User Management

Contents

1Introduction

2

Functions and Concepts
2.1User Authentication
2.2User Authorization
2.3Backup and Restore of Local User Data
2.4Types of Operation

3

Managed Object Model
3.1Rules for Default Roles

4

Configuration Management

5

MTAS Roles and Rules

1   Introduction

This document provides an overview of the management model and concepts associated with the User Management managed area.

A managed area is represented by a group of Managed Object Classes (MOCs) within the Managed Object Model (MOM).

2   Functions and Concepts

User Management provides a management interface to configure the following on the Managed Element (ME):

An overview of User Management is shown in Figure 1.

Figure 1   User Management Overview

This document assumes that the ME has already been installed and initially configured. The initial configuration includes the necessary settings for the authentication and authorization of users.

Authentication is used for checking user credentials and user access. Role-Based Access Control (RBAC) authorization is used to ensure correct user access privileges. The ME supports management of local users and authentication and supports the LDAP protocol for centralized user authentication. In case of centralized authentication, Target-Based Access Control (TBAC) can be applied over RBAC. Authentication and authorization are performed according to the organization authorization policy.

The local authentication method is always available to ensure that the operator cannot be inadvertently denied access to the managed element. It is recommended to create enough local accounts to mitigate connectivity issues to centralized authentication. The managed element supports centralized authentication by the LDAP protocol. Centralized authentication is preferred for daily operations to keep a consistent user base over a network of managed elements.

The local authentication method is always performed. If local authentication fails to find a user, the authentication continues with centralized LDAP authentication. The order of authentication methods cannot be changed.

For more information on the LDAP interface, refer to LDAP-Based Authentication and Authorization Interface.

2.1   User Authentication

The user initiates a session which triggers user authentication. For the authentication to be successful, a user account must be configured either locally by Local Authentication, or centrally in an external LDAP server. The first configured account is the Local Authentication administrator, which is defined at site deployment.

When adding user accounts, naming must serve as a unique identity. Naming collisions can result in unexpected authentication behavior, as the user trying to authenticate with that name is mapped to the account first found with that name. The operator must ensure that usernames are globally unique, in the scope of both local and central authentication, to match expected authentication behavior.

In centralized LDAP authentication, a primary and a secondary LDAP server is supported. The LDAP authentication first tries against the primary server and then the secondary server.

All authentication attempts, whether successful or not, are recorded in the ME security log.

For more information, refer to Audit Logs.

A successful user authentication triggers a user authorization.

2.2   User Authorization

Before user authorization occurs, the ME queries the roles of the users.

In case of local users, the roles are stored in the user account configuration.

In case of LDAP, the ME performs additional checks whether the user can access the ME based on POSIX parameters (uidNumber) and TBAC attribute of the user account. For roles, three different LDAP profile filters are supported for search; flexible filter, POSIX groups filter, and Ericsson roles filter. The Ericsson roles profile filter is used together with the Ericsson Operations Support System (OSS) solution. When the Ericsson roles profile filter is used, the authorization can be selective based on the target type. In some networks, it can be required to let a user have different management roles on different MEs. For example, the network can span several countries, and it can be needed to let a user act as "admin" in one country, but only as "operator" in another. This function is part of the TBAC functionality.

The user access rights depend on defined authorization rules that specify the permissions to a set of resources within the ME. The authorization rules are grouped into roles. A role is equivalent to the user occupation within an organization, for example, system administrator. A user can have one or more roles.

The ME supports some predefined roles, see Section 2.2.2 Default Roles. Custom roles can also be configured over the Northbound Interface (NBI).

The authorization rules are all defined locally on the ME. Therefore, the user authorization is a local authorization. Custom rules corresponding to customer roles can be configured over the NBI.

Authorization rules provide different access levels to the MIB and the ECLI commands. Authorization rules are defined by permission types, see Section 2.2.1 Permission Types.

2.2.1   Permission Types

Rules for access can be specified for Managed Objects (MOs), their attributes and actions. The execution of the ECLI commands and the NETCONF operations is not subject to authorization. However, the rules affect the result of the ECLI commands and the NETCONF operations that operate on MOs.

Permission types define different levels of access to the MIB according to Table 1.

Table 1    Permission Types

Permission Type

Description

No access (NO_ACCESS)

The user has no read, write, or execute rights to the MOs, attributes, or actions

Execute (X)

The user can execute all actions in the MOM

Read (R)

The user can read MOs and get attribute values

Read and execute (RX)

The user can read MOs, get attribute values, and execute all actions in the MOM

Read and write (RW)

The user can create and delete MOs as well as get and set attribute values

Read, write, and execute (RWX)

The user can create and delete MOs, set, and get attribute values, as well as execute all actions in the MOM

When a user with an authorization profile wants to access resources of the ME, the access request is authorized against matching security rules. The rules are checked in the following order:

  1. All negative rules (with the NO_ACCESS permission) are evaluated. If a match is found, access is denied.
  2. All positive rules (with X, R, RX, RW, and RWX permissions) are evaluated until a match is found; the corresponding access is granted. If no match is found, access is denied.

