:
■
CommandCentral storage and service use case for UNIX/Linux
■
CommandCentral storage and service use case for Windows
Symantec License Inventory Manager
Symantec License Inventory Manager (SLIM) is integrated with Symantec Product
Authentication Service (AT).
Table 5-9 lists the plug-ins that are supported by SLIM on UNIX, Linux, and
Windows platforms.
Table 5-9
Plug-ins supported by SLIM
SLIM version
UNIX/Linux
platform
Windows platform Cross platform
4.0.4
NIS
Windows NT
5.0
NISPLUS
UNIXPWD
The use cases show the specific versions of the SLIM product that are tested.
For more information on the SLIM use case on UNIX/Linux and Windows, see the
following sections in the Symantec Product Authentication and Authorization
Volume II:
■
Symantec License Inventory Manager use case for UNIX/Linux
■
Symantec License Inventory Manager use case for Windows
About upgrading AT
On a computer that has a management server, you can install the agents or the
clients of other Symantec products. For example, on the computer that has a
NetBackup management server, you can install the CommandCentral and VBR
management agents. The management server and management agents or clients
may require a different version of the Symantec Product Authentication Service
(AT).
When you upgrade the AT for a Symantec product, it may involve a compatibility
issue for other Symantec products that are installed on a computer. Before you
upgrade AT, you must verify that the new version is compatible with other
Symantec products. A good practice is to maintain a test environment in your
55
56
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authorization service
datacenter. You can use it to test new AT releases or maintenance packs before
you deploy the software to your production environment.
On a computer, a management server, agents, and clients of multiple Symantec
products may require different versions of AT. In this environment, you select
the latest version of AT and then you install it on the computer. You must use the
best practices to deploy AT across Symantec products.
Every Symantec product that is described in this document lists the AT versions
it is compatible with. The AT compatibility information for each Symantec product
is listed in the respective UNIX/Linux and Windows use cases.
See “Multiple product deployment approach” on page 59.
For more information on deploying Symantec products with the security feature,
see the following sections in Symantec Product Authentication and Authorization
Volume II:
■
Deployment of Symantec products with security on UNIX/Linux
■
Deployment of Symantec products with security on Windows
About deploying an authorization service
Deploying Symantec products with Symantec Product Authorization Service (AZ)
involves the following topics:
■
How AZ provides access control
■
About assimilating AZ into your enterprise
■
About upgrading AZ
The Symantec Product Authorization Service (AZ) provides an access control
service. After AT validates the identities of entities (principals) associated with
the Symantec products, AZ determines whether the validated entities have the
authority to perform privileged tasks on the protected resources.
How AZ provides access control
Symantec Product Authorization Service (AZ) works within the authorization
policies. The security administrators of Symantec products establish the
authorization policies. An administrator who wants to view, set, or modify a policy
can do so through the product user interface. AZ provides an authorization policy
database against which access decisions are made. After an access decision is
made, AZ allows each Symantec application to enforce that decision.
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authorization service
About assimilating AZ into your enterprise
You can deploy Symantec products with access control in enterprises that have
setup the Symantec Product Authorization Service (AZ) . The non superusers that
are granted the access control on privileged resources enable the users to have
superuser privileges.
NetBackup
NetBackup is integrated with Symantec Product Authorization Service (AZ).
The NetBackup master server uses the AZ authentication domain, SERVICES to
hold the authentication principal that is related to the NetBackup authorization
activities. The use case chapters show the specific version of the NetBackup
product that is tested.
For more information on NetBackup use case on UNIX/Linux and Windows, see
the following sections in Symantec Product Authentication and Authorization
Volume II:
■
NetBackup use case for UNIX/Linux
■
NetBackup use case for Windows
You can use the guidelines and best practices that are available to configure
NetBackup with AZ.
For more information on NetBackup and AZ service, see the Symantec Product
Authentication and Authorization Volume III.
CommandCentral Storage
CommandCentral Storage 5.0 is integrated with Symantec Product Authorization
Service (AZ).
The use cases show the specific version of the CommandCentral Storage product
that is tested.
For more information on the CommandCentral storage and service use case on
UNIX/Linux and Windows, see the following sections in the Symantec Product
Authentication and Authorization Volume II:
■
CommandCentral storage and service use case for UNIX/Linux
■
CommandCentral storage and service use case for Windows
About upgrading AZ
On a computer that has a management server, you can install the agents or the
clients of another Symantec product. For example, on the computer with a
57
58
How Symantec Product Authentication and Authorization are used across Symantec products
About deploying an authorization service
NetBackup media server, you can install the CommandCentral Storage agent. The
management server and management agents or clients may require a different
version of the Symantec Product Authorization Service (AZ).
When you upgrade the AZ for a Symantec product, it may involve a compatibility
issue for other Symantec products that are installed on a computer. Before you
upgrade AZ, you must verify that the new version is compatible with other
Symantec products. A good practice is to maintain a test environment in your
datacenter. You can use it to test new AZ releases or maintenance packs before
you deploy the software to your production environment.
On a computer, a management server, agents, and clients of multiple Symantec
products may require different versions of AZ. In this environment, you can select
the latest version of AZ and then you install it on the computer. You must use the
best practices to deploy AZ across Symantec products.
See “Multiple product deployment approach” on page 59.
For more information on deploying Symantec products with the security feature
on UNIX/Linux and Windows, see the following sections in Symantec Product
Authentication and Authorization Volume II:
■
Deployment of Symantec products with security on UNIX/Linux
■
Deployment of Symantec products with security on Windows
Chapter
6
Deployment guidelines and
best practices
This chapter includes the following topics:
■
Multiple product deployment approach
■
How to determine the broker architecture
■
About implementing AT and AZ services in your enterprise
■
AT and AZ administration tasks
■
AT and AZ backup and recovery strategy
■
Empirical use cases
■
Use cases verification steps and troubleshooting tips
Multiple product deployment approach
Symantec Product Authentication Service (AT) and Symantec Product
Authorization Service (AZ) provide the security infrastructure for all the Symantec
products. The secure deployment of Symantec products requires careful analysis
and planning. Business requirements in your enterprise dictate the basis of both
the security architecture and the implementation approach.
Symantec recommends that you interpret your business requirements in a master
plan with short-term and long-term deliverables. A phased approach that deploys
one or two products at a time has proven to be effective in the deployment of
Symantec products with security services.
You use the implementation guidelines to create a plan to deploy all Symantec
products with the AT and the AZ enabled.
60
Deployment guidelines and best practices
Multiple product deployment approach
You must consider the following issues:
■
The authentication hierarchy (root broker).
■
The number of authentication brokers.
■
The distribution of management servers, agents, and clients.
The following Symantec products are targeted for deployment with the AT and
the AZ:
■
Storage Foundation Manager (SF Manager)
■
Veritas Cluster Server Management Console (VCS MC)
■
Storage Foundation (SF)
■
Veritas Cluster Server (VCS)
■
NetBackup (NBU)
■
NetBackup Operations Manager (NOM)
■
Veritas Backup Reporter (VBR)
■
CommandCentral Storage and Service (CC Storage/Service)
■
Symantec License Inventory Manager (SLIM)
Figure 6-1 shows a deployment scenario of these Symantec products.
Deployment guidelines and best practices
Multiple product deployment approach
Figure 6-1
Multiple product enterprise security deployment scenario
61
62
Deployment guidelines and best practices
Multiple product deployment approach
In a phased approach, you design an implementation strategy that gradually adds
more Symantec products to the security infrastructure. The implementation
strategy is accompanied by the framework and the configuration information
that is depicted in Figure 6-1.
In phase 1, an authentication hierarchy is set up for the first Symantec product
that is deployed with security. The rest of the phases add more Symantec products
with the security capability into the enterprise. Each phase deploys one or more
management servers. These management servers require the setup of one or more
authentication brokers in the authentication hierarchy.
About application servers
An application is a group of computer programs that work together to perform
specific tasks. Examples of Symantec applications include Storage Foundation
products (Veritas Cluster Server), NetBackup, Veritas Backup Reporter, and
CommandCentral Storage.
