boks manager 6.6.2 installation guide · chapter 2: installing boks manager ... boks manager is a...

168
BoKS Manager 6.6.2 Installation Guide

Upload: others

Post on 24-Aug-2020

18 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

BoKS Manager 6.6.2Installation Guide

Page 2: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Copyright © 2012 Fox Technologies, Inc. All rights reserved. Copyright and title of Program Package remains with Licensor and/or respective owner.First published: 11/23/2012

Contact Information

See the Fox Technologies, Inc. Web site for contact information:Fox Technologies, Inc: www.foxt.comTrademarks

BoKS, ServerControl, and WorkstationControl are registered trademarks and BoKS Desktop, BoKS Agent, ApplicationControl Suite, AccessControl Suite, AccessControl for Applications, CorporateControls, MailReport, and the FoxT logo are trademarks of Fox Technologies, Inc. or its subsidiaries.Open Source Software

Some of Fox Technologies, Inc. products include open source software. Copyright and licensing information for such software is provided in the product distribution package.Third Party Products

Modules included in Fox Technologies, Inc. software may include third-party software. Other product and company names mentioned herein may be the trademarks of their respective owners.License agreement

This software and the associated documentation are proprietary to Fox Technologies, Inc., are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright below. This software and any copies thereof may not be provided or otherwise made available to any other person.

Page 3: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Contents

Contents Overview:

Chapter 1: Planning Installation ..............................................................................................13Chapter 2: Installing BoKS Manager ......................................................................................33Chapter 3: Upgrading BoKS Manager ...................................................................................87Chapter 4: Deploying BoKS Server Agents for Unix/Linux ...............................................107Chapter 5: Deploying BoKS Desktop ...................................................................................131Chapter 6: Deploying BoKS Application Agents .................................................................153Chapter 7: Index......................................................................................................................163

Note: See www.foxt.com for updated versions of product documentation. Revision: 11/23/2012.

Contents in Detail:

Preface....................................................................................................................................................7Reference Materials ...................................................................................................................8Recommended Reading.............................................................................................................9Terminology in the Documentation.............................................................................................9Getting Support and Service ....................................................................................................11

Chapter 1: Planning Installation........................................................................... 13Solutions Overview with BoKS Manager .............................................................................14Prerequisites for BoKS Manager............................................................................................16

System Requirements ..............................................................................................................16Semaphore Undo Structures ............................................................................................17

Web Administration Requirements ...........................................................................................18Installation Paths and Deployment of Solutions .......................................................................20

Defining Masters, Replicas and Domain Architecture ....................................................20Domain Communication Basics................................................................................................21Placing Replicas for Availability and Load Balancing ...............................................................22Multiple BoKS Domains............................................................................................................23

Preparing Node Keys, User Accounts and Host Groups ................................................25Node Keys................................................................................................................................26HostIDs.....................................................................................................................................26Host Groups Planning ..............................................................................................................26Local Root Account in BoKS Manager .....................................................................................27Preparing User Accounts..........................................................................................................28

Deploying a FoxT solution with BoKS Manager ................................................................28Pre-Deployment Checklist ........................................................................................................30

Chapter 2: Installing BoKS Manager.................................................................... 33Install Background......................................................................................................................34

Package Contents ....................................................................................................................34Unpacking the Package Contents ............................................................................................36Install Directories ......................................................................................................................38Install Parameters and Options ................................................................................................38

BoKS Manager 6.6.2 Installation Guide Page iii

Page 4: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Contents

Configuring Multiple Domains on the Same Subnet ................................................................ 40About Group Passwords on Unix/Linux ................................................................................... 41About Closing dtlogin Sessions ............................................................................................... 41About Installing Role-Based Access Controls.......................................................................... 43

Installation Issues on Specific Platforms............................................................................. 43Installation Issues on Oracle Solaris........................................................................................ 44

Installing on Virtual Server Operating Systems................................................................. 44Installing on Oracle Solaris Versions With Zone Support ........................................................ 44

BoKS Zone Support Basics ............................................................................................. 45Installation Requirements in a Solaris Zones Environment ............................................. 45Uninstalling in a Solaris Zones Environment ................................................................... 46Applying Hotfixes and Patches With Solaris Zones ......................................................... 46Upgrading With Solaris Zones ......................................................................................... 46Compatibility With Solaris Zones ..................................................................................... 46Patching the Operating System With Solaris Zones ........................................................ 46BoKS tty lock.................................................................................................................... 47zlogin................................................................................................................................ 47Location of the xinit Wrapper Script ................................................................................. 47

Installing on VMware ESX Server............................................................................................ 47Installing BoKS Manager on a Master ................................................................................. 49

Master Basics .......................................................................................................................... 49Prerequisites for BoKS Master Installation .............................................................................. 51Installing the Master................................................................................................................. 51Quick Start for Remote Administration..................................................................................... 56Initializing BoKS Manager........................................................................................................ 59Basic Configuration of BoKS Manager .................................................................................... 66Using Learn Mode.................................................................................................................... 68Importing Users and Hosts into the Database ......................................................................... 71Advanced Configuration Overview........................................................................................... 71

Installing BoKS Manager on a Replica ................................................................................ 72Replica Basics ......................................................................................................................... 72Replica Designated as Master Backup .................................................................................... 73Prerequisites for BoKS Replica Installation ............................................................................. 74Installing a Replica................................................................................................................... 74

Installing BoKS Manager Patches......................................................................................... 80Installing a BoKS Manager Patch ............................................................................................ 80Backing Out a BoKS Manager Patch ...................................................................................... 82

Installing OS Patches................................................................................................................ 83Installing OS Upgrades ............................................................................................................ 83Uninstalling BoKS Manager .................................................................................................... 84

Chapter 3: Upgrading BoKS Manager.................................................................. 87Upgrade Background ................................................................................................................ 87

Key Features and Issues of Upgrading.................................................................................... 88Mixed BoKS Environments ...................................................................................................... 91Prerequisites for Upgrading ..................................................................................................... 91Overview of Upgrading a BoKS Domain.................................................................................. 91

Page iv BoKS Manager 6.6.2 Installation Guide

Page 5: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Contents

Rolling Upgrade to BoKS Manager 6.6.2 ............................................................................92Upgrading the Master and Replicas .........................................................................................93Configuring Encryption with Pre-6.6.1 Hosts............................................................................96

Upgrading BoKS Server Agents for Unix/Linux .................................................................98Server Agent Upgrade Basics ..................................................................................................98Upgrading a Server Agent for Unix/Linux ...............................................................................103

Upgrading With BoKS Application Agents ........................................................................104

Chapter 4: Deploying BoKS Server Agents for Unix/Linux ............................. 107Server Agents for Unix/Linux Background ........................................................................107

FoxT ServerControl Overview with BoKS Server Agents for Unix/Linux................................108BoKS Server Agent for Unix/Linux Basics..............................................................................109About Deleting, Changing Host Type or Domain and Uninstalling Server Agents ................. 111Prerequisites for Deploying BoKS Server Agent for Unix/Linux .............................................112Scripts for Unattended Installation..........................................................................................112

Installing BoKS Server Agent for Unix/Linux ....................................................................113Installing Pre-registered Hosts as BoKS Server Agents for Unix/Linux ...................119

Install Preparations for Pre-registered Hosts..........................................................................119Installing a Pre-registered Host ..............................................................................................121

Listing BoKS Server Agents for Unix/Linux in the Domain...........................................124Installing Hotfixes, Patches and Upgrades .......................................................................125Enabling Offline Login to a BoKS Server Agent ..............................................................129Uninstalling BoKS Server Agent for Unix/Linux...............................................................130

Chapter 5: Deploying BoKS Desktop................................................................. 131BoKS Desktop Background ...................................................................................................132

System Overview with BoKS Desktop....................................................................................132About Deploying BoKS Desktop.............................................................................................133Prerequisites for BoKS Desktop .............................................................................................133Desktop Versions ...................................................................................................................133Disabling the Windows XP Fast User Switching Feature .......................................................133Scripts for Unattended Installation..........................................................................................134Setting Password Parameters for BoKS Desktop Users ........................................................134

Deploying BoKS Desktop.......................................................................................................135CA and Virtual Card Quick Start.............................................................................................135Installing BoKS Desktop on a Reference Machine.................................................................136

Tip...................................................................................................................................138Logging On to BoKS Desktop for the First Time ....................................................................138

Logging on in Integrated Logon Mode............................................................................138Logging on in On-Demand Logon Mode ........................................................................139Tip for administrators working with BoKS Desktop in a FoxT solution ...........................140Using RSA SecurID Tokens ...........................................................................................140

Deploying BoKS SSH Client for Windows.........................................................................141BoKS SSH Client for Windows Basics ...................................................................................141Authentication in BoKS SSH Client for Windows ...................................................................141Authorization in BoKS SSH Client for Windows .....................................................................142Registering BoKS SSH Client for Windows Hosts..................................................................143Deploying BoKS SSH Client for Windows With Certificate Authentication.............................143

BoKS Manager 6.6.2 Installation Guide Page v

Page 6: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Contents

Importing Smart Cards and Users....................................................................................... 145Importing a Smart Card with Serial Number .......................................................................... 146Importing a Rainbow iKey User ............................................................................................. 147Importing Smart Cards Using LDAP ...................................................................................... 150

Chapter 6: Deploying BoKS Application Agents .............................................. 153BoKS Application Agents Background............................................................................... 153System Overview with BoKS Application Agents ........................................................... 154BoKS Application Agent Versions ....................................................................................... 155Prerequisites for BoKS Application Agents ...................................................................... 156About Deploying BoKS Application Agents ...................................................................... 156Deploying BoKS Application Agents .................................................................................. 157

FoxT ApplicationControl Quick Start...................................................................................... 157Installing BoKS Application Agents in Overview.................................................................... 159Setting Up Encrypted Telnet .................................................................................................. 160

Index ................................................................................................................................................... 163

Page vi BoKS Manager 6.6.2 Installation Guide

Page 7: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Preface

BoKS Manager 6.6.2 Installation Guide describes how to install BoKS Manager in a network as part of one of the Fox Technologies solutions to protect UNIX servers, applications, personal computers and documents.

Note: See www.foxtechnologies.com for updated versions of product documentation. Revision: 11/23/2012.

Separate chapters explain how to install BoKS Desktop and BoKS Application Agents as part of the BoKS Desktop and FoxT ApplicationControl solutions.

A chapter describes how to install and configure BoKS Server Agent for Unix/Linux as part of the FoxT ServerControl solution.

A parallel guide, the BoKS Manager 6.6.2 Administration Guide, covers how to configure and use BoKS Manager (and BoKS Server Agent for Unix/Linux) in the various FoxT solutions. The Administration Guide covers the BoKS Manager Administration GUI, the BoKS Command Line Interface, and most configuration issues. It also covers initializing the BoKS CA, which is necessary for remote administration. It provides detailed usage of many settings that may be necessary for installation. References to many of these topics are found here in the Installation Guide at appropriate places.

Use the Administration Guide and Installation Guide interchangeably, employing the references between them and their separate indexes to find what you are looking for. Topic matter overlaps considerably.

Audience

This guide is intended for security administrators and network administrators who are responsible for security management. Only users with root permission and users given security administration rights can manage this security software.

You should be familiar with essential UNIX concepts and know how to use basic UNIX commands from the command line.

About User Interfaces for Managing BoKS Manager

BoKS Manager is a part of the FoxT ServerControl solution and can be managed using the BoKS Administration GUI, which is shipped together with BoKS Manager, and using FoxT Control Center, a separate management component with an updated web interface.

The procedures in this guide describe how to manage BoKS Manager using the BoKS Administration GUI. For information on how to manage BoKS Manager using FoxT Control Center, see the FoxT Control Center online help system.

How This Guide Is Organized

Primary chapters describe how to install BoKS Manager:

• Planning Installation covers preparation for implementing BoKS Manager in your network.

BoKS Manager 6.6.2 Installation Guide Page 7

Page 8: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Preface

• Installing BoKS Manager provides step-by-step instructions on how to install the product, initialize and do basic configuration as a Master or Replica.

• Upgrading BoKS Manager describes how to upgrade from a previous version of BoKS Manager with a BoKS domain

Remaining chapters describe how to deploy the other BoKS components used in the different FoxT solutions:

• Deploying BoKS Server Agents for Unix/Linux

• Deploying BoKS Desktop

• Deploying BoKS Application Agents

Product Documentation

The BoKS Manager documentation is available from the Fox Technologies Support web site:

• BoKS Manager 6.6.2 Installation Guide — BoKS662ins.pdf

• BoKS Manager 6.6.2 Administration Guide — BoKS662adm.pdf

Note: BoKS Server Agent for Unix/Linux has no separate documentation, but is instead included in the BoKS Manager documentation.

Reference Materials

Following are the primary product documentation for the Fox Technologies products. You can obtain these from your Fox Technologies Representative, from the product download package, or in some cases online from the product itself after the product is installed.

BoKS Manager 6.6.2 Administration Guide (includes BoKS Server Agent for Unix/Linux)

BoKS Manager 6.6.2 Installation Guide (includes BoKS Server Agent for Unix/Linux)

BoKS Manager Administration Workshop Notes (available to workshop participants)

BoKS Manager Deployment Workshop Notes (available to workshop participants)

BoKS Desktop Administrator’s Guide and Readme

BoKS SSH Client for Windows Administrator’s Guide and Readme

BoKS Application Agents Introduction

BoKS Application Agent Guide(s) for SAP SNC, SAP SSF, Informix, Oracle MTS, Sybase, PeopleSoft, Lotus Notes, and Web server applications, among others.

BoKS man pages for BoKS programs (from the command line)

Help from the BoKS Manager Administration GUI

Page 8 BoKS Manager 6.6.2 Installation Guide

Page 9: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Preface

Recommended Reading

Recommended reading for getting started with BoKS Manager

• The chapter “A Guided Tour” in the Administration Guide. A detailed overview of the product.

• The chapter “BoKS Manager Administration” in the Administration Guide. An introduction to using the BoKS Manager administration GUI and command line interface (CLI).

• The appendix “Command Line Interface” in the Administration Guide. An introduction to the BoKS command line for the advanced UNIX user.

Tip: “Basics” topics give a quick summary of key concepts, common tasks and important details within a particular area.

Recommended further reading for getting started with installation

• The chapter Planning Installation. Includes system overview, network architecture with planning Master and Replicas, system requirements, overview of deployment and/or upgrade paths.

• The chapter “System Configuration” in the Administration Guide. Details on communication settings and many other domain-wide issues, many of which are part of basic configuration of a domain.

• Other chapters that are relevant for your installation, such as LDAP Synchronization or Token Administration.

Recommended further reading for users of BoKS Desktop and BoKS Application Agents

• The section CA Background in the chapter “Certificate Authorities” in the Administration Guide

• The section Virtual Card Background in the chapter “Managing Virtual Cards” in the Administration Guide

• The section Group Encryption Key Background in the chapter “Managing Group Encryption Keys” in the Administration Guide

• BoKS Application Agents Introduction. Overviews the functionality, installation, and configuration of agents in general.

• Relevant introductory sections in BoKS Desktop Administrator’s Guide

Terminology in the Documentation

Fox Technologies solutions

FoxT solutions and their abbreviations are:

• FoxT ServerControl (SC)

• BoKS Desktop (BD)

BoKS Manager 6.6.2 Installation Guide Page 9

Page 10: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Preface

• FoxT ApplicationControl (AC)

UNIX and Linux

The term UNIX is used throughout this manual in the generic sense to mean the operating systems that are supported for installation of BoKS Manager and BoKS Server Agents for Unix/Linux, which include a wide variety of UNIX and Linux platforms. The terms UNIX passwords, UNIX access methods, UNIX hosts, etc. thus include those items on or in the operating system that is installed, including both UNIX and Linux varieties.

See also:

• Terminology in the chapter A Guided Tour in the Administration Guide

Other Terminology

Terminology has changed during development of successive versions of the product over the years. Some of the key terms and their older synonyms or names are listed in the following:

Term Description or older terms

FoxT Server Agent for Unix/Linux, Server Agent

Known in the documentation and some menus and man pages variously as BoKS Client for Unix/Linux, BoKS Client for Unix, BoKS Client and Client.

A Unix host with BoKS Manager software installed and set up as a Client. Previously called simply Client, in contrast to a Master and a Replica. The actual software installed may be the Master/Replica/Server Agent (MRA) package, or the Server Agent (A) package.Where information applies to both BoKS Server Agent for Unix/Linux and BoKS Client for Windows, the generic terms “BoKS Server Agent” or simply “Server Agent” may be used.

server Ordinary meaning, but sometimes also used to mean a BoKS Manager Master or Replica that provides services such as authentication, authorization and audit logging.

FoxT ServerControl, BoKS ServerControl orBoKS Protection

The services delivered in and controlled by BoKS Manager that protect UNIX access programs and daemons. When activated, these services protect the Master and Replicas, and any BoKS Server Agents for Unix/Linux. Previously called UnixControl. For details, see FoxT ServerControl in Overview on page 61.

TFS Agent / BoKS Agent The former term for a BoKS Application Agent. All earlier versions of the product which may be branded as TFS Agent / BoKS Agent are referred to in this manual as BoKS Application Agent.

TFS Desktop The former term for a BoKS Desktop. All earlier versions of the product which may be branded as TFS Desktop are referred to in this manual as BoKS Desktop.

Page 10 BoKS Manager 6.6.2 Installation Guide

Page 11: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Preface

Getting Support and Service

Before You Call for Technical Support

Note: Technical support is not provided during the warranty period unless a valid Software Service Contract is in force.

Please have the following information available when you call:

• Your Fox Technologies Customer/License ID.

• Fox Technologies software version number.

• The make and model number of the computer on which the problem occurs.

• The name and version of the operating system under which the problem occurs.

• The resulting tar archive from running the command:BoKS # boksinfo

which includes parts of the BoKS log, the error log (err_log), a complete dump of the BoKS ENV file (which shows version and installed hotfixes and patches) and other info. For usage details, see System Snapshot with the Program boksinfo in the appendix “System Monitoring Tools” in the Administration Guide.

Fox Technologies Inc www.foxt.com

BoKS Manager 6.6.2 Installation Guide Page 11

Page 12: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Preface

Page 12 BoKS Manager 6.6.2 Installation Guide

Page 13: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning InstallationWith BoKS Manager 6.6.2 and other Fox Technologies products, you turn your network into a centrally managed security domain using one of the Fox Technologies solutions. FoxT solutions offer advanced and simplified system administration, improved security, and replicated and distributed authentication servers that provide your users with fast and secure access.

Before deploying the BoKS Manager software, you should read relevant parts of this guide and of the Administration Guide. You need to be thoroughly familiar with BoKS terminology and with the major components of the system, their functions and how they interact.

Planning Installation includes the following topics:

• Solutions Overview with BoKS Manager

• Prerequisites for BoKS Manager

– System Requirements

– Web Administration Requirements

– Installation Paths and Deployment of Solutions

• Defining Masters, Replicas and Domain Architecture

– Domain Communication Basics

– Placing Replicas for Availability and Load Balancing

– Multiple BoKS Domains

• Preparing Node Keys, User Accounts and Host Groups

– Node Keys

– Host Groups Planning

– Local Root Account in BoKS Manager

– Preparing User Accounts

• Deploying a FoxT solution with BoKS Manager

– Pre-Deployment Checklist

See also:

• The chapter “A Guided Tour” in the Administration Guide

• The appendix “System Architecture” in the Administration Guide

• The chapter “System Configuration” in the Administration Guide

• The chapter “Host Administration” in the Administration Guide.

BoKS Manager 6.6.2 Installation Guide Page 13

Page 14: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

• The chapter “User Administration” in the Administration Guide

• The Readme, which contains late-breaking platform-specific installation information.

• “Using Learn Mode” on page 68

Solutions Overview with BoKS Manager

The BoKS security domain is a network in which at least one Master has been installed. In addition to the Master, one or several Replicas can be installed to help service BoKS Desktop, BoKS Application Agent and BoKS Server Agents for Unix/Linux.

Each domain has only one Master, on which the security database is maintained. The database is a central repository for data about all hosts, user accounts, their access permissions and other important security-related information. All administration is performed on the Master.

Agent Hostapplication server

BoKS Desktop

BoKS Server Agentfor UNIX

BoKS ManagerMaster or Replica

Other Hostnon-BoKS

FoxT ApplicationControl FoxT ServerControl

BoKSDesktop

Remote adminHTTPS

FoxT ServerControl

BoKS SSH Client for W

indowsFoxT ApplicationControl

Page 14 BoKS Manager 6.6.2 Installation Guide

Page 15: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

For large networks it may be useful to deploy multiple BoKS domains independent of each other. See Multiple BoKS Domains on page 23.

The Master responds to user login requests forwarded by BoKS Desktop, BoKS Application Agent and BoKS Server Agent for Unix/Linux in the domain.

Each Replica has a read-only copy of the BoKS Manager database and can also respond to login requests. Replicas thus provide for both load balancing and fault tolerance. In a network with Replicas, operation continues uninterrupted even if the Master fails.

A BoKS Server Agent for Unix/Linux is a UNIX host on which the BoKS Server Agent software has been installed. This Server Agent makes calls to the Master/Replica whenever a user attempts to log in using one of the access methods (such as telnet, ssh) that are included in BoKS Protection.

The Master and Replica servers also protect themselves by using the same BoKS Protection modules as are installed on BoKS Server Agents for Unix/Linux.

BoKS Desktops are Microsoft Windows workstations on which the BoKS Desktop has been installed. This Server Agent calls on the Master (or Replicas) for authorization of logon requests. It also provides Group Encryption Keys and other functionality locally.

BoKS Application Agent hosts are UNIX or Windows application servers on which the BoKS Application Agents have been installed to protect resident applications. This Server Agent calls on the Master (or Replicas) for authentication and authorization of logon requests. It also provides a secure encrypted channel between the application server and the application Server Agent on the Windows workstation.

For a full introduction to BoKS Manager, see the chapter A Guided Tour in the Administration Guide.

See also:

• Defining Masters, Replicas and Domain Architecture on page 20

Registering Hosts

You define the hosts in the domain and their different roles in the BoKS security domain in the BoKS Manager Administration program, where you provide the Host Type (Replica, BoKS Manager, BoKS Desktop, BoKS Application Agent, Other) and the IP address. Once defined, the various hosts will be linked and their access controlled from a single point within the network.

Hosts that are not running BoKS protection software can be registered in the database to allow access from them to hosts that are protected. Such hosts are registered as “Other Hosts”

BoKS Manager 6.6.2 Installation Guide Page 15

Page 16: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Pre-Registering BoKS Server Agents for Unix/Linux

In versions of BoKS Manager previous to BoKS Manager 6.5.2, you were required to install BoKS Server Agent for Unix/Linux on hosts at the same time as you register them in the BoKS database. In BoKS Manager 6.6.2, hosts do not need to have BoKS Server Agent for Unix/Linux installed to be registered in the BoKS database. You can pre-register hosts and they are then automatically added to the BoKS database when BoKS Server Agent for Unix/Linux is installed and they contact the BoKS Master.

The pre-register host function is useful for organizations that want to separate the tasks of registering and managing Server Agents in the BoKS database and installing BoKS software on hosts.

Other Hosts

You can register a host as the type Other Host in the BoKS domain so that you can grant access from it (from a specified, known IP address) to the BoKS Master, Replicas or to BoKS Server Agent for Unix/Linux hosts. Access to such Other Hosts is not protected by the BoKS Master.

“Other hosts” may be protected by another BoKS Master in another domain, where they are registered as the appropriate type of host for that domain, for example, BoKS Desktop or Server Agent for Unix/Linux. “Other host” allows a host to be included and known in several domains, while only one domain Master controls access to it.

One use of Other Host would be to allow remote administration of BoKS Manager from a workstation that was not protected by other Fox Technologies software.

See also:

• Host Types in the chapter “Host Administration” in the Administration Guide

Prerequisites for BoKS Manager

Topics include:

• System Requirements

• Web Administration Requirements

• Installation Paths and Deployment of Solutions

System Requirements

See also:

• The Readme, which contains late-breaking platform-specific installation information.

• “Master Basics” on page 49

• “Replica Basics” on page 72

Page 16 BoKS Manager 6.6.2 Installation Guide

Page 17: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

• “BoKS Server Agent for Unix/Linux Basics” on page 109.

RAM and Shared Memory

Recommended RAM memory for a Master or Replica is at least 256 MB.

Recommended shared memory for a Master or Replica is at least 16 MB, or at least 24 MB for hosts with boks_servc performance enhancements enabled.

Semaphore Sets

The required number of semaphore sets for BoKS Manager are

• Master: 2

• Replica: 2

Semaphore Undo Structures

Semaphore undo structures are used to reset the semaphore state if a process holding the semaphore dies. As a general recommendation, the required number of semaphore undo structures for BoKS Manager are:

• Master: 600

• Replica: 600

For details on configuring the number of semaphore undo structures, see you operating system documentation set.

Note: It is possible to stop bridge processes in BoKS from using a semaphore for locking by setting the BoKS ENV variable BRIDGE_CACHE_NOSEM to on, in which case a file is used for locking instead.

Disk Space

Recommended free disk space is:

• Master: at least 300 MB (includes about 20-50 MB for log files)

• Replica: at least 280 MB

• Server Agent installation of the MRA package: at least 170 MB

• Server Agent-only package installation: at least 75 MB.

In addition to these “permanent” space requirements, during installation you need approximately 100 MB of temporary storage in the directory /tmp (or another configurable directory) where patches will be temporarily unpacked by the install program.

The Server Agent installation of the MRA package requires more space than that of the Server Agent-only package since it includes files used if converting the Server Agent to a Replica.

BoKS Manager 6.6.2 Installation Guide Page 17

Page 18: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Disk space recommendations are platform dependent. The figures above cover the largest platform requirement. Requirements also depend on domain size, number of hosts and users, etc. Requirements here are minimum recommendations.

The product is stored by default in the following default directories:

– /opt/boksm ($BOKS_DIR)

– /etc/opt/boksm ($BOKS_etc)

– /var/opt/boksm ($BOKS_var)

If these directories are located on different partitions, 140 MB may be needed for $BOKS_DIR and 2 MB for $BOKS_etc. See also “Install Directories” on page 38.

The database on a Master or Replica is located in $BOKS_var and will grow depending on the size of your system.

Token Requirements

If you use RSA SecurID Tokens, you need to deploy the corresponding SecurID-related modules. For details, see the chapter “Managing Authenticators” in the Administration Guide.

To use RSA SecurID tokens with BoKS Manager, you also need to configure each BoKS Manager Master, Replica and Server Agent for Unix/Linux for integration with RSA Authentication Manager 5.0 (RSA ACE/Server 5.0), which is described in the installation procedure for these types of hosts.

If you use Secure Computing SafeWord tokens, you need to deploy the SafeWord Premier Access server. See also the chapter “Managing Authenticators” in the Administration Guide.

Note: In order to run BoKS debugging on Unix and Linux hosts, certain programs also need to be installed on the host. For details, see the section “Monitoring Daemon Processes” in the BoKS Manager Administration Guide.

Web Administration Requirements

There are two ways to use the BoKS Manager administration GUI:

• Run a browser locally on the Master

• Connect from network using https on port 6505 (configurable).

Regardless of how the administration GUI is accessed, cookies must be enabled in the browser as the BoKS administration web server stores authentication and timeout information in an encrypted cookie.

Running the BoKS Manager administration GUI from the network

The following has to be set up:

• The user may authenticate using:

Page 18 BoKS Manager 6.6.2 Installation Guide

Page 19: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Password - Only available if enabled. See Quick Start for Remote Administration on page 56.

Certificate - Browser is redirected to port 6506 where client side SSL authentication is requested.

SecurID - User is prompted for passcode

• Master must have a Host Virtual Card (https - server side SSL)

• User must have a valid Access Route for the BOKSADM method

• The browser must support https

• Cookies must be enabled in the browser

The procedures “Installing the Master” on page 51 and “Quick Start for Remote Administration” on page 56 cover password authentication, Host Virtual Card and a BOKSADM Access Route. Support for https and enabling cookies are the only steps you must prepare in advance.

To run the administration GUI locally:

Authentication is performed using a setuid program called 'bcookie' that determines the identity of the user.

• User must have a valid Access Route for the BOKSADM method

• There must be a browser locally installed on the Master

• Cookies must be enabled in the browser

See also:

• Web Browser Requirements on page 19

• Using the BoKS Manager Graphical User Interface in the chapter “BoKS Manager Administration” in the Administration Guide.

Web Browser Requirements

BoKS Manager can be managed remotely with any browser that supports HTTP 1.0 (with connection keep-alive) and SSL.

Basic web browser requirements are:

• Support for content based on the HTML 4 Transitional standard

• Cookies must be accepted in order to log in (the cookie is used to track user sessions, keep track of last usage, and for automatic session timeout checkups)

For remote administration, the browser must also meet the requirement:

• Support for 128-bit secure connections (SSL v. 3)

Examples of such browsers are Microsoft Internet Explorer 8.0 and later, and Mozilla Firefox 3.6 and later.

BoKS Manager 6.6.2 Installation Guide Page 19

Page 20: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Note: The text-based browser Lynx is no longer included in the product and is not supported. Lynx 2.8.4 still works for most operations, but is not fully tested. Use it only if a supported browser is unavailable and only to set up remote administration.

See also:

• Web Administration Requirements on page 18

• Using the BoKS Manager Graphical User Interface in the chapter “BoKS Manager Administration” in the Administration Guide.

Installation Paths and Deployment of Solutions

This Guide includes two basic procedures for installing BoKS Manager:

• The chapter “Installing BoKS Manager”

• The chapter “Upgrading BoKS Manager”

Depending on which FoxT solutions you are installing, deployment of the other products in the solution are described in the chapters:

• Deploying BoKS Server Agents for Unix/Linux

• Deploying BoKS Desktop

• Deploying BoKS Application Agents

Full distribution or patch

BoKS Manager 6.6.2 is released as a full distribution.

For installing patches, see “Installing a BoKS Manager Patch” on page 80 and the patch Readme.

See also:

• Deploying a FoxT solution with BoKS Manager on page 28

Defining Masters, Replicas and Domain Architecture

This section describes considerations for deciding on where to place Replicas in the network. It also discusses the use of multiple BoKS domains, each with their own Master and Replicas. Topics include:

• Domain Communication Basics

• Placing Replicas for Availability and Load Balancing

• Multiple BoKS Domains

Page 20 BoKS Manager 6.6.2 Installation Guide

Page 21: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Domain Communication Basics

Communication between BoKS hosts includes the use of UDP broadcast by default. The network must be able to pass BoKS-related traffic between hosts in the domain, regardless of where they reside.

