
5 Security
39
Do You Have Multiple Host Types that Users Need to Access?
Having multiple host types is handled in MultiCommManager security by placing modems that are
attached to one type of host device, such as a UNIX system, into a common modem group. Users
who need access to that host should be made members of that modem group. This ensures that users
who connect to modems that are in a modem group that they are not members of will have their
user IDs and passwords rejected. Also, it ensures that they will be called back only by modems that
are in modem groups that they are members of.
If you want to prompt callback users to select the host that will call them back, you must enable the
Host Select feature. When this is active, callback users who are members of more than one modem
group that has outbound modems in it are prompted to pick the host that they want to be called
back by. The names displayed are the names of the modem groups that they are members of. This
feature is not available with pass-through security.
See also:
“How to Set Up Security Modems and Modem Groups” on page 45.
Do You Have Multiple Security Levels for Call-In Users?
You may want to give some users, such as system administrators, more access to your system than
ordinary users. But the amount of access that you give may also depend on what type of data the
users are accessing. If the data is sensitive, then you will probably want to lock out your least
trusted users (LTUs) and restrict even your most trusted users (MTUs) so that it would be difficult
for anyone to hack into the data. If the data is not sensitive, then your MTUs could be given more
freedom and your LTUs could have restricted access. The different access privileges for MTUs ac-
cessing your most sensitive data versus your least sensitive data could be accomplished by having a
different user account for each type of data for the user (e.g, have an administrative account for
doing system maintenance, and a regular account for normal access to the system).
MultiCommManager security has many security barriers that can be adjusted to allow many
different security levels. The following table shows the different barriers and how they might be set
for different types of users and data.
Security barrier
Possible
values (most to
least secure) Most sensitive data Least sensitive data
Security type Fixed callback.
Variable call-
back.
Pass-through.
Allow only MTU;
require access via
fixed callback.
Allow MTU freedom with
pass-through or variable
callback, and LTU re-
stricted access through
Comentarios a estos manuales