I would assume that if it's important enough, you could write a program (or
find one) that will take a password, encrypt it, and store it in a file.
Then your script could use your program to decrypt the password and store it
in a variable.  Then your script could call your dsmadmc command with
-pa=$password.

Realistically, I've found that almost all of the people with root access to
a server are trusted by their employer.  Additionally, if you disable remote
login as root, so people can only su to root, you can realistically track
who has access to that password.  By putting the password in clear text in a
file that's only readable by root, I feel you've implemented a realistic
level of security.  If you're a government, or if security is
ultra-necessary, or possibly you have legal requirements, I don't see why
implementing your own password encryption scheme wouldn't be feasable.

As an aside, if you store the password in clear text in a root-only file on
the same server your TSM server lives on, you're really not losing any
security because anybody with root access (see the above paragraph) can just
come along and start TSM in the foreground and do whatever they like, such
as registering an admin with system authority.  Just as TSM admins have to
be trusted individuals, your OS people have to be trusted as well.

Alex Paschal
Storage Administrator
Freightliner, LLC
(503) 745-6850 phone/vmail


-----Original Message-----
From: StorageGroupAdmin StorageGroupAdmin
[mailto:[EMAIL PROTECTED]]
Sent: Wednesday, February 13, 2002 1:49 PM
To: [EMAIL PROTECTED]
Subject: How do you secure the passwd in a TSM admin command run a via
batch script


I would like to run a UNIX script that issues a series of TSM commands
that require  SYSTEM access rights ( DEFINE MACHINE & INSERT MACHINE).

The problem I have is that I am forced to have a TSM ID and PASSWD
within the script or in an input file therefore accessible to a
multitude of people.

Firstly, I have trouble understanding why these two commands require
SYSTEM access.

Secondly,  I would like to see the TSM security  re-worked so that
either;
specific functions could be added and removed from the generic access
class as required (ie Operator could be extended to allow the INSERT
MACHINE cmd).

OR

An individual users access could be extended to include / exclude
commands.

For those with mainframe / DFSMShsm knowledge, what I am imagining here
is that a PATCH like command that could be applied to the aplication to
redefine the required access.


Since the TSM developers also read this discussion group I am hoping
enough people will agree and comment as such so to plant the seed of
thought with the developers.


I also would appreciate if anyone could suggest a method to secure the
password from prying eyes. I can only think of making the file hidden
but that has it's own problems.


I imagine that similar situations will become more common place as task
dependancies on separate server grow and the scheduling of tasks must be
removed from the specific application (such as TSM) to a centralised
scheduling system.   For example, a file must successfully be written on
server A before the TSM backup starts.



Peter Griffin
Sydney Water


-----------------------------------------------------------
This e-mail is solely for the use of the intended recipient
and may contain information which is confidential or
privileged. Unauthorised use of its contents is prohibited.
If you have received this e-mail in error, please notify
the sender immediately via e-mail and then delete the
original e-mail.
-----------------------------------------------------------

Reply via email to