1 Introduction
This document describes how to perform the IPWorks authentication procedure after IPWorks installation.
IPWorks provides the following authentication functions:
- Remote user authorization and authentication
- Local user authorization and authentication
- Security log management
The remote/local user access activity is recorded by the IPWorks security log. And the security log for DNS, ENUM, and SS can be generated as a local file or remote server log (with/without TLS). For information on how to configure IPWorks security log, refer to IPWorks Security Log Management Guide.
IPWorks supports remote user and local user access respectively through NETCONF, ECLI, and SFTP over SSH.
- Note:
- Operator is free to apply either remote or local authentication method to each of the user account.
1.1 Prerequisites
This section describes the prerequisites which must be fulfilled before starting IPWorks Authentication feature.
1.1.1 Documentation
Before starting the IPWorks Authentication, ensure that the document Security Management for ECLI, NETCONF, and SFTP Users is available and understandable.
1.2 Related Information
Trademark information, typographic conventions, and a definition and explanation of acronyms and terminology can be found in the following documents:
2 Default Administrator User in IPWorks
After IPWorks initial installation, a default administrator user (username: la-admin, password: 123456) is available. This user has authorization to create, modify, or delete other users. It is recommended to modify the default administrator password before IPWorks system is in operation. For more information about how to modify password of default administrator, refer to Reset Password for User Account.
3 Remote and Local User Authorization
This section describes the default roles of the IPWorks system. These roles are applicable for both remote and local authorization.
Four default roles described in Table 1, are defined to support remote/local user Authorization in IPWorks. Accounts are authorized with specified role. For more information about the default roles, refer to Security Management for ECLI, NETCONF, and SFTP Users.
|
Default Role |
Description |
|---|---|
|
System Administrator |
Responsible for the administration of all non-security-related attributes and capabilities of an ME, including features, configuration parameters, and monitoring |
|
System Security Administrator |
Responsible for the administration of all security-related attributes and capabilities of an ME, including user accounts and authorizations |
|
Managed Function Application Administrator |
Responsible for the administration of all non-security-related attributes and capabilities of the Managed Function, including features, configuration parameters, and monitoring |
|
Managed Function Application Operator |
Can view some non-security-related attributes and capabilities of the Managed Function, including features, configuration parameters, and monitoring |
4 Remote User Authentication
The remote user initiates an ECLI, NETCONF, or SFTP session over SSH to the ME and triggers a user LDAP authentication from the ME. To configure remote user authentication, do the following:
- Create emergency user
See Section 4.1
- Configure remote LDAP server
Refer to LDAP-Based Authentication and Authorization Interface
- Note:
- The configuration on the remote LDAP server is out of the scope of this document.
- To set LDAP authentication
parameters, do the followings:
- Log on to the ECLI on the active SC with the user.
ssh <user name>@<SC_MIP> -t -s cli
- Navigate to the LDAP managed object, for example:
>dn ManagedElement=<node name>,SystemFunctions=1,SecM=1,UserManagement=1,LdapAuthenticationMethod=1,Ldap=1
- Enter configuration mode:
(Ldap=1)>configure
- Set the base DN to be used for user authentication to
the LDAP target, for example:
(config-Ldap=1)>baseDn="dc=my-domain,dc=com"
- Set the ldapIpAddress for user
authentication to the LDAP target, for example:
(config-Ldap=1)>ldapIpAddress=192.0.2.10
- Set the value of useTls to false.
(config-Ldap=1)>useTls=false
- Commit the settings:
(config-Ldap=1)>commit
- Verify the result:
(Ldap=1)>show
The following is an example output:
Ldap=1 baseDn="dc=my-domain,dc=com" bindDn="cn=proxyaccount,dc=ericsson,dc=com" bindPassword="1:PLDGCpRMq16BVyHxsZSp4dNvsCA2u6ED" fallbackLdapIpAddress=[] <empty> filterType=[] <empty> <deprecated> ldapId="1" ldapIpAddress="192.0.2.10" nodeCredential=[] <empty> nodeType=[] <empty> <deprecated> profileFilter=[] <empty> roleAliasesBaseDn=[] <empty> <deprecated> serverPort=[] <empty> tlsCaCertificate=[] <empty> <deprecated> tlsClientCertificate=[] <empty> <deprecated> tlsClientKey=[] <empty> <deprecated> tlsMode=STARTTLS <default> trustCategory=[] <empty> useReferrals=false <default> userLabel="LDAP based login authentication" useTls=false useTlsFallback=false <default> <deprecated> EricssonFilter=1 Filter=1
- Note:
- This is only a simple configuration. For more parameters that are listed in the above output, can be used according to descriptions in MO Ldap.
- Log on to the ECLI on the active SC with the user.
- Enable Remote authorization,
refer to Unlock LDAP Authentication
Method.
If password-based simple bind is required for LDAP authentication, refer to Change Bind Name and Password for LDAP Authentication.
If TLS is required for LDAP authentication, refer to Change Certificate Settings for LDAP TLS.
If Target-Based Access Control is required for LDAP authentication, refer to Configure Target-Based Access Control.
- Note:
- Remote authorization can be disabled, refer to Lock LDAP Authentication Method.
4.1 Create Emergency User
At least one emergency user must be created. This user is used when access to the system or to the centralized user management database is lost due to a configuration mistake or communication problems. For example, when LDAP server is unreachable or inactive, or connection between IPW and LDAP Server has broken, then operator is able to use emergency group account for operation. In this situation, You can use local Linux users that belong to the com-emergency Linux group to establish authentication locally and get complete Management Information Base (MIB) access through the ECLI or NETCONF.
- Note:
- How many emergency users that are created, and for whom, is deployment-specific. For example, one user for operator personnel and one for Ericsson support personnel can be created.
4.1.1 Add User for Standard Linux OS
To add a user to the com-emergency group for the standard Linux® Operating System (OS):
- Log on to one of the SCs as root:
ssh -l <user> <address>
- Add a user account.
useradd -G com-emergency <account>
An account according to the defaults of /etc/default/useradd is created. The account is added to the com-emergency group.
- Set password for the user account.
passwd <account>
The system prompts the user for a password and asks the user to repeat the selected password once more.
- Log off from the SC.
exit
- Log on to the other SC as root.
ssh -l <user> <address>
- Add the same user account as in Step 2.
useradd -G com-emergency <account>
An account according to the defaults of /etc/default/useradd is created. The account is added to the com-emergency group.
- Set the same password for the user account as in Step 3.
passwd <account>
The system prompts the user for a password and ask the user to repeat the selected password once more.
- Insert <account> all into the file /cluster/etc/login.allow.
- Log off from the SC.
exit
5 Local User Authentication
This section describes the procedures on how to configure local user authentication.
- Log on to the ECLI on the active SC with the la-admin.
ssh la-admin@<SC_MIP> -t -s cli
- Create password policy, refer to Create Password Policy.
- Create account policy, refer to Create Account Policy.
- Create user account, refer to Create User Account.
The created user account can access to the OS.
- Enable local authorization, refer to Unlock Local Authorization Method.
- Enable user account, refer to Unlock Administrative Lock for User Account.
- Note:
-
- The created user account can access to the OS.
- Local authorization can be disabled, refer to Lock Local Authorization Method.

Contents