4 4 3 Grolar:Configuring Database-Based Authentication
SEP sesam provides different authentication methods that are mutually exclusive: policy-based authentication and database-based authentication which can be combined with Lightweight Directory Access Protocol (LDAP) or/and Active Directory. Only one method (policy-based or database-based authentication) can be active at a time. By default, policy-based authentication is active.
Activating database-based authentication has to be done via the GUI to set the superuser/admin password. Note that superuser has replaced the former admin role with SEP sesam version 5.0.0 Jaglion.
After restarting SEP sesam GUI Server and Client, the superuser/admin (depending on the version) can configure default user access rights that are based on predefined user type.
SEP sesam currently provides 5 user types. The following list shows the available user types and their corresponding rights.
- Superuser (≥ Jaglion): The only user type with full control over the SEP sesam environment (previously Admin). This user type with superuser rights is automatically assigned exclusively to the Administrator user when database-based authentication is activated. If policy-based authentication is enabled, this user type with superuser rights is assigned to the Administrator, root and sesam users.
- Administrator: Administrators can administer the SEP sesam system and access the GUI objects (except permission management) if not restricted by ACLs.
- Operator: Operators can monitor the whole environment.
- Backup (≥ Jaglion): Backup users can access the GUI objects granted by ACLs. They are also allowed to start backups and restores.
- Restore: Restore users can access the GUI objects granted by ACLs. They are only allowed to start standard restores.
Which GUI components are displayed depends on the user type. For details, see Available interface options according to user type.
As of v. 5.0.0 Jaglion, it is also possible to authenticate users with a signed certificate instead of a user password if database-based authentication is enabled. For step-by-step procedure, see Configuring Certificate-Based Authentication.
- Make sure that reverse DNS resolution (from IP address to host name) is set up correctly. If the name resolution for the selected host is not correct, the connection to the GUI server fails. For details, see How to check DNS configuration.
Activating database-based authentication in the GUI
- In the GUI, from the menu bar select Configuration ‐> Permission Management.
- Click Activate Authentication. Set up the password for the Administrator user; note that this is the only way to set the administrator's password.
- After activating the authentication mode and confirming your action, SEP sesam GUI will restart automatically. You have to restart SEP sesam Client manually for the changes to take effect.
- LDAP/AD authentication is enabled by default. For details on how to configure LDAP/AD authentication, see Configuring LDAP/AD Authentication.
- You have to log in to configure users and add them to the selected group. The way you need to log in depends on the version. In v. ≥ 5.0.0 Jaglion log in as Administrator with the user type superuser. In earlier versions, log in with the administrator user type. The following user types are available: Administrators, Operators, Backup users (≥ 5.0.0 Jaglion), Restore users.
- You can create your own subgroups (e.g., SUB_ADMIN) to grant users more specific roles. Under the Groups tab, click Create New to configure a new subgroup. The Sub Group window opens.
- Specify a group name and from the drop-down list select the relevant role to be applied to the whole group: Administrator, Operator, Backup (in v. ≥ 5.0.0 Jaglion), or Restore. For more details, see User Roles and Permissions.
- Under the Users tab, click Create New to configure a new user. The Create User window opens.
- Enter a name (e.g., mustermann) and a password and assign the user to the relevant group, for example, RESTORE.
- A user can be a member of one or more groups. Under the Groups tab, double-click the relevant group and (de)select the users to assign them to or remove them from the respective group.
- Now you can configure ACLs (access control lists) to specify which users or groups are granted access to location (group of clients) or a specific client. As of v. 5.0.0 Jaglion, you can also configure ACLs for backup tasks, media pools and schedules. For details, see Using Access Control Lists.
|If you want to combine LDAP/AD, you have to use the external groups. Add the group from LDAP/AD and select the Based on group option to map to this particular SEP sesam group; see Configuring LDAP authentication in the GUI.|
|When activating database-based authentication via GUI, parameter authEnabled is changed to true in the sm.ini file. Setting the flag to false enables policy-based authentication and deactivates database-based authentication.|
Resetting user password
To reset the password of another user, you must have superuser/admin privileges. Resetting a password is a two-step process: The superuser/admin has to reset the password in the command line by using the sm_cmd command and then use the newly generated password to be able to change the password in the Permission Management in GUI.
Resetting the password in the command line
To reset a user password, log in to SEP sesam Server console and enter the following command:
sm_cmd reset user <ID or name>
The output of the above command is shown in the example.
In this example, the user name is mustermann.
sm_cmd reset user mustermann C:\Program Files\SEPsesam\bin\sesam>sm_cmd reset user mustermann bouryper39
Changing password in the GUI
After resetting a user password with the sm_cmd reset user command, you can change the password for the respective user in the Permission Management in the GUI by using the automatically generated password from the command output. Note that only a superuser/admin user has sufficient permissions to use the Permission Management and configure users.
- From the menu bar select Configuration ‐> Permission Management. The Permission Management window opens.
- Select the user for which you want to reset the password and click Change. In our example, the user is named mustermann.
- In the Change User window, click Change Password.
- The Change Password window opens. Enter the password you obtained by resetting a password in the command line (in our example bouryper39), enter a new password and click OK.
Deactivating database-based authentication
- In the GUI, from the menu bar select Configuration ‐> Permission Management -> tab Activation.
- Click Deactivate Authentication.
- After deactivating the authentication mode and confirming your action, SEP sesam GUI will restart automatically. You have to restart SEP sesam Client manually for the changes to take effect.
- Now policy-based authentication is enabled and the flag authEnabled is set to false in the sm.ini file.