Configuring the file server agent ACLs


The TrueSight Server Automation file server requires special agent ACLs because non-administrative users might require write access to the Depot storage directory on the file server. Traditionally, the file server has been configured with very open ACLs to allow for this. However, this might pose a security problem. The solution is to segregate access to the file server as internal access (when the Application Server accesses the file server while creating, modifying, or deleting objects such as BLPackage and NSH script) and explicit access (when you access the file server such as through an NSH script or extended object). In this way, more granular access can be granted to the TrueSight Server Automation file server storage directory in a secure fashion. For more information, see Restricting-access-to-the-file-server-file-system

The following example steps for the configuration of file server agent ACLs assume that you have a basic TrueSight Server Automation environment set up and configured, and you have some general knowledge of using Configuration Manager. The example shows steps for both Windows and UNIX environments.


ACLs should NEVER be pushed to the file server. Doing so causes various product operations to break, in addition to preventing the application server from starting. When setting up your ACL Push Job, do one of the following:

  • Run the job against an Alive Servers smart group that excludes the file server from the smart group.
  • Use Exclude Targets option in the ACL Push Job.

For more information about managing File Server ACLs, see How-to-configure-two-RSCD-agents-on-a-single-host.

To configure file server agent ACLs

  1. Create the following user accounts.
    1. Create a local, low-privileged user account with read/write access to the file server storage location. Use the following example commands:
      • (Windows) net user blfsrw /add
      • (UNIX) useradd blfsrw
      • (UNIX) useradd blfsro -g blfsrw
    2. Create a local, low-privileged user account with read only access to the file server storage location. Use the following example commands:
      • (Windows) net user blfsro /add
      • (UNIX) useradd blfsro
      • (UNIX) useradd blfsro -g blfsrw

        Note

        User creation is governed by an organization policy. Create user based on your organizations policy.

  2. Assign local file permissions to the Depot Store. The following examples for this step assume a file server storage location of C:\storage on Windows and /storage on UNIX.
    1. Grant read/write permission to user blfsrw
      • (Windows) Set permissions through the Security tab in the Properties dialog box.
        SOP_for_File_Server_Agent_ACLs_05.png
      • (UNIX) Use the following sample commands:
        chown -R blfsrw:blfsrw /opt/bmc/bladelogic/storageIf you also need to modify the permissions on this directory, run the following commands:

        find /opt/bmc/bladelogic/storage -type f | xargs -i chmod 640 {}
        find /opt/bmc/bladelogic/storage -type d | xargs -i chmod 750 {}
    2. (Windows) Grant read only permission to user blfsro through the Security tab in the Properties dialog box.
      image2022-10-20_16-43-13.png

  3. To enhance security on the file server, configure the following files:
    1. Configure the exports file.
      An Application Server does not need an agent to run. An Application Server needs to connect to a file server in order to run, and it is the file server that needs a valid agent. The exports file on the file server is configured differently from the exports file on a remote host, as all incoming connections from the Application Servers should be mapped to the same user. This ensures that file permission issues do not arise for Console users that try to open depot objects that have inconsistent ownerships on the file server.
      Use the following sample code:<application server 1>,<application server 2>,<application server n...> ro,user=blfsro

      Note

      • To ensure a more secure environment, allow incoming connections only from the Application Server.
      • To specify Application Servers, you can use either DNS names or IP addresses.
    2. Configure the users.local file to ensure that it contains the following code (on the file server only):
      System:System rw,map=blfsrw
      Where blfsrw is the local and low-privileged user account with read and write access to the file server storage location. The System:System role:user is a built-in account that the TrueSight Server Automation Application Server will use to communicate with the file server.

      For the file server, do not include the nouser entry in the users.local file or in the users file. For more information about the options in the users.local and users files, see Configuring-the-users-or-users-local-files.

      Tip

      For troubleshooting validation errors, see the rscd.log file of the file server located in the <rscd_installation_directory>/log directory in Unix and <rscd_installation_directory> in Windows. 

Default Configurations

The recemented File Server agent ACLs configurations are not configured out of the box. The TSSA Infrastructure Administrator need to configure it accordingly.

 

Tip: For faster searching, add an asterisk to the end of your partial query. Example: cert*