Process Security - HP -UX B6941-90001 Administrator's Reference Manual

Management server on hp-ux
Table of Contents

Advertisement

Table 9-5
An Overview of ITO Processes
Understanding ITO Processes
The directories in Table 9-4 on page 365 contain files which are listed in
Table 9-5 on page 366. Table 9-5 also explains what the files do and
whether or not the contents of the files are encrypted:
Agent-configuration Files and their Contents
File
logfile encapsulation configuration
le
opcmsg(1) and opcmsg(3)
msgi
message interceptor
SNMP event interceptor
trapi
MPE/iX console interceptor
consi
monitor agent template file
monitor
MOM configuration file
mgrconf
MOM configuration file
primmgr
node specific ITO configuration
nodeinfo
information, for example, the
logging directory, the type of
managed node internal character
set. All ITO agents read this file.

Process Security

Although IT/Operations carries out basic authorization checks
independently of DCE when communication between the management
server and the managed nodes is required, DCE allows the
implementation of a much more stringent security policy at process level
between, for example, an RPC client and an RPC server, specifically in
the areas of authentication and data protection.
The level of data protection is chosen by the client, although the server
has the option of deciding whether a chosen level is sufficient. ITO sees
the concept of authentication in the context of either the RPC client or
the RPC server. For example, just as a server needs to determine
whether or not an incoming request is from a genuine ITO client, an RPC
client also needs to be sure that the server it is calling is a real ITO
server.
366
Contents
Encrypted?
Yes
Yes
Yes
Yes
Yes
No
No
No
Chapter 9

Advertisement

Table of Contents
loading

This manual is also suitable for:

Openview it

Table of Contents