Symantec applications use the services that are available on the computer
operating system and the supporting Symantec applications. The supporting
Symantec applications include Private Branch Exchange, Authentication, and
Authorization.
See Table 2-1 on page 16.
An application server is a computer that is connected to an enterprise intranet,
and that runs a specific Symantec application. An application server typically
provides services to client computers.
Note: Application server and application service are synonymous and used
interchangeably.
About deploying application servers
On the computers that have an application server installed, the management
client or agents are also likely to be installed. These clients or agents manage the
application resources on these computers.
About deploying VCS with security
To deploy Veritas Cluster Server (VCS) with authentication service enabled, you
must configure an authentication broker on each node in the VCS cluster. Symantec
recommends that these authentication brokers use a root broker that is located
on a remote computer (outside of the VCS cluster). It is possible to configure the
root broker on one of the nodes in the VCS cluster, but it is not recommended.
Deployment guidelines and best practices
Multiple product deployment approach
About management servers
An application server that also manages client computers is called a management
server. A management server manages the resources on the client computers.
Resources on the client computers may include data, licensing information, and
storage capacity. The management server and the clients computers are connected
to the enterprise intranet.
See Table 2-1 on page 16.
Examples of Symantec management servers include NetBackup, NetBackup
Operations Manager (NOM), and CommandCentral Storage. Each of these
management servers manages a specific type of information on the client
computers. For example, NetBackup performs the backup and the recovery
operations for the data that resides on the client computers. NetBackup Operations
Manager manages the NetBackup master servers.
Note: Storage Foundation products are not categorized as management servers
because they do not manage client computers.
About deploying management servers
Symantec does not recommend that you deploy multiple product management
servers on the same computer. Management servers, like NetBackup master server
and CommandCentral Storage server, are typically installed on separate computers.
While you should deploy one product management server on a single computer,
you can set up a NOM management server on the same computer as the NetBackup
master server.
About deploying management servers with security
An authentication broker should always be configured for a management server
that is enabled with security. A management server that is set up on a computer
requires an authentication broker on the local computer. Symantec recommends
that you associate the authentication broker with an authentication hierarchy on
either the local system or on a remote system.
About management agents and clients
For a management server to manage a client computer, the product's client or
agent software must be installed on the client computer. You associate a client
with a specific management server by configuring it during or after the product
installation.
See Table 2-1 on page 16.
63
64
Deployment guidelines and best practices
How to determine the broker architecture
Note: NetBackup refers to its clients as clients. Other Symantec products refer to
their clients as agents. NetBackup clients are also referred to as agents by other
Symantec products. In this context, the agent and client are the same.
On a client computer, you can install a NetBackup client, CommandCentral, and
Veritas Backup Reporter agents. On the computers that have either management
agents or clients installed, typically, the client component of AT and AZ is installed.
You can configure a SLIM management agent on a system that has the Veritas
Cluster Server or the NetBackup master server.
See “About application servers” on page 62.
See “About management servers” on page 63.
How to determine the broker architecture
In an authentication hierarchy, there is only one root broker. The root broker
resides at the top of the hierarchy, and it is validated with a self-signed credential.
Every authentication hierarchy has a 40-byte electronic signature that is called
a root hash that uniquely identifies the root broker. The root hash is stored in a
binary file (root_hash), and an authentication command is available to display
the hash value.
See Figure 3-1 on page 28.
Note: Symantec strongly recommends that you establish one authentication
hierarchy (root broker) for your enterprise.
You can install and configure a root broker on a UNIX, Linux, or Windows platform.
The root broker authenticates a group of authentication brokers, signs their
certificates, and maintains the root private domain repository (PDR) to track these
authentication brokers.
See Figure 3-2 on page 30.
Authentication brokers reside one level below the root broker. There can be
multiple authentication brokers in the authentication hierarchy. An authentication
broker serves as an intermediary registration authority between the root and the
authenticating entities. It also serves as a certification authority that can
authenticate management servers, management agents and clients, users, and
application services.
See Figure 3-3 on page 30.
Deployment guidelines and best practices
How to determine the broker architecture
An authentication broker cannot authenticate other authentication brokers. Each
authentication broker has an authentication PDR that stores the domains of
management servers such as NetBackup, VCS, CommandCentral, and other
Symantec products. Most management servers require that you configure an
authentication broker on the same computer as the management server.
You can establish an authentication hierarchy on a UNIX, Linux, or Windows
platform. You can install and configure a root broker on Windows or UNIX/Linux.
You can install and configure authentication brokers on UNIX/Linux and Windows.
On a platform, the AT product installs a list of plug-ins that are available to each
authentication broker. An authentication broker uses the authentication
mechanism that is associated with the plug-in to authenticate the users. An
authentication mechanism is either platform-specific (such as UNIXPWD, NIS,
NISPLUS, or Windows NT), or it can span across platforms (such as LDAP).
Figure 6-2 shows an authentication hierarchy with the broker architecture that
is applicable to the deployment scenario of the Symantec products.
65
66
Deployment guidelines and best practices
How to determine the broker architecture
Figure 6-2
An authentication hierarchy with a root broker and heterogenous
authentication brokers
In the high-level layout of a sample security infrastructure, an authentication
hierarchy is created with authentication brokers for the Symantec products. The
management servers and the associated authentication brokers are implemented
on the computers that run Windows and UNIX/Linux. Application servers,
management agents, or management clients are also deployed on the computers
that run Windows and UNIX/Linux operating systems.
See Figure 6-2 on page 66.
See Figure 6-1 on page 61.
Deployment guidelines and best practices
How to determine the broker architecture
On UNIX/Linux and Windows, the product administrator assigns plug-in to
authenticating entities (such as users) on computers with management agents
and clients. Symantec products that do not support cross platform plug-ins (like
LDAP) must use authentication brokers on the respective platforms that have the
management agents and clients.
Symantec recommends that you set up an authentication broker on each platform
that has the entities that need to be authenticated. All the authentication brokers
reside in one authentication hierarchy. Typically, UNIX/Linux authentication
brokers are set up to authenticate the entities that are on the UNIX/Linux
computers. You must assign all the authenticating entities on Windows to the
authentication brokers that are configured on Windows.
Using Figure 6-1 as a deployment example, an enterprise has a NetBackup master
server with media servers on Windows, HP-UX, and RedHat platforms. The master
server manages many computers with the NetBackup client installed on Windows,
HP-UX, and RedHat. NetBackup media server requires the installation of an AT
client component on each of these computers.
To authenticate entities on computers with NetBackup client, you can set up
additional authentication brokers on the computers that have the NetBackup
media servers. You can change the AT configuration on a computer from an
authentication client to an authentication broker.
The authentication broker that is configured on the computer with the media
server is used to authenticate the users that are located on other computers. These
computers may have NetBackup client installed, or other management agents
that are on the same platform.
For example, the authentication broker that is configured on the HP-UX computer
with media server can be used to authenticate all the users on the HP-UX computer
with NetBackup client. Similarly, all the users on the Windows computer with
NetBackup client can be assigned to the authentication broker that is configured
on the Windows computer with the NetBackup media server.
All the examples use one authentication hierarchy (either on UNIX/Linux or
Windows) with either stand-alone or high availability brokers. In the UNIX/Linux
use cases, the authentication hierarchy (root broker) is configured on Solaris, and
authentication brokers are configured on other UNIX/Linux and Windows. In the
Windows use cases, the authentication hierarchy (root broker) is configured on
Windows, and authentication brokers are configured on UNIX/Linux and Windows.
Root and authentication brokers placement
In an enterprise that has UNIX/Linux and Windows platforms, Symantec
recommends that you place the root broker on the platform that is more common
in your enterprise. For example, if Windows constitutes 65 percent of the
67
68
Deployment guidelines and best practices
How to determine the broker architecture
computers in your enterprise, Windows becomes the preferred platform for you
to deploy the root broker.