Two key configurations are needed to ensure correct and available communication:

• When the Master, Replica(s), Server Agent(s), Application Agents and BoKS Desktops reside on different subnets, Server Agents must have the addresses of at least one Master and/or Replicas, specified in the $BOKS_etc/bcastaddr file on the Server Agent. Replicas should have the address of the Master, specified in the bcastaddr file on the Replica. BoKS Application Agents and BoKS Desktops must have one Master or Replica’s address and may have alternative addresses, configured during installation.

• When two or more BoKS domains operate on the same subnet, they must use different ports, as configured in the /etc/services file on the Master, Replica(s) and any BoKS Server Agent for Unix/Linux host(s).

Other configurations that may be needed are:

• All hostnames must be resolvable. BoKS Manager has the capability to use common hostname resolution applications, such as local /etc/hosts files, Domain Name Server (DNS), and Network Information Services (NIS/NIS+).

• If BoKS-related traffic will be communicated on networks utilizing firewalls (that is, Server Agents residing outside the firewall), the appropriate ports for this traffic must be opened.

• When a BoKS Server Agent for Unix/Linux host needs to be available in more than one domain, register that host as a BoKS Host in its own domain, and as an Other Host in other domains. Other domains will recognize it as a known, acceptable source host, but will not respond to its requests for authorization from a Master or Replica.

Identify the host’s IP address. If nothing else has yet been decided, this will be referred to as the system’s primary IP address, the IP address configured for the system’s Network Interface Card (NIC). If a host has more than one NIC, the primary NIC must be registered unless you indicate a secondary NIC by adding the settings BRIDGE_ADDR_USE=IP Address and NO_IP_CHECKS=on in the $BOKS_etc/ENV file on that host.

See also:

• Communication Basics in the chapter “System Configuration” in the Administration Guide

• Name Resolution and Firewall Openings in the chapter “System Configuration” in the Administration Guide

BoKS Manager 6.6.2 Installation Guide Page 21

Page 22: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Communication Ports

Identify a set of ports to be used for BoKS Manager communication in this domain. By default, BoKS uses 6500 as the base port, plus the next three ports.

If you use non-default ports, the base port must be entered in the /etc/services file of all BoKS Server Agents for Unix/Linux within the same domain, or alternatively, you must configure the ENV variable on all Server Agents for Unix/Linux within the domain. See “Setting Base Port” and Ports for Multiple BoKS Manager Domains in the chapter “System Configuration” in the Administration Guide.

See also:• Port Assignment Basics in the chapter “System Configuration” in the Administration

Guide

Placing Replicas for Availability and Load Balancing

Replicas are used both for failover backup to the Master and for load balancing.

BoKS Server Agent for Unix/Linux, BoKS Desktops and BoKS Application Agents send their requests for service to their list of BoKS Manager authentication servers (Master and Replicas). They complete the process of authentication and connection to the requested service with the first Master or Replica that responds, if the request is broadcast or sent to more than one configured server (see Domain Communication Basics on page 21). Since the Master or any of the Replicas can service a request from any Server Agent, the servers cooperatively manage Server Agent access and continuously implement system load balancing across the security domain.

Example: One Master, No Replicas

The network in the example below consists of three segments, with one Master servicing login requests from Server Agents in the entire network.

Physical network withthree segments

Router Router Router

IP address IP2 IP3

M

200hosts

One domain coversall three segments

M = Master = a BoKS Manager domain

Page 22 BoKS Manager 6.6.2 Installation Guide

Page 23: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Example: One Master, One Replica on Each Subnet

The network in the second example, below, includes two Replicas and one Master, each servicing requests from its own network segment. If any Replica or the Master is saturated with requests, a BoKS Server Agent for Unix/Linux may contact a remote Replica or Master for authentication.

As long as at least one Replica is up and running, the security management system is functional. Any Replica can assume the responsibilities of the Master, should the Master fail, ensuring that there are multiple backups available to service user access requests. Both high availability and load balancing become increasingly critical as intranets continue to grow, supporting up to thousands of users logging in to a large security domain.

See also:

• Configuring the bcastaddr File in the chapter “System Configuration” in the Administration Guide

Multiple BoKS Domains

A BoKS Master with sufficient resources and a sufficient number of Replicas is capable of handling a very large domain. Domain size might eventually become unmanageable with only one domain.

Other reasons to set up multiple BoKS domains include:

• The need for decentralized responsibility

• Interfacing with existing software or organizational structures

• Geographical spread (with both bandwidth and organizational considerations)

• Compartmentalized security, whereby hosts need to be isolated from other users and hosts, or require completely different levels of auditing and control

There are no limitations on how to set up BoKS Manager domains, but two key configurations are needed to ensure correct and available communication:

• When a single domain’s Master, Replica(s) and BoKS Server Agent for Unix/Linux host(s) reside on different subnets, they must have each other’s addresses, which are stored in the $BOKS_etc/bcastaddr file on the Master, Replica(s) and BoKS Server Agent for Unix/Linux host(s).

M

1400hosts

RR

One domain withtwo Replicas forloadbalancing

M = Master = a BoKS Manager domainR = Replica

BoKS Manager 6.6.2 Installation Guide Page 23

Page 24: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

• When two or more domains operate on the same subnet, they must use different ports, as configured in the /etc/services file on the Master, Replica(s) and BoKS Server Agent for Unix/Linux host(s).

Fox Technologies recommends that different ports always be used for different domains even when the domains operate on separate subnets. This creates a failsafe environment for the different BoKS Masters and their respective domains in the event of router programming mishaps, network cables being inadvertently plugged into the wrong connector, and so on.

Example: One Master on Each Subnet

Each subnet in the example below is a domain with its own Master servicing requests from Server Agents within the subnet. No address or port configuration is necessary although it may be recommended.

If you are defining multiple domains (with one Master per domain) on the same subnet, you must assign different communication ports to the hosts located in each separate domain. In other words, you will have different ports per domain, but the same port will be assigned to the Master, Replicas and all Server Agents within each Master’s domain. For example, if you have two Masters, you would assign one port for the first Master and all its Server Agents, and one port for the second Master and all its Server Agents.

Physical network withthree segments

Router Router Router

IP address IP2 IP3

M

1400hosts

MM

1000hosts

800hosts

Three domains withone Master/segment

M = Master = a BoKS Manager domainR = Replica

Page 24 BoKS Manager 6.6.2 Installation Guide

Page 25: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Example: Two Masters on the Same Subnet

One of the subnets in the example below contains two BoKS domains, possibly for decentralized management or for compartmentalized security. All BoKS hosts in one of the domains must be configured to use a set of ports different from the default ports (6500-6503), so that their communications do not collide.

In summary, set up BoKS domains first according to organizational needs and existing infrastructure, and secondly for availability.

See also:

• Configuring the bcastaddr File in the chapter “System Configuration” in the Administration Guide

• Ports for Multiple BoKS Manager Domains in the chapter “System Configuration” in the Administration Guide

Preparing Node Keys, User Accounts and Host Groups

Topics include:

• Node Keys

• Host Groups Planning

• Local Root Account in BoKS Manager

• Preparing User Accounts

See also:

• “Basic Configuration of BoKS Manager” on page 66

• “Importing Users and Hosts into the Database” on page 71

M

400hosts

MM

100hosts

1400hosts

Four domains, includingtwo domains on onesegment

M = Master = a BoKS Manager domainR = Replica

M

2000hosts

6500-6503

7000-7003

6500-6503

6500-6503

ports

BoKS Manager 6.6.2 Installation Guide Page 25

Page 26: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Node Keys

Each Master, Replica and BoKS Server Agent for Unix/Linux host has a node key. Node keys are used to encrypt security-related communication between these hosts and for encrypted communication using Telnet between UNIX hosts.

You create node keys when you set up BoKS Manager to be a Master, Replica, or BoKS Server Agent for Unix/Linux host. When the host is added (registered) in the security database you must provide the node key. The node key defined at installation (setup) and the node key specified later for registering in the security database must be identical. See “To install BoKS Manager on the Master:” on page 52.

Agent Hosts (hosts with BoKS Application Agents installed), also have node keys. For these hosts, the node key is first entered in the BoKS administration GUI, then entered manually when you install the Agent on the Agent Host.

Node Key Reminders

• It is vital to keep node keys secret.

• Node keys are only needed during installation and upgrade and when you register the host in BoKS Manager. An exception is that for BoKS Application Agent hosts, the node key doubles as their Host Virtual Card password.

• Best are long, random sequences of characters. If needed again, you can always modify the node key from the BoKS Manager Administration GUI, or reinstall with a new node key.

See also:

• Node Keys in the chapter “Host Administration” in the Administration Guide.

HostIDs

For environments featuring DHCP support and dynamic IP addresses, BoKS Server Agents for Unix/Linux have HostIDs. These are used instead of the IP address to identify the host. HostIDs should be unique identifiers for a host within the BoKS domain.

See also:

HostIDs in the chapter in the chapter “Host Administration” in the Administration Guide.

Host Groups Planning

In BoKS Manager, each user is assigned to a host or Host Group. If the user is assigned to a BoKS Server Agent for Unix/Linux host, BoKS Manager creates that user’s account on that host. If the user is assigned to a Host Group, then the user account (with UID, password and group memberships) is created on all BoKS Server Agent for Unix/Linux hosts included in the Host Group.

Page 26 BoKS Manager 6.6.2 Installation Guide

Page 27: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Hosts can be gathered into Host Groups, based on common access needs, to simplify access control and user management. For example, when hosts are grouped by access needs, you can specify an Access Route by simply specifying the group instead of all the individual host members. See the chapters A Guided Tour and Host Administration in the Administration Guide.

You can use UNIX groups and other host or user groupings that currently exist in your network as a basis for defining the Host Groups you want to set up for your BoKS domain.

See also:

• Using Host Groups for User Administration in the chapter “A Guided Tour” in the Administration Guide

• Using Host Groups for Access Control in the chapter “A Guided Tour” in the Administration Guide

• Node Keys in the chapter “Host Administration” in the Administration Guide

Host Root Account Necessary

When you register a UNIX host in BoKS Manager, you often import some of the system accounts, especially the root account, into BoKS. This is necessary in order to do administration on that host.

See also:

• About Importing Unix System Accounts and Windows Administrators in the chapter “User Administration” in the Administration Guide

• “Root Account” on page 50

• “Root Account on Replica Backup for Master” on page 73

• “BoKS Server Agent for Unix/Linux Basics” on page 109

Local Root Account in BoKS Manager

Fox Technologies recommends that you have a BoKS Manager account for the root account on any Replica or BoKS Server Agent for Unix/Linux. A BoKS Manager account is needed for administration on the host.

As with all BoKS accounts, you can prefix the root account with either the local hostname or the Host Group name. While there are advantages to using Host Group for many user accounts, Fox Technologies recommends you use the local hostname as prefix for system accounts and particularly the root account. That is, create the root account as hostname:root, where hostname is the hostname of the host.

See also:

• About Importing Unix System Accounts and Windows Administrators in the chapter “User Administration” in the Administration Guide

BoKS Manager 6.6.2 Installation Guide Page 27

Page 28: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Preparing User Accounts

User ID Synchronization

BoKS Manager identifies a user with the notation host:username or hostgroup:username. BoKS requires unique usernames within each host or Host Group, but allows non-unique names in Host Groups that have no hosts in common, that is, that are disjoint. Since overlapping Host Groups are also allowed, and frequently used, Fox Technologies recommends keeping both usernames and user IDs unique throughout the domain, in order to minimize the risk of administrative errors that could lead to security breaches.

In BoKS Manager 6.6.2 and later you can configure checking for overlapping user accounts that could potentially be created by various operations. For details, see the BoKS Manager Administration Guide.

Group ID Synchronization

Synchronization concerns regarding UIDs also apply to UNIX GIDs. Before BoKS Manager is implemented, a common /etc/group file should exist, including all UNIX platforms in the domain. If the UNIX group information is stored in NIS or NIS+ instead of /etc/group this synchronization is applied automatically.

See also:

• Using Host Groups for User Administration on page 49 in the chapter “A Guided Tour” in the Administration Guide.

• Unique Usernames within a Host Group in the chapter “User Administration” in the Administration Guide

Deploying a FoxT solution with BoKS Manager

This section applies to initial installation. For upgrade, see the chapter Upgrading BoKS Manager.

To Deploy a FoxT Solution with BoKS Manager:

1. Prepare for the domain deployment process by reviewing and completing your plans, including selection of hosts to be the BoKS Manager Master (Master) and Replica(s), definition of user accounts, User Classes, Host Groups, and security policies. You can use the checklist in Pre-Deployment Checklist on page 30.

2. Install the Master and configure the BoKS Manager domain. See “Installing BoKS Manager on a Master” on page 49.

3. Install the Replica(s). See “Installing BoKS Manager on a Replica” on page 72.

4. Install the BoKS Server Agent for Unix/Linux host(s), BoKS Application Agents and BoKS Desktops as needed for the FoxT solution that you are deploying. For details, see the respective chapter in this book:

Page 28 BoKS Manager 6.6.2 Installation Guide

Page 29: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

• The chapter “Deploying BoKS Server Agents for Unix/Linux”

• The chapter “Deploying BoKS Desktop”

• The chapter “Deploying BoKS Application Agents”

5. Test communications and troubleshoot access from the various Server Agents. For tools and procedures, see:

• The appendix “Troubleshooting” in the Administration Guide

• The appendix “System Monitoring Tools” in the Administration Guide

• “Using Learn Mode” on page 68

6. After you are convinced that everything is working correctly, enable highest BoKS security on each respective host with the appropriate method as follows:

• For BoKS Desktop, this optional step is called Disabling Online Bypass and makes certificate logon mandatory for any user on the Windows workstation.

• For a BoKS Server Agent for Unix/Linux host, this step is called Activating BoKS Protection. Note that this applies to the Master and Replicas as well as to Server Agents for UNIX.

• For BoKS Application Agents, this step depends on the particular Agent. For many proxy Agents, it involves setting the application to listen to local host only on the specified port, so that the application can only be reached through the Agent.

• Optionally, for FoxT ServerControl and FoxT ApplicationControl, you may wish to allow users to temporarily access hosts without Access Routes. See “Using Learn Mode” on page 68.

• If you had enabled password login for the BoKS Manager GUI (see “Quick Start for Remote Administration” on page 56), you may wish to now disable password login and only accept Token and Certificate login.

Groupwise Deployment

During deployment, a common approach to maximize availability is to install one network segment or group of user workstations at a time, first testing communications and configuration with a test host acting in conjunction with the Master or Replica. Once the test BoKS Desktop works with all installed BoKS Application Agents, and/or the test Server Agent for Unix/Linux works with the Master or Replica, then the other BoKS Desktops or Server Agents for UNIX can be installed using the same configuration.

See also:

• “Pre-Deployment Checklist” on page 30

• “Installation Paths and Deployment of Solutions” on page 20

• “Installing Hotfixes, Patches and Upgrades” on page 125

BoKS Manager 6.6.2 Installation Guide Page 29

Page 30: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Pre-Deployment Checklist

Prior to deployment, perform the following tasks to ensure a smooth installation:

• Identify a machine to be used as the BoKS Master and note its IP address (unless otherwise noted, IP address refers to the system’s primary IP address). See “Master Basics” on page 49.

• Identify one or more hosts to be BoKS Replicas, based on the initial deployment criteria, and list their hostnames and IP addresses.

• Ensure that all machines on which the BoKS Manager software is to be installed have sufficient disk space. See System Requirements on page 16.

• See Web Browser Requirements on page 19 for details on supported web browsers for performing BoKS Manager Administration through the network and on Windows workstations in the domain. You can also run BoKS Administration using the command line programs, from a terminal window on the BoKS Master with the appropriate Access Route to the Master and su to root privilege.

• Determine the format of the node keys. Node keys should be long and random, and kept in a secure location. See Node Keys on page 26.

• Develop a naming convention for Host Groups and User Classes to make it easier to distinguish hosts from Host Groups and users from User Classes.

Note: The names of the predefined User Classes and Host Groups are in upper case letters, a convention also recommended for User Classes and Host Groups that you create.

• If you are using non-default ports, identify a base port for BoKS Manager communication. See Domain Communication Basics on page 21. Enter the base port in the /etc/services file of all UNIX systems within the same domain, for example:

boks 7000/tcp

where 7000 is the desired base port number.

• If any BoKS Server Agent for Unix/Linux hosts reside on the other side of a firewall, open two communication ports at the firewall, for example 6502 through 6503 if you are using BoKS Manager default ports, to allow both TCP and UDP traffic. See Domain Communication Basics on page 21.

• If Domain Name System (DNS) is to be used for name resolution, verify that it is working properly and able to perform accurate forward and reverse lookups.If DNS is not used for host resolution, then the /etc/hosts files on each UNIX system must be complete and consistent.

• If NIS or NIS+ is used for password or host file management on UNIX hosts, verify that it is working properly.

• If NIS is not used to manage the /etc/passwd file and users have accounts on multiple systems, clean up user accounts to insure the following:

Page 30 BoKS Manager 6.6.2 Installation Guide

Page 31: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

– Users should not have conflicting User Identifier (UID) numbers between systems. For example, a specific user with UID of 1500 should have a UID of 1500 across all systems.

– Group Identifier (GID) numbers and names should be consistent across all systems.

• Identify a person or group of people who will have full-time responsibility to manage the BoKS domain. Decide on other administrators who will be designated Sub-Administrators and have limited management rights, and specify those rights, including which hosts, users, Group Encryption Keys and virtual cards that they will manage. See the chapter “Sub-Administrator Configuration” in the Administration Guide.

• If SecurID authentication is to be used, ensure that the RSA Authentication Manager is up and running, and copy the sdconf.rec file for each Master/Replica host on the RSA Authentication Manager to the Master/Replica. Do this for Server Agents for Unix/Linux, too. See Configuring Hosts for SecurID Authentication in the chapter “Managing Authenticators” in the Administration Guide.

• If you use Secure Computing SafeWord tokens, ensure that the SafeWord Premier Access server is up and running properly. See also Using SafeWord Authenticators in the chapter “Managing Authenticators” in the Administration Guide.

BoKS Manager 6.6.2 Installation Guide Page 31

Page 32: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

1 Planning Installation

Page 32 BoKS Manager 6.6.2 Installation Guide

Page 33: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS ManagerInstalling BoKS Manager covers installing BoKS Manager on a Master or Replica, and doing basic configuration of these servers and the BoKS domain.

Topics include:

• Install Background

– Package Contents

– Unpacking the Package Contents

– Install Directories

– Install Parameters and Options

– Configuring Multiple Domains on the Same Subnet

– About Group Passwords on Unix/Linux

– About Closing dtlogin Sessions

– About Installing Role-Based Access Controls

• Installation Issues on Specific Platforms

– Installation Issues on Oracle Solaris

• Installing on Virtual Server Operating Systems

• Installing BoKS Manager on a Master

– Master Basics

– Prerequisites for BoKS Master Installation

– Installing the Master

– Quick Start for Remote Administration

– Initializing BoKS Manager

– Basic Configuration of BoKS Manager

– Using Learn Mode

– Importing Users and Hosts into the Database

– Advanced Configuration Overview

• Installing BoKS Manager on a Replica

– Replica Basics

– Replica Designated as Master Backup

– Prerequisites for BoKS Replica Installation

BoKS Manager 6.6.2 Installation Guide Page 33

Page 34: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

– Installing a Replica

• Installing BoKS Manager Patches

– Installing a BoKS Manager Patch

– Backing Out a BoKS Manager Patch

• Installing OS Patches

• Uninstalling BoKS Manager

See also:

• The chapter “Upgrading BoKS Manager”

• The chapter “Planning Installation”

• The chapter “System Configuration” in the Administration Guide

• The Readme, which contains platform-specific installation information.

Install Background

Install Background includes the topics:

• Package Contents

• Unpacking the Package Contents

• Install Directories

• Install Parameters and Options

• Configuring Multiple Domains on the Same Subnet

• About Closing dtlogin Sessions

• About Installing Role-Based Access Controls

See also:

• The chapter “Upgrading BoKS Manager”

• The chapter “Planning Installation”

Package Contents

BoKS Manager 6.6.2 is delivered as a web download file from the Fox Technologies web site. Separate download files are available for each platform supported.

BoKS Server Agent for Unix/Linux 6.6.2 distributions are also delivered as platform-specific web download files, but have a slightly different package directory structure.

Unpack the package into an appropriate directory. For details, see “Unpacking the Package Contents” on page 36.

Page 34 BoKS Manager 6.6.2 Installation Guide

Page 35: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

The unpacked packages for BoKS Manager and BoKS Server Agent for Unix/Linux contains the following:

BoKS Manager Package Directory Structure

BoKS Server Agent for Unix/Linux Package Directory Structure

Directory Sub-directories and files Description

root directory install Installation program for BoKS Manager 6.6.2

platformname/for example, Solaris

Directory used by the installation program. Contains full product program files for this platform, in archived format.

/acknowledgments Directory containing acknowledgment and license information for third-party products included in the distribution.

Patches/ Contains patch installation programs and all necessary files, in a sub-directory for each platform. For details, see “Patch Directory Structure” on page 37.

upgrade_client program that upgrades an older BoKS Server Agent to a specified later version of Server Agent for Unix/Linux.

prog/ Contains upgrade utilities used by upgrade_client:boks_uname, program that determines the operating system on the hostpre_upgrade, a script to back up data before upgradingupgrade_version, a script to upgrade files on an older BoKS Server Agent to format forBoKS Server Agent for Unix/Linux version 6.6.2

README An empty file. The Readme is now available on the Fox Technologies Support web site as a separate download. It is updated periodically and contains latest on-going information.

License.txt Fox Technologies License Agreement

Directory Sub-directories and files Description

root directory install Installation program for BoKS Server Agent for Unix/Linux 6.6.2

platformname/for example, Solaris

Directory used by the installation program. Contains full product program files for this platform, in archived format.

/acknowledgments Directory containing acknowledgment and license information for third-party products included in the distribution.

BoKS Manager 6.6.2 Installation Guide Page 35

Page 36: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Unpacking the Package Contents

Packages are delivered in archive format, and must be unpacked before installation can be run.

For information on the top level directory structure, including full distribution installation, licensing and documentation, see Package Contents on page 34. For information on the patch installation directory, see Patch Directory Structure on page 37.

To unpack the full package contents:

1. Save the archive file in a temporary directory. For example:

hostname# cp BoKS66-Solaris-2.10-sparc.tar.gz /tmp

2. Move to the temporary directory. For example:

hostname# cd /tmp

3. Unpack the archive file. For example:

hostname# gunzip BoKS66-Solaris-2.10-sparc.tar.gz

4. Unpack the archive. For example:

hostname# tar -xvf BoKS66-Solaris-2.10-sparc.tar

A directory structure is created.

To unpack the patch:

1. Save the archive file in a temporary directory. For example:

hostname# cp BoKS66-Solaris-2.10-sparc.t.Z /tmp

upgrade_client Program that upgrades an older BoKS Server Agent to a specified later version of Server Agent for Unix/Linux.

prog/ Contains upgrade utilities used by upgrade_client:boks_uname, program that determines the operating system on the hostpre_upgrade, a script to back up data before upgradingupgrade_version, a script to upgrade files on an older BoKS Server Agent to format for BoKS Server Agent for Unix/Linux version 6.6.2

README An empty file. The Readme is now available on the Fox Technologies Support web site as a separate download. It is updated periodically and contains latest on-going information.

License.txt Fox Technologies License Agreement

Directory Sub-directories and files Description

Page 36 BoKS Manager 6.6.2 Installation Guide

Page 37: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

2. Move to the temporary directory. For example:

hostname# cd /tmp

3. Unpack the archive file. For example:

hostname# gunzip BoKS66-Solaris-2.10-sparc.t.Z

4. Unpack the archive. For example:

hostname# tar -xvf BoKS66-Solaris-2.10-sparc.t

A directory structure is created.

5. To unpack patch packages, move to the Patches directory in the directory structure you unpacked. The Patches directory contains a sub-directory for the appropriate platform. For example:

hostname# cd /tmp/BoKS660/Patches/Solaris

6. Unpack the patch package into a temporary directory using the command:

hostname# zcat ‘patch_package_name’ ¦ tar xf -

A patch installation directory is created.

The untarred directory varies somewhat by platform, but has the general contents described below:

Patch Directory Structure

Directory Sub-directories and files Description

boksm_patch/ backoutpatch Program to roll back the patch installation to the previously installed version.

fmode Used by installpatch to check file modes.

fsinfo Used by installpatch to check that there is enough disk space for installation.

installpatch Installation program for the BoKS Manager 6.6.2 patch.

boksm Directory that contains new versions of the files to be patched.

patchname.patchmap List of files that are patched for this patch, patchname.

patchinfo Lists various parameters for the patch, for example version and size.

boks_uname Program that determines the operating system on the host.

README An empty file. Readme issues for all platforms are included in the top-level README available on the Fox Technologies web site.

BoKS Manager 6.6.2 Installation Guide Page 37

Page 38: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Install Directories

BoKS Manager software resides in the major directories listed below, either user-specified or default directories. Once installed, you can use the $BOKS directory names in both command line and GUI input to refer to the corresponding directory. These names are used throughout the documentation to refer to the directories.

• BoKS Server Agent for Unix/Linux has the same directory structure, although Server Agents do not contain all components.

For further detail, see Directory Structure in BoKS Manager in the appendix “System Architecture” in the Administration Guide.

See also:

• BoKS Environment Variables in the chapter “BoKS Manager Administration” in the Administration Guide

• Install Parameters and Options on page 38

• BoKS Manager Package Directory Structure on page 35

• Unpacking the Package Contents on page 36

Install Parameters and Options

You can run the install program with no options:

./install

or you can use some of the optional flags and parameters as described below.

Directory Default Directory Description

$BOKS_DIR /opt/boksm BoKS directory

$BOKS_bin /opt/boksm/bin Executable programs for non-administrators (for example xdl and suexec).

$BOKS_sbin /opt/boksm/sbin boksadm and other programs for managing BoKS Manager.

$BOKS_lib /opt/boksm/lib Help files, online manual, the GUI, and all other internally needed programs.

$BOKS_man /opt/boksm/man Man pages for BoKS commands. Make sure to have your MANPATH variable set to include /opt/boksm/man.

$BOKS_etc /etc/opt/boksm The configuration directory

$BOKS_var /var/opt/boksm Includes the security database, logs and variable data such as temporary files for integrity checks, etc.

$BOKS_data /var/opt/boksm/data The database file and log files which grow

$BOKS_unipc $BOKS_var/unipc or /var/opt/boksm/unipc

UNIX domain IPC socket directory. Default location $BOKS_var/unipc changes if $BOKS_var path name is longer than 80 characters. See $BOKS_unipc in the chapter System Architecture in the Administration Guide.

Page 38 BoKS Manager 6.6.2 Installation Guide

Page 39: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Install Usage and Options:install [-<id> <path>][-patchdir <dir>][-s type]install [-<id> <path>][-p] [-u <uid>] [-g <gid>][-s <type> -n <nodekey> -i <interface> -h <hostid>] -q -f[-r product_number] [product_and_OS_ARCH]

• -<id><path> sets Install Directory paths from the command line for the three BoKS install directories with id’s of opt, var and etc. For example, using these flags, you might install in:

-opt /usr/opt/boksm

-var /usr/var/boksm

-etc /usr/etc/boksm

If you do not use the flags, the install program will prompt you individually for each directory and provide a default for each that you can simply accept.

• -patchdir <dir> sets the directory where patches are stored

• -p [-u <uid>] [-g <gid>] sets up SSH privilege separation by creating a special user account for the sshd daemon, where:-u <uid> optionally specifies a uid for the sshd user account and

-g <gid> optionally specifies a gid for the sshd user account.

Without -u or -g, the system takes the next available uid and gid, respectively.

For details and creating this account manually instead, see Configuring Privilege Separation in the chapter System Configuration in the Administration Guide.

• -q runs in quiet mode, i.e., non-interactive. This requires the -s and -n flags.

• -s <type> runs setup BoKS Manager after install with the specified type where <type> is one of master, replica or client.

• -n <nodekey> provides the node key <nodekey> when setting up BoKS Manager.Used together with -s and -q.

Note: Using "-n <nodekey>" is a security risk, as the node key can be captured in real time during install by, for example, ps -ef | grep install.

• -f, setup does not prompt whether to remove group passwords, but removes any existing group passwords automatically.For more details, see “About Group Passwords on Unix/Linux” on page 41.

• -i <interface> specifies the network interface to be monitored for changes in IP address. Used together with -s, for BoKS Server Agents with dynamic IP address only.

• -h <hostid> provides the HostID for the host.User together with -s, for BoKS Server Agents with dynamic IP address only.

BoKS Manager 6.6.2 Installation Guide Page 39

Page 40: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• -r <product_number> select the product to install in the options list presented during interactive install (usually 1 = the product name, 2 = Quit). Most common is to use -r 1, which saves the interactive question to install or quit.

• <product_and_OS_ARCH>, for example,./install boksm_d-6.6-Solaris-2.10-i386

(the first part of the name of the files on the OS directory you want). This can be used to force an installation on a later release of an OS than the one Fox Technologies supported when that BoKS Manager version was released.

• -v installs in verbose mode.

See also:

• Install Directories on page 38

• Unpacking the Package Contents on page 36

Configuring Multiple Domains on the Same Subnet

All BoKS communication uses the TCP/UDP ports 6500 through 6503 by default. See “Domain Communication Basics” on page 21. With multiple domains, the UDP broadcast can cause problems. If you want to install a second or third domain on the same network, you must use another set of four consecutive ports for each domain by altering the /etc/services file, so that the UDP broadcasts from the different domains do not collide. Do this on all BoKS hosts that belong to the second, third, etc. domains (Master, Replicas, and BoKS Server Agent for Unix/Linux hosts).

BoKS Application Agents and BoKS Desktops are each configured with the address of a BoKS Manager Master/Replica, so there is no problem with multiple BoKS domains on the same subnet. Their requests go to the configured server for the domain to which they belong.

See also:

• Ports for Multiple BoKS Manager Domains in the chapter “System Configuration” in the Administration Guide

To install a second Master on a network:

1. Add a line with the following syntax to the /etc/services file:

boks portnumber/tcp

Example:

boks 6530/tcp

You can use any available number that has at least four consecutive free port numbers; for instance, in the example above 6530, 6531, 6532, and 6533 must all be available. Note that this will not work if NIS or NIS+ is running.