2.2.2   Default Roles

The ME supports the predefined default roles described in Table 2. These roles and the corresponding rules cannot be modified. The detailed permissions for each role are described in Section 3.1 Rules for Default Roles.

Default permissions to the ME are granted automatically to all users and are expressed through the role named "Self".

Table 2    Default Roles

Default Role

Description

Self

Default authorization

System Administrator

Responsible for the administration of all non-security-related attributes and capabilities of an ME, including features, configuration parameters, and monitoring.

Local Authentication Administrator

Responsible for the administration of the local user accounts. Dedicated to the Administrator Account to limit its use.

System Security Administrator

Responsible for the administration of all security-related attributes and capabilities of an ME, including user accounts and authorizations.

System Read Only

Can view most non-security-related attributes and capabilities of an ME, including features, configuration parameters, and monitoring.

Managed Function Application Administrator

Responsible for the administration of all non-security-related attributes and capabilities of the Managed Function, including features, configuration parameters, and monitoring.

Managed Function Application Security Administrator

Responsible for the administration of all security-related attributes and capabilities of the Managed Function, including user accounts and authorizations.

Managed Function Application Operator

Can view some non-security-related attributes and capabilities of the Managed Function, including features, configuration parameters, and monitoring.

2.3   Backup and Restore of Local User Data

Information related to user accounts expires over time. Backup taken of configuration data could have been done at a time when different accounts were used. The users can also have changed their passwords after the configuration data backup. This can result in a state after restoration where the valid users before the backup restoration cannot access the ME after the restoration, because of expired passwords or invalid accounts, or can access the ME with different authorization.

It is strongly recommended to create a backup immediately after any change in the password of the administrator account. It is also recommended to create regular backups of User Account information frequently.

User account information classifies as system data in backup and restore procedures.

2.4   Types of Operation

User Management supports the following operations for an administrator with the System Security Administrator role. The local administrator account defined in Local Authentication can access the local authentication operations.

General

Local Authentication

Local authentication operations must be used if the system does not support centralized authentication, or to configure centralized authentication and to define fallback accounts, in case the centralized user management service becomes inaccessible.

LDAP Authentication

LDAP authentication must be configured if there is a centralized user management service accessible with the LDAP protocol. For security, deploying it with TLS is highly recommended.

Local Authorization

Local authorization must be used to understand the default roles the product delivers, and using roles in assigning authorization for users. Customization of roles and rules are possible by adding extra roles over the default ones.

3   Managed Object Model

The User Management managed area is represented in the Managed Object Model (MOM) as follows:

ManagedElement
   +-SystemFunctions
      +-SecM
         +-UserManagement
            +-LdapAuthenticationMethod
               +-Ldap
                  +-EricssonFilter
                  +-Filter
            +-LocalAuthenticationMethod
                  +-AccountPolicy
                  +-AdministratorAccount
                     +-SshPublicKey
                  +-PasswordPolicy
                  +-PasswordQuality
                  +-UserAccountM
                     +-UserAccount
                        +-SshPublicKey
            +-LocalAuthorizationMethod
               +-CustomRole
               +-CustomRule
               +-Role
                  +-Rule

For general information about the MOM, MOCs, MOs, cardinality, and related concepts, refer to Managed Object Model User Guide.

The User Management MOCs are described in Table 3.

Table 3    User Management Managed Object Class Descriptions

Managed Object Class

Description

SecM

The root of the Security Management model.

UserManagement

Describes the ME target types for TBAC.

LdapAuthenticationMethod

Handles the LDAP authentication method used to verify user credentials when attempting to log on to an ME.

Ldap

Handles the primary and secondary LDAP servers.

EricssonFilter

Defines the configuration used for the Ericsson filter (applicable when the value of profileFilter is ERICSSON_FILTER).

Filter

Defines the configuration used for the flexible filter (applicable when the value of profileFilter is FLEXIBLE).

LocalAuthenticationMethod

Handles the local authentication method used to verify user credentials when attempting to log on to an ME.

AccountPolicy

Handles the account policies.

AdministratorAccount

Handles the administrator account.

PasswordPolicy

Handles the password policies.

PasswordQuality

Handles the password quality parameters

UserAccountM

Contains all the local user accounts created by an administrator.

UserAccount

Describes an individual user account, and related policies, credentials, and relevant password monitoring.

LocalAuthorizationMethod

Handles the local authorization method used to verify the user access to the ME resources.