Similarly, in a predominantly UNIX/Linux environment, you place the root broker
on a computer that runs one of the UNIX/Linux operating systems. You may be
able to use other factors in your enterprise to determine the physical placement
of the root broker.
See “About an isolated root broker” on page 69.
After an authentication hierarchy (root broker) is successfully deployed, you must
configure additional authentication brokers. These authentication brokers are
needed to authenticate the entities that are located on heterogenous platforms.
If you have UNIX/Linux and Windows platforms deployed in your enterprise, you
may have to configure authentication brokers on each of the platforms. For
example, you must assign the Windows entities that use the Windows's NT
mechanism to an authentication broker on a Windows computer.
Figure 6-3 shows how you can place the root and the authentication brokers on
heterogenous platforms.
Figure 6-3
Root and authentication broker placement
Deployment guidelines and best practices
How to determine the broker architecture
In an enterprise that has a large number of authenticating entities (such as users),
Symantec recommends that you configure multiple authentication brokers to
authenticate these entities. Usually, the authenticating entities are dispersed over
many computers with management agents and clients. Product administrators
can assign the authenticating entities to different authentication brokers.
The use of one authentication broker to authenticate a large number of entities
has certain disadvantages. A catastrophic hardware failure can occur on the
computer where the authentication broker is located. Without an authentication
broker, the entities cannot acquire the credential to communicate with their
service providers. In addition, the entities that are located on UNIX/Linux and
Windows computers would likely require a platform-specific authentication
broker.
The number of authentication brokers to configure is based on the number of
authentication mechanisms (plug-ins) that are used in your enterprise. If your
enterprise uses NISPLUS, UNIXPWD, and Windows NT mechanisms, Symantec
recommends that you set up an authentication broker on a separate computer for
each of these mechanisms. On each of these computers, you may set up another
Symantec product.
You can use the authentication mechanism to determine the assignment of entities
to authentication brokers. If the majority of the entities use the NISPLUS
mechanism, Symantec recommends that you set up multiple authentication
brokers with this mechanism to share the load.
For example, assume that there are four computers in an enterprise with more
than three thousand NISPLUS users on each computer. You can configure an
authentication broker on four separate computers, and you can assign users on
each of the computers to one of the authentication brokers.
About an isolated root broker
You can set up an authentication hierarchy with the root broker on a computer
without any authentication broker. The root broker is isolated to a secure computer
that is accessible only to selected individuals with high privileges. For the
enterprises that want to control the creation of authentication brokers, this
configuration provides added security to the environment.
Figure 6-4 shows the isolated root broker configuration.
69
70
Deployment guidelines and best practices
How to determine the broker architecture
Figure 6-4
Isolated root broker configuration
About multiple root brokers
You can set up an authentication hierarchy (root broker) on either a Windows or
a UNIX/Linux platform. You can create Windows and UNIX/Linux authentication
brokers in an authentication hierarchy that is either on Windows or on
UNIX/Linux. You can isolate the root broker of your authentication hierarchy on
a secure computer.
The business requirements of your enterprise may require that you establish more
than one authentication hierarchy. Before you implement multiple authentication
hierarchies, you must anticipate the limitations of multiple authentication
hierarchies, and you must understand the effort that is required to maintain them.
In a typical enterprise, one authentication hierarchy (root broker) is usually
sufficient. Unless your enterprise has unique requirements, Symantec does not
recommend that you set up multiple authentication hierarchies, or that you set
up trust between hierarchies.
Deployment guidelines and best practices
How to determine the broker architecture
For example, assume that your enterprise has an authentication hierarchy that
is set up on a secure computer. When you set up another authentication hierarchy
and establish trust between these hierarchies, the configuration may defeat the
purpose of having a root broker on a secure computer.
You must set up every Symantec product that has a management server on a
dedicated computer. It is typical for a product administrator to configure a
management server (for example, CommandCentral Storage) on one computer,
and another management server (for example, Veritas Cluster Server Management
Console) on another computer.
Two different administrators may be responsible for maintaining these Symantec
products. For example, one product administrator can create an authentication
broker in a new authentication hierarchy. The other product administrator can
create an authentication broker in a new hierarchy. In this example, two
authentication hierarchies would exist in the enterprise.
Figure 6-5 shows the management servers with their authentication brokers that
are configured on two separate authentication hierarchies (private root brokers).
Figure 6-5
Management servers with private root brokers
Every root broker has a unique electronic signature. The authentication credentials
that are obtained in one authentication hierarchy are not recognized in another
authentication hierarchy. Entities that use authentication brokers in different
authentication hierarchies cannot communicate. For the entities in different
71
72
Deployment guidelines and best practices
How to determine the broker architecture
hierarchies to communicate, you must set up a trust from one hierarchy to
recognize the authentication brokers in another.
To set up the trust correctly, you must have advanced knowledge of the
authentication product, and you must understand your configuration. After the
trust is established at the root level, all the authenticating entities within the
trusting hierarchy must be made aware of the root electronic signature in the
trusted hierarchy.
For example, NetBackup and NetBackup Operations Manager (NOM) are set up
with authentication brokers in different hierarchies. For the NOM to manage the
NetBackup, NetBackup is the trusting hierarchy and the NOM's hierarchy is
considered as trusted. You must re-authenticate the entities in the trusting
hierarchy.
If your enterprise has no requirements to maintain multiple authentication
hierarchies, Symantec recommends that you avoid implementing multiple
hierarchies. You must always implement one authentication hierarchy that
contains all the authentication brokers for all the management servers.
See Figure 6-2 on page 66.
One authentication hierarchy simplifies the management and maintenance of
your authentication infrastructure. The authentication administrator installs the
NOM management server on a computer with an authentication broker that points
to an existing authentication hierarchy. The NOM and NetBackup are now under
the same authentication hierarchy, which eliminates all the trust and
re-authentication tasks.
Root brokers consolidation
You can consolidate multiple authentication hierarchies into one authentication
hierarchy.
When you choose the simple installation type during installation, the Symantec
product installation script usually sets up a new authentication hierarchy on the
computer.
Note: You can inadvertently create multiple authentication hierarchies when you
set up multiple Symantec products with management servers on different
computers.
See Figure 6-5 on page 71.
Secure communication across all the Symantec products is prohibited when all
the authentication brokers of all the management servers are in different
Deployment guidelines and best practices
How to determine the broker architecture
authentication hierarchies. You can install agents of other Symantec products on
a computer that has a NetBackup management server.
For example, agents may include NetBackup Operations Manager, Veritas Backup
Reporter, and CommandCentral Storage. When all the agents need to work with
the NetBackup management server, you must specify from which authentication
hierarchy an agent gets its credential. Because a computer can hold an
authentication credential from only one root broker at a time, you must set up
trust between different hierarchies to facilitate communication among all the
authenticating entities.
In your enterprise, you may have two management servers that are installed on
two computers. You can create an authentication hierarchy on each computer for
the management server.
For example, assume that the first management server is Symantec Licensing
Inventory Manager (SLIM) and the second management server is CommandCentral
Storage (CC Storage).
See Figure 6-6 on page 74.
You can merge the authentication brokers from one authentication hierarchy into
another. Usually, it is easier to merge the authentication hierarchy that has the
least number of authentication brokers. You can merge a hierarchy on Windows
into a hierarchy on UNIX/Linux, or vice versa.
See Figure 6-5 on page 71.
After you move all the authentication brokers in an authentication hierarchy, you
can delete the empty authentication hierarchy.
Figure 6-6 shows the single authentication hierarchy after the consolidation of
two hierarchies into one hierarchy.
73
74
Deployment guidelines and best practices
How to determine the broker architecture
Figure 6-6
Consolidating authentication hierarchies
You can move an authentication broker that is created in an authentication
hierarchy on UNIX/Linux into another authentication hierarchy that is created
on Windows. For example, you can move the SLIM authentication broker that is
created on a UNIX/Linux hierarchy into a hierarchy on Windows. The Windows
hierarchy is created for the CommandCentral storage management server. You
can also move an authentication broker that is created in a Windows hierarchy
into a hierarchy on UNIX/Linux.
