Depends on your situation...

one solution:

We created an admin account (ex. QUERY), that is granted no authority.
Which means it can do queries, but can't change anything.
For scripts that just do queries, we use that admin id and don't sweat
whether it's hackable.
Now in theory somebody could find out the password and SUBMIT A BIG QUERY
that ties up your server,
but really, so what....  not in my list of Worst Things to Worry About.

another solution:

For scripts that do more than queries, put the userid and password in a file
that is protected so only root can read it.
Then have the script (assume you are running it via cron) read the id and
password from that file and plug it in.

If you're rally paranoid, encrypt the file that has the userid and password
in it.
But if your root password is compromised....  TSM won't be the Worst Thing
to Worry About...

-----Original Message-----
From: Justin Bleistein [mailto:[EMAIL PROTECTED]
Sent: Tuesday, May 27, 2003 3:24 PM
To: [EMAIL PROTECTED]
Subject: Re: Clear text passwords. Was: Automating dsmserv


any alternatives to running: "dsmserv" via batch mode with the:

dsmadmc -id=login -pass=password syntax...

I mean it's passwords in clear text so all someone has to do is cat that
file and your exposed... Any ideas on how to automate the client-server
interface (dsmadmc) without displaying the password anywhere?. Thanks!.

--Justin Richard Bleistein
Unix/TSM Systems Administrator (Sungard eSourcing)
Desk: (856) 566 - 3485
Cell:    (856) 912 - 0861
Email: [EMAIL PROTECTED]



                      "Stapleton, Mark"
                      <[EMAIL PROTECTED]        To:
[EMAIL PROTECTED]
                      COM>                     cc:
                      Sent by: "ADSM:          Subject:  Re: Clear text
passwords.  Was: Automating dsmserv
                      Dist Stor
                      Manager"
                      <[EMAIL PROTECTED]
                      .EDU>


                      05/27/2003 12:08
                      PM
                      Please respond to
                      "ADSM: Dist Stor
                      Manager"






From: Thomas A. La Porte [mailto:[EMAIL PROTECTED]
> Since this topic of clear text passwords has arisen, I wonder if
> anybody knows whether or not there is/are any outstanding
> requirements or enhancement requests for Kerberos support within
> TSM. This would be handy both in the situation discussed below,
> and for general administrative and node access to the server.
>
> If there isn't an outstanding request, I'll probably go ahead and
> ask that one be made.

One of the nice things about how Tivoli has handled TSM is that the
authentication system is *exactly* the same, no matter what the server
and client OS platforms may be. The same can be said for the interfaces
and the way administration is performed. Inserting something like
Kerberos into the mix would mean you'd have to make it work for all
platforms that the TSM server supports--including MVS, OS/400, and
<shudder> Windows.

There are ways of scripting TSM tasks that can sidestep the clear text
stuff, much the same as the ways you script FTP sessions without putting
passwords where users can gefingerpoken.

--
Mark Stapleton ([EMAIL PROTECTED])
Berbee Information Networks
Office 262.521.5627

Reply via email to