2. Follow the instructions in “To install BoKS Manager on the Master:” on page 52.

Page 40 BoKS Manager 6.6.2 Installation Guide

Page 41: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

To install Replicas in a second BoKS Manager domain:

1. Add a line with the following syntax to the /etc/services file:

boks portnumber/tcp

where portnumber is the same as in the /etc/services file on the MasterExample:

boks 6530/tcp

2. Follow the instructions in “Installing a Replica” on page 74.

To install BoKS Server Agent for Unix/Linux hosts in a second domain:

1. Add a line with the following syntax to the /etc/services file:

boks portnumber/tcp

where portnumber is the same as in the /etc/services file on the MasterExample:

boks 6530/tcp

2. Follow the instructions in “Installing BoKS Server Agent for Unix/Linux” on page 113.

About Group Passwords on Unix/Linux

BoKS Manager and BoKS Server Agent for Unix/Linux do not support the use of group passwords on Unix and Linux platforms. Therefore any existing group passwords must be removed from the /etc/group file before installing BoKS Manager / BoKS Server Agent for Unix/Linux. In addition, if shadowed group passwords are in use, in for example an /etc/gshadow file, the entire gshadow file must be removed.

When you run setup, you are prompted to confirm the removal of any group passwords configured on the host. If you opt not to remove group passwords, the setup procedure is not completed. This leaves the system in a state where BoKS is installed, but not set up. Setup can be performed at a later time.

You can stop setup from prompting whether to remove group passwords, and automatically remove them, by specifying the -f option to the setup program. You can also specify -f to the install program, in which case the option is passed to the setup program causing it not to prompt asking whether group passwords should be removed, but removing them automatically.

See also:

• “Install Parameters and Options” on page 38

About Closing dtlogin Sessions

This section applies to all non-PAM platforms, when you activate and deactivate BoKS Protection and when you uninstall BoKS Manager or Server Agent for Unix/Linux.

BoKS Manager 6.6.2 Installation Guide Page 41

Page 42: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

When you activate BoKS Protection on the Master, Replica or a Server Agent for Unix/Linux, BoKS Manager replaces the operating system’s dtlogin daemon with the BoKS dtlogin daemon, but it does not restart the dtlogin daemon, since this would terminate potentially important user connections, and in particular, interrupt an administrator who was doing BoKS Manager activate/deactivate via dtlogin, leaving the system in an undefined state. Thus the operating system's dtlogin will continue to run and new dtlogin sessions will not be authenticated by BoKS Manager.

• Any open dtlogin sessions will be terminated when you restart the dtlogin daemon.

• To insure highest security, restart the dtlogin daemon after installing BoKS Manager or BoKS Server Agent for Unix/Linux and each time you activate BoKS Protection.

CAUTION: Killing dtlogin according to the directions below allows BoKS Manager to lock down security on the host when BoKS is activated. Failure to follow these directions carefully will leave dtlogin authentication outside the control of BoKS.

When you deactivate BoKS Protection, follow the same procedure for closing sessions and stopping dtlogin, to insure that the BoKS dtlogin is stopped and the native dtlogin can start.

To close dtlogin sessions on HP-UX 11:

1. /sbin/init.d/dtlogin.rc stop

2. Find the pid of dtlogin (ps -aef | grep dtlogin)

3. Kill -TERM <pid>; kill -KILL <pid>

4. /sbin/init.d/dtlogin.rc start

To close dtlogin sessions on TRU64:

1. /sbin/init.d/xlogin stop

2. Find the pid of dtlogin (ps -aef | grep dtlogin)

3. Kill -TERM <pid>; kill -KILL <pid>

4. /sbin/init.d/xlogin start

To close dtlogin sessions on AIX:

1. stopsrc -s dtsrc

2. Find the pid of dtlogin (ps -eaf | grep dtlogin)

3. Kill -TERM <pid>; kill -KILL <pid>

4. startsrc -s dtsrc

Page 42 BoKS Manager 6.6.2 Installation Guide

Page 43: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

About Installing Role-Based Access Controls

BoKS Manager 6.6.2 includes functionality for Role-Based Access Controls (RBAC) called extensible Role-Based Access Controls (xRBAC), which allows you to centrally manage roles and permissions.

On platforms with native RBAC support which also include BoKS xRBAC support, any existing Role-Based Access Controls on the host are backed up when you install BoKS. This ensures that existing RBAC configurations on the host are preserved in the event that you want to uninstall BoKS and return to the original non-BoKS RBAC configuration on a host.

The platforms this affects are currently:

• IBM AIX 6.1 & 7.1

• Oracle Solaris 10

For up-to-date information about platform support see the latest version of the README.

When you install BoKS Manager or BoKS Server Agent for Unix/Linux/Linux on a host running these operating systems and run setup, the existing RBAC Rolesets and mappings are archived and saved. The checksum for the Rolesets and mappings is saved to $BOKS_data/rbac_saved_checksum. The archive with the Rolesets and mappings files is saved to $BOKS_data/rbac_saved_config.tar.bkz.

While at setup existing RBAC configurations are backed up, they are not removed from the host until a new OS Roleset is provisioned to the host from the BoKS Master or servc determines that no OS Roleset should be installed on the host. At this point the original RBAC configuration on the host is removed, to be replaced either by a new BoKS configuration, or no configuration.

The backed up configuration is restored when you uninstall BoKS Manager, unless you use the -r option for ithe uninstall program, in which case the BoKS configuration is kept locally. For more details, see “Uninstalling BoKS Manager” on page 84.

Installation Issues on Specific Platforms

This section describes issues that are only relevant on a limited number of platforms. For late-breaking platform-specific installation issues, see the BoKS Manager README, available for download from the Fox Technologies web site.

BoKS Manager 6.6.2 Installation Guide Page 43

Page 44: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Installation Issues on Oracle Solaris

BoKS tty lock

The BoKS device driver used to implement the tty lock service allocates space for a fixed number of tlock pseudo devices when the driver is loaded into the kernel. The default number of devices is 64. This means that no more than 64 simultaneous tty lock sessions can be active in the system. See the BoKS man page tlock.conf(4B) for details on how to change the max number of tlock devices. A failed tlock invocation attempt will be logged in the BoKS audit log.

Installing on Virtual Server Operating Systems

This section includes the following topics:

• Installing on Oracle Solaris Versions With Zone Support

• Installing on VMware ESX Server

Installing on Oracle Solaris Versions With Zone Support

BoKS Manager 6.5.2 and later includes support for installation on the virtual server operating system Oracle Solaris 10 and later with zone support. This section contains information about special considerations that apply when installing BoKS Manager on Solaris versions with zone support.

This section includes the following topics:

• BoKS Zone Support Basics

• Installation Requirements in a Solaris Zones Environment

• Uninstalling in a Solaris Zones Environment

• Applying Hotfixes and Patches With Solaris Zones

• Upgrading With Solaris Zones

• Compatibility With Solaris Zones

• Patching the Operating System With Solaris Zones

• BoKS tty lock

• zlogin

• Location of the xinit Wrapper Script

Page 44 BoKS Manager 6.6.2 Installation Guide

Page 45: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

BoKS Zone Support Basics

Solaris zones is Solaris technology for creating multiple virtual application environments on a single machine. From a BoKS perspective, each Solaris zone is a separate BoKS host. One instance of BoKS should be installed in each zone requiring BoKS protection. BoKS must be installed in the global zone to be able to install BoKS Manager in non-global zones. The normal BoKS constraints for multiple BoKS domains and subnets apply to BoKS installations on a multi-zone host.

See also:

• “Multiple BoKS Domains” on page 23

Installation Requirements in a Solaris Zones Environment

The following requirements apply for the installation of BoKS Manager and BoKS Server Agent for Unix/Linux in a Solaris zones environment:

• All BoKS Manager Installations in a Solaris zones environment must be version 6.1 or later (for BoKS Server Agents for Unix/Linux) or version 6.5 or later (for Master and Replicas). This applies also to the global zone.

• The zone must be assigned at least one external network address.

• Non-global zones may be configured to share disk partitions with the global zone to reduce disk-space usage, but the following directories must NOT be shared:

– /etc - Zone configuration files

– /var - Zone data files

– $BOKS_etc - BoKS configuration files

– $BOKS_DIR - BoKS program files

– $BOKS_var - BoKS data files

• BoKS Manager on Solaris uses kernel modules to implement tty lock and encrypted telnet functions. Kernel modules can only be loaded/unloaded from the global zone. A non-global zone BoKS Manager installation will depend on a BoKS installation in the global zone supplying the kernel modules. BoKS must be installed and set up in the global zone before installing BoKS in a non-global zone. However, BoKS protection does not need to be activated in the global zone.

• The tty lock function uses a BoKS-specific device driver tlock. Non-global zone configuration must include access permission to the tlock device, see zonecfg(1M) for details on how to add device access permission to a non-global zone.

Note: To get a /dev/tlock device instantiated in a non-global zone, the tlock device must be available in the global zone when the non-global zone boots for the first time. If /dev/tlock is not available in the non-global zone even though added to the zone configuration, reboot the non-global zone after installing BoKS Manager in the global zone.

BoKS Manager 6.6.2 Installation Guide Page 45

Page 46: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Uninstalling in a Solaris Zones Environment

Uninstalling BoKS Manager in the global zone unloads the BoKS kernel modules for tlock and encrypted telnet. Any BoKS installations in non-global zones are then not able to use these services. Starting the BoKS uninstallation program in the global zone while there are BoKS installations in non-global zones results in a warning message. It is possible to override the warning and proceed with the uninstall to be able to temporarily uninstall BoKS in the global zone during an upgrade of the BoKS installation, see “Upgrading With Solaris Zones” on page 46.

Applying Hotfixes and Patches With Solaris Zones

When applying a hotfix or patch to a zone environment, the global zone must be hotfixed/patched first before applying the hotfix/patch to non-global zones.

Upgrading With Solaris Zones

Similarly to applying hotfixes and patches, upgrading must be performed in the global zone first before upgrading non-global zones. During upgrade of a BoKS installation in a zone environment it is allowed to temporarily uninstall BoKS in the global zone while BoKS installations are still running in non-global zones. However, new tty lock and encrypted telnet sessions cannot be initiated in the non-global zones until BoKS is reinstalled in the global zone.

A possible workaround to keep tty lock and encrypted telnet operational while upgrading the global zone is to lock the tty lock and encrypted telnet kernel modules in the kernel. This can be achieved by having at least one active tty lock and encrypted telnet session in a non-global zone. The downside to this workaround is that the new version of the BoKS kernel modules will not be loaded into the kernel until the operating system is rebooted.

Compatibility With Solaris Zones

All BoKS installations on a multi-zone host must be version 6.1 or later for BoKS Server Agent for Unix/Linux, and 6.5.1 or later for BoKS Manager Master and Replica. BoKS 6.1, 6.5 and 6.6.2 Server Agents for Unix/Linux installed on a multi-zone host are compatible with BoKS Manager version 5.6, 6.0, 6.5 and 6.6.2 Master, Replicas and Server Agents installed on other hosts in the domain.

Patching the Operating System With Solaris Zones

The recommended procedure for applying operating system patches when using BoKS Manager is to deactivate BoKS protection while installing the patch to prevent operating system files replaced by BoKS from being overwritten by the patch. Some Solaris patches require that the patch is installed on all zones at once. This would require deactivating BoKS protection on all zones before applying the patch. The only operating system file on Solaris replaced by BoKS Manager is the /etc/pam.conf file. If it can be verified that an operating system patch does not modify the /etc/pam.conf file, the patch may be applied without deactivating BoKS protection.

Page 46 BoKS Manager 6.6.2 Installation Guide

Page 47: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

BoKS tty lock

The BoKS device driver used to implement the tty lock service allocates space for a fixed number of tlock pseudo-devices when the driver is loaded into the kernel. The default number of devices is 64. This means that no more than 64 simultaneous tty lock sessions can be active in the system. In a zone environment, the maximum number of tlock devices is shared by all zones and the maximum number of tlock sessions might need to be increased. See the UNIX man page tlock.conf(4B) for details on how to change the maximum number of tlock devices. A failed tlock invocation attempt will be logged to the BoKS audit log.

zlogin

When BoKS protection is active, zlogin interactive and non-interactive sessions are logged to the BoKS audit log via the login(1) and su(1) PAM services respectively. See the UNIX man page zlogin(1). When zlogin is invoked in “safe mode” (-S option), the PAM system is bypassed and sessions are not logged to the BoKS audit log.

Location of the xinit Wrapper Script

The BoKS xinit wrapper script is no longer installed in the /usr/openwin/bin directory by default. The script is only needed on systems where the X-server is started from the command line, a method rarely used in newer systems. The script is now located in $BOKS_bin/X11/xinit. See the UNIX man page xinit(1B) for instructions on how to install the xinit wrapper script when needed.

Installing on VMware ESX Server

BoKS Manager 6.6.2 includes support for installation on the virtual server operating system VMware ESX Server. For specific version support, see the BoKS Manager README. Note that VMware ESX Server is supported only for BoKS Server Agent for Unix/Linux installations, not for Master and Replica installations.

This section contains information on specific installation procedures for VMware ESX Server.

To install BoKS Server Agent for Unix/Linux on VMware ESX Server:

1. Disable shadow group passwords.

# /usr/sbin/grpunconv

2. Install the appropriate BoKS distribution for RedHat Enterprise Linux, but do not run BoKS setup yet.

Note: Although this package contains a full MRA distribution only BoKS Server Agent configuration is supported for VMware ESX Server.

3. Configure the base port for BoKS communication in /etc/services for the BoKS domain if the default base port (6500) is not used.

BoKS Manager 6.6.2 Installation Guide Page 47

Page 48: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

4. If the Linux firewall is enabled (default), open ports needed for BoKS Server Agent communication.To keep the open ports to a minimum, use the BoKS environment variable PORT_RANGE to specify a port range for use in BoKS communication outgoing ports, see the BoKS man page ENV (4).Example:BoKS domain base port 6500 (default)Port range for outgoing ports 6510-6519BoKS servc outgoing communication

# /usr/sbin/esxcfg-firewall -o 6501,tcp,out,boks

# /usr/sbin/esxcfg-firewall -o 6501,udp,out,boks

BoKS clntd incoming communication

# /usr/sbin/esxcfg-firewall -o 6503,tcp,in,boks

Client ports for BoKS servc communication as specified by PORT_RANGE. BoKS servc will send replies to these ports.

# /usr/sbin/esxcfg-firewall -o 6510,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6511,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6512,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6513,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6514,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6515,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6516,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6517,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6518,udp,in,boks

# /usr/sbin/esxcfg-firewall -o 6519,udp,in,boks

5. Add a $BOKS_etc/bcastaddr file if the BoKS Master/Replica is on a different subnet, see the BoKS man page bcastaddr (4).

6. Run the BoKS setup script and configure the host as a BoKS Server Agent.

7. Disable the boks_xd daemon (ESX server does not support X-windows) by setting the BoKS environment variable XD=off and restart BoKS.

8. Optionally, replace the native SSH daemon with BoKS SSHD. Disable the native SSH daemon via the VI client console.

Note: This will close any open SSH connections.

Enable the BoKS SSH daemon by setting the BoKS environment variable BOKS_SSHD=on and restart BoKS.

Page 48 BoKS Manager 6.6.2 Installation Guide

Page 49: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

9. If the Virtual Infrastructure framework is used to manage the ESX server, a local account 'vpxuser' will be created on the ESX server when it is registered in Virtual Infrastructure.This is a functional account used by Virtual Infrastructure and it should NOT be imported into BoKS database. To make it possible for Virtual Infrastructure to set a password for this account, password changes for vpxuser are handled locally even if BoKS is activated. The vpxuser account can not be used to login via any BoKS controlled service as the account is not imported into BoKS.

See also:

• “Installing BoKS Server Agent for Unix/Linux” on page 113

Installing BoKS Manager on a Master

Installing on a Master includes:

• Master Basics

• Prerequisites for BoKS Master Installation

• Installing the Master

• Quick Start for Remote Administration

• Initializing BoKS Manager

• Basic Configuration of BoKS Manager

• Using Learn Mode

• Importing Users and Hosts into the Database

• Advanced Configuration Overview

See also:

• Installing BoKS Manager on a Replica on page 72

• Converting Between Master, Replicas and Server Agents in the chapter “System Configuration” in the Administration Guide

Master Basics

The BoKS Master does not need to be a dedicated computer, but must not have heavy applications running. BoKS need not run on the most powerful machine, as long the machine meets the minimum requirements.

Shared Memory

For recommended shared memory, see “System Requirements” on page 16. Once you set shared memory, you must keep it the same on the Master and all Replicas. When you re-install during an upgrade, you must set the same value as set in the old installation.

BoKS Manager 6.6.2 Installation Guide Page 49

Page 50: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Set shared memory in BoKS after you have installed BoKS. Set shared memory with the variable SHM_SIZE in the $BOKS_etc/ENV file.

If needed, shared memory settings can also be changed later. Restart BoKS after changing shared memory settings:

BoKS # Boot -kBoKS # Boot

If your BoKS shared memory setting necessitates changing the shared memory for the operating system, refer to your system’s documentation.

Disk Space Requirements

For recommended disk space, see “System Requirements” on page 16.

Keep in mind the following:

• Disk space is platform dependent. Some platforms can get by with less.

• Disk space required for the log files depends on the amount of activity.

Protection

The BoKS Master will be the main security server for some, if not all, mission-critical applications in your domain. It therefore needs to be highly protected. Measures you can take to protect it include:

• Physical security. Like all mission-critical machines, the Master should be located in a secure place. Physical security is often overlooked in an effort to strengthen logical security, although it is equally important, if not more so.

• BoKS Protection. Always activate BoKS Protection on the Master (and on Replicas), to protect it from intrusion over the network, even when you are not using BoKS Protection in the rest of your BoKS domain. This allows you to control access to the Master on a host level, restricting access to only individuals to whom you assign specific Access Routes.

• Root password. Restrict knowledge of the root password on the Master to a limited number of administrators.

• Replica designated as backup. Designate one Replica to be converted to a Master in the event the Master fails and cannot be brought online again quickly. Prepare for this eventuality, so that you can convert the Replica and begin administration of the domain on it. See Replica Designated as Master Backup on page 73. See also Recovery Procedures in the chapter “System Configuration” in the Administration Guide.

Root Account

Note: The root account on the Master is automatically added to the BoKS database when you install BoKS Manager and set it up as Master. The BoKS Manager username is masterhostname:root where masterhostname is the hostname of the Master.

See also:

Page 50 BoKS Manager 6.6.2 Installation Guide

Page 51: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• “Preparing Node Keys, User Accounts and Host Groups” on page 25

• “Install Directories” on page 38

Prerequisites for BoKS Master Installation

Before deploying the Master, review your plan and see that:

• All system requirements are met. See “System Requirements” on page 16.

• At least 8 semaphore sets are available for BoKS Manager. See “System Requirements” on page 16.

• Port numbers have been decided upon, if non-default ports are used. See “Configuring Multiple Domains on the Same Subnet” on page 40.

• Node keys have been decided upon for the Master and all hosts.

• The source for user accounts is consistent

• Use of certificates or RSA SecurID tokens is prepared. These can be added later, but it is well to have your plan clear from the start.

• Shared memory size has been decided upon. It must be set the same on the Master and all Replicas. See recommended size in Master Basics on page 49.

See also:

• “Prerequisites for BoKS Manager” on page 16

• “Master Basics” on page 49

• The Readme, which contains platform-specific installation information.

Installing the Master

Before installing the Master, read relevant parts of both the Installation Guide and the Administration Guide. See Master Basics on page 49 for a summary.

For details, see:

• “System Requirements” on page 16

• “Prerequisites for BoKS Master Installation” on page 51

• The Readme, which contains platform-specific installation information.

• “Install Directories” on page 38

• “Install Parameters and Options” on page 38

• “Unpacking the Package Contents” on page 36

Notes:

• Plan node keys in advance and remember the Node Key you use during installation. You will need it when you register the host and in the case of future upgrades of BoKS Manager. See “Node Keys” on page 26.

BoKS Manager 6.6.2 Installation Guide Page 51

Page 52: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• BoKS uses a number of install directories for which you can specify paths or accept system defaults. These are referred to below by the BoKS directory names $BOKS_DIR, $BOKS_etc and $BOKS_var. See Install Directories on page 38 for a list of these directories and their default paths.

• The install program provides options not used in the procedure below. See Install Parameters and Options on page 38.

To install BoKS Manager on the Master:

1. Download and save the BoKS Manager latest release package in a location accessible from the Master. For example in the /downloads directory on the Master.

2. If required, uncompress the release package. See Unpacking the Package Contents on page 36. A directory structure is created.The directory structure includes an install program, and binaries for specific platforms in sub-directories.

3. Become superuser:

$ su

4. If the directory /tmp has less than 250 MB of space for use during install, or for HP-UX itanium, less than 500 MB, then set the UNIX environment variable PATCH_TMP to a directory that has 250 MB, or for HP-UX itanium 500 MB free, for example, /var/tmp/tempbokspatch, as follows:

# PATCH_TMP=/var/tmp/tempbokspatch

# export PATCH_TMP

5. On HP-UX, Oracle Solaris, TRU64, and AIX, close all dtlogin sessions and stop the dtlogin daemon. See About Closing dtlogin Sessions on page 41.

6. Run the install program:To install without any options, type:

# path to location of uncompressed package/install

To install and create the special user account required if you intend to use SSH privilege separation, type:

# path to location of uncompressed package/install -p [-u <uid>] [-g <uid>]

where <uid> and <gid> let you optionally specify the uid and gid for the SSH daemon account, respectively. This account can be created manually instead (see Configuring Privilege Separation in the chapter System Configuration in the Administration Guide).

For other install options, see Install Parameters and Options on page 38.

7. When prompted to install the product or Quit, select the product.

Page 52 BoKS Manager 6.6.2 Installation Guide

Page 53: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

1) BoKS Manager (domestic version) 6.6q) Quit install

Type 1 and press ENTER to install BoKS Manager.

8. If you did not use the -opt, -var or -etc flags, the install program will prompt you individually for each install directory and provide a default that you can simply accept by pressing Enter. Defaults are:/opt/boksm/etc/opt/boksm/var/opt/boksmAccept each of these with Enter, or else enter the directory that you want to use.

9. When asked:

Would you like to start the installation now? [y]

press ENTER to start the installation.

10. When the installation is finished, the following is displayed:

Setting up BoKS1) Master2) Replica3) Client

q) Quit and run setup later

11. Before running setup, check to see what patch level has been installed, by typing, for example (assuming the default installation directory):

# grep PATCH_LEVEL /etc/opt/boksm/ENV

The variable PATCH _LEVEL displays the patch level currently installed.If the latest patch was not included, download the latest patch release and install it either now or later. See Installing BoKS Manager Patches on page 80.

12. Before running setup, open a new terminal window and make any of the following configurations that are necessary for communications between this Master and Replicas, Server Agents, and Agent Hosts in the same domain:

• Set shared memory with the variable SHM_SIZE in the $BOKS_etc/ENV file to the value decided upon.

• If you using non-default port settings for BoKS, configure the base port by adding a line to the /etc/services file. For example, add the line:

boks 6530/tcp

• If this version 6.6.2 Master will be inter-operating with any pre-6.6.2 Server Agents or any BoKS Application Agents, create a bremotever file in the $BOKS_etc/ directory (default /etc/opt/boksm), containing the host addresses and the encryption levels that you wish to use with those hosts. Different encryption levels can be specified for different hosts as in the example below.

BoKS Manager 6.6.2 Installation Guide Page 53

Page 54: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

With any hosts that are not specified, the Master will use version 6.6.2 default encryption level, CRYPT_AES_256. The following example bremotever file contents specify 64-bit RC5 encryption for 2 hosts in the domain and 128- bit RC5 encryption for 2 other hosts:

CRYPT_RC510.10.10.10110.10.10.102CRYPT_RC5_12810.10.10.10310.10.10.104

See “Configuring Encryption with Pre-6.6.1 Hosts” on page 96 and “Setting Encryption Levels for BoKS Host Communication” on page 179 in the Administration Guide.

13. Return to the terminal window with the BoKS Manager install process finished (which you left after install but before setup) and type the number 1 for Setup Master, then press ENTER to set up the Master. If you closed the window, start the setup program by typing:

/opt/boksm/sbin/setup master

(for a default installation directory), or use the path to your $BOKS_sbin directory.

14. When prompted to enter a Node Key:

Enter BoKS node key:

type the Node Key that you have planned and press ENTER.Remember the Node Key for later upgrading or converting the Master to become a Replica or Server Agent. See “Node Keys” on page 26.

15. When prompted to re-enter the Node Key, do so and then press ENTER.

Re-enter node key:

16. The installation process is finished and you are returned to the list of available products. Exit the installation program by typing q for quit:

q) Quit

17. If you use SSH, enable BoKS SSH by finding the BOKS_SSHD variable in the $BOKS_etc/ENV file and changing its value from off to on. For other optional SSH configuration, see Configuring SSH in the chapter “System Configuration” in the Administration Guide.

18. If you are using RSA SecurID tokens, configure this host for SecurID authentication as described in Configuring Hosts for SecurID Authentication in the chapter “Managing Authenticators” in the Administration Guide.

19. To keep a backup of the audit log on one or more Replicas, do as follows (as described in Configuring Backup Logs on a Replica in the chapter “System Configuration” in the Administration Guide):Open the file $BOKS_data/db.conf and add the line:

Page 54 BoKS Manager 6.6.2 Installation Guide

Page 55: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

file LOG hostname1[hostname2, ...]

where hostname1, hostname2, etc. are Replicas on which to keep copies of the audit log.

Example:

file LOG dandelion daisy rose

will cause log copies to be written to the Replicas dandelion, daisy and rose.To write log backups to all Replicas, add the line:

file LOG

20. Restart the BoKS daemons by typing (assuming installation in the default directory /opt/boksm/):

# /opt/boksm/sbin/boksadm -S Boot -k

# /opt/boksm/sbin/boksadm -S Boot

21. On HP-UX, TRU64, and AIX, restart dtlogin, if you use it. See About Closing dtlogin Sessions on page 41.

22. To facilitate starting the BoKS Manager administration GUI program, define a UNIX environment variable that the BoKS Administration program can use to locate the browser, as shown in the table below.

For example, if you are using the Korn Shell and Netscape is located at the path below, type:

# BOKSADM_BROWSER=/usr/dt/bin/netscape

23. Change to the $BOKS_sbin directory (by default /opt/boksm/sbin/). For example:

# cd /opt/boksm/sbin

24. Run the boksadm startup program by typing one of the following alternatives:If you set the environment variable for the browser, type:

# ./boksadm

If you did not set the environment variable, type:

# ./boksadm -b /pathtobrowser

where pathtobrowser is the full path to the browser on the local machine. For example:

# ./boksadm -b /usr/dt/bin/netscape

boksadm opens the browser window to the Welcome page, from which you click to the BoKS administration main menu.

Shell UNIX Environment Variable

Korn Shell BOKSADM_BROWSER=pathtobrowser

Bourne Shell BOKSADM_BROWSER=pathtobrowserexport BOKSADM_BROWSER

C Shell setenv BOKSADM_BROWSER pathtobrowser

BoKS Manager 6.6.2 Installation Guide Page 55

Page 56: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Note: Use of the -d flag to export the display is not recommended, since the communication with the display will not be encrypted. Run the BoKS Manager administration GUI only locally on the Master until you have set up remote administration, which provides an encrypted channel.

25. Optional: Activate BoKS Protection using the menu Security Configuration and Backup > Activate or Deactivate BoKS Protection. From this point on, access to the Master host from any other host requires an Access Route. Access to the Master will only be allowed by user root from the Master console until you Initialize the Master and set up Access Routes. You can activate or deactivate from the command line using the command sysreplace.

Note: If this is a new installation, you may wish to wait with activating BoKS Protection, until you have set up remote administration, in later steps. Otherwise, you need to work locally on the Master while setting up remote access.

26. If you are upgrading the installation of BoKS Manager Master, you are now done with the installation and can return to the upgrade instructions. See the chapter Upgrading BoKS Manager.

27. For a new installation, continue now or at your convenience later to do one of the following:

• Initialize BoKS Manager. This provides a full initialization of the BoKS CA hierarchy and sets up remote administration for a root user from a chosen workstation. Follow the procedure in Initializing BoKS Manager on page 59.

• Run the program adminwiz, as described in Quick Start for Remote Administration on page 56. This quickly sets up remote administration via the BoKS GUI (running in an https window) for a single specified root user by password login. You can later initialize BoKS Manager, setting up the full CA hierarchy. You can also then, for highest security, disable password login.

See also:

• Installing BoKS Manager on a Replica on page 72

• Recovery Scenarios with the convert Script Overview in the chapter “System Configuration” in the Administration Guide

Quick Start for Remote Administration

This procedure, using the command line program adminwiz, quickly sets up remote administration via the BoKS GUI running in an https window for a single specified root user by password login. You can later initialize the BoKS GUI and, for highest security, disable password login.

Prerequisite: BoKS Manager has been installed and set up as Master. See Installing the Master on page 51.

Page 56 BoKS Manager 6.6.2 Installation Guide

Page 57: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Usage:

• You can run this script several times, creating one user each time, or changing the password login option.

• To change the password login option directly, see Enabling/Disabling Password Login to the GUI in the chapter BoKS Manager Administration in the Administration Guide.

• When you create a new user account, the user’s physical home directory is not created by the script. If you need it, it must be created outside the script.

To do a quick start for remote administration:

1. Log in to the BoKS Master, become superuser and start the BoKS shell:

# /opt/boksm/sbin/boksadm -S

where /opt/boksm/sbin is the default $BOKS_sbin installation directory. If not default, use the directory where you installed.

2. Start the remote administration wizard:

BoKS # adminwiz

BoKS # Do you wish to continue? yes

3. Enter data for a root CA that will be used to sign certificates needed for remote administration. This CA can be but need not be your root CA later on.Enter root CA Country (e.g. "US"): < the two letter ISO 3166 country code as listed in the file $BOKS_etc/countrylist>Enter root CA Organization: <your organization’s name>Enter root CA Org. Unit (not required): <unit within organization, optional>Enter root CA CommonName: <a name for this root CA>, for example, “Root CA”Enter root CA key length (max 8192): <2048>The minimum value is 512-bit, maximum 8192-bit and the default value is 2048-bit.Enter validity in years (default is 10): <10>Enter password: <CA password>Make a note of this password so that you can use the CA later on.Re-enter password: <CA password>Save password for automatic use [yn]: Type y if you want to save the CA password for use in virtual card and certificate operations.

