[Info-vax] VMS and MFA?
Dave Froble
davef at tsoft-inc.com
Thu Aug 20 03:12:01 EDT 2020
On 8/19/2020 11:41 PM, geze... at rlgsc.com wrote:
> On Wednesday, August 19, 2020 at 4:20:30 PM UTC-4, Arne Vajhøj wrote:
>> On 8/19/2020 3:08 PM, Dave Froble wrote:
>>> On 8/19/2020 2:13 PM, Arne Vajhøj wrote:
>>>> On 8/19/2020 11:44 AM, Jan-Erik Söderholm wrote:
>>>>> Thanks all. Yes, there are several "layers" before anyone reach the VMS
>>>>> "Username:" prompt. I first login to the Citrix Remote Desktop, and that
>>>>> is throught a MFA (6-digit code in SMS/text message). From there is it
>>>>> a Putty session against the VMS system "as usual".
>>>>>
>>>>> We had a discussion, and many of our "users" are generic and named
>>>>> after the workplace. There can be 10 different operators working there
>>>>> and using a group login VMS account setup for each "process terminal".
>>>>>
>>>>> So, the decision was that MFA is not suitable for us.
>>>>
>>>> If you have started a process of looking at security then
>>>> one account used by multiple persons could raise some
>>>> serious red flags.
>>>
>>> In my opinion, the best security is being able to control what can be
>>> accomplished.
>>>
>>> As far as I'm aware, and I'd welcome any information I'm unaware of, a
>>> captive account is very effective. Of course, it depends on what
>>> activity a captive account can accomplish.
>>>
>>> It may be that multiple users can perform the same activity, and if so,
>>> multiple users of the same user account need not be a problem. Though
>>> setting up individual user accounts is usually not a problem.
>>>
>>> Depending on requirements, various amounts of logging of activity can be
>>> implemented. Perhaps good for exploring issues, but as always, who
>>> watches the watchers?
>>>
>>> While access control is possible, it's my feeling that trust of
>>> authorized users is usually a much greater security issue.
>> It is usually considered a good thing security wise to be able
>> to actually log who successfully did what and who unsuccessfully
>> tried what.
>>
>> Unique accounts helps with that.
>>
>> It is not even a new thing.
>>
>> Arne
> Arne,
>
> Quite
>
> For "captive" applications, my general recommendation is for
> individual logins, for control and accountability purposes. If a
> user's access is deemed no longer necessary or appropriate, their
> access can be revoked without impacting others.
>
> I also prefer individuals to have individual work/home directories.
> Sometimes programs have presumptions that each user will run a single
> copy, it is better for the home directory to be separate for each
> user. If large numbers of files are common, logical names with search
> lists can be used to provide access to common files.
Yep.
> That said, such users are normally put in a group, which has a
> group-specific login which sets up the environment (see my old
> OpenVMS Consultant column on http://www.rlgsc.com for how to setup
> group-specific login files.
>
> One such client had tens or hundreds of users who never saw VMS. They
> logged in to individual accounts. All of the accounts were set up as
> captive in a single group, with a group-specific login. Each user was
> granted RIGHTSLIST identifiers as to what tasks they were allowed to
> perform. A simple menu system, driven by the rightslist entries
> allowed them to acces their authorized applications.
I'm aware there are multiple methods to achieve desired results. But
I'm curious, why get into the complexity of rightslist entries?
A captive account, with a menu of possible apps to run, pretty much
locks a user into just those apps. Of course a menu utility that allows
for custom menus for each user makes this simple. If a user somehow
gets out of the allowed apps, being captive, the process is killed.
--
David Froble Tel: 724-529-0450
Dave Froble Enterprises, Inc. E-Mail: davef at tsoft-inc.com
DFE Ultralights, Inc.
170 Grimplin Road
Vanderbilt, PA 15486
More information about the Info-vax
mailing list