[Info-vax] VMS and MFA?

geze...@rlgsc.com gezelter at rlgsc.com
Wed Aug 19 23:41:43 EDT 2020


On Wednesday, August 19, 2020 at 4:20:30 PM UTC-4, Arne Vajhøj wrote:
> On 8/19/2020 3:08 PM, Dave Froble wrote: 
> > On 8/19/2020 2:13 PM, Arne Vajhøj wrote: 
> >> On 8/19/2020 11:44 AM, Jan-Erik Söderholm wrote: 
> >>> Thanks all. Yes, there are several "layers" before anyone reach the VMS 
> >>> "Username:" prompt. I first login to the Citrix Remote Desktop, and that 
> >>> is throught a MFA (6-digit code in SMS/text message). From there is it 
> >>> a Putty session against the VMS system "as usual". 
> >>> 
> >>> We had a discussion, and many of our "users" are generic and named 
> >>> after the workplace. There can be 10 different operators working there 
> >>> and using a group login VMS account setup for each "process terminal". 
> >>> 
> >>> So, the decision was that MFA is not suitable for us. 
> >> 
> >> If you have started a process of looking at security then 
> >> one account used by multiple persons could raise some 
> >> serious red flags. 
> >
> > In my opinion, the best security is being able to control what can be 
> > accomplished. 
> > 
> > As far as I'm aware, and I'd welcome any information I'm unaware of, a 
> > captive account is very effective. Of course, it depends on what 
> > activity a captive account can accomplish. 
> > 
> > It may be that multiple users can perform the same activity, and if so, 
> > multiple users of the same user account need not be a problem. Though 
> > setting up individual user accounts is usually not a problem. 
> > 
> > Depending on requirements, various amounts of logging of activity can be 
> > implemented. Perhaps good for exploring issues, but as always, who 
> > watches the watchers? 
> > 
> > While access control is possible, it's my feeling that trust of 
> > authorized users is usually a much greater security issue.
> It is usually considered a good thing security wise to be able 
> to actually log who successfully did what and who unsuccessfully 
> tried what. 
> 
> Unique accounts helps with that. 
> 
> It is not even a new thing. 
> 
> Arne
Arne,

Quite 

For "captive" applications, my general recommendation is for individual logins, for control and accountability purposes. If a user's access is deemed no longer necessary or appropriate, their access can be revoked without impacting others.

I also prefer individuals to have individual work/home directories. Sometimes programs have presumptions that each user will run a single copy, it is better for the home directory to be separate for each user. If large numbers of files are common, logical names with search lists can be used to provide access to common files.

That said, such users are normally put in a group, which has a group-specific login which sets up the environment (see my old OpenVMS Consultant column on http://www.rlgsc.com for how to setup group-specific login files.

One such client had tens or hundreds of users who never saw VMS. They logged in to individual accounts. All of the accounts were set up as captive in a single group, with a group-specific login. Each user was granted RIGHTSLIST identifiers as to what tasks they were allowed to perform. A simple menu system, driven by the rightslist entries allowed them to acces their authorized applications. 

- Bob Gezelter, http://www.rlgsc.com



More information about the Info-vax mailing list