CustomRole

Handles the authorization roles that can be assigned to users.

CustomRule

Handles the rules that define the user access control of MOs.

Role

Describes the authorization roles that can be assigned to users.

Rule

Describes the authorization rules that define the user access control to MOs.

3.1   Rules for Default Roles

The detailed permissions for the default roles are described in Table 4, Table 5, Table 6, Table 7, and Table 8.

"Deny" indicates the default behavior when no permission rule is defined.

Table 4    Self-Permissions

MOM Fragment

Permission

Scope

Managed Element

R

Only the MO but not the attributes (enables navigation in the ECLI)

 

System Functions

 

Backup and Restore Management

Deny

Not applicable

Fault Management

File Management

License Management

Performance Management

Security Management

R

Only the MO but not the attributes (enables navigation in the ECLI)

 

User Management

 

LocalAuthenticationMethod

 

AdministratorAccount

 

SshPublicKey

The MO, its attributes, and actions

UserAccountM

Only the MO but not the attributes (enables navigation in the ECLI)

 

UserAccount

 

SshPublicKey

The MO, its attributes, and actions

Software Inventory Management

Deny

Not applicable

Software Management

System Management

Transport

Equipment

Table 5    LocalAuthenticationAdministrator Permissions

MOM Fragment

Permission

Scope

Managed Element

R

Only the MO but not the attributes (enables navigation in the ECLI)

 

System Functions

 

Backup and Restore Management

Deny

Not applicable

Fault Management

File Management

License Management

Performance Management

Security Management

R

Only the MO but not the attributes (enables navigation in the ECLI)

 

User Management

 

LocalAuthenticationMethod

RWX

The MO, its attributes, actions, and child MOs

Software Inventory Management

Deny

Not applicable

Software Management

System Management

Transport

Equipment

Table 6    System Administrator Permissions for Default Roles

MOM Fragment

Permission

Scope

Managed Element

RWX

The MO, its attributes, and actions

 

System Functions

 

Backup and Restore Management

The MO, its attributes, actions, and child MOs

Fault Management

File Management

License Management

Performance Management

Security Management

R

Only the MO but not the attributes (enables navigation in the ECLI)

 

Certificate Management

R

The MO, its attributes, actions, and child MOs

Software Inventory Management

RW

Software Management

RWX

System Management

Transport

The MO, its attributes, and actions

Equipment

Deny

Not applicable

Table 7    System Security Administrator Permissions for Default Roles

MOM Fragment

Permission

Scope

Managed Element

R

Only the MO but not the attributes (enables navigation in the ECLI)

 

System Functions

 

Backup and Restore Management

Deny

Not applicable

Fault Management

R

The MO, its attributes, actions, and child MOs

File Management

Deny

Not applicable

License Management

Performance Management

Security Management

RWX

The MO, its attributes, actions, and child MOs

 

Certificate Management

Software Inventory Management

R

Software Management

Deny

Not applicable

System Management

Transport

Equipment

Table 8    System Read Only for Default Roles

MOM Fragment

Permission

Scope

Managed Element

R

The MO, its attributes, and actions

 

System Functions

 

Backup and Restore Management

The MO, its attributes, actions, and child MOs

Fault Management

File Management

Deny

Not Applicable

License Management

R

The MO, its attributes, actions, and child MOs

Performance Management

Security Management

Deny

Not applicable

Software Inventory Management

R

The MO, its attributes, actions, and child MOs

Software Management

R

System Management

Transport

The MO, its attributes, and actions

Equipment

Deny

Not applicable

4   Configuration Management

User Management is accessed using NETCONF or the ECLI to manipulate the MIB.

The following operations, described in Operating Instructions using the ECLI, can be performed by an administrator with the System Security Administrator role:

General

Local Authentication

LDAP Authentication

Local Authorization

5   MTAS Roles and Rules

The MTAS roles and rules are listed in Table 9.

Table 9    MTAS Roles and Rules

Managed Area

Mtas_Application_ Administrator Role

Mtas_Application_ Security_Administrator Role

Mtas_Application_ Operator Role

Backup and Restore Management

Mtas_AA_BrM


'RWX' permission on the 'ManagedElement, SystemFunctions, BrM,*' resource

   

Fault Management

Mtas_AA_Fm


'R' permission on the 'ManagedElement, SystemFunctions, Fm,*' resource

Mtas_ASA_Fm


'R' permission on the 'ManagedElement, SystemFunctions,Fm,*' resource

Mtas_AO_Fm


'R' permission on the 'ManagedElement, SystemFunctions,Fm,*' resource

File Management

Mtas_AA_FileM_FGP


'RWX' permission on the 'ManagedElement, SystemFunctions, FileM,FileGroupPolicy, *' resource