4. Enter the username and, optionally, data for the user account that will be used for remote administration. This can be an existing account on the Master, or a new account that is created here.Enter name of GUI administrator: <a user account name> for example, “cgray”If this is an existing account, the wizard gives you the option of importing user data for the account from /etc/passwd:User “<user>” exists locally. Do you wish to import user data from /etc/passwd [yn]

BoKS Manager 6.6.2 Installation Guide Page 57

Page 58: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

If this is a new account or if you answer no to the previous question, the wizard asks for data to set up the user:Do you wish to set Unix parameters for this user [yn]?If you are not interested in a “real” user account (that is, if this will be a temporary account that you remove after BoKS Manager is set up and running), you can answer No and let the wizard use default values. Otherwise, answer Yes and enter any of the following that you want to (or press return to accept the default value):Enter UID (leave empty for auto selection): for example, “13300”Enter GID [65534]: for example, “500”Enter shell [/bin/false]: for example, “/usr/bin/sh”Enter home directory [/]: for example, “/home/cgray”Enter comment [BoKS GUI admin]: <user real name>Enter password: <user password> MANDATORY FIELDRe-enter password: <user password>

5. Answer yes to Do you wish to enable password authentication [yn].You can later disable password authentication. see Enabling/Disabling Password Login to the GUI in the chapter BoKS Manager Administration in the Administration Guide.

6. Answer yes to “Do you wish to go ahead and make the changes to BoKS [yn]: The wizard goes to work and responds with:

Creating Root CA

Creating Master Host Virtual Card

Creating administrator

Enabling password authentication (BoKS reboot)

BoKS #

Remote administration is now set up and available for this user from any host by password login.

7. To launch the BoKS Manager GUI, open a browser window and enter the URL: https://mastername:6505, where mastername is the name or IP address of the BoKS Master.On the login options page, click Password and then log in using the user account name and user password that you specified earlier for the GUI administrator.

You can now do remote administration in the GUI from any host. To be able to make use of all BoKS Manager features, continue with relevant parts of the procedure Initializing BoKS Manager on page 59 (skipping parts that are irrelevant such as setting up a user account for remote administration, which you have already done here).

See also:

• Setting Up Remote Administration for a User in the chapter BoKS Manager Administration in the Administration Guide

Page 58 BoKS Manager 6.6.2 Installation Guide

Page 59: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• Launching the BoKS Manager GUI Remotely in the chapter BoKS Manager Administration in the Administration Guide

Initializing BoKS Manager

This procedure accomplishes the following:

• Sets up a BoKS Root CA and creates a Host Virtual Card for the Master that is needed for BoKS GUI administration. This is necessary after installation and before any other components or users can work with the BoKS Manager and its database.If this is all you want to do, you can use the shorter procedure Quick Start for Remote Administration on page 56.

• Sets up other CAs required for BoKS Desktop login in BoKS Desktop and FoxT ApplicationControl.

• Sets up remote administration with certificate or token login for a root user from a chosen workstation.

This procedure is not required when upgrading.

To initialize BoKS Manager:

1. Open the BoKS Manager administration GUI in a browser window remotely (if you are able, see Launching the BoKS Manager GUI Remotely in the chapter BoKS Manager Administration in the Administration Guide) or on the Master console. If the administration GUI is not running on the Master, start it as described in the procedure Installing the Master on page 51.

2. If you have previously run adminwiz, which creates a BoKS Root CA and a Host Virtual Card for the Master, then do the following:

• Delete the Master’s Host Virtual Card using the menu Virtual Card Administration > Delete Virtual Card.

• Delete the existing BoKS Root CA using the menu CA Administration > Delete CA.

3. Initialize the BoKS CA hierarchy as follows (as described in Initializing the BoKS CA in the chapter “Certificate Authorities” in the Administration Guide):

CAUTION: It is essential that you remember the passwords you specify for each of the CAs in the BoKS CA Hierarchy. You will use these passwords when creating virtual cards for hosts and users that are necessary for BoKS communication and for user access.

• Select CA Administration > Initialize BoKS CA.

• In the Country list, select the country of the CA. This will typically be the country in which your organization or office is located.

• In the Organization box, type the name of your organization.

BoKS Manager 6.6.2 Installation Guide Page 59

Page 60: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• In the Organization Unit box, type the name of the department in your organization associated with this CA, if appropriate. This information is not mandatory.

• In the Root CA password box, type a password for the Root CA.

• In the Root CA password (again) box, retype the password for the Root CA for verification.

• In the Virtual Card Lifespan list, select a default lifespan for virtual cards signed by the BoKS Root CA. The default setting for the Root CA is fifteen years. Shorter lifespan for virtual cards is more secure, since this means there is less chance of credentials being compromised, but it does mean more administrative work in managing renewal of credentials.

• In the RSA Key Length list, select the length of the RSA Key that the Root CA will be signed with. The default Key Length is 2048-bits. Larger key lengths mean stronger encryption of the Root CA, and are therefore more secure.

• In the User CA password box, type a password for the User CA that will be created when you initialize the BoKS Root CA.

• In the User CA password (again) box, retype the password for the User CA for verification.

• In the Virtual Card Lifespan list, select the select a default lifespan for virtual cards signed by the User CA. The default setting for the User CA is ten years.

• In the RSA Key Length list, select the length of the RSA Key that the User CA will be signed with. The default Key Length is 1024-bits.

• In the Admin CA password box, type a password for the Admin CA that will be created when you initialize the BoKS Root CA.

• In the Admin CA password (again) box, retype the password for the Admin CA for verification.

• In the Virtual Card Lifespan list, select the select a default lifespan for virtual cards signed by the Admin CA. The default setting for the Admin CA is ten years.

• In the RSA Key Length list, select the length of the RSA Key that the Admin CA will be signed with. The default Key Length is 1024-bits.

• In the Key Recovery password box, type a password for the Key Recovery Virtual Card that will be created when you initialize the BoKS Root CA.

• In the Key Recovery password (again) box, retype the password for the Key Recovery Virtual Card for verification.

• In the Virtual Card Lifespan list, select the select a default lifespan for the Key Recovery Virtual Card. The default setting is ten years.

• Click Execute.The BoKS certificate hierarchy will now be created. This may take a few minutes, depending on the key lengths that you chose.

Page 60 BoKS Manager 6.6.2 Installation Guide

Page 61: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• Select CA Administration > View CA Hierarchy, which displays the CA hierarchy that you have just created.

4. Create a backup of the directory that contains the CA hierarchy virtual cards and certificates $BOKS_data/sso_creds (by default /var/opt/boksm/data/sso_creds) This will be needed if the Master goes down and a Replica needs to be converted to become Master.

5. Export the BoKS Root CA certificate to a file where it will be accessible later to install in your browser or when you install BoKS Desktops, as follows (as described in Exporting CA Certificates in the chapter “Certificate Authorities” in the Administration Guide):

• Select CA Administration > Export CA.

• In the Destination section, select the format you want the output to be in. It is recommended to select File, and provide the file name, for example: BoKSrootCA.crt.

• In the Choose CA Certificate to Export list, select the root CA certificate.

• Click Execute.

• From a command window, copy the file with the exported root CA certificate to a floppy disk for later use when installing BoKS Desktops that will be used for remote administration.

6. If you will be using certificates issued by an external CA, import the complete chain of CA certificates that are involved from the root CA and downward, using CA Administration > Import CA. See About Importing CA Certificates. For compatibility with BoKS Desktop, during import of the chain be sure to classify the lowest, issuing CA as VERIFY and LOGON, and the other CAs in the chain as VERIFY. These classifications are recommended (although not required) even if you are not currently using BoKS Desktop, to allow future use of BoKS Desktop.

7. Create a Host Virtual Card for the Master as follows (as described in Creating Host Virtual Cards in the chapter “Managing Virtual Cards” in the Administration Guide):

• Select Virtual Card Administration > Create Host Virtual Card.

• In the CA list, select the root CA certificate.

• Host Virtual Cards for Agent Hosts should be signed by the Virtual Card CA. Host Virtual Cards for the Master and Replicas should be signed by the BoKS Root CA.

• In the Host list, select the Master.

• In the CA Virtual Card Password box, type the password for the root CA.

• In the Country list, select the appropriate country to list in the virtual card.

• In the Organization box, type the name of the Organization to list in the virtual card.

BoKS Manager 6.6.2 Installation Guide Page 61

Page 62: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• In the Organization Unit (optional) box, type the name of the Organizational Unit to list in the virtual card, for example “Accounting”. This field is optional.

• In the Virtual Card Lifespan list, select a lifespan for the new virtual card. The default lifespan is five years. You may wish to choose a greater life span to avoid having to re-initialize the BoKS administration GUI.

• Check the Install Virtual Card on Host checkbox (checked by default).

• Click Execute.The virtual card is now created in the BoKS database and installed on the Master.

8. If you will be doing remote administration from non-BoKS Desktop computers, then do the following:

• Export the certificate that the Master uses to identify itself, by typing:

# /opt/boksm/lib/usrcreds get -k ‘masteripaddress’ -c > master_host_cert.crt

where masteripaddress is the IP address of the Master.

• Run the fingerprint program on the certificate, by typing:

# /opt/boksm/lib/fingerprint -f master_host_cert.crt

The SHA1 and MD5 certificate fingerprints are displayed, as illustrated below:

Print the MD5 hash fingerprint for reference in the future when you are setting up remote administration from a remote workstation and need to verify the Master’s certificate.

9. Create a user account in BoKS Manager for yourself, or root, if you do not already have one, as follows (as described in Creating User Accounts in the chapter “User Administration” in the Administration Guide):

• Select User Administration > Create User.

• In the Host/Host Group box, select the hostname of the Master.

Note: The user must be assigned to the Master or to a Host Group which includes the Master, in order to do BoKS Manager administration.

Note: If you already have an account on the Master, you can import that account into BoKS Manager using User Administration > Import User Data, selecting Import users only from /etc/passwd file or one of the other options.

Page 62 BoKS Manager 6.6.2 Installation Guide

Page 63: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

You can set up the user’s account for login to the administration GUI with a BoKS Manager virtual card, an external certificate (which may be on a smart card), or an RSA SecurID token. In the following, we assume a virtual card:

• In the User Login Name box, type a unique account name for the BoKS user. using ASCII lower case characters only.

• Click Continue. The Create User screen is displayed.

• The Primary Group and Initial Password fields are mandatory; you must fill them in before you can create a user.

• In the User’s Real Name box, type the user’s full name.

• In the User Class list, assign the user to the predefined ADMIN class, which will provide standard Access Routes for administrators.

• In the Account Expires box, select the lifetime of this user account.

• In the UID box, change the user ID only if you have some reason to do so. The UID is the user’s numerical identification for the system. If you created the user in a Host Group, the user has the same UID on all machines in that Host Group.

• MANDATORY: In the Primary Group box, click the primary UNIX group to which the user belongs, or type its name in the Specify a Group box. The UNIX group is a component of the UNIX file permission system. You cannot submit the user data without selecting a UNIX group. If you created the user in a Host Group, the user has the same UNIX group permissions on all hosts in the Host Group.

• In the Home Directory box (a mandatory parameter), make sure there is a full or relative path to the user’s home directory. Often the box is filled in with the user’s login name by BoKS Manager.You can accept the suggested path or enter another path for this user. Example: asmith.

• Click Create Home Directory to create the user’s home directory or leave blank if you do not intend to use a Unix home directory.

• In the Shell box, correct the user’s default UNIX shell if necessary. You can assign only an executable shell, for example /bin/csh or /bin/sh.

• In the Initial Password box, type an initial password for the user. Mandatory Do not uses spaces and do not leave empty. Use only ASCII characters (recommended) and do not use space, comma, =, +, /, \, <, >, #. The virtual card created with this account will have the same initial password.

• In the Timeout box, select the number of minutes a logged-in user is allowed to be inactive before timeout. The System Default option is the UNIX system default.

• In the Action on Timeout box, click the action to be taken when the timeout limit is reached.

• Leave Block User unchecked.

BoKS Manager 6.6.2 Installation Guide Page 63

Page 64: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• Leave Create User Virtual Card unchecked. You will create a virtual card separately in the Virtual Card Administration menu below.

• Skip the CA list.

• Skip the CA Virtual Card Password box.

• Leave User Password unchecked.

• Click Execute.This user now has a BoKS user account on the Master, but needs a virtual card (assuming virtual card for authentication to the BoKS administration GUI).

10. Create a User Virtual Card for the user, as follows (as described in Creating User/Admin Virtual Cards in the chapter “Managing Virtual Cards” in the Administration Guide):

• Select Virtual Card Administration > Create User/Admin Virtual Card.

• In the CA list, select the Virtual Card CA to sign the virtual card.

• In the Login Name in BoKS Desktop box, type the username that will be allowed to log in using BoKS Desktop with this virtual card.This can be (but does not need to be) the same as the user’s BoKS Manager login name.

• In the CA Virtual Card Password box, type the password for the CA certificate you selected in the CA list.

• In the Country list, select the appropriate country to be listed in the virtual card.

• In the Organization box, type the name of the Organization to be listed in the virtual card.

• In the Organizational Unit (optional) box, type the name of the Organizational Unit to be listed in the virtual card, for example “Accounting”. Note that this field is optional.

• In the Full Name box, type the full name of the user for whom you are creating the virtual card.

• In the Email address (optional) box, you can type an email address for inclusion in the virtual card’s user certificate. For details, see About Email Addresses in User Certificates in the chapter “Managing Virtual Cards” in the Administration Guide.

• In the Link Virtual Card to BoKS User list, select the BoKS user to link the new virtual card to, or type the username in the or Specify a BoKS User to Link to box.

• In the RSA Key Length list, select a key length for the new virtual card.

• In the Virtual Card Lifespan list, select a lifespan for the new virtual card.

• In the Initial Virtual Card Password box, type a password for the virtual card. This is the password the user will need to give when logging in for the first time using BoKS Desktop. The user can then change the password.

Page 64 BoKS Manager 6.6.2 Installation Guide

Page 65: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

This field is not displayed if Domain Password mode is activated (Domain Password should not be activated until later, if you intend to use it).

• Check the Use Password checkbox (checked by default).This field is not displayed if Domain Password mode is activated.

• Leave Use SecurID unchecked.

• Click Execute.The user now has both an account and a virtual card to use for login to the BoKS administration GUI. All they need now are a BoKS Desktop and an Access Route, which are the next steps.

11. Register the user’s computer in BoKS Manager, as follows (as described in Registering a Host in the chapter “Host Administration” in the Administration Guide):

• Select Host Administration > Register Host.

• In the Host Name box, type the hostname for the user’s computer. If you have more than one host in your domain with the same basename, you must use the fully qualified DNS name to identify such hosts.

• Click Continue. The Register Host Screen is displayed, showing the hostname.

• Under Type of Host, select BoKS Desktop.

• In the Address(es) to Add box, type the host’s IP address if it is not already displayed. If an IP address is already displayed but is incorrect, change the address. If the host has multiple IP addresses, be sure to include all of them, each separated by a space.

• Skip Host Groups, Node Key and Parent Home Directory.

• Click Execute.

12. Add an Access Route that allows remote administration in the GUI for the user by doing the following:

• Click Access Control Administration > Add Access Routes.

• Select the user. Alternatively, select the User Class ADMIN, if you want to use this predefined class for your administrators.

• Select Remote BoKS Administration.

• Click Continue.

• In the Access Method list, select BOKSADM. This grants access to the BoKS administration GUI.

• In From Host, select the Host Group or workstations from which this user is allowed to do remote administration.You can be as restrictive as you wish. ALL is the Host Group that includes all hosts registered in the database.

• In To Host, select the Master, or a Host Group that includes the Master.

BoKS Manager 6.6.2 Installation Guide Page 65

Page 66: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• In Days select Any Day or Workdays, to allow access all days or Monday to Friday only.

• Select access times From: 12 am Until: 11:59 pm (or a restricted set of times).

• Click Execute.

• Check that the Access Route is as you want it by clicking Access Control Administration > List User Access Routes (or List User Class Access Routes, if you created a route for a User Class). If it is not as you want it, use Access Control Administration > Remove Access Routes to delete the route, then create another that is as you want it.

13. Optional: Activate BoKS Protection using the menu Security Configuration and Backup > Activate or Deactivate BoKS Protection. From this point on, access to the Master host from any other host requires an Access Route.

14. This concludes work on the Master to Initialize BoKS Manager.

The next step is Basic Configuration as described in Basic Configuration of BoKS Manager on page 66. You can do this either now working locally on the Master or remotely using a user account and remote computer that you have registered on the Master.

Continue installation by installing BoKS Desktop on a Windows workstation that you will use to do remote administration, as described in “Installing BoKS Desktop on a Reference Machine” on page 136. Take with you to the workstation the copy of the BoKS Root CA certificate that you made, and be ready to provide the Master’s hostname/IP address and port number (6505, by default).

Basic Configuration of BoKS Manager

Prerequisites for this procedure are successful completion of the procedures:

• Installing the Master on page 51

• Initializing BoKS Manager on page 59

To Perform Basic Configuration of BoKS Manager:

1. Work in the BoKS administration GUI on the Master locally, or open the BoKS administration GUI in a browser window with the URL https://mastername:port (port 6505 by default) from a remote computer with BoKS Desktop installed (and which you have included in a BOKSADM Access Route).

2. Set the security level you want by clicking Security Configuration and Backup > Set Low Security Level (or Medium or High) and then click Execute.

• To customize settings, click Security Configuration and Backup > View/Modify Current Settings and review the settings. Change any that you want to, and then click Execute.

Page 66 BoKS Manager 6.6.2 Installation Guide

Page 67: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Note: It is important to set Security Level in your BoKS Manager domain, since these parameters regulate access to the Master and Replicas. They also regulate what events are logged in the domain.

3. Set shared memory, if needed to handle a large number of users (> 1000) in the database, by altering the variable SHM_SIZE located in the file $BOKS_etc/ENV. The default setting is 1000 KB. Set the same size on the BoKS Master and Replicas.

4. Set the file monitoring interval on the Master, if desired, with the variable FILEMON_INTERVAL in the file $BOKS_etc/ENV. Specify time in minutes. Default value is 120 minutes.

5. If you want, set the Lockout of Unknown host variables to prevent access by unknown hosts or hosts with unresolved hostnames, which the expression ANY/* in an Access Route would otherwise allow. For details, see Lockout of Unknown Hosts in the chapter “System Configuration” in the Administration Guide.

6. Set up an automatic scheduled backup of the database (optional), by doing as follows (see Setting Up Automatic Backup and Restore in the chapter “System Configuration” in the Administration Guide):

• From the root shell prompt, type:

hostname# crontab -e

• This command starts the editor according to the environment variable EDITOR.

• Add the new line to the file:

01 00 * * * /opt/boksm/sbin/boks_bru -p -d /dev/rmt/0

If you installed BoKS in a non-default directory, replace the directory above with your $BOKS_sbin directory.

• Save the file and leave the editor.This file will run boks_bru each night at 00.01 and back up all BoKS files to the device /dev/rmt/0.

7. Configure the BoKS Manager audit log that is maintained on the Master in Log Administration > Log Parameters.

8. To configure optional email notification whenever a BoKS-protected host is activated or deactivated (Master, Replica or BoKS Server Agents for Unix/Linux), add the following line to the $BOKS_etc/ENV file:

MAIL_NOTIFY=email address of alert recipient

9. Optional: For any Server Agent for Unix/Linux or Agent host that uses a time zone different from the Master or the host’s configured Replica, add a line to the $BOKS_etc/timezones file on the Master defining the time zone for the host, as described in Setting Time Zones in the chapter “System Configuration” in the Administration Guide:

<hostname> <timezone>

BoKS Manager 6.6.2 Installation Guide Page 67

Page 68: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

This can also be done later when installing each Server Agent for Unix/Linux or Agent Host.

10. Use Virtual Card Administration to configure settings that apply to Credential Store passwords and logons to BoKS Desktops, if you are using BoKS Desktop. Some settings for BoKS Desktops must be configured on the BoKS Desktop reference installation before rollout.

11. Optional: Activate BoKS Protection on the Master (and later on each Replica) with the menu Security Configuration and Backup > Activate or Deactivate BoKS Protection. To do this from a command terminal on the Master (or Replica), type:

BoKS # sysreplace replace

12. Finish configuration by restarting BoKS processes, by typing:

# /opt/boksm/sbin/boksadm -S Boot

See also:

• The chapter “System Configuration” in the Administration Guide

• The chapter “BoKS Manager Administration” in the Administration Guide

• The chapter “Sub-Administrator Configuration” in the Administration Guide

• The chapter “Managing Virtual Cards” in the Administration Guide

• Activating BoKS Protection on the Master and Other Hosts in the chapter “System Configuration” in the Administration Guide

Using Learn Mode

Learn Mode is intended for initial deployment and troubleshooting.

Learn Mode allows you to run BoKS Manager and BoKS Server Agent for Unix/Linux with BoKS Manager activated but without enforcing most Access Routes.

Note: Access using the methods rsh, rlogin without password, and any access to an account with UID 0 (for example root) still requires users to have Access Routes, even in Learn Mode.

For access using methods other than those specified above, BoKS Protection is still activated and BoKS still logs all access, but access is not denied when the user has no Access Route. Instead, access is allowed as long as all other requirements are met (such as having an account and authenticating correctly with password or whatever is configured). Learn mode produces an extra log entry for each access. These entries may be sorted out and displayed to see which Access Routes are needed.

Learn mode simplifies a roll-out when it is not certain that the system is configured correctly. The intent behind this feature is to decrease the pressure on administrators during deployment by decreasing frustration for the end users.

Page 68 BoKS Manager 6.6.2 Installation Guide

Page 69: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Properties

• Users must exist in the BoKS Manager database. Users that are only defined locally, for example, in /etc/passwd, are not granted access.

• User must login with the correct password.

• User must login with any required (and assigned) Authenticator.

• Learn Mode is not applied to the root account and BoKS Manager administration (both from the command line and in the GUI)— the root account is still fully protected.

• Learn Mode is not applied for access using the methods rsh, and rlogin without a password — users accessing using these methods still require Access Routes.

• Limit on maximum number of concurrent logins for a user (set with modbks) applies even under Learn Mode.

• In learn mode, a user who enters the wrong password too many times is still blocked.

Example Output in the Audit Log

Login with Learn Mode disabled:

10/19/04 08:14:11 cgray-pc1 pts/4 cgray login Successful login (rlogin from cgray-pc3:cgray)

Login with Learn Mode enabled and the user has a correct Access Route:

10/19/04 08:14:31 cgray-pc1 - cgray noaccessctl success, RLOGIN:cgray@cgray-pc3->cgray-pc1, psw (RLOGIN,TELNET,XDM:KNOWN/*->*)

10/19/04 08:14:31 cgray-pc1 pts/4 cgray login Successful login (rlogin from cgray-pc3:cgray)

Login with Learn Mode enabled and the user does not have the needed Access Route:

10/19/04 08:17:27 cgray-pc1 - mafh01 noaccessctl failure, RLOGIN:mafh01@cgray-pc3->cgray-pc1, psw

10/19/04 08:17:27 cgray-pc1 pts/7 mafh01 login Successful login (rlogin from cgray-pc3:mafh01)

Note that there are two entries for each access when learn mode is enabled. When the Access Route was missing, the failure entry shows a minimum route that would provide the access.

Usage

To enable Learn Mode:

1. Log in to the BoKS Master, become superuser and start a BoKS shell

2. Run the following:

BoKS # bksdef -Z enable

BoKS Manager 6.6.2 Installation Guide Page 69

Page 70: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

It is not necessary to reboot BoKS.

To disable Learn Mode:

1. Log in to the BoKS Master, become superuser and start a BoKS shell

2. Run the following:

BoKS # bksdef -Z disable

It is not necessary to reboot BoKS.

To view the current Learn Mode setting:

To find out whether Learn Mode is enabled or disabled:

1. Log in to the BoKS Master, become superuser and start a BoKS shell

2. Run:

BoKS # bksdef

3. Review the BoKS settings that are displayed. If Learn Mode is enabled, the listing shows the line: BoKS access control: DISABLED!If Learn Mode is disabled, the listing shows the line: BoKS access control: ENABLED

Note: The setting “BoKS Access Control” has the opposite setting to Learn Mode. Learn Mode enabled means that Access Control is disabled!

To view Learn Mode output:

When Learn Mode is enabled, extra log entries are added to the BoKS log by the program noaccessctl. You can study the BoKS audit log itself, but it will contain double entries for every access attempt as well as entries other than those concerning Access Routes.To only view output from Learn Mode (events concerning Access Routes), use the CLI command learnmodelog, for example:

BoKS # learnmodelog -f $BOKS_data/LOG -p

Tip! Using the -p option formats the output in the same way that bkslog formats output.

See the BoKS man page for learnmodelog for details and other options.

See also:

• The chapter “Managing Access Routes” in the Administration Guide

• Activating BoKS Protection on the Master and Other Hosts in the chapter “System Configuration” in the Administration Guide

• The chapter “Planning Installation”

Page 70 BoKS Manager 6.6.2 Installation Guide

Page 71: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Importing Users and Hosts into the Database

You can import a whole existing BoKS database, or build a database by importing user accounts, hosts and other data from other sources.

Importing User Data to the Security Database

User data can be imported from a number of different sources. These include:

• The /etc/passwd file on a UNIX host.

• A combination of a NIS passwd map and the /etc/passwd file

• A local file on the Master

• An LDAP database. See the chapter “LDAP User Provisioning” in the Administration Guide.

• A security database from a previous BoKS Manager version that you have saved as a backup. See the chapter “Backup and Restore” in the Administration Guide.

• Third party certificates, used for locking virtual cards or other purposes. You can also create virtual cards while importing users from an LDAP server. See:

– The chapter “Certificate Authorities” in the Administration Guide

– The chapter “Managing Virtual Cards” in the Administration Guide

– The chapter “LDAP User Provisioning” in the Administration Guide

See also:

• Creating User Accounts in the chapter “User Administration” in the Administration Guide.

Importing Host Data to the Security Database

Host data can be imported from the local /etc/hosts file on the Master or from an external source (NIS host map or DNS) or from a combination of both. See Host Background in the chapter “Host Administration” in the Administration Guide.

Advanced Configuration Overview

When you have finished the Basic Configuration of your BoKS Manager domain, you must configure the settings that provide and control user access to hosts and applications in the domain.

Configuration that may need to be done includes:

• Access to hosts protected by BoKS Server Agent for Unix/Linux and applications protected by BoKS Application Agents, is controlled by Access Routes defined and managed in the menu Access Control Administration.

• Assign Sub-Administrator status to users who will do sub-administration in the GUI, and specifying their rights in the Sub-Administrator Administration menu.

BoKS Manager 6.6.2 Installation Guide Page 71

Page 72: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• For BoKS Desktop: Access to BoKS Desktop logon is controlled by defining user Credential Stores in the menu Virtual Card Administration or by importing CA Certificates for third party user credentials in the menu CA Administration. Map these third party certificates to users in the User Administration > Modify menu or during LDAP import or user accounts. See also “Deploying a FoxT solution with BoKS Manager” on page 28.

• For Group File Encryption: Access to Group Encryption Keys is controlled by assignments to users in the menu Group Encryption Keys.

For full information on these and other configuration topics, see the BoKS Manager Adminstration Guide.

See also:

• The chapter “A Guided Tour” in the Administration Guide (an introduction)

• The chapter “Managing Access Routes” in the Administration Guide

• The chapter “System Configuration” in the Administration Guide

Installing BoKS Manager on a Replica

Installing on a Replica includes the topics:

• Replica Basics

• Replica Designated as Master Backup

• Prerequisites for BoKS Replica Installation

• Installing a Replica

Replica Basics

The BoKS Replica contains a read-only copy of the security database. The Replica must be added as a BoKS Replica host in the security database on the BoKS Master. The node key must also be added to the Master. For details, see Node Keys in the chapter “Host Administration” in the Administration Guide.

When installing a BoKS Replica, remember that the Replica must have contact with the Master. If the Master, Replica and BoKS Server Agent for Unix/Linux are on different subnets, you may have to configure the bcastaddr file on the Replica and BoKS Server Agent for Unix/Linux hosts to supply the IP addresses of the Master and Replicas. See “Domain Communication Basics” on page 21.

A Replica must always have the same BoKS shared memory setting in the $BOKS_etc/ENV file as the Master.

The disk space requirements for the BoKS Replica are approximately the same as those for the BoKS Master. See “System Requirements” on page 16.

Page 72 BoKS Manager 6.6.2 Installation Guide

Page 73: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

Replicas do not keep a copy of the log file by default; it must be configured during or after installation. For details, see “Configuring Backup Logs on a Replica”.

Since a Replica contains a copy of the security database, Replica security should be as high as on the Master, which includes physical security, activating BoKS Protection, and restricting the root password to few administrators.

One Replica in the domain should be designated as and planned for as a backup to convert to Master if the Master fails. See Replica Designated as Master Backup on page 73.

In order to do administrative tasks on the Replica when BoKS Protection is activated, the root account on the Replica must be defined as a BoKS user account, just like any other user account. You can import this account from the /etc/passwd file (at the same time as you import user accounts) in the administration GUI menu User Administration > Import User Data.

See also:

• Master Basics on page 49

• Install Directories on page 38

Replica Designated as Master Backup

To plan for the event that the Master becomes unavailable for a substantial period of time, Fox Technologies recommends that you designate one of your Replicas as backup Master. In the event that the Master needs to be replaced, it would be this Replica that you would convert to become the new Master, perhaps only until the old Master can be brought back online.

Note: All Replicas have copies of the security database and can provide the same authentication and authorization services that the Master provides. However, you can only update the database on the Master. So if you need to do administration, such as adding and deleting user accounts, while the Master is down, you will need to convert a Replica to Master. For details on converting, see Recovery Procedures in the chapter “System Configuration” in the Administration Guide.

Root Account on Replica Backup for Master

Plan to protect the root account on this Replica just as you do for the root account on the Master. This might include:

• Restrict knowledge of the root password on this Replica to a limited number of administrators.

• Consider creating a Host Group for administration that includes only the Master and the Replica that is designated as backup to the Master, so that Access Routes for administration can be easily set up and will already be in place if the Replica needs to be quickly converted to Master.

BoKS Manager 6.6.2 Installation Guide Page 73

Page 74: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

You need to have a BoKS account for the root account on this backup Replica. A BoKS account is needed for administration on any host, but is particularly important to have in place for the backup Replica, since access as root is required during and after conversion, and at a time when you cannot use the Master to add the account to the database. With no local root account in the database, you would need to either work locally on the console or deactivate BoKS Protection.

See also:

• About Importing Unix System Accounts and Windows Administrators in the chapter “User Administration” in the Administration Guide

• Master Basics on page 49

• Replica Basics on page 72

Prerequisites for BoKS Replica Installation

Before installing Replicas:

• See that all system requirements are met. See “System Requirements” on page 16.

• Initialize BoKS Manager and complete the basic configuration procedure (you can always modify configuration later). See:

– Initializing BoKS Manager or Quick Start for Remote Administration

– Basic Configuration of BoKS Manager

• If non-default ports are used, configure port numbers in the /etc/services file. See Configuring Multiple Domains on the Same Subnet on page 40.

• Before running setup on the Replica, the BoKS Manager Master must be set up and running, so that setup can contact the Master in real time.