For more information on the replacement of the root broker for the SLIM
management server, see the Symantec Product Authentication and Authorization
Volume III.
You can move the NetBackup and CommandCentral authentication brokers into
another authentication hierarchy.
After the SLIM authentication broker is moved into the authentication hierarchy
of the CC Storage, you must re-authenticate the SLIM management agent on all
the computers. The re-authentication is used to retrieve the electronic signature
of the root broker in the CommandCentral authentication hierarchy.
You perform the re-authentication on each computer that has the SLIM
management agent. When you consolidate the authentication hierarchies, it is
Deployment guidelines and best practices
How to determine the broker architecture
easier to move the hierarchy that has the least number of authentication brokers,
and management agents, or clients.
About the availability of brokers
An authentication hierarchy can have one root broker and many authentication
brokers.
See “Authentication hierarchy” on page 28.
The root broker must be available when you add a new authentication broker. The
root broker keeps track of all the authentication brokers in the authentication
hierarchy.
See Figure 6-2 on page 66.
An authentication broker must be available to authenticate entities and hand out
credentials.
See “How the authentication process works” on page 33.
Without the root broker, you cannot do the following tasks:
■
Add new authentication brokers.
■
Establish trust between different authentication hierarchies.
You can continue to use the existing authentication brokers to authenticate
entities, and to issue credentials when the root broker is not available. After the
root broker ceases to exist, an authentication broker can continue to function for
up to eight years.
Without the authentication broker, authenticating entities that use the
authentication broker can no longer obtain new authentication certificates or
new credentials. However, the credentials that were cached on the computers are
still valid, and continue to work until they expire.
The AT product administrator must continue to monitor the status of the root
broker and all the authentication brokers. When a user fails to authenticate or to
log on to the Web console, the AT product administrator must verify the health
of the authentication broker.
See “How the authentication process works” on page 33.
Authentication brokers are used more frequently than the root broker. It is ideal
to have multiple authentication brokers that are configured on stand-alone
computers. These authentication brokers are configured with the same
authentication plug-in to share the load, and to respond as backup.
For more information on setting up an authentication hierarchy with stand-alone
brokers, see the Symantec Product Authentication and Authorization Volume III.
75
76
Deployment guidelines and best practices
About implementing AT and AZ services in your enterprise
For example, an authentication broker that is located on a stand-alone computer
is used to authenticate the users on a computer with a management client. When
failure occurs on the computer with the authentication broker, the affected users
can be reassigned to another authentication broker that supports the same plug-in.
Instead of setting up multiple stand-alone computers with authentication brokers,
you can set up a high availability authentication broker. Assume that the high
availability authentication broker is configured with the Veritas Cluster Server
(VCS) software.
The high availability authentication broker is always online on one of the nodes
in the VCS cluster. You access to the authentication broker through the virtual
host name that is associated with the authentication broker.
See “Authentication brokers in a high availability environment” on page 36.
On a computer, you can easily determine if either a root-plus-authentication
broker or an authentication broker is configured.
For more information on the verification of the AZ service, see the Symantec
Product Authentication and Authorization Volume III.
About brokers in different time zones
Root broker and authentication brokers can span different time zones. The
Symantec Product Authentication Service (AT) and the Symantec Product
Authorization Service (AZ) perform all of their operations relative to Greenwich
Mean Time (GMT).
You must set the clock on the computers where your root broker and authentication
brokers reside within five minutes of each other. For example, you can have the
root broker located in Los Angeles and authentication brokers in London or
Singapore.
On the computers that have either the root or the authentication broker, you must
configure the time zone and clock correctly according to the local time zone.
About implementing AT and AZ services in your
enterprise
Your enterprise may already deploy some of the Symantec products with the
Symantec Product Authentication Service (AT) and the Symantec Product
Authorization Service (AZ). You can deploy multiple Symantec products in a
number of scenarios with the AT and the AZ enabled.
See Table 2-1 on page 16.
Deployment guidelines and best practices
About implementing AT and AZ services in your enterprise
For all scenarios, you must formulate a project plan, and you must transform the
implementation approach into a diagram.
See Figure 6-1 on page 61.
Typical enterprise scenarios include the following examples:
■
In the first scenario, your enterprise is ready to deploy the first Symantec
product with the AT and the AZ services enabled.
Assume that you have created the project plan diagram. Next, prioritize the
Symantec products in the order of importance, and then install them. Symantec
highly recommends that you install each management server on a computer
by itself. You can place the authentication hierarchy (root broker) on the
computer where the first Symantec product with a management server is
installed.
If your enterprise requires that you isolate the root broker on a separate
computer, Symantec recommends that you install and configure the root
broker first. After you install and configure the root broker, you can install
the first Symantec management server.
An authentication hierarchy is created when either the SF Manager or the VCS
MC Symantec product is installed first.
See Figure 6-1 on page 61.
Next, you install additional Symantec management servers. The authentication
brokers that are created for the management servers should belong to the
authentication hierarchy that the first Symantec product creates. After you
configure a management server and verify that it works, you can start the
management client or agent installation.
You must configure an authentication broker on each node of the VCS cluster
when the securable VCS is enabled with the AT service. For example, you must
configure an authentication broker on each node of the SF Oracle RAC cluster.
Symantec recommends that the VCS authentication brokers reside in the
authentication hierarchy that is set up by the first Symantec product.
Certain Symantec products (such as NOM) use the authentication service for
authenticating NOM users. The NOM installation script automatically
configures an authentication broker. The installation script of certain Symantec
products automatically configures an authentication hierarchy on the computer
where the Symantec product is installed. The authentication hierarchy includes
the root broker plus the authentication broker.
Other Symantec products (such as NetBackup) require that you install and
configure the AT and the AZ services separately after NetBackup is configured.
■
In the second scenario, your enterprise has several Symantec products that
are already deployed. Some of the Symantec products (such as VCS and VCS
MC) are deployed with the AT service. Other Symantec products (such as
NetBackup and CommandCentral Storage) are also deployed, but are not
77
78
Deployment guidelines and best practices
About implementing AT and AZ services in your enterprise
activated with the AT and the AZ services. You can enable the AT and the AZ
services for NetBackup and CommandCentral Storage. You create the
NetBackup and CommandCentral Storage authentication brokers in the
authentication hierarchy that already exist.
In this deployment scenario, you install and configure the VCS cluster and the
VCS MC management server on separate computers. You can assume that the
AT service is enabled for the VCS and the VCS MC Symantec products. The AT
and the AZ services are not enabled on the NetBackup and CommandCentral
Storage management servers. You can enable the AT and the AZ services for
the NetBackup and CommandCentral Storage management servers that are
installed and configured on stand-alone computers.
For more information on NetBackup use case on UNIX/Linux and Windows,
see the following sections in Symantec Product Authentication and
Authorization Volume II:
■
NetBackup use case for UNIX/Linux
■
NetBackup use case for Windows
For more information on the CommandCentral storage and service use case
on UNIX/Linux and Windows, see the following sections in the Symantec
Product Authentication and Authorization Volume II:
■
CommandCentral storage and service use case for UNIX/Linux
■
CommandCentral storage and service use case for Windows
The VCS application server is installed on a two-node cluster by using the SF
for Oracle RAC product. The AT service may not be enabled for the securable
VCS during the initial configuration. To enable the AT service in a securable
VCS, the instructions and procedures are described in the Storage Foundation
section in the UNIX/Linux use cases.
For more information on the Storage Foundation products use case on
UNIX/Linux, see the Symantec Product Authentication and Authorization
Volume II.
For more information on the Veritas Cluster Server use case on UNIX/Linux,
see the Symantec Product Authentication and Authorization Volume II.
The SFWHA product use cases for Windows illustrate the instructions and
procedures that you use to enable the AT service in a securable VCS.
For more information on the Storage Foundation products use case on
Windows, see the Symantec Product Authentication and Authorization Volume
II.
For more information on the Veritas Cluster Server use case on Windows, see
the Symantec Product Authentication and Authorization Volume II.