Mtas_ASA_FileM_FGP


'RWX' permission on the 'ManagedElement, SystemFunctions, FileM,FileGroupPolicy, *' resource

Mtas_AO_FileM_FGP


'R' permission on the 'ManagedElement, SystemFunctions, FileM,FileGroupPolicy, *' resource

Mtas_AA_FileM_FG_Alarm


'RWX' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=AlarmLogs, *' resource

Mtas_ASA_FileM_FG_Alarm


'R' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=AlarmLogs, *' resource

Mtas_AO_FileM_FG_Alarm


'R' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=AlarmLogs, *' resource

Mtas_AA_FileM_FG_Alert


'RWX' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=AlertLogs, *' resource

Mtas_ASA_FileM_FG_Alert


'R' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=AlertLogs, *' resource

Mtas_AO_FileM_FG_Alert


'R' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=AlertLogs, *' resource

Mtas_AA_FileM_FG_DC


'RWX' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=DataCollection, *' resource

 

Mtas_AO_FileM_FG_DC


'R' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=DataCollection, *' resource

Mtas_AA_FileM_FG_Mtas


'RWX' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=Mtas, *' resource

 

Mtas_AO_FileM_FG_Mtas


'R' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=Mtas, *' resource

Mtas_AA_FileM_FG_PM


'RWX' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=PerformanceManagementReportFiles, *' resource

   

Performance Management

Mtas_AA_PM


'RWX' permission on the 'ManagedElement, SystemFunctions, Pm,*' resource

 

Mtas_AO_FileM_FG_PM


'R' permission on the 'ManagedElement=1, SystemFunctions=1, FileM=1,LogicalFs=1, FileGroup=PerformanceManagementReportFiles, *' resource

Security Management

Mtas_AA_CertM


'R' permission on the 'ManagedElement, SystemFunctions, SecM, CertM,*' resource

Mtas_ASA_CertM


'R' permission on the 'ManagedElement, SystemFunctions, SecM,CertM,*' resource

Mtas_AO_CertM


'R' permission on the 'ManagedElement, SystemFunctions, SecM,CertM,*' resource

Mtas_ASA_MAA_Role_Rule


'RWX' permission on the 'ManagedElement, SystemFunctions, SecM,UserManagement, LocalAuthorizationMethod,Role=Mtas_ Application_Administrator, *' resource

Mtas_ASA_MASA_Role_Rule


'RWX' permission on the 'ManagedElement, SystemFunctions, SecM,UserManagement, LocalAuthorizationMethod, Role=Mtas_ Application_Security_Administrator, *' resource

Mtas_ASA_UserManagement


'R' permission on the 'ManagedElement, SystemFunctions, SecM,UserManagement, *' resource

Software Inventory Management

Mtas_AA_SwIM


'RW' permission on the 'ManagedElement, SystemFunctions, SwInventory, *' resource

Mtas_ASA_SwIM


'R' permission on the 'ManagedElement, SystemFunctions, SwInventory, *' resource

Mtas_AO_SwIM


'R' permission on the 'ManagedElement, SystemFunctions, SwInventory, *' resource

Software Management

Mtas_AA_SwM


'RWX' permission on the 'ManagedElement, SystemFunctions, SwM,*' resource

   

Mtas_AA_SwM_UP


'RWX' permission on the 'ManagedElement, SystemFunctions, SwM, UpgradePackage.*' resource

   

Application

Mtas_AA_MtasFunction


'RWX' permission on the 'ManagedElement, MtasFunction,*' resource

Mtas_ASA_MtasFunction


'R' permission on the 'ManagedElement, MtasFunction,*' resource

Mtas_AO_MtasFunction


‘RWX' permission on the 'ManagedElement, MtasFunction,*' resource

Mtas_AA_MtasXdmsCai3gUser


'NO_ACCESS' permission on the 'managed element, MtasFunction, MtasXdms, MtasXdmsCai3gUser, *' resource

Mtas_ASA_MtasXdmsCai3gUser


'RWX' permission on the 'ManagedElement, MtasFunction, MtasXdms ,MtasXdmsCai3gUser, *' resource

Mtas_AO_MtasXdmsCai3gUser


'NO_ACCESS' permission on the 'ManagedElement, MtasFunction, MtasXdms, MtasXdmsCai3gUser, *' resource



Copyright

© Ericsson AB 2017. All rights reserved. No part of this document may be reproduced in any form without the written permission of the copyright owner.

Disclaimer

The contents of this document are subject to revision without notice due to continued progress in methodology, design and manufacturing. Ericsson shall have no liability for any error or damage of any kind resulting from the use of this document.

Trademark List
All trademarks mentioned herein are the property of their respective owners. These are shown in the document Trademark Information.

    User Management