Installing a Replica

The steps described here are almost the same as for the BoKS Master (as described in To install BoKS Manager on the Master: on page 52), except that here you select to set up a Replica instead of a Master and do not start the administration GUI (it runs only on the Master).

See also:

• Prerequisites for BoKS Replica Installation on page 74

• Replica Basics on page 72

• Install Directories on page 38

• Install Parameters and Options on page 38

• The Readme, which contains platform-specific installation information.

• Configuring Backup Logs on a Replica in the chapter “System Configuration” in the Administration Guide

Page 74 BoKS Manager 6.6.2 Installation Guide

Page 75: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• Converting Between Master, Replicas and Server Agents in the chapter “System Configuration” in the Administration Guide

Notes:

• Plan node keys in advance and remember the Node Key you use during installation. You will need it when you register the host and in the case of future upgrades of BoKS Manager. See “Node Keys” on page 26.

• BoKS uses a number of install directories for which you can specify paths or accept system defaults. These are referred to below by the BoKS directory names $BOKS_DIR, $BOKS_etc and $BOKS_var. See Install Directories on page 38 for a list of these directories and their default paths.

• The install program provides options not used in the procedure below. See Install Parameters and Options on page 38.

To install and set up BoKS Manager on a Replica:

1. Download and save the BoKS Manager latest release package in a location accessible from the Replica.For example in the /downloads directory on the Replica.

2. If required, uncompress the release package. See “System Requirements” on page 16. A directory structure is created.The directory structure includes an install program, and binaries for specific platforms in sub-directories.

3. Become superuser:

$ su

4. If the directory /tmp has less than 250 MB of space for use during install, or for HP-UX itanium, less than 500 MB, then set the UNIX environment variable PATCH_TMP to a directory that has 250 MB, or for HP-UX itanium 500 MB free, for example, /var/tmp/tempbokspatch, as follows:

# PATCH_TMP=/var/tmp/tempbokspatch

# export PATCH_TMP

5. On HP-UX, Oracle Solaris, TRU64, AIX, and SCO, close all dtlogin sessions and stop the dtlogin daemon. See About Closing dtlogin Sessions on page 41.

6. Run the install program:To install without any options, type:

# path to location of uncompressed package/install

To install and create the special user account required if you intend to use SSH privilege separation, type:

# path to location of uncompressed package/install -p [-u <uid>] [-g <uid>]

BoKS Manager 6.6.2 Installation Guide Page 75

Page 76: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

where <uid> and <gid> let you optionally specify the uid and gid for the SSH daemon account, respectively. This account can be created manually instead (see Configuring Privilege Separation in the chapter System Configuration in the Administration Guide).

For other install options, see Install Parameters and Options on page 38.

7. When prompted to install the product or Quit, select the product.

1) BoKS Manager (domestic version) 6.6q) Quit install

Type 1 and press ENTER to install BoKS Manager.

8. If you did not use the -opt, -var or -etc flags, the install program will prompt you individually for each install directory and provide a default that you can simply accept by pressing Enter. Defaults are:/opt/boksm/etc/opt/boksm/var/opt/boksmAccept each of these with Enter, or else enter the directory that you want to use.

9. When asked:

Would you like to start the installation now? [y]

press ENTER to start the installation.

10. When the installation is finished, the following is displayed:

Setting up BoKS1) Master2) Replica3) Client

q) Quit and run setup later

11. Before running setup, check to see what patch level has been installed, by typing, for example (assuming the default installation directory):

# grep PATCH_LEVEL /etc/opt/boksm/ENV

The variable PATCH _LEVEL displays the patch level currently installed.If the latest patch was not included, download the latest patch release and install it either now or later. See Installing BoKS Manager Patches on page 80.

12. Before running setup, open a new terminal window and make any of the following configurations that are necessary for communications between this Replica and the Master, other Replicas, Server Agents, and Agent Hosts in the same domain:

• Set shared memory with the variable SHM_SIZE in the $BOKS_etc/ENV file to the same value as set on the Master.

• If the Master is outside of the Replica’s broadcast subnet, create a bcastaddr file in the $BOKS_etc directory (default /etc/opt/boksm), containing the IP address of the Master. For example, add the Master’s address:

Page 76 BoKS Manager 6.6.2 Installation Guide

Page 77: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

10.10.10.100

You can also add any Replicas that communicate with this Replica. See Configuring the bcastaddr File in the chapter “System Configuration” in the Administration Guide.

• If you using non-default port settings for BoKS, configure the base port by adding a line to the /etc/services file. For example, add the line:

boks 6530/tcp

• If this version 6.6.2 Replica will be inter-operating with any pre-6.6.2 Server Agents or any BoKS Application Agents, create a bremotever file in the $BOKS_etc/ directory (default /etc/opt/boksm), containing the host addresses and the encryption levels that you wish to use with those hosts. Different encryption levels can be specified for different hosts as in the example below. With any hosts that are not specified, the Replica will use version 6.6.2 default encryption level, CRYPT_AES_256. The following example bremotever file contents specify 64-bit RC5 encryption for 2 hosts in the domain and 128- bit RC5 encryption for 2 other hosts:

CRYPT_RC510.10.10.10110.10.10.102CRYPT_RC5_12810.10.10.10310.10.10.104

See “Configuring Encryption with Pre-6.6.1 Hosts” on page 96 and “Setting Encryption Levels for BoKS Host Communication” on page 179 in the Administration Guide.

13. Return to the terminal window with the BoKS Manager install process finished (which you left after install but before setup) and type the number 2 for Setup Replica, then press ENTER to set up the Replica.If you closed the window, start the setup program by typing:

/opt/boksm/sbin/setup replica

(for a default installation directory), or use the path to your $BOKS_sbin directory).

14. When prompted to enter a Node Key:

Enter BoKS node key:

type the Node Key that you have planned and press ENTER.Remember the Node Key for registering the host in the BoKS database later.

15. When prompted to re-enter the Node Key, do so and then press ENTER.

Re-enter node key:

16. The installation process is finished and you are returned to the list of available products. Exit the installation program by typing q for quit:

q) Quit

BoKS Manager 6.6.2 Installation Guide Page 77

Page 78: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

17. If you use SSH, enable BoKS SSH by finding the BOKS_SSHD variable in the $BOKS_etc/ENV file and changing its value from off to on. For other optional SSH configuration, see Configuring SSH in the chapter “System Configuration” in the Administration Guide.

18. If you are using RSA SecurID tokens, configure this host for SecurID authentication as described in Configuring Hosts for SecurID Authentication in the chapter “Managing Authenticators” in the Administration Guide.

19. Restart the BoKS daemons by typing (assuming installation in the default directory /opt/boksm/):

# /opt/boksm/sbin/boksadm -S Boot -k

# /opt/boksm/sbin/boksadm -S Boot

20. On HP-UX, TRU64, AIX, and SCO, restart dtlogin, if you use it. See About Closing dtlogin Sessions on page 41.

21. In the BoKS administration GUI on the Master, register the Replica in the menu Host Administration > Register Host as follows:

• Set the Host Type to BoKS Replica Host.

• Provide the IP address in the Address(s) to Add box. If there are multiple addresses, separate them by commas.

• Optionally provide a Host Group to which this host will belong.

• Provide the Node Key that you entered earlier during setup.

• In the Parent Home Directory box, type the name of the parent directory on this machine under which users’ home directories are located, for example /home (default location depends on operating system). See Home Directory Host Configurations for Unix Hosts in the chapter “Host Administration” in the Administration Guide for examples of Parent Home Directory and Physical Home Directory.

• If BoKS Manager is to create the home directory on another host, type the hostname and directory in the Physical Home Directory box, in the format Host:Directory. For example:hostname:/export/home.

• Click Execute to complete the registration.

22. Create a Host Virtual Card for the Replica as follows (as described in Creating Host Virtual Cards in the chapter “Managing Virtual Cards” in the Administration Guide):

• Select Virtual Card Administration > Create Host Virtual Card.

• In the CA list, select the root CA certificate.

• Host Virtual Cards for Agent Hosts should be signed by the Virtual Card CA. Host Virtual Cards for the Master and Replicas should be signed by the BoKS Root CA.

Page 78 BoKS Manager 6.6.2 Installation Guide

Page 79: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• In the Host list, select the Replica.

• In the CA Virtual Card Password box, type the password for the root CA.

• In the Country list, select the appropriate country to list in the virtual card.

• In the Organization box, type the name of the Organization to list in the virtual card.

• In the Organization Unit (optional) box, type the name of the Organizational Unit to list in the virtual card, for example “Accounting”. This field is optional.

• In the Virtual Card Lifespan list, select a lifespan for the new virtual card. The default lifespan is five years. You may wish to choose a greater life span to avoid having to re-initialize the BoKS Manager administration GUI.

• Check the Install Virtual Card on Host checkbox (checked by default).

• Click Execute.The virtual card is now created in the BoKS database and will be automatically installed on the Replica in the $BOKS_etc/keys directory.

Note: It can take up to ten minutes before the Host Virtual Card is pushed out to the Replica, so that login with BoKS Desktops to the Replica can be delayed.

23. Import the root account for the host into the database, using User Administration > Import User Data. Fox Technologies recommends you use the local hostname as prefix for system accounts and particularly the root account. That is, create the root account as hostname:root, where hostname is the hostname of the host. See About Importing Unix System Accounts and Windows Administrators in the chapter “User Administration” in the Administration Guide. This is necessary in order to do administration while BoKS Protection is activated.

24. If this Replica is to keep a copy of the audit log, then add its hostname in the $BOKS_data/db.conf file on the Master, if you have not already done so as part of the installation procedure for the Master. See Installing the Master on page 51 or Configuring Backup Logs on a Replica in the chapter “System Configuration” in the Administration Guide.

25. Test communications with the Master and trouble shoot. Check that all processes on the Replica are working.

• Look at the log files.

• For a list of demons, see Daemons and Their Operations in the appendix “System Architecture” in the Administration Guide.

• For use of the command line program bdebug, see the man page for bdebug, and the appendix “Command Line Interface” in the Administration Guide.

• See also the appendix “Troubleshooting” in the Administration Guide

BoKS Manager 6.6.2 Installation Guide Page 79

Page 80: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

26. Optional: In the BoKS administration GUI on the Master, activate BoKS Protection of the Replica using the menu Security Configuration and Backup > Activate or Deactivate BoKS Protection. Alternatively, use the command line program sysreplace. From this point on, access to the Replica host from any other host requires an Access Route.

Installing BoKS Manager Patches

Topics include:

• Installing a BoKS Manager Patch

• Backing Out a BoKS Manager Patch

See also:

• “Installing OS Patches” on page 83

• “Uninstalling BoKS Manager” on page 84

• “Rolling Upgrade to BoKS Manager 6.6.2” on page 92

• “Installing the Master” on page 51

• “Install Directories” on page 38

• “Installing Hotfixes, Patches and Upgrades” on page 125

Installing a BoKS Manager Patch

BoKS Manager versions 6.5.2 and later include performance enhancements that require increased shared memory compared with previous BoKS Manager versions. The minimum recommended shared memory for Master and Replicas where using performance enhancements has risen from 16 MB to 24 MB. If you want to activate performance enhancements, you must increase the shared memory by 40% on the machine before applying the BoKS Manager 6.6.2 patch.

In addition to increasing the shared memory setting on the machine, you must also increase the amount of shared memory BoKS uses by increasing the value of the SHM_SIZE variable in the $BOKS_etc/ENV file to a minimum of 24000 on the Master and all Replicas. For details of how to do this, see “Setting Shared Memory” in the BoKS Manager Adminstration Guide.

If the patch installation detects that shared memory on the machine is insufficient, the performance enhancements are not activated on the host and a warning is written to the terminal during the installation of the patch.

This procedure applies to patches for both BoKS Manager and BoKS Server Agent for Unix/Linux version 5.6.0 and later. The procedure for earlier versions was essentially the same.

Page 80 BoKS Manager 6.6.2 Installation Guide

Page 81: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• For a patch to BoKS Server Agent for Unix/Linux, you can use the remote patch installation script boks_upgrade instead of the procedure below. See “Installing Hotfixes, Patches and Upgrades” on page 125.

• To upgrade, see “Upgrading BoKS Manager” on page 87.

CAUTION: When patching, all hotfixes are removed. You should be aware that a released patch might not include a removed hotfix, and, in that case, should contact Fox Technologies.For information on which hotfixes are included in the patch, see the BoKS Manager README.

To install a BoKS Manager or Server Agent for Unix/Linux patch:

1. Log in to the machine and become superuser.

2. If the host is the Master, make a backup of the security database.

3. Move to the directory that contains the patch distribution for the appropriate platform. See Unpacking the Package Contents on page 36. For example:

hostname# cd /downloads/patches/boksm_patch

4. If the directory /tmp has less than 250 MB of space for use during install, or for HP-UX itanium, less than 500 MB, then set the UNIX environment variable PATCH_TMP to a directory that has 250 MB, or for HP-UX itanium 500 MB free, for example, /var/tmp/tempbokspatch, as follows:

# PATCH_TMP=/var/tmp/tempbokspatch

# export PATCH_TMP

5. To install the BoKS Manager patch, run the installpatch program:

hostname# ./installpatch

6. Follow the online instructions in the patch installation program to complete the installation.

7. To verify that the patch has installed correctly, you can check the $BOKS_etc/ENV file (by default /etc/opt/boksm), which contains version information, or run the following command:

hostname# /opt/boksm/sbin/boksadm -S boksversion

(assuming the default installation directory /opt/boksm)

Note: The installpatch program will restart the BoKS processes after the patch installation is successful, if the processes were running when installpatch was run. Otherwise, you will need to start the processes manually.

See also:

• Backing Out a BoKS Manager Patch on page 82

BoKS Manager 6.6.2 Installation Guide Page 81

Page 82: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• Installing OS Patches on page 83

• Install Directories on page 38

Backing Out a BoKS Manager Patch

To uninstall a BoKS Manager or BoKS Server Agent for Unix/Linux patch, you can run the backoutpatch program, which is included in the original distribution directory.

• For a patch to BoKS Server Agent for Unix/Linux, you can use the remote patch installation script boks_upgrade instead of the procedure below. See “Installing Hotfixes, Patches and Upgrades” on page 125.

What version results from running backoutpatch?

Note that running backoutpatch returns you to the patch level that you previously installed manually, or if none, to the patch level included in the last full distribution that you installed. If you installed interim patches between the full distribution and the latest patch, these will be removed one at a time each time you run backoutpatch until the level of the full distribution is reached, at which time backoutpatch returns you to the baseline patch level for that port (which may be 0, but is sometimes higher).

For example:

• If you installed a distribution that included patch level 3, then installed patch 6, running backoutpatch once will return you to patch level 3.

• If you installed a distribution that included patch level 3, then installed patch 5, then installed patch 6, running backoutpatch will return you to patch level 5 the first time, then to patch level 3 if run again, then to level 0 (or whatever level is the baseline level for that platform port) if run a third time.

• If you installed a platform port based on patch level 3, running backoutpatch successively will return you to patch level 3 and no further, since that is the baseline for that port.

To back out a BoKS Manager or Server Agent for Unix/Linux patch:

1. Log in to the machine and become superuser.

2. If the host is the Master, make a backup of the security database.

3. Move to the BoKS installation directory (/opt/boksm/ by default). For example:

hostname# cd /opt/boksm/

4. Uninstall the latest patch by running the backoutpatch program:

hostname# Patches/backoutpatch

See also:

• Installing a BoKS Manager Patch on page 80

• Uninstalling BoKS Manager on page 84

Page 82 BoKS Manager 6.6.2 Installation Guide

Page 83: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• Install Directories on page 38

Installing OS Patches

Before installing a new OS patch, you must deactivate BoKS Protection. This is to ensure that the patch does not overwrite any BoKS binaries such as the login program which is replaced when you activate BoKS Protection.

After you have installed a new patch to the operating system, you need to activate BoKS Protection again.

CAUTION: If the OS patch changes the OS version to a version that is not supported by the installed BoKS package, you will need to upgrade BoKS Manager when you install the OS patch. See “Installing OS Upgrades” on page 83.

To install an Operating System patch:

1. Deactivate BoKS Protection on the BoKS Master, Replica or Server Agent for Unix/Linux on which the patch is to be applied.

2. Install the operating system patch according to vendor instructions.

3. Activate BoKS Protection.

See also:

• The chapter “Upgrading BoKS Manager”

• NIS/NIS+ Integration with BoKS Manager in the chapter “System Configuration” in the Administration Guide.

• “Installing BoKS Manager,” on page 33

Installing OS Upgrades

If a new OS version is released, you may or may not need to upgrade BoKS Manager to a new version, depending on the scope of changes within the OS upgrade. A handy way to check this is to determine if there is a specific BoKS Manager package available for the new OS version you are upgrading to available for download on the Fox Technologies customer service website.

If in doubt, please check with Fox Technologies customer service before installing an OS upgrade on a BoKS-protected machine.

See also:

• The chapter “Upgrading BoKS Manager”

BoKS Manager 6.6.2 Installation Guide Page 83

Page 84: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• NIS/NIS+ Integration with BoKS Manager in the chapter “System Configuration” in the Administration Guide.

• “Installing BoKS Manager,” on page 33

• “Installing OS Patches” on page 83

Uninstalling BoKS Manager

This procedure applies to the Master, Replicas and BoKS Server Agents for Unix/Linux. The uninstall procedure is the same for all, with the exception that it is only on the Master that you must make a backup of the security database.

Remove BoKS Application Agents, BoKS Desktops and BoKS Server Agent for Unix/Linux hosts first, then Replicas, and finally the Master.

Note: Make sure you have no BoKS Application Agents or BoKS Desktops installed on your domain that are configured to authenticate to the BoKS Manager that you are uninstalling. BoKS Application Agents and BoKS Desktops will cease to function correctly if they do not have access to a working Master or Replica.

See also:

• The man page uninstall

• “About Deleting, Changing Host Type or Domain and Uninstalling Server Agents” on page 111

Notes

• When you run the uninstall program on the Master, a backup of the security database is created automatically and stored in /var/tmp/boksm.sav. It is recommended that you immediately move this backup to a safe place.To manually create a backup, use the menu Security Administration and Backup > Backup and Restore. See the chapter “Backup and Restore” in the Administration Guide.

• The uninstall program deletes all BoKS-specific programs, such as the xdm and dtlogin program. Reboot the system or kill the active xdm/dtlogin processes, then start the original xdm/dtlogin program.

• Note that on some platforms (for example, HP-UX), files that are running cannot be removed. This means that some files may still remain in the system after execution of the uninstall program.

• For a way (using Access Routes) to ensure no access to BoKS-protected hosts in the domain via the uninstalled host during uninstallation, see the man page uninstall.

• If you uninstall BoKS from a host while there are suexec sessions with keystroke logging still running, the keystroke log files are not finalized and sent to the Master.

Page 84 BoKS Manager 6.6.2 Installation Guide

Page 85: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

• For platforms that feature native RBAC support, you can use the uninstall -r option to keep the BoKS RBAC configuration when you uninstall BoKS. In this case, the Roleset definitions and mappings defined on the host by BoKS are kept. If you run uninstall without the -r option, any backed up original RBAC configuration existing on the host is restored when you uninstall BoKS.See also “About Installing Role-Based Access Controls” on page 43.

To remove BoKS Manager or BoKS Server Agent for Unix/Linux:

Note: Exit the BoKS Manager prompt before removing BoKS Manager software.

1. If this is a BoKS Server Agent for Unix/Linux and if the special upgrade OpenSSH daemon used by the boks_upgrade script is still installed (see the directory /var/boks_upgrade on the Server Agent), remove it by running boks_upgrade from the Master, as follows:

BoKS # boks_upgrade cleanall -h <host>

where <host> is the host to be uninstalled.Alternatively, log in to the Server Agent, find the upgrade OpenSSH daemon and kill it, then remove the /var/boks_upgrade directory on the Server Agent. The special upgrade SSH daemon and the directory /var/boks_upgrade on a Server Agent are not removed automatically by the BoKS uninstall routine.

2. Login to the host and become superuser:

$ su

3. Run the uninstall program:

# /opt/boksm/sbin/uninstall

The following is displayed:

Do you wish to go ahead (y/n)

4. Type y and press ENTER to start the uninstall program.If this is the Master, a backup of the security database is created:

Database saved to /var/tmp/boksm.sav

5. When the uninstall process is finished the following is displayed:

Done

6. Delete the host from the BoKS database using the menu Host Administration > Delete Host Definition or change the host type to Other Host in the Modify Host Definition menu. If you do not delete the host, error messages will be written to the log every time the Master tries to establish communication (for a Replica, every ten minutes).

7. On non-PAM platforms, close any existing dtlogin sessions and restart the native dtlogin.

BoKS Manager 6.6.2 Installation Guide Page 85

Page 86: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

2 Installing BoKS Manager

8. If you use SSH and the operating system includes sshd, re-enable and start the original sshd to restore the system to its original configuration.

Page 86 BoKS Manager 6.6.2 Installation Guide

Page 87: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS ManagerThis chapter describes how to upgrade the BoKS Manager Master and Replicas from version 5.6, 6.0 and 6.5 to 6.6.2. The BoKS domain may include BoKS Server Agents for Unix/Linux, BoKS Application Agents and BoKS Desktops of varying previous versions. Some or all of these components may be affected by the upgrade.

Upgrading BoKS Manager includes the topics:

• Upgrade Background

– Key Features and Issues of Upgrading

– Mixed BoKS Environments

– Prerequisites for Upgrading

– Overview of Upgrading a BoKS Domain

• Rolling Upgrade to BoKS Manager 6.6.2

– Upgrading the Master and Replicas

– Configuring Encryption with Pre-6.6.1 Hosts

• Upgrading BoKS Server Agents for Unix/Linux

– Server Agent Upgrade Basics

– Upgrading a Server Agent for Unix/Linux

• Upgrading With BoKS Application Agents

See also:

• “Installing BoKS Manager Patches” on page 80

• “Installing Hotfixes, Patches and Upgrades” on page 125

• The chapter “Deploying BoKS Desktop”

• The chapter “Deploying BoKS Application Agents”

Upgrade Background

Topics include:

• Key Features and Issues of Upgrading

• Mixed BoKS Environments

• Prerequisites for Upgrading

• Overview of Upgrading a BoKS Domain

BoKS Manager 6.6.2 Installation Guide Page 87

Page 88: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

See also:

• “Installing BoKS Manager Patches” on page 80

• “Installing Hotfixes, Patches and Upgrades” on page 125

• The chapter “Planning Installation”

• The chapter “System Configuration” in the Administration Guide

Key Features and Issues of Upgrading

Key features and issues of BoKS Manager 6.6.2 that you need to be aware of while upgrading are:

• Multiple password hash algorithms for Unix type user accountsBoKS Manager 6.6.1 and later includes support for stronger password hashing algorithms for Unix type user accounts. In previous versions, only the Unix crypt (DES) algorithm was supported. As BoKS Manager 6.6.1 and later supports multiple hash algorithms for use on different Unix and Linux operating systems, passwords for Unix user accounts are stored in the BoKS database in the union of multiple password hashes.

When you restore a pre-6.6.1 database on a 6.6.1 or later Master, Unix user account passwords are handled as follows:

– If the account has a valid Unix crypt hash, the new password hash fields in the BoKS database are set to “*nohash*” and new password hashes for the user are generated the first time they perform a successful login

– If the account password is empty, the new password hash fields in the BoKS database are set to empty strings

– If the account password is an invalid crypt hash string, the crypt hash field and all the new password hash fields in the BoKS database are set to "*no login*" The account is locked for password login (as it was before the upgrade).

– If the account passowrd is set to “*no login*”, the new password hash fields in the BoKS database are set to “*nohash*” and new password hashes for the user are generated the first time they perform a successful login.

For more details, see “Unix/Linux Password Encryption” on page 228 in the Administration Guide and “About Importing Users from an /etc/passwd or NIS Map File” on page 258 in the Administration Guide.

• Nodekey size issues with AES-256 when upgrading from BoKS 6.5.x and earlierBoKS Manager version 6.6.1 adds support for the AES encryption algorithm for BoKS host to host communication (BoKS bridge encryption). AES encryption with key sizes 128 and 256 bits are supported. AES-256 is the default encryption algorithm in BoKS Manager 6.6.2.

Page 88 BoKS Manager 6.6.2 Installation Guide

Page 89: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

In BoKS 6.5.x and earlier, the nodekey size is 128 bits (an MD4 hash of the input "pass-phrase" to the hostkey command). 128 bits is sufficient for all BoKS bridge encryption algorithms supported by BoKS 6.5.x. With the addition of the AES-256 algorithm in BoKS Manager 6.6.1, a 256-bit key is needed, thus in BoKS Manager 6.6.2 the nodekey size is increased to 256 bits. The first 128 bits of a BoKS Manager 6.6.2 nodekey is identical to a nodekey generated with the BoKS 6.5.x hostkey command using the same input pass-phrase. This allows for some backward compatibility. When using encryption algorithms that only need a 128 bit key it is possible to encrypt a message with a nodekey generated by BoKS Manager 6.6.2 hostkey command and then decrypt the message with a nodekey generated with the BoKS 6.5.x hostkey command provided that the same “pass-phrase” was used to the hostkey command.

This is not true when AES-256 is used. If BoKS communication is configured to use AES-256 but only a 128 bit nodekey is available for the host, BoKS expands the nodekey to 256 bits by mirroring the low order bits to the missing high order bits. The sending side using an "expanded" nodekey will mark this in the messages sent so that the receiving side will also use an "expanded" nodekey when decrypting the message even if the receiving side has a 256 bit nodekey.

On the other hand, if the sending side is using a full length 256-bit nodekey but the receiving side only has a "BoKS 6.5.x" 128-bit nodekey, the receiver will fail in decrypting the message.

To take full advantage of the AES-256 encryption strength the nodekey should be (re)set for BoKS Manager 6.6.2 hosts when upgrading. For further details about Server Agent upgrades, see also “Node Keys and Encryption” on page 101.

• Password policy settings only partially restored when upgradingBoKS Manager 6.5.2 and later includes a new password policy engine for UNIX passwords. Due to changes in the way password policies are handled in version 6.5.2 and later, some of the settings contained in pre-6.5.2 databases are not restored when you upgrade to version 6.5.2 and later and restore the database.

The following summarizes what settings are and are not restored:

– The Demands on new passwords setting configured in the BoKS Administration GUI using Security Configuration and Backup > Low, Medium or High Security Level are not restored. This means if, for example, the database has a Medium setting for Demands on new passwords, it will be set to None when the database is restored in BoKS Manager 6.5.2 and later.

– Password rules based on regular expressions in the pre-6.5.2 database are not restored in BoKS Manager 6.5.2 and later, which has a new method for specifying regular expression password rules.

– Banned words that may not be used in passwords in the pre-6.5.2 database are restored in BoKS Manager 6.5.2 and later.

For details on setting UNIX password policies in BoKS Manager 6.5.2 and later, see the chapter “Managing BoKS Password Policies” in the Administration Guide.

• The $BOKS_etc/brpf file is not automatically updated after upgrading

BoKS Manager 6.6.2 Installation Guide Page 89

Page 90: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

The $BOKS_etc/brpf file contains an encrypted version of the root password, enabling system administrators to log in as root from tty console in the event of a host with BoKS protection activated being unable to contact BoKS to authenticate users. The brpf file is not automatically updated when you reinstall BoKS Manager on a host, for example during an upgrade, and must be manually updated in order to ensure that emergency root access from tty console will work.

The following command, run in a BoKS shell, can be used to update the $BOKS_etc/brpf file on all BoKS hosts in the domain, ensuring local login for root in case of a problem will work:

BOKS # boksdiag updpasswdentry ‘lsbks '*:root'’

• BoKS Application Agent Method NamesBoKS Application Agent Method names as defined in the $BOKS_etc/method.conf file are restored on the Master, but are not automatically propagated to Replicas. Solve this by re-registering the existing BoKS Application Agent Method Names using the BoKS Administration GUI. See Re-registering BoKS Application Agent Method Names on page 104.

• Shared Memory for Replicas When you restore the database when upgrading the Master, the new $BOKS_etc/ENV file will have the shared memory value you had in the previous installation. However, the shared memory value is not restored on Replicas. If you have been using a different value, you must reset the SHM_SIZE to the value it has on the Master, before you do setup on the Replica.

• Keystroke log filesKeystroke log files on the BoKS Master are not automatically backed up by boks_bru, but are stored by default in a BoKS directory, so these must be manually backed up and restored after the upgrade. For details of files and locations, see “Managing Keystroke Logging” in the Administration Guide.In addition, if you are using encryption to protect keystroke log files, certain other files must be manually backed up and restored post-upgrade. For details, see “Keystroke Log File Protection Backup” on page 669 in the Administration Guide.

• Server Agent for Unix/Linux UpgradeServer Agents are now upgraded with a special script that automatically backs up files, upgrades, restores the earlier configurations and activates BoKS Protection (if it was activated at time of upgrade), making the whole process quick and easy. See “Upgrading BoKS Server Agents for Unix/Linux” on page 98. Another script allows you to safely, easily and securely push out upgrades to multiple Server Agents, for example, to a Host Group. See “Installing Hotfixes, Patches and Upgrades” on page 125

• BoKS Desktops and AgentsBoKS Manager is compatible with many earlier versions of BoKS Application Agents and BoKS Desktops. See “BoKS Application Agent Versions” on page 155 and “Desktop Versions” on page 133.

See also:

Page 90 BoKS Manager 6.6.2 Installation Guide

Page 91: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

• “Upgrade Background” on page 87

Mixed BoKS Environments

BoKS Manager 6.6.2 supports a mixed BoKS environment.

The only restriction is that the Master and all Replica(s) must be of the same version, since the database is different in the different versions.

Version 6.6.2 Master/Replicas can co-exist with version 5.6, 6.0 and 6.5 BoKS Server Agent for Unix/Linux hosts.

See also:

• Key Features and Issues of Upgrading on page 88

• Upgrade Background on page 87

Prerequisites for Upgrading

Existing Versions

You can upgrade to BoKS Manager 6.6.2 on a Master or Replica starting from one of these versions:

• BoKS Manager 6.0.x

• BoKS Manager 6.5.x

Compatibility with Other BoKS Components

BoKS Manager 6.6.2 is compatible with most earlier BoKS Application Agent and BoKS Desktop versions. See “BoKS Application Agent Versions” on page 155 and “Desktop Versions” on page 133.

BoKS Manager 6.6.2 is compatible with BoKS Server Agents for Unix/Linux 5.6, 6.0 and 6.5.

See also:

• “Mixed BoKS Environments” on page 91

• “Installing Hotfixes, Patches and Upgrades” on page 125.

Overview of Upgrading a BoKS Domain

A BoKS Manager domain consists of a Master, possibly one or several Replica(s), BoKS Server Agent for Unix/Linux host(s) (previously called Clients in earlier versions of the product), BoKS Application Agents on application servers and BoKS Desktops on Windows workstations. You may have one or several of these components.