■
In the third scenario, your enterprise has deployed several Symantec products.
None of the deployed Symantec products are activated with either the AT or
Deployment guidelines and best practices
AT and AZ administration tasks
the AZ service. In this scenario, when those Symantec products are ready to
enable the AT service, a new authentication hierarchy is created.
You select the Symantec products that need the security the most by enabling
them with the AT and the AZ services. You can deploy the authentication
hierarchy (root broker) on a computer where the Symantec product is installed.
You can also deploy the authentication hierarchy on a secure computer.
In your enterprise, always remember that one authentication hierarchy is adequate
and is preferred. On a UNIX/Linux computer, you can create an authentication
broker that belongs to an authentication hierarchy (root broker) on Windows.
Similarly, you can create an authentication broker (on Windows) that belongs to
an authentication hierarchy on UNIX/Linux. The root broker and the
authentication broker can be on the same or the different platforms.
You can configure a local root broker for each of the Symantec management
servers. You must consolidate all the redundant root brokers into one
authentication hierarchy.
AT and AZ administration tasks
Administrators for the Symantec Product Authentication Service (AT) and the
Symantec Product Authorization Service (AZ) perform a number of administrative
tasks.
Typical administrative actions include the following tasks:
■
Ensure that the AT and the AZ services are configured according to the product
specifications. Their usages must meet the business requirements that are
established for your enterprise.
■
Perform regular backups of the data that is generated by the AT and the AZ
services. Administrators verify that the recovered data is usable and valid.
■
Define an upgrade procedure for the AT and the AZ products. The upgrade is
determined by the compatibility between the new versions of AT and AZ, and
the existing consuming Symantec products. The consuming Symantec products
that are configured on a computer must work with the upgraded AT or AZ
version.
■
Monitor the availability of the AT and the AZ services. Avoid disruption to
availability, either directly (the designated authentication broker is stopped),
or indirectly (AZ cannot authenticate because the authentication broker that
is needed by AZ is no longer available).
AT administrator responsibilities
Symantec Product Authentication Service (AT) maintenance consists of:
79
80
Deployment guidelines and best practices
AT and AZ administration tasks
■
Backing up the AT data.
■
Managing the root broker, all the authentication brokers, and all the
authentication clients that are deployed in the enterprise.
One of the AT administrator's most important duties is to ensure that the AT data
of the root and authentication brokers are backed up regularly by using a backup
schedule that is designed for the enterprise. After an authentication hierarchy is
configured and verified that it works, it typically requires little maintenance other
than to perform regular backups.
See “AT and AZ backup and recovery strategy” on page 90.
The AT administrator must decide which authentication domains the
authentication entities (such as users) should use, and which authentication
brokers they should contact. An authentication domain is associated with a specific
authentication plug-in.
For example, an authentication broker is configured with an authentication domain
that supports the plug-in for the NISPLUS mechanism. For a user on a management
client (like NetBackup) to use a plug-in (like NISPLUS), the product administrator
assigns an authentication broker that has the NISPLUS authentication domain
that is configured to the management client. The product administrator uses a
product configuration tool on UNIX/Linux and Windows to make the configuration
modifications. The AT administrator must also verify that the Symantec products
are properly configured with AT service.
See “Authentication plug-ins and mechanisms” on page 30.
The AT administrator sets up new authentication brokers and the AT administrator
renews the authentication broker credentials. The AT administrator must ensure
that all the authentication brokers are available to their clients all the time. Clients
contact an authentication broker whenever a user or an application on a client
computer needs to authenticate or renew a credential.
In an enterprise, credential renewals are typically the responsibility of the
application administrators who manage Symantec management servers (such as
NetBackup and CommandCentral Storage) that are configured with the AT service.
The Symantec product administrators must work with the AT administrator to
define a process for addressing the new installation and upgrade issues, especially
when the AT is installed on a computer that is shared by a management server
and agent/client of another Symantec product.
Symantec recommends that you design an AT recovery strategy, test the procedure,
and document it. The recovery process must cover the root broker, an
authentication broker, and an authentication client. In the event that you need
to rebuild the root broker on a computer, you follow the recovery procedure by
Deployment guidelines and best practices
AT and AZ administration tasks
using the AT backup. Similarly, you rely on the backup to repair an authentication
broker or an authentication client.
AZ administrator responsibilities
Symantec Product Authorization Service (AZ) maintenance consists of maintaining
the AZ server, the AZ access control list repository, and the AZ clients that are
deployed in the enterprise.
One of the most important duties for an AZ administrator is to ensure that the
AZ access control list repository is backed up regularly by using a backup schedule
that is designed for the enterprise.
See “AT and AZ backup and recovery strategy” on page 90.
The AZ administrator must ensure that the authorization groups, access control
list, and permission sets are defined and maintained correctly. The AZ
administrator must work with other Symantec product administrators to ensure
that an authentication broker is always available, and that the AZ service is
available to all the Symantec products (such as NetBackup) that need it.
For more information on NetBackup and AZ service, see the Symantec Product
Authentication and Authorization Volume III.
Symantec recommends that you design an AZ recovery strategy, test the procedure,
and document it. The recovery process must cover the AZ server and authorization
client. In the event that you need to rebuild the AZ server on a computer, you
follow the recovery procedure by using the AZ backup. Similarly, you rely on the
backup to repair an authorization client.
Platform-specific considerations
The Symantec Product Authentication Service (AT) and Symantec Product
Authorization Service (AZ) are supported on UNIX, Linux, and Windows platforms.
The AT and the AZ configuration scenarios are described on the following
operating systems:
■
AIX
■
HP-UX
■
Linux (RedHat and SuSE)
■
Solaris
■
Windows
81
82
Deployment guidelines and best practices
AT and AZ administration tasks
In the use case section, each Symantec product that is identified with the AT
service shows the operating system version that is used on each platform. The
same information is available for each Symantec product that uses the AZ service.
On a given operating system, the AT supports many plug-ins. Each plug-in has a
corresponding mechanism that the AT uses to authenticate entities, such as users.
Some of these plug-ins are available exclusively on UNIX/Linux. Others are
available only on Windows. The AT has a proprietary plug-in named VX that is
used exclusively to authenticate services, daemons (processes), and clients of
Symantec products.
To authenticate a user for a logon session, the AT must use an authentication
plug-in that is available on either the local computer or the enterprise. Users can
use material such as a user name and password for authentication. The user name
and password can be the password mechanism on the local computer or the
NISPLUS mechanism in the enterprise.
See “Authentication plug-ins and mechanisms” on page 30.
See “About assimilating AT into your enterprise” on page 49.
UNIX/Linux plug-ins and mechanisms
Mechanisms such as NIS, NISPLUS, and UNIXPWD are specific to UNIX/Linux,
and do not operate on Windows. For the Symantec Product Authentication Service
(AT) to use NIS or NISPLUS as the authentication plug-in, you must configure
this service in the enterprise.
On UNIX/Linux platforms, the UNIX password is the basic authentication plug-in
that is available to the AT for authenticating users. An authentication client uses
the UNIXPWD password mechanism that is on the computer where the
authentication broker is located, and not a password file on the client computer.
Other AT plug-ins, such as LDAP, are supported on the UNIX and Linux platforms.
However, a Symantec management server (such as CommandCentral Storage)
must support the LDAP plug-ins before users can use LDAP for authentication.
Before you integrate a mechanism (such as NISPLUS or LDAP) with the AT service,
it must be configured and verified first.
Windows plug-ins and mechanisms
On Windows, Symantec Product Authentication Service (AT) supports the NT
plug-in, which corresponds to the Windows NT mechanism. The NT plug-in uses
the Windows Security Services Provider Interface (SSPI).
During the logon session, Symantec products on Windows uses the NT plug-in to
authenticate users.
Deployment guidelines and best practices
AT and AZ administration tasks
On Windows, the AT has a plug-in that supports the LDAP mechanism. Before
you integrate a mechanism (such as LDAP) with the AT service, it must be
configured and verified.
AT and AZ installation considerations
When you set up the Symantec Product Authentication Service (AT) and the
Symantec Product Authorization Service (AZ), refer to the guidelines that are
described in the AT and the AZ use cases in the appendix .
For more information on AT use case, see the Symantec Product Authentication
and Authorization Volume III.
For more information on AZ use case, see the Symantec Product Authentication
and Authorization Volume III.
If you use a version of the AT or the AZ that is not covered in the use cases, you
may have to consult product installation guides and release notes.
The AT and the AZ products have both the service and the client components. On
a computer, when you install the service component, usually the client component
is also installed. However, on some platforms (like Linux), the service installation
requires the service and the client components be installed explicitly. You can
install the client component separately on a computer. The AZ depends on the
AT. To install the AZ in either the service or the client mode, the AT client
component must already be installed, or must be installed concurrently with the
AZ.
A product configuration is required when the AT and the AZ are installed in service
installations. To perform a product configuration, both the service and the client
components must be installed on a computer. Client installations do not require
product configuration.
On the computers that have Symantec management servers, the AT service and
client components are also installed. An authentication broker (at the minimum)
is set up on the local computer where the management server resides.
On the computers that have either management agents or clients, you need to
install only the AT client component.
On the computers that have cluster server (like VCS) installed, management agents
and/or clients of other Symantec products can be installed. An authentication
broker must be configured on each node of the cluster in order for the VCS to
communicate in secure mode. On these computers, VCS uses the service and the
client components of the AT product. The management agents and clients need
to use only the AT client component.
83
84
Deployment guidelines and best practices
AT and AZ administration tasks
Some management servers (like NetBackup master server and CommandCentral
Storage) use the AZ service for access control. On the computers that host these
management servers, the AZ service and client components are installed. Other
management servers (like NetBackup media server) that are configured on a
stand-alone computer also need the AT and the AZ client component.
In your enterprise, you start by setting up the AT and the AZ services on the
computers that have the Symantec management servers. Next, you move to the
application servers that need the AT service. After all the computers with
management and application servers are setup with the AT and the AZ services,
you can set up the AT client on the computers that host the management agents
and the clients.
For more information on the typical product deployment strategy on UNIX/Linux,
see the Symantec Product Authentication and Authorization Volume II.
About the AT product installation
The Symantec Product Authentication Service (AT) can be installed in either a
service or a client installation.
On a computer, you can install the AT product in one of these scenarios:
■
Create an authentication hierarchy with a root broker. You can also configure
an authentication broker with the root broker on the same computer.
■
Install an authentication broker for a Symantec management server. The root
broker for the authentication broker is remote on another computer. A
management server often installs an authentication broker automatically.
■
Install the AT client component. A management agent or client of other
Symantec products may be installed on the computer. A management agent
or client might install the AT client component automatically.
Starting with the AT version 4.3, you can configure the AT to use the Private
Branch Exchange (PBX) port (1556) for communication. To use PBX port for AT
communication, you must first install and configure PBX.
For more information on Private Branch Exchange use case, see the Symantec
Product Authentication and Authorization Volume III.
About the root broker installation
The Symantec Product Authentication Service (AT) can be deployed as either a
stand-alone or high availability AT service. In the authentication hierarchy where
the root broker is configured, an authentication broker is also created.
You deploy the AT service with an authentication hierarchy that has the root
broker configured in either a stand-alone mode or high availability mode.
Deployment guidelines and best practices
AT and AZ administration tasks
In the stand-alone mode, the AT authentication hierarchy is created by using one
of the following methods:
■
Use the installation script that is distributed by the AT product to install and
configure an authentication hierarchy with the root broker.
■
Use the installation script of a consuming Symantec product (such as VCS
MC), which installs the AT and configures the root broker. By default, the
product installation script installs the AT product and configures the root
broker with an authentication broker.
In an environment where an authentication hierarchy already exists, you
instruct the installation script to create only the new authentication broker
in the existing hierarchy.
Note: The installation script of some Symantec products may unconditionally
create a new authentication hierarchy with a root broker plus an authentication
broker. In this situation, you merge the authentication hierarchy to your
existing hierarchy.
The installation script of some Symantec products (such as NetBackup) cannot
create an authentication hierarchy and an authentication broker. To set up
the AT service for the NetBackup product, you must use the AT installation
script.
For more information on setting up an authentication hierarchy with stand-alone
brokers, see the Symantec Product Authentication and Authorization Volume III.
In the high availability mode, the AT authentication hierarchy is created by using
the following process:
■
Use the installation script that is distributed by the AT product to install and
configure the root broker in stand-alone mode on each of the nodes in the VCS
cluster.
■
After all the nodes in the VCS cluster are set up, use the configuration script
that is distributed by the AT product to configure the root broker in high
availability mode.
Only specific versions of AT 4.2 and 4.3 support the high availability root broker.
For more information on setting up an authentication hierarchy with high
availability brokers, see the Symantec Product Authentication and Authorization
Volume III.
Authentication broker installation
The Symantec Product Authentication Service (AT) can be deployed as either a
stand-alone or as a high availability authentication broker. In your enterprise,
85
86
Deployment guidelines and best practices
AT and AZ administration tasks
you must have an authentication hierarchy already set up for the new
authentication brokers. The root broker in the existing hierarchy can be configured
in either stand-alone or high availability mode.
A new authentication broker is configured in either stand-alone or high availability
mode.
In the stand-alone mode, the authentication broker is created by using one of the
following methods:
■
Use the installation script that is distributed by the AT to install and configure
an authentication broker with a remote root broker.
■
Use the installation script of a consuming Symantec product (such as
CommandCentral), which installs AT and configures an authentication broker.
The installation script of some Symantec products (such as NetBackup) cannot
create new authentication brokers. To set up an authentication broker for the
NetBackup product, you must use the AT installation script.
For more information on setting up an authentication hierarchy with stand-alone
brokers, see the Symantec Product Authentication and Authorization Volume III.
In the high availability mode, the authentication broker is created by using the
following process:
■
Use the installation script that is distributed by the AT product to install and
configure an authentication broker in stand-alone mode on each of the nodes
in the VCS cluster.
■
After all the nodes in the VCS cluster are set up, use the configuration script
that is distributed by the AT product to configure the authentication broker
in high availability mode.
Only the specific versions of AT 4.2 and 4.3 support the high availability
authentication broker.
For more information on setting up an authentication hierarchy with high
availability brokers, see the Symantec Product Authentication and Authorization
Volume III.
About the AT client installation
The Symantec Product Authentication Service (AT) client component can be
installed on a computer without installing the AT service component. The AT
client component is usually installed by using the AT installation script. The
installation script of other Symantec products (such as SF Manager) can also be
used to install the AT client component.
Deployment guidelines and best practices
AT and AZ administration tasks
Typically, you install the AT client component on the computers that have a
management server, an application server, and an agent or a client of other
Symantec products.
About the AZ installation
The Symantec Product Authorization Service (AZ) is dependent on the Symantec
Product Authentication Service (AT). Before the AZ is installed on a computer,
the AT client component must be installed already. The AT client component is
usually installed on the computers that have either management clients or agents.
About the AZ service installation
You can deploy the Symantec Product Authorization Service (AZ) as either a
stand-alone or as a high availability AZ service.
Symantec recommends that you install the AZ service on the same computer as
the management server that needs it. Having the AZ service and the management
server on the same computer limits the overhead of network latency that may
occur if these two applications are on separate computers.
The master copy of the authorization access control list repository is always found
on the computer where the AZ service is configured. On a computer that has the
AZ client component installed, a copy of the access control list can be kept locally.
This setup is useful in an environment that has a NetBackup media server that
communicates securely with a master server on two separate computers.
You configure a new AZ service in either stand-alone or high availability mode.
In the stand-alone mode, the AZ service is created by using one of the following
methods:
■
Use the installation script that is distributed by the AZ to install and configure
an AZ service.
■
Use the installation script of a consuming Symantec product (such as
CommandCentral Storage), which installs the AZ and configures an AZ service.