Upgrading includes the basic steps:

• backing up the security database,

BoKS Manager 6.6.2 Installation Guide Page 91

Page 92: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

• removing old BoKS Manager software on the Master

• installing the new version on the Master

• restoring the previously saved database.

• removing and installing new software on all Replicas

• upgrading any BoKS Server Agents for Unix/Linux, BoKS Desktop and BoKS Application Agents that may be wanted or needed in later versions.

In addition, depending on your environment, you may need to reconfigure some settings and to configure BoKS Manager for new features and functionality that you intend to use in version 6.6.2.

For details, see “Rolling Upgrade to BoKS Manager 6.6.2” on page 92.

This basic rolling upgrade procedure allows you to maintain service during upgrade, with Replicas handling authentications while the Master is being upgraded.The only loss of service is that the audit log will be missing for the time that the Master is down. If you want the log to be continuous, you can convert a Replica to be Master during the period that the Master’s is down (see Converting Between Master, Replicas and Server Agents in the chapter “System Configuration” in the Administration Guide).

If you can accept downtime for authentications, you can modify the procedure to do an offline upgrade, which may be even simpler.

See also:

• “Upgrading With BoKS Application Agents” on page 104

• “Upgrading BoKS Server Agents for Unix/Linux” on page 98

• “Installing Hotfixes, Patches and Upgrades” on page 125.

Rolling Upgrade to BoKS Manager 6.6.2

The following sections give detailed instructions on performing an upgrade from BoKS Manager 6.0/6.5 Masters and Replicas to BoKS Manager 6.6.2 while maintaining continuous ability to handle authentications and almost continuous logging.

Topics include:

• Upgrading the Master and Replicas

See also:

• “Installing BoKS Manager Patches” on page 80

• “Upgrading BoKS Server Agents for Unix/Linux” on page 98

• “Upgrading With BoKS Application Agents” on page 104

• The chapter “Installing BoKS Manager”

• “Installing Hotfixes, Patches and Upgrades” on page 125.

Page 92 BoKS Manager 6.6.2 Installation Guide

Page 93: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

Upgrading the Master and Replicas

Note: The rolling upgrade procedure below allows you to continue to handle authentications, but there may be a loss of password changes and log updates during the time the Master is being upgraded. If necessary to minimize password and log losses, you can convert a Replica to be Master during the period that the original Master is down (see Converting Between Master, Replicas and Server Agents in the chapter “System Configuration” in the Administration Guide).

Note: The rolling upgrade procedure assumes that the existing BoKS domain is running BoKS 6.0 or 6.5 and using default bridge encryption RC5-128. After Master/Replica upgrade the Master <-> Replica communication will use AES-256 encryption and Server Agent <-> Master/Replica communication will still use RC5-128.

Before upgrading, read “Upgrade Background” on page 87, including “Prerequisites for Upgrading” on page 91.

To upgrade the BoKS Manager Master and Replicas to version 6.6.2:

1. Upgrade the Master as follows:

• Log in to the Master and become root.

• If you are using BoKS Application Agents, uninstall the server modules for all Agents from the Master.

• If you have been using BoKS SSH, backup SSH keys in the $BOKS_etc/ssh directory to a safe location.

• Start a new log file and back up the database (for use if the upgrade fails) by typing from a BoKS shell:

BoKS # logadm -nBoKS # boks_bru -p -l -d filename

The -p switch saves the database in shar format.The -l switch signifies that the log files should be backed up (leave this switch out of the command if you do not want to back up the log files).The -d signifies the device/file to back up to. See the man page on the boks_bru command for more information.

Note: This command can be run while the Master BoKS processes are running. The boks_bru script will stop and restart BoKS as needed.

Alternatively, you can use the BoKS Administration GUI feature Security Configuration and Backup > Backup and Restore.

• In the GUI, change the Host Type of all Replicas from Replica to BoKS Host. For details, see Modifying a Host Definition in the chapter Host Administration in the Administration Guide.

BoKS Manager 6.6.2 Installation Guide Page 93

Page 94: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

• Set the default bridge encryption algorithm to RC5-128 in the $BOKS_etc/ENV file. This will ensure that RC5 bridge encryption is still used when the database backup taken in the next step is restored on the new BoKS 6.6.2 installation.

BoKS # cadm -E BRIDGE_CRYPT=CRYPT_RC5_128 \-h <master-hostname>

• Start a new log file and back up the database again for using to restore after the upgrade. Use a different file name than in the first backup. For details, see the backup above.

• Optional (may be skipped if the upgrade uninstall is followed directly by re-install of the new version BoKS Manager). Close all dtlogin sessions and stop the dtlogin daemon, according to platform-specific instructions given in “About Closing dtlogin Sessions” on page 41.

• Uninstall BoKS on the Master, by typing:

BoKS # uninstall

Note: At this point, you will no longer be able to perform BoKS Manager administration. Any further log information (on authentications) will be lost (unless you choose to convert a Replica to a Master). If users change their passwords, they will still have to use their old passwords and change passwords again when the Master is brought back on line.

• Logout of the BoKS shell by running exit until the BoKS prompt disappears:

BoKS # exit

• Install BoKS Manager 6.6.2 on the Master as described in “Installing the Master” on page 51.

• Restore the security database on the Master using the backup taken just before uninstall, by typing:

BoKS # boks_bru -u -d path to file or device

• If needed, adjust any IP addresses in the $BOKS_etc/bcastaddr file or encryption settings in the $BOKS_etc/bremotever file (note that in earlier versions, default encryption was set to RC5-128 using the $BOKS_etc/ENV variable BRIDGE_CRYPT). Reboot BoKS if any files were changed.

• Manually restore SSH keys and re-configure any SSH settings that you use (enabling SSH was included in the procedure “Installing the Master” on page 51). If you restore the original SSH key as described above the keys are already in the database and there is no need to run ssh_keyreg.

• Reset the node keys stored in the BoKS database for the BoKS Master and all Replicas using the same passphrase as was used when the respective existing node key was set.For Master and Replicas use the following command:

BoKS # hostkey -s -h <hostname>

Page 94 BoKS Manager 6.6.2 Installation Guide

Page 95: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

alternatively, set the node key via the BoKS GUI. This will ensure that a 256-bit node key is available for Replica communication when the Replicas are assigned 256-bit node keys when they are upgraded to BoKS Manager 6.6.1 later, see “Nodekey size issues with AES-256 when upgrading from BoKS 6.5.x and earlier” on page 88.

Note: For BoKS Server Agent for Windows 6.6, RC5-128 encryption is default and strongest setting available.

• Activate BoKS protection on the Master, either using the menu Security Configuration and Backup > Activate or Deactivate BoKS Protection in the BoKS Administration GUI, or typing the following at the command line:

BoKS # sysreplace replace

• Exit the BoKS shell by typing:

BoKS # exit

• For any Server Agent for Unix/Linux or Agent host that uses a time zone different from the Master or the host’s configured Replica, add a line to the $BOKS_etc/timezones file on the Master defining the time zone for the host, as described in Setting Time Zones in the chapter “System Configuration” in the Administration Guide:

<hostname> <timezone>

• Reinstall server modules for any BoKS Application Agents on the Master.

2. Upgrade Replicas, carrying out the following steps for each Replica:

• Log in to the Replica and become root.

• If you have been using BoKS SSH, backup SSH keys in the $BOKS_etc/ssh directory to a safe location.

• Close all dtlogin sessions and stop the dtlogin daemon, according to platform-specific instructions given in “About Closing dtlogin Sessions” on page 41.

• Uninstall BoKS on the Replica, by typing:

BoKS # uninstall

• Logout of the BoKS shell by running exit until the BoKS prompt disappears:

BoKS # exit

• Install the new BoKS Manager 6.6.2 version software, including setting shared memory with the variable SHM_SIZE, adjusting any necessary IP addresses in $BOKS_etc/bcastaddr and creating a Host Virtual Card, all as described in “Installing a Replica” on page 74.

• Set the default bridge encryption algorithm to RC5-128 by adding the variable BRIDGE_CRYPT=CRYPT_RC5_128 to the $BOKS_etc/ENV file. Then, override the default encryption for communication with the BoKS Master by setting:

BoKS Manager 6.6.2 Installation Guide Page 95

Page 96: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

CRYPT_AES_256<master-ip-address>

in the bremotever file. If this is the Replica designated as backup for the Master, also add the IP addresses of the other Replicas to the CRYPT_AES_256 section of the bremotever file.

• Manually restore SSH keys and re-configure any SSH settings that you use (enabling SSH was included in the procedure “Installing a Replica” on page 74). To publish the old SSH public host key for the Replica in the BoKS database, use the following command:

BoKS # ssh_keyreg -w -f <host key file>

For example:

BoKS # ssh_keyreg -w -f $BOKS_etc/ssh/ssh_host_rsa_key.pub

• In the administration GUI or the CLI on the BoKS Master, change the Host Type of the Replica from BoKS Host to Replica, if you did not do so during the procedure “Installing a Replica” on page 74.

• Create a bremotever file on the BoKS Master if none exists already and add the Replica’s IP address to the CRYPT_AES_256 section in the bremotever file.

• Activate BoKS protection on the Replica, either using the menu Security Configuration and Backup > Activate or Deactivate BoKS Protection in the BoKS Administration GUI, or typing the following at the command line on the Replica:

BoKS # sysreplace replace

• Reinstall server modules for any BoKS Application Agents on the Replica.

• When all Replicas have been upgraded, verify that they are in contact with the Master by running the following command on the BoKS Master:

BoKS# boksdiag list-servers

3. For the new remote administration, create new virtual cards for administrators or distribute and assign any smart cards and RSA SecurID tokens that may be needed.Upgrading is now complete except for and Agent configuration.

4. Configure BoKS Manager 6.6.2 for operation with BoKS Application Agents as follows:

• On the Master, re-register any Agent Method Names that you use, see “Re-registering BoKS Application Agent Method Names” on page 104.

Configuring Encryption with Pre-6.6.1 Hosts

BoKS Manager Master, Replicas and Server Agents for Unix/Linux of pre-6.6.1 versions, BoKS Server Agent for Windows 6.6 and earlier, and BoKS Application Agents use weaker encryption strength for internal BoKS communication than the AES 256-bit encryption that is the default in BoKS Manager 6.6.1 and later.

Page 96 BoKS Manager 6.6.2 Installation Guide

Page 97: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

This means that BoKS Manager 6.6.2 hosts must be configured to recognize hosts running older versions and Agents so that they can use RC5 encryption when communicating with them. Similarly, a Server Agent for Unix/Linux 6.x that works with a pre-6.6.1 Master or Replica must be configured to use the weaker encryption with the older Master/Replicas.

This can be done in either of two ways, using:

• the BRIDGE_CRYPT variable in the $BOKS_etc/ENV file. This sets the default encryption a host uses in all bridge communication.

• the $BOKS_etc/bremotever file. This is a file in which you can list pre-6.6.1 BoKS version or Agent Hosts (inlcuding BoKS Server Agent for Windows 6.6) that use weaker encryption in communication. Settings in this file take precedence over the BRIDGE_CRYPT variable.

To configure encryption level using bremotever:

1. On the version 6.x host, open the $BOKS_etc/bremotever file in an editor. For example:

BoKS # vi $BoKS_etc/bremotever

If the file does not exist, you can create it.

2. The file should look like this:

CRYPT_RC5IP Address of ServerAgent1IP Address of ServerAgent2CRYPT_RC5_128IP Address of ServerAgent3

The CRYPT_RC5 keyword specifies that the host should use 64-bit RC5 encryption when communicating with the machines whose IP addresses appear under the keyword in the file. The CRYPT_RC5_128 keyword specifies 128-bit RC5 encryption.

Note: If you have many pre-6.6.1 Server Agents, including BoKS Server Agent for Windows 6.6, and a 6.6.1 or later Master and a few Replicas, you may choose instead to set default encryption strength for the domain to RC5 using the BRIDGE_CRYPT variable and list the Master and Replica IP address in the bremotever file under the keyword CRYPT_AES_256.

3. When the IP addresses of all BoKS Server Agent hosts have been added, save the $BOKS_etc/bremotever file.The file should be the same on all hosts in the domain running BoKS Manager 6.6.2 and BoKS Server Agent for Unix/Linux 6.6.2.

For information on the different variables supported in the bremotever file, and which BoKS versions support these, see “Setting Encryption Levels for BoKS Host Communication” on page 179 in the Administration Guide.

BoKS Manager 6.6.2 Installation Guide Page 97

Page 98: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

To set default encryption level for a host using BRIDGE_CRYPT:

1. Log in to the version 6.x host and become superuser.

2. Open the $BOKS_etc/ENV file in an editor, for example:

# vi /etc/boksm/ENV

3. Add the following line to the ENV file:

BRIDGE_CRYPT=keyword

where keyword is CRYPT_RC5 for 64-bit encryption or CRYPT_RC5_128 for 128-bit RC5 encryption. See also the man page for bremotever. Note that with use of the BRIDGE_CRYPT default encryption setting, you must take the lowest common encryption strength, so if there are any hosts using 64-bit RC5 encryption, you must use CRYPT_RC5.Note that you can also define the variable remotely on hosts using the cadm program.

Upgrading BoKS Server Agents for Unix/Linux

This section applies to upgrading Server Agents from 6.0 and 6.5 to 6.6.2.

Upgrading BoKS Server Agents for Unix/Linux includes:

• Server Agent Upgrade Basics

• Upgrading a Server Agent for Unix/Linux

If you have BoKS Server Agents for Unix/Linux in your BoKS environment, you can choose whether to upgrade these to level 6.6.2. BoKS Server Agent for Unix/Linux was previously known simply as a Server Agent installation of BoKS Manager.

It is possible to run older versions of BoKS Server Agent for Unix/Linux in your environment after you have upgraded the Master and Replicas. However, Fox Technologies recommends upgrading Server Agents successively as platform coverage increases to take advantage of functionality improvements and issue fixes.

For details of currently supported Server Agent platforms, visit the Fox Technologies web site at http://www.foxt.com.

Server Agent Upgrade Basics

About Server Agent Packaging

For the majority of platforms, Fox Technologies distributes a Master/Replica/Server Agent (MRA) package that includes the BoKS Server Agent for Unix/Linux software. However for certain platforms, a BoKS Server Agent for Unix/Linux is distributed separately.

The form and content of the distribution package will therefore depend on the platform you are installing BoKS Server Agent for Unix/Linux on.

Page 98 BoKS Manager 6.6.2 Installation Guide

Page 99: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

Upgrade Programs

There are two primary programs for upgrading Server Agents:

• upgrade_client upgrades a single Server Agent, backing up and restoring settings. For details, see below and “Upgrading a Server Agent for Unix/Linux” on page 103. When you can, run this program indirectly by running boks_upgrade, since boks_upgrade has certain features that make it easier, safer and more secure than running upgrade_client directly.

• boks_upgrade upgrades multiple Server Agents remotely and automatically, by calling upgrade_client once for each host. For background on upgrade_client, see below. For using the program, see “Installing Hotfixes, Patches and Upgrades” on page 125.

The upgrade_client Program

Upgrading a BoKS Server Agent for Unix/Linux involves running the upgrade_client program from the BoKS Manager or BoKS Server Agent for Unix/Linux distribution package. The program upgrade_client is located in the root directory of the distribution, at the same level as the install program. The complete distribution should be either saved on the Server Agent or at a location accessible from the Server Agent.

Operations Performed

The upgrade_client program performs the following operations in order:

• Saves important system files and configuration information in a backup directory

• Uninstalls the existing BoKS Server Agent for Unix/Linux

• Installs the current latest version of BoKS Server Agent for Unix/Linux

• Sets up the installation as a Server Agent

• Restores the saved system files and configuration information

• If BoKS Protection was active on the host before you began the upgrade, it is automatically activated again by the upgrade program. If it was not active, you must manually activate BoKS Protection on the host after upgrading.

Upgrade Logging

The upgrade_client program logs its progress to the /tmp/boks_upgrade_client.“pid”/boks_upgrade_client.log file. Here you can see in detail the outcome of the various steps of the upgrade procedure. The return code of the program is included in this file and helps you determine whether or not the upgrade has completed successfully. See Return Codes below.

BoKS Manager 6.6.2 Installation Guide Page 99

Page 100: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

Backed Up Files

The following files and directories are backed up from the old installation and restored when you perform the Server Agent upgrade:

File or Directory

$BOKS_etc/bcastaddr

$BOKS_etc/bokscron.conf

$BOKS_etc/bokspam.conf

$BOKS_etc/bremotever

$BOKS_etc/brpf

$BOKS_etc/ENV

$BOKS_etc/filmon.conf

$BOKS_etc/keys/host.kpg

$BOKS_etc/profiles

$BOKS_etc/safeword.cfg

$BOKS_etc/ssh/ssh_config

$BOKS_etc/ssh/ssh_host_dsa_key

$BOKS_etc/ssh/ssh_host_dsa_key.pub

$BOKS_etc/ssh/ssh_host_key

$BOKS_etc/ssh/ssh_host_key.pub

$BOKS_etc/ssh/ssh_host_rsa_key

$BOKS_etc/ssh/ssh_host_rsa_key.pub

$BOKS_etc/ssh/sshd_config..active

$BOKS_etc/ssh/sshd_config..inactive

$BOKS_etc/ssm_hook_config

$BOKS_etc/ssm_hostadd

$BOKS_etc/ssm_hostdel

$BOKS_etc/ssm_hostmod

$BOKS_etc/ssm_useradd

$BOKS_etc/ssm_userdel

$BOKS_etc/ssm_usermod

$BOKS_etc/X11/Xdefaults

$BOKS_var/ssoconfig

BoKS Integrity Checking parameters in the crontab file are also backed up

Page 100 BoKS Manager 6.6.2 Installation Guide

Page 101: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

Files That Are Not Backed Up

The upgrade_client program does not back up and restore the following files. If you have made modifications to these files, make sure that you save a copy of them in another location before you run upgrade_client so that you can restore them after the Server Agent has been upgraded:

• The PAM configuration files:$BOKS_etc/pam.conf..ssm for Solaris platforms

$BOKS_etc/pam.d/* for Linux platforms.

• $BOKS_etc/errlog.msgs and errlog.ignore

If these files contain any customized additions that you want to retain, then save the additions and edit them back into the files after upgrade.

Node Keys and Encryption

The upgrade_client program automatically uses the same node key for the Server Agent as it had before. This node key can be changed after the upgrade, if required. It is recommended to reset the nodekey after you upgrade to BoKS Manager 6.6.2. This is done in the Host Administration > Modify Host Definition menu of the BoKS Administration GUI and using the hostkey command line program on the BoKS Server Agent.

Although the default BoKS Manager 6.6.2 bridge encryption algorithm is AES-256, when upgrading a BoKS Server Agent with the upgrade_client program, the program adds BRIDGE_CRYPT=CRYPT_RC5_128 to the Server Agent $BOKS_etc/ENV file.

The Server Agent will continue to use RC5-128 when communicating with BoKS Servers. BoKS Servers should also be configured to use RC5_128 when communicating with the Server Agent until a new (256-bit) nodekey has been set both locally on the Server Agent and in the BoKS database.

It is also possible to specify an encryption algorithm for the upgraded Server Agent using command line option -c <cryptalg> to the upgrade_client program, where cryptalg can be one of the following strings:

• AES256

• AES128

• RC5128

Before you configure the Server Agent to use AES256 encryption, the following conditions should be met:

• The BoKS Master and Replicas must all be running BoKS Manager 6.6.1 or later

• The nodekey for the Server Agent must have been reset in the BoKS database after the Master was upgraded to BoKS Manager 6.6.1 or later

• The nodekey for the Server Agent locally on the host must have been reset during or after the upgrade procedure.

BoKS Manager 6.6.2 Installation Guide Page 101

Page 102: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

Remember that if AES256 is used, the nodekey must be reset both on the BoKS Server Agent and in the BoKS database on the Master.

See also “Key Features and Issues of Upgrading” on page 88.

Server AgentEnvironment Variables

The environment variables in the $BOKS_etc/ENV file of the old installation are saved by the program. It then restores any variables that differ from the default variables in the $BOKS_etc/ENV file of the new installation, excepting those specified by the ENVDONTSAVELIST variable.

Return Codes

The following table describes the different codes that the upgrade_client program can return, together with the appropriate action to take if they occur:

Code Description Action

0 - Client successfully upgraded

The upgrade has completed problem free.

None

1 - Failed: installation still intact

The upgrade failed, but the original installation is still usable.

Check where the upgrade failed in the /tmp/boks_upgrade_client.“pid”/boks_upgrade_client.log file.

2 - Failed: upgrade done but BoKS couldn’t be activated

The new software has been installed, but BoKS Protection has not been activated on the host.

Activate BoKS Protection on the Server Agent using the command line or from the BoKS Administration GUI.

3 - Failed: new Server Agent partially installed, BoKS unusable

The installation of the upgrade was interrupted, and a partial installation of BoKS Server Agent for Unix/Linux has been done.

1. Check where the upgrade failed in the /tmp/boks_upgrade_client.“pid”/boks_upgrade_client.log file.

2. Do an uninstall of BoKS.3. Do a manual install of the new

Server Agent using the install program. See “Installing BoKS Server Agent for Unix/Linux” on page 113.

4. Reconfigure the Server Agent.

4 - Failed: new Server Agent installed but ‘setup’ not done

The new software has been installed on the host, but it has not been setup as a Server Agent.

Manually run setup to specify the host as a BoKS Server Agent for Unix/Linux host.

5 - Failed: new Server Agent installed but won’t boot

The new software has been installed and the host has been set up as a Server Agent, but reboot of BoKS failed. Reboot is necessary to get the Server Agent to use the proper node key.

Manually reboot BoKS on the Server Agent.

Page 102 BoKS Manager 6.6.2 Installation Guide

Page 103: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

Upgrading a Server Agent for Unix/Linux

This section describes how to upgrade a single BoKS Server Agent for Unix/Linux host using the program upgrade_client. This procedure can be done either before or after you have upgraded the BoKS Manager Master and Replicas. Before you begin, read “Server Agent Upgrade Basics” on page 98.

Note: You can automate this procedure to upgrade multiple Server Agents, using the program boks_upgrade. For details, see “Installing Hotfixes, Patches and Upgrades” on page 125 and the man page boks_upgrade.

CAUTION: The Server Agent Upgrade program will unlock any locked X-sessions on the Server Agent you run it on. These user sessions are also removed from bwho and btmp file, so you cannot see that they are logged on. Have users log out before you run the Server Agent Upgrade, to avoid x-locked sessions becoming unlocked as a result of the upgrade.

To upgrade a BoKS Server Agent for Unix/Linux host:

1. Make sure the distribution package is saved in uncompressed form on the host, for example in the /downloads directory or on a networked device.

2. Log in to the host, become superuser.

3. Add the Master’s IP address in $BOKS_etc/bcastaddr, if it is not already there.

4. If you were in a BoKS shell, exit the BoKS shell before installing or upgrading.

5. Move to the directory where the uncompressed distribution package is stored.

6. Run the upgrade_client program, optionally specifying the encryption algorithms to use on the command line (for details, see “Node Keys and Encryption” on page 101):

# ./upgrade_client

6 - Failed: upgrade ok but wrong node key is used

The upgrade was completed but the node key was not successfully set for the Server Agent

Update the node key for the host to the correct value in the BoKS Administration GUI using Host Administration > Modify Host Definition.

7 - Failed: New Server Agent installed but failed to restore data

The new software has been installed but configuration data has not been restored.

Reconfigure the Server Agent.

8 - Failed: Error in usage The upgrade script cannot be run on the host.

Check where the upgrade failed in the /tmp/boks_upgrade_client.“pid”/boks_upgrade_client.log file.

Code Description Action

BoKS Manager 6.6.2 Installation Guide Page 103

Page 104: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

7. Check the upgrade log file, /tmp/boks_upgrade_client.“pid”/boks_upgrade_client.log.

8. If the upgrade has completed successfully, you will need to manually activate BoKS Protection on the Server Agent if you deactivated it before upgrading.

9. If the Server Agent was configured to use the AES-256 encryption algorithm, reset the nodekey on the Server Agent using the hostkey command:

BoKS# hostkey -f

and in the BoKS database on the Master using the command:

BoKS# hostkey -s -h <serveragent-hostname>

See also Configuring Encryption with Pre-6.6.1 Hosts on page 96.

10. On non-PAM platforms, restart dtlogin, if you use it. See “About Closing dtlogin Sessions” on page 41.

Server Agent upgrade is now complete.

See also:

• “Installing Hotfixes, Patches and Upgrades” on page 125

• “Server Agent Upgrade Basics” on page 98

• “Prerequisites for Upgrading” on page 91

• “Mixed BoKS Environments” on page 91

Upgrading With BoKS Application Agents

BoKS Manager 6.6.2 is compatible with most BoKS Application Agent versions. However there are some exceptions. For details, see “BoKS Application Agent Versions” on page 155 and the appropriate Agent documentation.

See also:

• The chapter “Deploying BoKS Application Agents”

Encryption Strength

You must configure the Master and Replicas to use RC5-128 encryption when communicating with Agents. This is included as part of the procedure Upgrading the Master and Replicas on page 93.

Re-registering BoKS Application Agent Method Names

Though the BoKS Application Agent method names you have defined are restored on the Master when you restore the database, they need to be propagated out to Replicas. To do this, re-register the method names after upgrading.

Page 104 BoKS Manager 6.6.2 Installation Guide

Page 105: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

To re-register BoKS Application Agent Method Names:

1. In the BoKS Administration GUI, select BoKS Agent Configuration > Setup BoKS Application Agent.

2. Click on the Agent method name in the BoKS Agents box.

3. Click Continue.

4. Click Execute.The BoKS Application Agent method name is re-registered in the database and propagated to Replicas.

BoKS Manager 6.6.2 Installation Guide Page 105

Page 106: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

3 Upgrading BoKS Manager

Page 106 BoKS Manager 6.6.2 Installation Guide

Page 107: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/LinuxThis chapter describes how to install and deploy BoKS Server Agents for Unix/Linux, used together with BoKS Manager in the FoxT ServerControl solution. For all post-installation configuration, for example, concerning user accounts, authentication, access control and auditing, see the relevant chapters in the BoKS Manager Administration Guide.

Topics include:

• Server Agents for Unix/Linux Background

– FoxT ServerControl Overview with BoKS Server Agents for Unix/Linux

– BoKS Server Agent for Unix/Linux Basics

– About Deleting, Changing Host Type or Domain and Uninstalling Server Agents

– Prerequisites for Deploying BoKS Server Agent for Unix/Linux

– Scripts for Unattended Installation

• Installing BoKS Server Agent for Unix/Linux

• Installing Pre-registered Hosts as BoKS Server Agents for Unix/Linux

– Install Preparations for Pre-registered Hosts

– Installing a Pre-registered Host

• Listing BoKS Server Agents for Unix/Linux in the Domain

• Installing Hotfixes, Patches and Upgrades

• Enabling Offline Login to a BoKS Server Agent

• Uninstalling BoKS Server Agent for Unix/Linux

See also:

• The relevant Readme, which contains platform-specific installation information.

• “Deploying a FoxT solution with BoKS Manager” on page 28

• “Domain Communication Basics” on page 21

• “Mixed BoKS Environments” on page 91

Server Agents for Unix/Linux Background

Topics include:

BoKS Manager 6.6.2 Installation Guide Page 107

Page 108: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

• FoxT ServerControl Overview with BoKS Server Agents for Unix/Linux

• BoKS Server Agent for Unix/Linux Basics

• About Deleting, Changing Host Type or Domain and Uninstalling Server Agents

• Prerequisites for Deploying BoKS Server Agent for Unix/Linux

• Scripts for Unattended Installation

See also:

• Home Directory Host Configurations for Unix Hosts in the chapter “Host Administration” in the Administration Guide

FoxT ServerControl Overview with BoKS Server Agents for Unix/Linux

See also:

• “Solutions Overview with BoKS Manager” on page 14

• “Defining Masters, Replicas and Domain Architecture” on page 20

Agent Hostapplication server

BoKS Desktop

BoKS Server Agentfor UNIX

BoKS ManagerMaster or Replica

Other Hostnon-BoKS

FoxT ApplicationControl FoxT ServerControl

BoKSDesktop

Remote adminHTTPS

FoxT ServerControl

BoKS SSH Client for W

indowsFoxT ApplicationControl

Page 108 BoKS Manager 6.6.2 Installation Guide

Page 109: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

• “About Deploying BoKS Desktop” on page 133

• “About Deploying BoKS Application Agents” on page 156

• “Using Learn Mode” on page 68

BoKS Server Agent for Unix/Linux Basics

About Server Agent Packaging

For the majority of platforms, Fox Technologies distributes a Master/Replica/Server Agent (MRA) package that includes the BoKS Server Agent for Unix/Linux software. However for certain platforms, a BoKS Server Agent for Unix/Linux is distributed separately.

The form and content of the distribution package will therefore depend on the platform you are installing BoKS Server Agent for Unix/Linux on.

System Requirements

For disk space requirements, see “System Requirements” on page 16.

The space requirements for $BOKS_DIR and $BOKS_etc are the same as for a BoKS Manager Master.

bcastaddr

When installing a BoKS Server Agent for Unix/Linux host, remember that the host must have contact with the Master or a Replica(s). If the Server Agent is not on the same subnet as the Master and Replicas, you must configure the host $BOKS_etc/bcastaddr file to supply the IP addresses to at least one of these servers. See also “Domain Communication Basics” on page 21.

About Deploying BoKS Server Agents for Unix/Linux

Deploy BoKS Server Agent for Unix/Linux after you have installed the Master and imported or set up users in the database. Make sure that the Master and any Replicas that will service a particular BoKS Server Agent for Unix/Linux host, are working properly.

To install a BoKS Server Agent for Unix/Linux host, follow the procedure “Installing BoKS Server Agent for Unix/Linux” on page 113.

• In setup, select Server Agent mode.

• In BoKS Manager Administration, add the BoKS Server Agent for Unix/Linux host to the database, selecting the Host type BoKS Host.

• In order to do administrative tasks on the Server Agent when BoKS Protection is activated, the root account on the Server Agent must be defined as a BoKS user account, just like any other user account. You can import this account from the /etc/passwd file (at the same time as you import user accounts) in the administration GUI menu User Administration > Import User Data. See also “Local Root Account in BoKS Manager” on page 27.

BoKS Manager 6.6.2 Installation Guide Page 109

Page 110: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

Check that communications with the Master and relevant Replicas are working.

Enable BoKS Protection of the BoKS Server Agent for Unix/Linux host, by using the BoKS Administration menu Security Configuration and Backup > Activate or Deactivate BoKS Protection.