The installation script of some Symantec products (such as NetBackup) cannot
create the AZ service. To set up an AZ service for the NetBackup product, you
must use the AZ installation script.
For more information on setting up a stand-alone authorization service for access
control, see the Symantec Product Authentication and Authorization Volume III.
In the high availability mode, the AZ service is created by using the following
process:
87
88
Deployment guidelines and best practices
AT and AZ administration tasks
■
Use the installation script that is distributed by the AZ product to install and
configure an AZ service in stand-alone mode on each of the nodes in the VCS
cluster.
■
After all the nodes in the VCS cluster are set up, use the configuration script
that is distributed by the AZ product to configure the AZ service in high
availability mode.
Only specific versions of AT 4.2 and 4.3 support the high availability AZ service.
For more information on setting up a high availability authorization service for
access control, see the Symantec Product Authentication and Authorization Volume
III.
About the AZ client installation
You use the installation script that is distributed with the Symantec Product
Authorization Service (AZ) to install the AZ client component. The AZ client can
be installed without installing the AZ service component. A computer that has
the NetBackup media server requires the installation of the AZ client component.
About the AT and the AZ upgrades
All the Symantec products that are described in the use cases use the shared
installation of the Symantec Product Authentication Service (AT) and the Symantec
Product Authorization Service (AZ).
A shared installation refers to a component (such as the AT or the AZ) that is
installed on a computer that is used by all the Symantec products. For example,
NetBackup management server, SLIM management agent, and CommandCentral
management agent can use the same version of the AT on a computer.
Each Symantec product requires a specific version of the AT. Installation or
upgrade of Symantec products that require a later version of the AT would upgrade
the AT version on the computer. In this situation, you must use the latest AT
version. On the computer that has a more recent version of the AT, the installation
script skips the installation task.
The AT provides compatibility between different versions of the AT product. A
management client on a computer with AT 4.2 can communicate with its
management server on another computer that has AT 4.3. The converse
(management client with AT 4.3 and management server with AT 4.2) is also
supported.
For example, a NetBackup management server that is configured on one computer
with AT version 4.2 can operate with a NetBackup management client on another
computer that is configured with AT version 4.3. A management agent or a client
Deployment guidelines and best practices
AT and AZ administration tasks
with AT version 4.2 and a management server that has AT version 4.3 is also a
valid configuration.
The compatibility between different versions of the AT also applies to the
compatibility between different versions of the AZ.
About upgrading the AT
The upgrade of the Symantec Product Authentication Service (AT) is performed
by using the installation script that is either distributed with the AT, or distributed
with a Symantec product. You can upgrade the AT product that is deployed in
either a stand-alone or a high availability mode.
Before you upgrade the AT on a computer that has multiple Symantec products
that use the AT, Symantec recommends that you verify that the new version is
compatible with all the Symantec products. To do this upgrade, you can set up a
test environment and then verify your configuration before the new AT is deployed
to the production environment.
Each Symantec product may require a different version of the AT. Symantec
recommends that you always leave the latest version of the AT installed on the
computer. For example, a management server (such as NetBackup 6.0MP5) may
require AT 4.2, and a management agent (such as CommandCentral Storage) may
require AT 4.3. In this example, you leave AT 4.3 installed.
Note: Later versions of the AT (for example, 4.3), are always compatible with
earlier versions (such as 4.2).
Before the AT is upgraded, you must perform the following tasks:
■
Do a full backup of the AT.
See “AT and AZ backup and recovery strategy” on page 90.
■
Shut down all the Symantec applications that use the AT, so that no
authentication activities are initiated during the upgrade.
■
Verify that the AT components and all the Symantec products that use the AT
are operational, after the upgrade is complete.
Symantec recommends that the AT administrator keeps track of all the Symantec
products that use the AT service.
For more information on upgrading the stand-alone brokers in an authentication
hierarchy, see the Symantec Product Authentication and Authorization Volume
III.
For more information on upgrading the high availability brokers on a VCS cluster,
see the Symantec Product Authentication and Authorization Volume III.
89
90
Deployment guidelines and best practices
AT and AZ backup and recovery strategy
About upgrading the AZ
The Symantec Product Authorization Service (AZ) is integrated with NetBackup
and the CommandCentral storage (version 5.0) Symantec products. The AZ service
is deployed as either a stand-alone or a high availability service.
The AZ service is installed on a computer that has the NetBackup management
server and the CommandCentral storage agent installed. Before you upgrade the
AZ service, verify that the new version of the AZ is compatible with the Symantec
products.
After the upgrade of the AZ service is completed, you must verify that all the
Symantec products that use the AZ service continue to work correctly.
For more information on upgrading the stand-alone AZ service, see the Symantec
Product Authentication and Authorization Volume III.
For more information on upgrading the high availability AZ service on a VCS
cluster, see the Symantec Product Authentication and Authorization Volume III.
After you upgrade the AZ service on a computer where there is only one Symantec
product that uses the AZ service, you must verify that the AZ service and the
Symantec product work correctly.
AT and AZ backup and recovery strategy
The Symantec Product Authentication Service (AT) and the Symantec Product
Authorization Service (AZ) create operational data. The data is required to ensure
the correct operation of the AT and the AZ products. Each product generates data
during the course of its operation.
For the AT, operational data can be the credential information that is managed
by the registration authority and credential manager. For the AZ, operational data
is the access control list data repository that consists of a database where all the
permission sets are stored.
You must regularly back up the AT and the AZ operational data and product files
that are present on the computers. Each computer contains either the service
component or the client component. Symantec recommends that you include the
backup schedules for these computers as a part of the backup infrastructure for
your enterprise’s backup and recovery strategy.
On the computers that have only the client component installed, you can back up
only the binaries and libraries. You can safely keep only one backup copy of the
client component for a specified product version.
For example, if ten computers on the same platform have the same AT client
version (such as 4.2.2.34) installed, you can back up the AT client component from
Deployment guidelines and best practices
AT and AZ backup and recovery strategy
one of these computers. For either the AT or the AZ, the backup from one of the
computers is sufficient.
The backup and the recovery procedures that are used in your enterprise must
be verified through a successful restore. After the AT or the AZ data is restored,
you must verify that the Symantec products can use the recovered data. The ability
to use the recovered data from a backup is important to your backup strategy.
For more information on successfully perform a backup and a restore for the
NetBackup clients, see the Symantec Product Authentication and Authorization
Volume III.
When you implement a backup and a recovery strategy, you use the following
guidelines:
■
Install and configure the AT and the AZ on a computer.
■
Take a full backup for these products (operational data, configuration files,
product binaries, and libraries).
■
Shut down the original computer and build a new computer. The original
computer and the new computers should be on the same platform and operating
system. The new computer uses the same host name as the original.
■
Recover the AT and the AZ backups to the new computer.
■
Verify that the services that were hosted in the original computer are now
available through the new computer.
Keeping track of all computers that have the AT and the AZ components installed
is a manual process. The security administrators who are responsible for the AT
and the AZ must verify that the critical components on all the computers are
backed up.
Backup and recovery of AT data
On the computers that host the root broker and authentication brokers, Symantec
recommends that you back up the operational data and configuration files. A
backup should include the AT product binaries and libraries. On the computers
that have the AT client component, backing up the product files is sufficient.
The operational data the root broker maintains includes the registration
information, private domain repositories, and credential stores. Every
authentication broker also maintains operational data.
The operational data that the authentication broker maintains includes the private
domain repositories that are created by the Symantec application or management
servers. Symantec recommends that you regularly back up the operational data
and the AT product files on all the computers that have the AT product installed.
91
92
Deployment guidelines and best practices
Empirical use cases
For more information on successfully backing up and restoring AT data, see the
Symantec Product Authentication and Authorization Volume III.
You must track the computers in your enterprise that have the AT product
installed. The AT installation can be a root-plus-authentication broker, an
authentication broker, or a client installation. To assist with maintenance and
administration, you can keep an up-to-date layout of all the computers in your
enterprise.
See Figure 6-1 on page 61.
On the same computers, there may be other Symantec products and home grown
applications that need backup.
Backup and recovery of AZ data
On the computers that have the AZ service installed, Symantec recommends that
you back up the access control list repository. A backup should also include the
AZ product binaries and libraries. On the computers that host the AZ client
component, backing up the product files is sufficient.
For more information on successfully backing up and restoring AZ data, see the
Symantec Product Authentication and Authorization Volume III.
It is important to track the computers in your enterprise that have the AZ product
installed. To assist with maintenance and administration, you must keep an
up-to-date layout of all the computers in your enterprise.
See Figure 6-1 on page 61.
On the same computers, there may be other Symantec products and home grown
applications that need backup.
Empirical use cases
To support the guidelines and best practices, deployment scenarios are described
in the use cases that were validated in the Symantec products testing lab.
Installations and configurations of the use cases were tested and verified on both
UNIX/Linux and Windows platforms. Procedures that pertain to the Symantec
products that use the services of the AT and the AZ products are described in the
use cases chapters.
For more information on deploying Symantec products with the security feature
on UNIX/Linux, see the Symantec Product Authentication and Authorization
Volume II.
Deployment guidelines and best practices
Empirical use cases
For more information on deploying Symantec products with the security feature
on Windows, see the Symantec Product Authentication and Authorization Volume
II.
UNIX/Linux use cases
The UNIX/Linux use cases are for the enterprises that deploy the majority of their
Symantec products on UNIX/Linux platforms. The UNIX/Linux platforms include
Solaris, AIX, HP-UX, RedHat, and SuSE. The Symantec application server,
management server, management agent, and management client are validated
on one (or more) of these UNIX/Linux platforms. The procedures apply to all the
UNIX/Linux platforms, unless otherwise noted.
In an enterprise, it is typical to have Symantec products deployed on UNIX/Linux
and Windows platforms. To create a real-world environment, the UNIX/Linux use
cases also include Windows platforms. The application server, management agent
or client, and management server (such as the NetBackup media server) are added
to the UNIX/Linux deployment scenario.
Windows use cases
The Windows use cases are for the enterprises that deploy the majority of their
Symantec products on the Windows platform. The application server, management
server, and management agent or client are validated on the Windows platform.
In an enterprise, it is possible to have Symantec products deployed on Windows
and UNIX/Linux platforms. The Windows use cases also include information on
Symantec products that are deployed on UNIX/Linux platforms. The application
server, management agent or client, and management server (such as the
NetBackup Media server) are deployed on UNIX/Linux and managed by the
management servers on Windows.
Recommended approach to the use cases
After you install the Symantec Product Authentication Service (AT) and the
authentication hierarchy, you can deploy Symantec products. Typically, you
deploy Symantec products one at a time with the security enabled. After you verify
the security configuration of a Symantec product, you can add the next Symantec
product. You can independently deploy the Symantec products that are described
in the use cases.
The Symantec Product Authorization Service (AZ) is created for each Symantec
product that needs the AZ service.
93
94
Deployment guidelines and best practices
Use cases verification steps and troubleshooting tips
You can create an enterprise environment and install all the Symantec products
that are configured with the AT and the AZ services enabled.
See Figure 6-1 on page 61.
You can use the information that is presented in the use cases (UNIX/Linux and
Windows) as a guide to performing the following tasks:
■
Enable the AT and the AZ capabilities for an already-installed Symantec
product.
■
Install and configure a new Symantec product into an existing enterprise with
the AT and the AZ service enabled. Some of the Symantec products in an
existing enterprise may already have the AT and the AZ services configured.
Use cases verification steps and troubleshooting tips
The verification steps and troubleshooting tips are provided for the Symantec
products that are configured with the AT and the AZ services. The information
on authentication, verification, and troubleshooting is found in the product use
case and the appendix sections. Platform-specific information is available in the
use cases (UNIX/Linux and Windows). In a product appendix, you can also find
procedure to consolidate multiple authentication hierarchies into one hierarchy.
Index
A
access control 44
access control information data repository
definition 41
acronyms
list of 16
administration tasks
AT and AZ 79
administrator responsibilities 83
AT 79
AT installation considerations 83
AZ 81
AZ installation considerations 83
platform-specific considerations 81
application client
definition 32
application server
defined 62
deploying 62
deploying in a cluster environment 62
application service
definition 32
approach
multiproduct deployment 59
architecture
Authentication 27
Authorization 39
AT
administrator responsibilities 79
benefits of using 23
client installation 86
configuring with PBX 84
data backup overview 91
installation overview 84
overview 47
upgrade overview 89
upgrade with multiple products 89
AT and AZ
administration tasks 79
backup and recovery strategy overview 90
upgrade overview 88
AT upgrade
preparing for 89
audience for Yellow Book 10
authentication
architecture 27
components 27, 49
overview 22
authentication broker
details 30
in a heterogenous environment 64
installation overview 85
load balancing 67
placement 67
authentication client
details 32
authentication hierarchy
definition 28
authentication module
components 33
description 33
authorization
architecture 39
high availability 44
overview 22
steps 45
authorization principal
definition 43
authorization service
definition 41
AZ
administrator responsibilities 81
benefits of using 23
client installation 88
data backup overview 92
installation overview 87
upgrade overview 90
B
backup and recovery strategy overview 90
benefits
of using AT and AZ 23
96
Index
broker architecture
determining 64
C
chief security officers
what to read 10
CommandCentral
integration 54
CommandCentral Service
plug-ins 54
CommandCentral Storage
plug-ins 54
component details
Norton 360 29
components
authentication 27, 49
authorization 40
Norton 360 56
Symantec Product Authentication Service 49
D
data backup overview
AT 91
AZ 92
definitions
acronym list 16
authorization principal 43
terms used in this book 22
detail
authentication broker 30
authentication client 32
E
expiry periods 37
I
integration
CommandCentral with common service
framework products 54
NetBackup Operations Manager with common
service framework products 50
NetBackup with Authentication product 50
Storage Foundation Manager with common core
services products 53
Symantec License Inventory Manager with
common core services products 55
Veritas Backup Reporter with common core
services products 51
integration (continued)
Veritas Cluster Server Management Console with
common core services products 53
Veritas Cluster Server with common core
services products 52
Veritas Storage Foundation with common core
services products 51
isolated root broker 69
L
load balancing
authentication broker 67
local authorization service
definition 42
M
management agent
defined 63
management client
defined 63
management server
defined 63
deploying 63
deploying with AT 63
master authorization service
definition 42
multiple root brokers 70
multiproduct deployment
approach 59
N
NetBackup
Authentication 50
supported plug-ins 50
NetBackup Operations Manager
integration 50
supported plug-ins 51
Norton 360
component details 29
P
plug-in mechanisms
UNIX and Linux, overview 82
Windows, overview 82
plug-ins
supported by CommandCentral Service 54
supported by CommandCentral Storage 54
supported by NetBackup 50
Index
plug-ins (continued)
supported by NetBackup Operations Manager 51
supported by Symantec License Inventory
Manager 55
supported by Veritas Cluster Server 52
product integration
enterprise 49
R
resource management application
definition 42
root broker
consolidation 72
definition 29
in a heterogenous environment 64
installation overview 84
isolated 69
multiple 70
placement 67
root brokers consolidation 72
S
security administrators
what to read 10
Storage Foundation Manager
integration 53
plug-ins 53
Symantec License Inventory Manager
integration 55
plug-in support 55
Symantec Product Authorization Service
about 56
Symantec products
current edition 16
systems programmers
what to read 10
T
terms and definitions 22
U
use cases
overview 92
recommended approach 93
troubleshooting tips 94
UNIX/Linux 93
verification 94
Windows 93
V
validity period
certificate 36
Veritas Backup Reporter
integration 51
plug-ins
UNIX/Linux 51
Veritas Cluster Server
integration 52
plug-ins
UNIX/Linux 52
Windows 52
Veritas Cluster Server Management Console
integration 53
plug-ins 54
Veritas Storage Foundation
integration 51
Y
Yellow Book
audience 10
contrast with product guides 14
overview 13
scope 14
97