• For a new domain, you can disable Access Route Access Control while you study access patterns of users and set up your Access Routes. See “Using Learn Mode” on page 68 for details.

Always deactivate and uninstall a Server Agent before deleting it from the domain or changing its host type to Other Host.

When uninstalling a Server Agent, delete the host from the BoKS database after uninstalling it. Until you delete the host, it will still be a part of any existing Access Routes, so that it may open up a security hole to protected Server Agents since it will now be unprotected itself. See “About Deleting, Changing Host Type or Domain and Uninstalling Server Agents” on page 111. Note that uninstalling BoKS Server Agent for Unix/Linux removes all BoKS protection!

When moving a Server Agent to another domain, register it in the new domain and then delete it or change the host type to Other Host in the old domain (depending on your purposes). Until deleted or changed to Other Host, it may open up a security hole to Server Agents in the old domain (see Uninstalling, above) and error messages will be written to the log every time the Master tries to establish communication (for a Replica, every ten minutes).

BoKS Manager 6.6.2 also supports BoKS Server Agents for Unix/Linux with dynamic IP addresses used with Dynamic Host Configuration Protocol. Dynamic IP Server Agents are configured with specific setup options and registered as a different host type (Dynamic IP BoKS Host) in the BoKS database.

Note that a BoKS Server Agent for Unix/Linux is only protected when it is registered as a BoKS Host in a domain and BoKS Protection is activated. A host registered as Other Host is not protected by the Master on which it is registered as Other Host!

See also:

• “Master Basics” on page 49

• “Replica Basics” on page 72

• “Install Directories” on page 38

• “Install Parameters and Options” on page 38

• The Readme, which contains platform-specific installation information.

• BoKS Manager Protection Processes on Unix Hosts in the appendix “System Architecture” in the Administration Guide

Page 110 BoKS Manager 6.6.2 Installation Guide

Page 111: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

About Deleting, Changing Host Type or Domain and Uninstalling Server Agents

Always deactivate and uninstall a Server Agent before deleting it or changing its host type to Other Host. BoKS Manager is designed to protect and update Server Agents. BoKS Manager is not designed to protect or update the host type Other Host, or hosts that once were part of a BoKS domain, but now are deleted.

Not deactivating and uninstalling BoKS while deleting or changing it to host type Other Host on the Master, leaves the host in an unclear situation:

• If a Server Agent with BoKS Protection activated is deleted from the database, the host will no longer receive updates from the Master to the /etc/passwd and /etc/group files. The host will continue to contact the Master for authentication, but all such attempts will fail because the Master no longer has the host with its node key in the database, and thus does not recognize this host as a Server Agent. Users will be denied access, but there will be no entry in the audit log.

• If a Server Agent with BoKS Protection activated is changed in the GUI to host type Other Host, the host will continue to receive updates from the Master to the /etc/passwd and /etc/group files if it belongs to a Host Group. If it is not part of a Host Group, it will not be updated. The host will continue to contact the Master for authentication, and the Master will respond as it would with a Server Agent, and grant access to any users who have Access Routes to that host. The access will be entered by servc into the audit log.

Note: Deleting a Server Agent or changing its host type to Other Host (meaning it is no longer a Server Agent from the Master’s point of view), removes BoKS Manager protection from the host. If you want protection, consider the following alternatives:

• If your purpose in deleting is to block all access to a host, you can accomplish this by assigning the authentication method BLOCKED to an Access Route from anywhere with any access method to the Server Agent host (leaving the Server Agent as a BoKS host), using the program bksdef. For example:

bksdef -n blocked -b0 -e0 -w1234567 -z '*:ANY/*->hostname'

• Alternatively, you can block all access by adding a set of Restrictive Access Routes to this host, one for each Access Route type (as viewed in the GUI).

• For a way (using restrictive Access Routes) to insure no access to BoKS-protected hosts in the domain via a host changed to Other host or during uninstallation of BoKS, see the man page uninstall.

When uninstalling a Server Agent or moving a Server Agent to another domain, Delete the host from the BoKS database or change the host type to Other Host in the old domain. If you do not delete the host, error messages will be written to the log every time the Master tries to establish communication (for a Replica, every ten minutes).

See also:

• “Master Basics” on page 49

• “BoKS Server Agent for Unix/Linux Basics” on page 109

BoKS Manager 6.6.2 Installation Guide Page 111

Page 112: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

• BoKS Manager Protection Processes on Unix Hosts in the appendix “System Architecture” in the Administration Guide

Prerequisites for Deploying BoKS Server Agent for Unix/Linux

Requirements for deploying BoKS Server Agents for Unix/Linux in the BoKS Manager domain include:

• All system requirements are met. See “System Requirements” on page 16.

• BoKS Manager is installed, initialized and basic configuration has been completed on the Master.

Note: If authentication and other services are not needed, the absolute minimum requirement for installing a Server Agent is that before running setup, the BoKS Manager Master must be set up and running, so that setup can contact the Master in real time.

See also:

• “BoKS Server Agent for Unix/Linux Basics” on page 109

Scripts for Unattended Installation

Prior to deploying the software across a domain with many hosts, plan the deployment with regard to user access and phased deployment of network segments, for the BoKS Server Agents for Unix/Linux. Then develop scripts for unattended installations of Server Agents, to be used after the BoKS Master and Replicas have been installed and configured.

For unattended installation of patches, hotfixes and upgrades, see “Installing Hotfixes, Patches and Upgrades” on page 125.

Unattended installations of BoKS Server Agent for Unix/Linux

For unattended installations of BoKS Server Agent for Unix/Linux, develop a script that will do the following:

• Perform the installation from a network installation directory

• Perform any sort of customizing to the BoKS Server Agent for Unix/Linux host, for example integration with RSA Authentication Manager or copying the $BOKS_etc/bcastaddr file.

• Run the setup command to

– set the Node Key, or

– for pre-registered hosts, provide the pre-registration secret and if using pre-registration types, also provide the type

– if required, specify configurations for offline login support

– for BoKS Server Agents with dynamic IP address, set the HostID and network interface to monitor.

Page 112 BoKS Manager 6.6.2 Installation Guide

Page 113: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

• Add the machine to the database with host type BoKS host (this step is not required for pre-registered hosts, which are registered in the database automatically)

• Verify communication with the Master and Replicas.

See also:

• Scripting and Efficient Batch Processing in the chapter “Command Line Interface” in the Administration Guide.

• “BoKS Server Agent for Unix/Linux Basics” on page 109

• “Install Directories” on page 38

• “Install Parameters and Options” on page 38

Installing BoKS Server Agent for Unix/Linux

BoKS Server Agent for Unix/Linux is distributed in two different packages, depending on operating system:

• Master/Replica/Server Agent distribution package (MRA)

• Server Agent distribution package (A)

The install procedure below is almost identical for both packages, but in the Server Agent package setup gives only one choice, Server Agent, while in the MRA package you are given the three choices: Master, Replica and Server Agent. In both cases, you choose Server Agent. For reference concerning the MRA package, see “Installing the Master” on page 51.

See also:

• “System Requirements” on page 16

• “Prerequisites for Deploying BoKS Server Agent for Unix/Linux” on page 112

• The Readme, which contains platform-specific installation information.

• “BoKS Server Agent for Unix/Linux Basics” on page 109

• “Install Directories” on page 38

• “Install Parameters and Options” on page 38

• “About Server Agent Packaging” on page 109

• “Unpacking the Package Contents” on page 36

For remote installation of hotfixes, patches and upgrades, see “Installing Hotfixes, Patches and Upgrades” on page 125.

BoKS Manager 6.6.2 Installation Guide Page 113

Page 114: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

Notes:

• Plan node keys in advance and remember the Node Key you use during installation. You will need it when you register the host and in the case of future upgrades of BoKS Manager. See “Node Keys” on page 26.

• BoKS uses a number of install directories for which you can specify paths or accept system defaults. These are referred to below by the BoKS directory names $BOKS_DIR, $BOKS_etc and $BOKS_var. See “Install Directories” on page 38 for a list of these directories and their default paths.

• The install program provides options not used in the procedure below. See “Install Parameters and Options” on page 38.

• For platforms that support native Role-Based Access Control (RBAC), the existing RBAC configuration is backed up when you run setup on the Server Agent. This configuration is restored in the event that you uninstall BoKS from the host, though you can also opt to keep the BoKS RBAC configuration at uninstall. For more details, see “About Installing Role-Based Access Controls” on page 43 and “Uninstalling BoKS Manager” on page 84.

To install BoKS Server Agent for Unix/Linux:

1. Download and save the BoKS Manager or BoKS Server Agent for Unix/Linux release package (depending on the platform, the Server Agent may be packaged together with the Master and Replica) to a location accessible from the Server Agent host.For example in the /downloads directory on the Server Agent host.

2. If required, uncompress the release package. See “Unpacking the Package Contents” on page 36. A directory structure is created.The directory structure includes an install program, and binaries for specific platforms in sub-directories.

3. Become superuser:

$ su

4. If the directory /tmp has less than 250 MB of space for use during install, or for HP-UX itanium, less than 500 MB, then set the UNIX environment variable PATCH_TMP to a directory that has 250 MB, or for HP-UX itanium 500 MB free, for example, /var/tmp/tempbokspatch, as follows:

# PATCH_TMP=/var/tmp/tempbokspatch

# export PATCH_TMP

5. On HP-UX, TRU64, and AIX 5.3, close all dtlogin sessions and stop the dtlogin daemon. See “About Closing dtlogin Sessions” on page 41.

6. Run the install program:To install without any options, type:

# path to location of uncompressed package/install

Page 114 BoKS Manager 6.6.2 Installation Guide

Page 115: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

To install and create the special user account required if you intend to use SSH privilege separation, type:

# path to location of uncompressed package/install -p [-u <uid>] [-g <uid>]

where <uid> and <gid> let you optionally specify the uid and gid for the SSH daemon account, respectively. This account can be created manually instead (see Configuring Privilege Separation in the chapter System Configuration in the Administration Guide).

For other install options, see “Install Parameters and Options” on page 38.

7. When prompted to install the product or Quit, select the product. With the Master/Replica/Server Agent package, the product is called BoKS Manager 6.6. With the Server Agent package, the product is called Server Agent for Unix/Linux 6.6.

1) BoKS Manager 6.6q) Quit install

Type 1 and press ENTER to install BoKS Server Agent for Unix/Linux.

8. If you did not use the -opt, -var or -etc flags, the install program will prompt you individually for each install directory and provide a default that you can simply accept by pressing Enter. Defaults are:/opt/boksm/etc/opt/boksm/var/opt/boksmAccept each of these with Enter, or else enter the directory that you want to use.

9. When asked:

Would you like to start the installation now? [y]

press ENTER to start the installation.

10. When the installation is finished, the following is displayed (the Master and Replica choices are only displayed when installing from an MRC package):

Setting up BoKS1) Master2) Replica3) Server Agent

q) Quit and run setup later

11. Before running setup, check to see what patch level has been installed, by typing, for example (assuming the default installation directory):

# grep PATCH_LEVEL /etc/opt/boksm/ENV

The variable PATCH _LEVEL displays the patch level currently installed.If the latest patch was not included, download the latest patch release and install it either now or later. See “Installing BoKS Manager Patches” on page 80.

BoKS Manager 6.6.2 Installation Guide Page 115

Page 116: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

12. Before running setup, open a new terminal window and make any of the following configurations that are necessary for communications between this Server Agent for Unix/Linux and the Master, Replicas and other Server Agents for Unix/Linux in the same domain:

• If the Master is outside of the Server Agent’s broadcast subnet, create a bcastaddr file in the $BOKS_etc directory (default /etc/opt/boksm), containing the IP address of the Master. For example, add the Master’s address:

10.10.10.100

You can also add any Replicas that communicate with this Server Agent. See Configuring the bcastaddr File in the chapter “System Configuration” in the Administration Guide.

• If you using non-default port settings for BoKS Manager, configure the base port by adding a line to the /etc/services file. For example, add the line:

boks 6530/tcp

13. If this version 6.6.2 Server Agent will be inter-operating with pre-6.6.1 version Master/ Replicas, set the $BOKS_etc/ENV variable BRIDGE_CRYPT=CRYPT_RC5_128.See also “Configuring Encryption with Pre-6.6.1 Hosts” on page 96 and Setting Encryption Levels for BoKS Host Communication on page 179 in the Administration GuideIf you are upgrading the installation of BoKS Server Agent for Unix/Linux, there may be other important steps to perform before you run setup. See the chapter Upgrading BoKS Manager.

14. Return to the terminal window with the BoKS install process finished (which you left after install but before setup) and type the number for Setup Server Agent (1 or 3, depending on the distribution package), then press ENTER to set up the BoKS Server Agent for Unix/Linux. If you closed the window, start the setup program by typing:

/opt/boksm/sbin/setup client

(for a default installation directory), or use the path to your $BOKS_sbin directory).

15. When prompted to enter a Node Key:

Enter BoKS node key:

type the Node Key that you have planned and press ENTER.

Note: Remember the Node Key for registering the host in the BoKS database later.

16. When prompted to re-enter the Node Key, do so and then press ENTER.

Re-enter node key:

Page 116 BoKS Manager 6.6.2 Installation Guide

Page 117: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

17. The installation process is finished and you are returned to the list of available products. Exit the installation program by typing q for quit:

q) Quit

18. If you use SSH, enable BoKS SSH by finding the BOKS_SSHD variable in the $BOKS_etc/ENV file and changing its value from off to on. For other optional SSH configuration, see Configuring SSH in the chapter “System Configuration” in the Administration Guide.

19. In the BoKS administration GUI on the Master, register the Server Agent using the menu Host Administration > Register Host as follows:

• Set the Host Type to BoKS Host or, if the Server Agent has a dynamic IP address, BoKS Dynamic IP Host.

• Either:

– Provide the IP address in the Address(s) to Add box. If there are multiple addresses, separate them by commas.

– If the Server Agent has a dynamic IP address, specify a HostID which will be used to identify the Server Agent instead of the IP address.

• Optionally provide a Host Group to which this host will belong.

• Provide the Node Key that you entered earlier during setup.

• In the Parent Home Directory box, type the name of the parent directory on this machine under which users’ home directories are located, for example /home. See Home Directory Host Configurations for Unix Hosts in the chapter “Host Administration” in the Administration Guide for examples of Parent Home Directory and Physical Home Directory.

• If BoKS Manager is to create the home directory on another host, type the hostname and directory in the Physical Home Directory box, in the format Host:Directory. For example:hostname:/export/home.

• Click Execute to complete the registration.

20. If you use Telnet SSO from BoKS Desktops, on the Master create a new Host Virtual Card for the Server Agent as follows (as described in Creating Host Virtual Cards in the chapter “Managing Virtual Cards” in the Administration Guide):

• Select Virtual Card Administration > Create Host Virtual Card.

• In the CA list, select the root CA certificate.

• Host Virtual Cards for Server Agents should be signed by the BoKS Root CA.

• In the Host list, select the Server Agent.

• In the CA Virtual Card Password box, type the password for the root CA.

• In the Country list, select the appropriate country to list in the virtual card.

BoKS Manager 6.6.2 Installation Guide Page 117

Page 118: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

• In the Organization box, type the name of the Organization to list in the virtual card.

• In the Organization Unit (optional) box, type the name of the Organizational Unit to list in the virtual card, for example “Accounting”. This field is optional.

• In the Virtual Card Lifespan list, select a lifespan for the new virtual card. The default lifespan is five years. You may wish to choose a greater life span to avoid having to re-initialize the BoKS administration GUI.

• Check the Install Virtual Card on Host checkbox (checked by default).

• Click Execute.The virtual card is now created in the BoKS database and will be automatically installed on the Server Agent in the $BOKS_etc/keys directory.

Note: It can take up to ten minutes before the Host Virtual Card is pushed out to the Server Agent.

21. If you use RSA SecurID tokens, configure this host for SecurID authentication as described in Configuring Hosts for SecurID Authentication in the chapter “Managing Authenticators” in the Administration Guide.

22. Restart the BoKS daemons by typing (assuming installation in the default directory /opt/boksm/):

# /opt/boksm/sbin/boksadm -S Boot -k

# /opt/boksm/sbin/boksadm -S Boot

23. On HP-UX, TRU64, and AIX 5.3, restart dtlogin, if you use it. See “About Closing dtlogin Sessions” on page 41.

24. Import the root account for the host into the database, using User Administration > Import User Data. Fox Technologies recommends you use the local hostname as prefix for system accounts and particularly the root account. That is, create the root account as hostname:root, where hostname is the hostname of the host. See About Importing Unix System Accounts and Windows Administrators in the chapter “User Administration” in the Administration Guide. This is necessary in order to do administration while BoKS Protection is activated.

25. If this host uses a time zone different from the Master or the host’s configured Replica, add a line to the $BOKS_etc/timezones file on the Master defining the time zone for the host, as described in Setting Time Zones in the chapter “System Configuration” in the Administration Guide:

<hostname> <timezone>

See also:

• Converting Between Master, Replicas and Server Agents in the chapter “System Configuration” in the Administration Guide

Page 118 BoKS Manager 6.6.2 Installation Guide

Page 119: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

Installing Pre-registered Hosts as BoKS Server Agents for Unix/Linux

For hosts that have already been pre-registered in the BoKS Administration GUI, the installation procedure is slightly different. All of the relevant information for the host has already been entered and the registration of the host in the BoKS database is performed automatically.

Key points for installing pre-registered hosts as BoKS Server Agents for Unix/Linux are:

• Host pre-registration is only supported for hosts running BoKS Server Agent for Unix/Linux 6.5.2 and later in domains where the Master is running BoKS Manager 6.5.2 or later.

• The pre-registered host must have contact with the BoKS Master when the Server Agent is setup for the registration of the Server Agent in the BoKS database.

• You do not need to specify a node key for pre-registered hosts; a random node key is assigned to the Server Agent by the BoKS Master.

• No information needs to be entered for pre-registered hosts in the BoKS Administration GUI or CLI after the BoKS Server Agent for Unix/Linux software is installed and the setup performed. The Server Agent is automatically registered and included in the BoKS domain.

• Most steps of installing BoKS Server Agent for Unix/Linux on a pre-registered host are the same as installing on a normal, non pre-registered host. The main difference occurs when you come to the setup stage.

Installing pre-registered hosts as BoKS Server Agents for Unix/Linux includes:

• Install Preparations for Pre-registered Hosts

• Installing a Pre-registered Host

See also:

• The section “Pre-registered Host Background” on page 299 in the Administration Guide.

• The section “Pre-registered Host Key Features” on page 301 in the Administration Guide.

Install Preparations for Pre-registered Hosts

Before you install BoKS Server Agent for Unix/Linux on a pre-registered host, there are some preparations you need to make. These are:

• The host must have been pre-registered in BoKS Manager for the appropriate BoKS domain using the BoKS Administration GUI or the BoKS CLI or a pre-registration type must have been added which the host can be registered as.

BoKS Manager 6.6.2 Installation Guide Page 119

Page 120: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

• You will need the following information when you install BoKS Server Agent for Unix/Linux on the host:Either:

– The host name: This is specified when the host is pre-registered; your BoKS Administrator should be able to provide this.

OR:

– The hostname and pre-registration type: If the hostname has not been pre-registered, you also need to provide a pre-registration type. This is a type specified in the BoKS database that enables hosts to be auto-registered without the hostname being pre-registered in BoKS. Your BoKS Administrator should be able to provide this.

– The pre-registration secret: This is specified when the host is pre-registered or a pre-registration type is defined; your BoKS Administrator should be able to provide this.

Note: Be sure not to type the secret on the command line to the setup command, as this will allow it to be seen in a ps listing. Either let the program prompt for it, or for automated install, keep it in the parameters file pointed out by the -A FILE=path_to_parameterfile parameter to the setup program.

– The IP address or FQDN hostname of the BoKS Master; your BoKS Administrator or appropriate network administrator should be able to provide this.

• Ensure that the pre-registered host is able to contact the BoKS Master.

• You can use server certificates or server certificate fingerprints to securely identify the BoKS Master server when you are setting up the Server Agent. If you choose to do this, you will need the server certificate or server certificate for the BoKS Master in the appropriate domain when you install BoKS Server Agent for Unix/Linux on the pre-registered host. Your BoKS Administrator should be able to supply this.

Note: Your organization may use a list of server certificates / server certificate fingerprints if you are using multiple BoKS domains.

See also:

• The section “Pre-Registering a Host” on page 324 in the Administration Guide.

• The section “Listing Host Certificate Fingerprints” on page 781 in the Administration Guide.

• The section “Exporting CA Certificates” on page 851 in the Administration Guide.

Page 120 BoKS Manager 6.6.2 Installation Guide

Page 121: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

Installing a Pre-registered Host

To install BoKS Server Agent for Unix/Linux on a pre-registered host:

1. Follow steps 1 - 12 in the procedure for installing on a normal, non pre-registered host.For details, see “To install BoKS Server Agent for Unix/Linux:” on page 114.

2. Open a terminal and run the setup program with the -a flag to begin setting up the pre-registered host as a BoKS Server Agent for Unix/Linux:

/opt/boksm/sbin/setup -a client

(for a default installation directory), or use the path to your $BOKS_sbin directory.If you type the command using only the -a option, you will be prompted to enter your user name, the host name, where applicable the type, and the pre-registration secret for the host.Alternatively, you can specify the parameters for registering the pre-registered host in a file and direct the setup program to that file using the -A FILE=path_to_parameters_file:

/opt/boksm/sbin/setup -a -A FILE=path to parameters file client

The following table displays all the auto-registration options that can be used with the setup -a client command:

setup client -a -A parameter Mandatory? Description

USER=user Yes The user to log the auto-registration option as.

HOST=hostname Yes The hostname for the pre-registered host.

SECRET=secret Yes The secret specified when the host was pre-registered

Note: FoxT Recommends the pre-registration secret is either entered at the prompt from the setup programs or entered in a parameters file pointed out using the FILE variable.Avoid entering the secret directly from the command line using the SECRET= parameter.

HOSTID=hostid No For pre-version 6.6.2 Server Agents that use DHCP, specify the HostID that will be used to identify the host instead of primary IP address.For 6.6.2 and later Server Agents, you can supply the HostID directly via the -h option for the setup program.

BoKS Manager 6.6.2 Installation Guide Page 121

Page 122: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

For further details, see the BoKS man page boks_autoregister.

Note: If the hostname you enter is not pre-registered in the BoKS database, the setup program prompts you to enter a pre-registration type instead, as long as there is at least one type registered. If no types are registered and the hostname has not been pre-registered, the installation will fail.

TYPE=type No The pre-registration type the host should be registered with.

FILE=filename No File to read options from. You can save the other parameters required for registering the pre-registered host in a file and only specify this option indicating the file where the other parameters can be read.

PORTNO=port No Port for secure communication between the pre-registered host and the BoKS Master. The default setting is port 6507.If a non-default port is to be used, the port number used by the boks_autoregisterd daemon on the Master must be changed by adding -p port in the boksinit.master file on the Master and restarting BoKS.

MASTER=host_or_ip No The name or IP address of the Master. If this is not provided, BoKS tries the IP addresses specified in the $BOKS_etc/bcastaddr file.

CACERT=cacertfile No A file containing the root CA certificate from the BoKS Master.The file may contain several certificates from the BoKS Master. It may contain several certificates (e.g. for Masters from different BoKS domains).For details of using certificate authentication with auto-registration, see “Pre-registered Host Authentication” in the BoKS Manager 6.6.2 Adminstration Guide.

FINGERPRINTS=fingerprintfile No A file containing MD5 and/or SHA1 fingerprints of allowed server-side certificates, i.e. the fingerprint of the Master’s host certificate must be included.For details of using fingerprint authentication with auto-registration, see “Pre-registered Host Authentication” in the BoKS Manager 6.6.2 Adminstration Guide.

setup client -a -A parameter Mandatory? Description

Page 122 BoKS Manager 6.6.2 Installation Guide

Page 123: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

3. If you use SSH, enable BoKS SSH by finding the BOKS_SSHD variable in the $BOKS_etc/ENV file and changing its value from off to on. For other optional SSH configuration, see Configuring SSH in the chapter “System Configuration” in the Administration Guide.

4. If you use Telnet SSO from BoKS Desktops, on the Master create a new Host Virtual Card for the Server Agent as follows (as described in Creating Host Virtual Cards in the chapter “Managing Virtual Cards” in the Administration Guide):

• Select Virtual Card Administration > Create Host Virtual Card.

• In the CA list, select the root CA certificate.

• Host Virtual Cards for Server Agents should be signed by the BoKS Root CA.

• In the Host list, select the Server Agent.

• In the CA Virtual Card Password box, type the password for the root CA.

• In the Country list, select the appropriate country to list in the virtual card.

• In the Organization box, type the name of the Organization to list in the virtual card.

• In the Organization Unit (optional) box, type the name of the Organizational Unit to list in the virtual card, for example “Accounting”. This field is optional.

• In the Virtual Card Lifespan list, select a lifespan for the new virtual card. The default lifespan is five years. You may wish to choose a greater life span to avoid having to re-initialize the BoKS administration GUI.

• Check the Install Virtual Card on Host checkbox (checked by default).

• Click Execute.The virtual card is now created in the BoKS database and will be automatically installed on the Server Agent in the $BOKS_etc/keys directory.

Note: It can take up to ten minutes before the Host Virtual Card is pushed out to the Server Agent.

5. If you use RSA SecurID tokens, configure this host for SecurID authentication as described in Configuring Hosts for SecurID Authentication in the chapter “Managing Authenticators” in the Administration Guide.

6. Restart the BoKS daemons by typing (assuming installation in the default directory /opt/boksm/):

# /opt/boksm/sbin/boksadm -S Boot -k

# /opt/boksm/sbin/boksadm -S Boot

7. On HP-UX, TRU64, and AIX 5.3, restart dtlogin, if you use it. See “About Closing dtlogin Sessions” on page 41.

BoKS Manager 6.6.2 Installation Guide Page 123

Page 124: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

8. Import the root account for the host into the database, using User Administration > Import User Data. Fox Technologies recommends you use the local hostname as prefix for system accounts and particularly the root account. That is, create the root account as hostname:root, where hostname is the hostname of the host. See About Importing Unix System Accounts and Windows Administrators in the chapter “User Administration” in the Administration Guide. This is necessary in order to do administration while BoKS Protection is activated.

9. If this host uses a time zone different from the Master or the host’s configured Replica, add a line to the $BOKS_etc/timezones file on the Master defining the time zone for the host, as described in Setting Time Zones in the chapter “System Configuration” in the Administration Guide:

<hostname> <timezone>

See also:

• The section “Pre-registered Host Background” on page 299 in the Administration Guide.

• The section “Pre-Registering a Host” on page 324 in the Administration Guide.

Listing BoKS Server Agents for Unix/Linux in the Domain

For Server Agents that are registered in the BoKS Manager domain, you can list different information in a number of ways:

• To list hostname, IP address and Host Group membership for one or more hosts, use the menu Host Administration > List Host Information. From the command line, you can list similar information using the program lh and hostadm.

• To list Host Groups and the hosts that they contain, use the menu Host Administration > List Host Groups. From the command line, use the program hgrpadm.

• To list Server Agents on which BoKS Protection is activated, use the menu Security Configuration and Backup > Hosts with BoKS Protection Activated. To list Server Agents on which BoKS Protection is not activated, use the menu Security Configuration and Backup > Hosts with BoKS Protection Deactivated.

• To list installed BoKS Manager versions, use boks_upgrade (see procedure below).

• To list BoKS environment variables for a single Server Agent, use cadm.

• To take a system snapshot of a single Server Agent, including the version, operating system and copies of recent logs, use boksinfo.

To list Server Agents with BoKS version and operating system version:

1. Log in to the Master, su to root and start a BoKS shell.

Page 124 BoKS Manager 6.6.2 Installation Guide

Page 125: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

2. Run the following command, specifying the Host Groups that you want to list, or ALL for all Server Agents:

BoKS# boks_upgrade info -h <hostgroup> [, <hostgroup>]

where <hostgroup> is any hostname or Host Group name, or the word ALL.

ALL lists all hosts, even those that have BoKS Manager or Server Agent for Unix/Linux installed but that are not Server Agents in the Master’s domain.

Example output:

ae-aix Not a clientaqa-hp1 Not a clientaqa-sol3 Version: 6.0 Patch 3 Hotfixes: Platform: SunOS aqa-sol3 5.8 Generic_108528-11 sun4u sparc SUNW,Ultra-5_10quentin Not a Unix BoKS host

See also:

• The man pages boks_upgrade, lh, hostadm, hgrpadm, cadm, boksinfo

• “Installing Hotfixes, Patches and Upgrades” on page 125 (using boks_upgrade)

• The chapter System Monitoring Tools in the Administration Guide

• “Deploying BoKS Server Agents for Unix/Linux” on page 107 (overview of topics)

Installing Hotfixes, Patches and Upgrades

The script boks_upgrade automates the install hotfix, patch or upgrade routine for a number of specified Server Agents for Unix/Linux, for example, for all hosts in a given Host Group. You can also use it on a single Server Agent. boks_upgrade uses an SSH channel to make the install secure. boks_upgrade is safe because it does not run under the control of BoKS Manager: if the install should fail for any reason on a particular host, it leaves you with an open SSH connection to the host, over which you can take any required steps (such as manually backing out a patch where the patch installation aborted).

The boks_upgrade script automates the following procedures, which you can also use separately on their own:

• To install a patch: “Installing a BoKS Manager Patch” on page 80.

• To uninstall a patch: “Backing Out a BoKS Manager Patch” on page 82.

• To install or uninstall a hotfix, the procedure given in the hotfix Readme.

• To upgrade: “Upgrading a Server Agent for Unix/Linux” on page 103 (using the program upgrade_client).

BoKS Manager 6.6.2 Installation Guide Page 125

Page 126: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

After the automatic install, depending on the environment, you may need to perform some configuration (for example, reconfiguring encryption levels or SSH).

The boks_upgrade script cannot uninstall BoKS Server Agent for Unix/Linux or back out an upgrade. See “Uninstalling BoKS Server Agent for Unix/Linux” on page 130.

See also:

• The man page boks_upgrade

• The man page for cadm, used to connect to BoKS Server Agents for Unix/Linux

• “BoKS Server Agent for Unix/Linux Basics” on page 109

• “Upgrading BoKS Server Agents for Unix/Linux” on page 98

• “Installing OS Patches” on page 83

Prerequisites

The same prerequisites apply for boks_upgrade as for a manual hotfix, patch or upgrade. These include:

• /var/tmp has at least 200 MB free space for temporary storage on each Server Agent to be updated.

• The program ‘uncompress’ is available on each Server Agent.

Note: Some operating systems do not include ‘uncompress’. However, the upgrade environment for the boks_upgrade program can be set up using a boks_upgrade_rc file referenced by the configuration file. For usage examples, see the BoKS man page boks_upgrade.

• For upgrading only, make sure the Master’s or a Replica’s IP address is in $BOKS_etc/bcastaddr on all Server Agents to be upgraded, so that the install program setup can reach the Master or a Replica. For other upgrade prerequisites, see the following:

– “Prerequisites for Upgrading” on page 91

– “Server Agent Upgrade Basics” on page 98

– “Upgrading a Server Agent for Unix/Linux” on page 103

• For hotfix and patch prerequisites, see the requirements stated in the Readme.

Using a boks_upgrade Configuration File

A number of variables used by the boks_upgrade program can be defined using an external configuration file. Program options that can be set using the configuration file include -x (SSH directory) and -p (package directory).

For more information on using a boks_upgrade configuration file, see the BoKS man page boks_upgrade.

Page 126 BoKS Manager 6.6.2 Installation Guide

Page 127: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

To automatically update Server Agents for UNIX:

The boks_upgrade script provides many options and can be used for many purposes. The procedure below is typical but not exclusive. For other options, examples and full detail, including using a boks_upgrade configuration file, see the man page boks_upgrade.

The boks_upgrade script updates a list of Server Agents. As a precaution and to keep runs manageable, Fox Technologies suggests that you only update a portion of your network at one time, for example, one Host Group, while using this script.

CAUTION: After running boks_upgrade, be sure to shut down the special boks_upgrade SSH channel (as described below) so that all access is again under BoKS’ control.

CAUTION: When patching or upgrading, all hotfixes are removed. You should be aware that a released patch or upgrade might not include a removed hotfix, and, in that case, should contact Fox Technologies.

1. Log in on the Master and become superuser.

2. Download from the Fox Technologies web site the package containing the upgrade, patch or hotfix for all platforms concerned.

3. Download from the Fox Technologies web site the latest special upgrade OpenSSH package for all platforms concerned. Note that this is not the BoKS OpenSSH included in BoKS.

4. Download from the Fox Technologies web site the boks_uname script for all platforms concerned and place it in the same directory as the upgrade OpenSSH package.This script can also be copied from the prog subdirectory of an upgrade or a patch package.

5. Make sure all logged-in users are notified that the Server Agents concerned are about to be updated. If necessary, close down user sessions. For example, on non-PAM platforms, close dtlogin sessions as described in “About Closing dtlogin Sessions” on page 41.

6. Start a BoKS shell by typing:

# $BOKS_sbin/boksadm -S

For details, see Launching the BoKS Manager CLI in the chapter BoKS Manager Administration in the Administration Guide.

7. Generate SSH keys on the Master, if they do not already exist from a previous boks_upgrade session, using boks_upgrade’s keygen subcommand:

BoKS # boks_updgrade keygen

8. Set up the special ssh daemon on the Server Agents that are to be updated with the setup subcommand:

BoKS # boks_upgrade setup -h <hostlist> -x <sshdirectory>

BoKS Manager 6.6.2 Installation Guide Page 127

Page 128: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

where <hostlist> is one or more hosts or Host Groups separated by commas, for example, “GROUP1, GROUP2, host3” and <sshdirectory> is the directory that contains the upgrade OpenSSH package (downloaded from the Fox Technologies web site) and the boks_uname program (downloaded or copied from the prog subdirectory of a BoKS patch distribution).

9. Check installed version level with the info subcommand. This step is optional.

BoKS # boks_upgrade info -h <hostlist>

where <hostlist> is the collection of hosts being operated upon.For each host, output includes installed version with patch level, installed hotfixes list, and platform.

10. Run boks_upgrade using the hotfix, patch or upgrade subcommand, the hosts and the distribution that you want to install. See the man page for details:

BoKS # boks_upgrade <update_type> -h <hostlist> -p <package_directory> -s <version>

where <update_type> is one of hotfix, patch or upgrade<hostlist> is one or more hosts or Host Groups separated by commas<package_directory> is the directory containing the hotfix, patch or upgrade package and<version> is the product version to install, for example “6.5”. For a hotfix, <version> is the hotfix package name, for example “TFS041231-235959”.Successful upgrade displays the following line for each host:<hostname> Upgrade OK (or Hotfix OK or Patch OK, respectively)Failed upgrade displays a similar message for each failed host:

11. Check installed version level with the info subcommand. This step is optional.

BoKS # boks_upgrade info -h <hostlist>

where <hostlist> is the collection of hosts being operated upon.For each host, output includes installed version with patch level, installed hotfixes list, and platform.

12. Post-Upgrade Configuration: If this is an upgrade, on each upgraded Server Agent configure any of the following that may be needed and that are not automatically handled by boks_upgrade (see “Upgrading a Server Agent for Unix/Linux” on page 103 for details):

• Encryption level set for the Master and Replicas in $BOKS_etc/bremotever. The bridge encryption level on upgraded Server Agents is set to RC5-128 by default, so normally no changes are required in the $BOKS_etc/bremotever files on the Master / Replica(s).

• On non-PAM platforms, restart dtlogin, if you use it. See “About Closing dtlogin Sessions” on page 41.

Page 128 BoKS Manager 6.6.2 Installation Guide

Page 129: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

13. Shutdown the update daemons and close the SSH channel using the shutdown subcommand. This step is optional but highly recommended; shutdown cleans up the system and most importantly, closes the SSH channel so that BoKS again controls all access to the host (assuming BoKS Protection is activated).

BoKS # boks_upgrade shutdown -h <hostlist>

where <hostlist> is again the collection of hosts being operated upon.For each host, the message “Stopped OK” is displayed

Emergency Access to a Server Agent

The upgrade OpenSSH daemon installed on Server Agents with the boks_upgrade setup subcommand is left active until the shutdown subcommand is used. This channel can be used to gain root access to the Server Agent from the Master if something goes wrong during the hotfix, patch or upgrade, and normal access is blocked by BoKS Manager.

To access the Server Agent from the Master via this SSH channel, use the command:

$BOKS_bin/ssh -F $BOKS_etc/upgrade/ssh_config <host> <command>

where <host> is the Server Agent hostname and <command> is the UNIX command to be executed on the Server Agent (for example, to kill BoKS, $BOKS_sbin/Boot -k).

Enabling Offline Login to a BoKS Server Agent

It is possible to allow a BoKS Server Agent user to log in and use a set of predefined access methods even if the BoKS Server Agent cannot communicate with a BoKS server.

An administrator can enable offline login to a BoKS Server Agent in two ways:

• During Server Agent setup after a BoKS installation. See “To enable BoKS Server Agent offline login during installation” on page 129.

• By editing the file $BOKS_etc/ENV. See the BoKS Manager Administration Guide for details on how to enable offline login by editing the ENV file, and also for more details concerning BoKS Server Agent offline login in general.

Note: Support for offline login is disabled by default.

To enable BoKS Server Agent offline login during installation

1. When the BoKS installation has finished, quit the setup program by typing q for quit.

2. At the command line, type for example:

# ./setup -o “telnet login rlogin” -O “login” client

where -o adds access methods to the OFFLINE_SERVICES variable, and -O to the OFFLINE_SERVICES_ROOT variable in the file $BOKS_etc/ENV.

BoKS Manager 6.6.2 Installation Guide Page 129

Page 130: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

4 Deploying BoKS Server Agents for Unix/Linux

Uninstalling BoKS Server Agent for Unix/Linux

To uninstall BoKS Server Agent for Unix/Linux, use the procedure “Uninstalling BoKS Manager” on page 84, paying attention to delete the host from the BoKS domain after uninstalling. See “About Deleting, Changing Host Type or Domain and Uninstalling Server Agents” on page 111.

CAUTION: Uninstalling a Server Agent, removes all BoKS protection from the host. In addition, until you delete the host from the BoKS domain so that it is no longer a member of any Host Groups or part of any Access Routes, this unprotected host may even allow unintended access to protected Server Agents (for example, if this host is a member of a trusted Host Group, from which access is allowed to protected Server Agents).

• For a way (using Access Routes) to insure no access to BoKS-protected hosts in the domain via the uninstalled host during uninstallation, see the BoKS man page uninstall.

Note: If you uninstall BoKS from a host while there are suexec sessions with keystroke logging still running, the keystroke log files are not finalized and sent to the Master.

To uninstall a hotfix or patch, see “Installing Hotfixes, Patches and Upgrades” on page 125.

See also:

• “BoKS Server Agent for Unix/Linux Basics” on page 109

• The BoKS man page uninstall

Page 130 BoKS Manager 6.6.2 Installation Guide

Page 131: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS DesktopThis chapter describes how to install and deploy BoKS Desktop used together with BoKS Manager in the BoKS Desktop and FoxT ApplicationControl solutions. Topics include:

• BoKS Desktop Background

– System Overview with BoKS Desktop

– About Deploying BoKS Desktop

– Prerequisites for BoKS Desktop

– Disabling the Windows XP Fast User Switching Feature

– Scripts for Unattended Installation

– Setting Password Parameters for BoKS Desktop Users

• Deploying BoKS Desktop

– CA and Virtual Card Quick Start

– Installing BoKS Desktop on a Reference Machine

– Logging On to BoKS Desktop for the First Time

• Deploying BoKS SSH Client for Windows

– BoKS SSH Client for Windows Basics

– Authentication in BoKS SSH Client for Windows

– Authorization in BoKS SSH Client for Windows

– Registering BoKS SSH Client for Windows Hosts

– Deploying BoKS SSH Client for Windows With Certificate Authentication

• Importing Smart Cards and Users

– Importing Smart Cards Using LDAP

– Importing a Rainbow iKey User

– Importing Smart Cards Using LDAP

See also:

• The chapter “A Guided Tour” in the Administration Guide

• BoKS Desktop and the CSSP Server in the appendix “System Architecture” in the Administration Guide

• BoKS Desktop Administrator’s Guide

• “Upgrading With BoKS Application Agents” on page 104

• The chapter “Deploying BoKS Application Agents”

BoKS Manager 6.6.2 Installation Guide Page 131

Page 132: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• BoKS Application Agents Introduction

• The chapter “Host Administration” in the Administration Guide

• The chapter “User Administration” in the Administration Guide

BoKS Desktop Background

Topics include:

• System Overview with BoKS Desktop

• About Deploying BoKS Desktop

• Prerequisites for BoKS Desktop

• Disabling the Windows XP Fast User Switching Feature

• Scripts for Unattended Installation

• Setting Password Parameters for BoKS Desktop Users

System Overview with BoKS Desktop

See also:

• “Solutions Overview with BoKS Manager” on page 14

• The chapter “A Guided Tour” in the Administration Guide

Agent Hostapplication server

FoxT ApplicationControl

KS Desktop

BoKS ManagerMaster or Replica

ktop

BoKS Desktop

BoKS ManagerMaster or Replica

Page 132 BoKS Manager 6.6.2 Installation Guide

Page 133: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• BoKS Desktop and the CSSP Server in the appendix “System Architecture” in the Administration Guide

• BoKS Desktop Administrator’s Guide

• “About Deploying BoKS Application Agents” on page 156

About Deploying BoKS Desktop

Deploy BoKS Desktop on computers in the domain after you have installed the Master and imported or set up users in the database, including creating their virtual cards or smart cards. Make sure that the Master and any Replicas that will service a particular BoKS Desktop host, are working properly.

To install a BoKS Desktop, see the Installation and Administration Guides for the product version that you are using. The recommended deployment method is to first set up and test a reference installation, configure it the way you want it, then push it out to computers on a segment or in the whole domain using Active Directory or Microsoft SMS.

If you are not using BoKS Desktop Domain Passwords, be sure that password policy is configured in the reference installation.

While testing and configuring the Reference installation, you normally enable Bypass Logon. Then, if you are configuring for highest security with Integrated Logon mode, as a final step before deployment, you disable Bypass Logon, meaning that a user can only logon through the Desktop.

Prerequisites for BoKS Desktop

Requirements for deploying BoKS Desktop in the BoKS Manager domain include:

• BoKS Manager is installed, initialized and basic configuration has been completed on the Master.

• For Windows XP, Fast User Switching has been disabled. See “Disabling the Windows XP Fast User Switching Feature” on page 133.

Desktop Versions

BoKS Manager 6.6.2 is compatible with BoKS Desktop versions:

• BoKS Desktop 6.0 and later

Disabling the Windows XP Fast User Switching Feature

The following material is taken from the BoKS Desktop 5.93 Administrator’s Guide.

Note: Fast user switching is not supported for BoKS Desktop 6.6.

BoKS Manager 6.6.2 Installation Guide Page 133

Page 134: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

To disable the Windows XP Fast Switching feature:

1. Ensure that you have an administrator account on a computer that is a member of the workgroup for which you want to disable Fast User Switching.

2. Select Start > Settings > Control Panel > User Accounts.

3. Click Change the way users log on or off.

4. Clear the Use Fast User Switching check box.

See also:

• “BoKS Desktop Background” on page 132

• “Deploying BoKS Desktop” on page 135

• “Importing Smart Cards and Users” on page 145

Scripts for Unattended Installation

Prior to deploying the software across a domain with many hosts, plan the deployment with regard to user access and phased deployment of network segments, for the BoKS Desktops. Then develop scripts for unattended installations of BoKS Desktops, to be used after the BoKS Master and Replicas have been installed and configured.

Unattended installations of BoKS Desktops

BoKS Desktop is commonly deployed using Microsoft Active Directory or SMS. If you use your own script, include the following:

• Perform the installation from a network installation directory

• Add the machine to the database as a BoKS Desktop host and verify communication with the Master and nearest Replica.

See also:

• “BoKS Desktop Background” on page 132

• “Deploying BoKS Desktop” on page 135

• “Importing Smart Cards and Users” on page 145

Setting Password Parameters for BoKS Desktop Users

Configure BoKS Desktops either in the menu Virtual Card Administration (if you are using BoKS Desktop Domain Passwords) or in your BoKS Desktop reference installation before you roll out to local Windows workstations.

When using Domain Password mode, set the BoKS Desktop password parameter configuration to the following:

• Password age: 365 days. (or anything except Never expires)

Page 134 BoKS Manager 6.6.2 Installation Guide

Page 135: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• Virtual card logon attempts: can be set to any value, but lockout occurs at the minimum of the value set here on the Desktop and the value set centrally in BoKS Manager for Domain Passwords (which applies to all users). To avoid having lockout by BoKS Manager and BoKS Desktop at the same time, it is suggested to set the Desktop parameter to 1 more than the value set for Domain Password allowed logon attempts so that the BoKS Manager Domain Password allowed logon limit will be triggered first.

Note that these parameters do not apply to UNIX user accounts and logons on the Master, Replicas and any BoKS Server Agent for Unix/Linux hosts.

See also:

• The Administrator’s Guide for the applicable BoKS Desktop product

• The chapter “Managing Virtual Cards” in the Administration Guide

• “BoKS Desktop Background” on page 132

• “Deploying BoKS Desktop” on page 135

• “Importing Smart Cards and Users” on page 145

Deploying BoKS Desktop

This procedure describes how to deploy BoKS Desktop in a domain using BoKS Manager as identity and authentication server.

Topics include:

• CA and Virtual Card Quick Start

• Installing BoKS Desktop on a Reference Machine

• Logging On to BoKS Desktop for the First Time

– Logging on in Integrated Logon Mode

– Logging on in On-Demand Logon Mode

See also:

• Using an External CA with Client-Side Certificate Enrollment in the chapter Certificate Authorities in the Administration Guide

• “Importing Smart Cards and Users” on page 145

• “BoKS Desktop Background” on page 132

CA and Virtual Card Quick Start

Prerequisites: BoKS Manager is installed on the Master and the BoKS CA is initialized.

BoKS Manager 6.6.2 Installation Guide Page 135

Page 136: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

To start working with CAs and virtual cards:

1. Create a BoKS user using User Administration > Create User.

2. Create a virtual card for the new BoKS user using Virtual Card Administration > Create User/Admin Virtual Card.You can also link directly to this page from the Create User page in the previous step.

3. Install BoKS Desktop on the user’s Windows workstation, configuring the BoKS Master as an authentication server in the Desktop.For details, see “Installing BoKS Desktop on a Reference Machine” on page 136.

4. Export the BoKS Root CA to the Desktop Windows workstation using CA Administration > Export CA.For details, see the Export step in “Initializing BoKS Manager” on page 59.

The user is now ready to authenticate from their BoKS Desktop to BoKS Manager using their initial virtual card password as set in BoKS Manager.

If you are using an external CA, see Using External CAs in the chapter Certificate Authorities in the Administration Guide.

See also:

• “BoKS Desktop Background” on page 132

• “Deploying BoKS Desktop” on page 135

• “Importing Smart Cards and Users” on page 145

Installing BoKS Desktop on a Reference Machine

The following material is taken from the BoKS Desktop 6.6 Administrator’s Guide.

To install the BoKS Desktop for use in a FoxT solution:

1. Double-click the BoKS Desktop Windows Installer Package (.msi file).In the InstallShield Wizard Welcome screen, click Next.

2. In the Destination Folder screen, change the destination folder for BoKS Desktop installation files if required and click Next.

3. In the Setup Type screen, select whether to perform a complete or custom installation.By default, complete installation is selected, meaning all of the BoKS Desktop features are selected for installation. Refer to your Pre-Installation Check List to determine whether you want to customize your installation and deselect the features that you do not want to install. To deselect features that you do not want, click on the feature, and then click the X.

4. Click Next.

Page 136 BoKS Manager 6.6.2 Installation Guide

Page 137: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

5. Click Install to begin the installation.

6. Once the installation is complete, click Finish to complete the installation.The Configuration Wizard is displayed.

7. In the Configuration Wizard Welcome screen, click Next.

8. In the BoKS Manager screen, select Use a BoKS Manager.Type the IP address or the DNS name of the BoKS Master in the IP address or hostname box.You can configure whether you want to allow users to log in to BoKS Desktop when it cannot contact a BoKS Manager server using the Allow users to login offline checkbox. By default, the checkbox is selected, meaning users are allowed to login when the BoKS Desktop cannot contact a BoKS Manager server.Click Next.

9. In the Root Certificate screen, type the path to the root certificate from your BoKS Manager security domain, or click Browse... and browse to the location where the root certificate is located.Click Next.

10. In the Smart Cards screen, select an option to configure how BoKS Desktop users will use virtual cards / smart cards when they log on.Click Next.

11. In the PKCS#11 Smart Card Driver screen, click Browse... to indicate the location of the driver for use with your smart cards.

Note: This screen is only displayed if you selected an option that includes smart cards in the Smart Cards screen. If you selected Use virtual card only, this screen is not displayed.

Click Next.

12. In the Agents screen, check the Use agents to protect communication checkbox if you are using FoxT Application Agents in a FoxT ApplicationControl solution.Click Next.

13. In the Configuration Finished screen, click Finish to close the Configuration Wizard.

14. A Reboot Computer dialog is displayed asking whether you want to reboot the compiter now. Click Yes to reboot the computer.

Note: If you have configured BoKS Desktop in Integrated Logon mode, you will need to log on to BoKS Desktop directly once the computer has restarted.

After you install BoKS Desktop on a reference workstation, you are ready to log on.

BoKS Manager 6.6.2 Installation Guide Page 137

Page 138: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

Tip

• If you experience problems installing BoKS Desktop, you can turn on the debug feature so you can capture information to aid you and your FoxT support technician in troubleshooting the installation process. For instructions, see Debug in the BoKS Desktop Administrator’s Guide.

See also:

• “BoKS Desktop Background” on page 132

• “Deploying BoKS Desktop” on page 135

• “Importing Smart Cards and Users” on page 145

Logging On to BoKS Desktop for the First Time

The following material is taken from the BoKS Desktop 6.6 Administrator’s Guide.

These instructions are for a new logon to BoKS Desktop. If you are upgrading your BoKS Desktop, the logon procedure is the same as usual.

Logging on to BoKS Desktop for the First Time includes

• Logging on in Integrated Logon Mode

• Logging on in On-Demand Logon Mode

Note: Instructions for smart card users are also valid for Extended Smart Card users unless otherwise noted.

CAUTION: Do not insert or remove the smart card until the logon GUI is displayed. If you do so, the logon program may freeze temporarily or hang indefinitely, requiring the workstation to be rebooted. Removing the smart card when no logon GUI is displayed interrupts the operations BoKS Desktop is performing on the smart card.

Do not remove the smart card from the reader after you enter your password until the logon process is complete. Doing so may cause the smart card to become corrupt.

Logging on in Integrated Logon Mode

Follow the instructions for your installation type.

To log on to a standalone BoKS Desktop:

1. Insert your smart card into the card reader.

2. Enter your PIN.

3. Click the arrow icon.

Page 138 BoKS Manager 6.6.2 Installation Guide

Page 139: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

You are prompted to change your Credential Store password. After you change your password, a Windows Security message is displayed prompting for your Windows credentials.

4. Enter your Windows or network logon information.

5. Check Save Settings to save your Windows or network logon information to your Credential Store.

6. Click the arrow icon or press Enter.

7. You are now logged on to BoKS Desktop and your local Windows or network account.

To log on to BoKS Desktop installed for use with a FoxT solution:

1. Insert your smart card into the card reader, or enter your BoKS Desktop username if you have a virtual card, and click the arrow icon.The Password dialog box opens. If you are using RSA SecurID tokens, the passcode dialog box opens instead.

2. Enter your Credential Store password, smart card PIN or token passcode.If you are using an RSA SecurID token, enter your passcode instead of your password. If this is the first time you are using your token, see “Using RSA SecurID Tokens” on page 140.

3. You are prompted to change your Credential Store password. If you are using an RSA SecurID token, you will not be asked to change your password.After you change your password, a Windows Security message is displayed prompting for your Windows credentials.

4. Enter your Windows or network logon information.

5. Check Save Settings to save your Windows or network logon information to your Credential Store.

6. Click the arrow icon or press Enter.

7. You are now logged on to BoKS Desktop and your local Windows or network account.

Logging on in On-Demand Logon Mode

To log on to BoKS Desktop in On-Demand Logon mode:

1. Start the workstation.

2. Click the BoKS Desktop icon on the Windows System Tray to open the logon dialog box.The BoKS Desktop logon dialog box also opens if you try to access any BoKS Desktop components such as an application protected by a FoxT Application Agent.

BoKS Manager 6.6.2 Installation Guide Page 139

Page 140: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

3. If you have a smart card, insert your smart card in the reader and click the arrow icon.If you have a virtual card, type your BoKS Desktop username and click the arrow icon.The Password dialog box opens, or if you are using BoKS Desktop in a FoxT solution with RSA SecurID tokens, the Passcode dialog box opens instead.

4. Type your smart card or virtual card password. If you are using an RSA SecurID token, type your passcode instead of your password. If your token is in New PIN mode, see Logging on Using RSA SecurID Tokens in the BoKS Desktop Administrator’s Guide.

5. Click the arrow icon.If this is the first time you are logging on, you are prompted to change your Credential Store password. (If you are using a virtual card with an RSA SecurID token, you are not asked to change your password.)After you change your password, you are logged on to BoKS Desktop.

Tip for administrators working with BoKS Desktop in a FoxT solution

• If BoKS Desktop cannot communicate with BoKS Manager, check that the correct Root CA certificate has been installed. It is possible to access the BoKS Desktop configuration program to remove the incorrect certificate and install a new one even if you cannot log on to BoKS Desktop.Refer to User Cannot Log on to BoKS Desktop in the BoKS Desktop Administrator’s Guide for additional information.

Using RSA SecurID Tokens

Not available in standalone BoKS Desktop. RSA SecurID tokens require that a passcode be entered to log you on to BoKS Desktop. A passcode is either only the code shown on the token, as is the case with a PIN pad token, or your PIN number plus the code shown on the token, as is the case with a Standard SecurID card or a Key Fob.

• If your token is in New PIN mode, enter the code displaying on the token, but do not enter the PIN. The new PIN dialog box opens. Create a new PIN.

• If you have an RSA SecurID PINPAD and have already associated a PIN with your token, enter the PIN into the token, and press the diamond on the token. A code will display on the PIN pad. Enter the code in the Enter Passcode field in the BoKS Desktop dialog box.

• If you have a standard RSA SecurID Card or Key Fob and have already associated a PIN with your token, enter your PIN in the Enter passcode field in the BoKS Desktop dialog box, followed by the code displaying on your token.

• If you consistently receive error messages such as Access Denied, your token might be in New PIN mode. Try entering just the code the token displays without including your PIN. If the token is in New PIN mode, the New PIN dialog box opens. Create a new PIN.

Page 140 BoKS Manager 6.6.2 Installation Guide

Page 141: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

See the documentation provided with your RSA SecurID tokens and RSA Authentication Manager for more information on using RSA SecurID tokens.

Deploying BoKS SSH Client for Windows

Deploying BoKS SSH Client for Windows includes the following topics:

• BoKS SSH Client for Windows Basics

• Authentication in BoKS SSH Client for Windows

• Authorization in BoKS SSH Client for Windows

• Registering BoKS SSH Client for Windows Hosts

• Deploying BoKS SSH Client for Windows With Certificate Authentication

BoKS SSH Client for Windows Basics

BoKS Desktop 6.5 and later includes a client program enabling users to make secure SSH connections to UNIX servers from their PC. The BoKS SSH Client for Windows, which is also available as a stand-alone product, provides a number of services that can be run from a Microsoft Windows PC including secure shell, secure copy, secure file transfer and X11 forwarding.

BoKS SSH Client for Windows, whether standalone or included in BoKS Desktop, supports SSH connections both to BoKS-protected UNIX hosts running BoKS SSH and UNIX hosts running other versions of SSH such as OpenSSH. However, certain types of user authentication are only supported when using BoKS SSH Server Agent for Unix/Linux to access UNIX servers protected by BoKS, i.e. operates in a BoKS server environment.

A BoKS server environment is a UNIX domain where user accounts and access to and from BoKS Server Agents for Unix/Linux are regulated by security settings specified by administrators in the BoKS security database.

When BoKS SSH Client for Windows is deployed in a BoKS server environment, all access to servers is controlled using BoKS Access Routes. Different kinds of user authentication can be set for different Access Routes.

This manual deals only with configuration steps required when using the SSH Client in a BoKS environment. For details of server-side configuration in non-BoKS SSH environments, see your SSH server documentation.

For client configuration, BoKS SSH Client for Windows is delivered with full documentation. See the BoKS SSH Client for Windows Administrator’s Guide.

Authentication in BoKS SSH Client for Windows

BoKS SSH Client for Windows supports the following authentication methods:

BoKS Manager 6.6.2 Installation Guide Page 141

Page 142: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• SSH Password (only in a non-BoKS server environment)

• BoKS password (only supported in a BoKS server environment)

• SSH Public Key

• SSH Hostbased (only supported for BoKS hosts running BoKS Manager/Server Agent for Unix/Linux 6.0 and later)

• x.509 Certificate (only supported for Access Routes to BoKS hosts running BoKS Manager/Server Agent for Unix/Linux 6.5 and later)

• RSA SecurID token (only supported in a BoKS server environment)

• Secure Computing SafeWord token (only supported in a BoKS server environment)

• BoKS Virtual Card (only in a BoKS server environment with BoKS Desktop installed on the PC)

Using each of these authentication methods requires configuration steps on both the BoKS SSH Client for Windows and on the server side.

Authorization in BoKS SSH Client for Windows

Any user accessing BoKS-protected UNIX servers from a BoKS SSH Client for Windows PC must be assigned appropriate Access Routes, and depending on the authentication method specified for the Access Route, assigned the appropriate authenticator in BoKS Manager.

Note that in BoKS Manager, authorization must explicitly be granted for each SSH service used. This means administrators can specify granular authorization to SSH services, giving a user secure remote copy access to one server, for example, but denying them secure file transfer access.

The services available using BoKS SSH Client for Windows map to access methods available in BoKS Manager Access Routes as follows:

BoKS SSH Client Service BoKS Manager Access Method

SSH (BoKS SSH Client for Windows > BoKSSH) SSH_SH, SSH_EXEC

BSCP SSH_SCP

BSFTP SSH_SFTP

X11 Forwarding (SSH > X11) SSH_X11

Local Port Forwarding (SSH > Tunnels with Local radio button selected)

SSH_FWD

Remote Port Forwarding (SSH > Tunnels with Remote radio button selected)

SSH_RFWD

blink SSH_SH, SSH_EXEC

Page 142 BoKS Manager 6.6.2 Installation Guide

Page 143: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

Note: For SSH access, two access methods are available in BoKS Manager. SSH_SH allows the user to open an interactive shell on the server, while SSH_EXEC allows the user to execute commands on the server.

For example, to allow the user jsingh to run BSCP from the workstation JSINGH_PC to any UNIX host in the ORADEV Host Group, the user must be assigned the following Access Route:

SSH_SCP,SSH:JSINGH_PC->ORADEV

Registering BoKS SSH Client for Windows Hosts

You can optionally register the Microsoft Windows PCs running BoKS SSH Client for Windows in the BoKS database using their IP address. This provides extra security as it means users can only access SSH Access Routes from machines with the specified IP address.

However, if your Windows network is using dynamic IP addresses, or if you prefer not to register all Windows PCs in BoKS, you can also use the wildcard ANY/* as the fromhost in BoKS SSH Client for Windows Access Routes.

If you choose to register the BoKS SSH Client for Windows host in the BoKS database, it is registered with the host type Other Host.

Deploying BoKS SSH Client for Windows With Certificate Authentication

This section describes how to deploy certificate authentication on a BoKS Access Route from a Windows PC running standalone BoKS SSH Client for Windows to a BoKS Server Agent for Unix/Linux host. This requires the use of a third-party Certificate Authority which can issue x.509 certificates.

You can also specify optional SSH certificate authentication for BoKS Access Routes from BoKS SSH Client for Windows PCs to BoKS Manager-protected hosts. In this case, you can specify a backup authentication method. In parts of the Access Route where the client does not support certificate authentication (for instance between two UNIX hosts) BoKS Manager then uses the backup authentication method. For details, see Optional SSH Certificate Authentication Background in the Administration Guide.

To deploy this, a number of configuration steps are required on both the BoKS SSH Client for Windows PC, the BoKS Server Agent for Unix/Linux and the BoKS Manager Master.

On the BoKS Master:

1. Register the BoKS Server Agent for Unix/Linux host in the BoKS database.

2. Create a Host Virtual Card for the BoKS Server Agent for Unix/Linux host, choosing to automatically install it onto the host.

3. Optionally, register the BoKS SSH Client for Windows host in the BoKS database.

BoKS Manager 6.6.2 Installation Guide Page 143

Page 144: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

See “Registering BoKS SSH Client for Windows Hosts” on page 143.

4. Add a BoKS user account for the user. The first part of the user account name should either be the target UNIX host or target Host Group.

5. Assign an SSH Certificate authenticator to the user.

6. Import the third-party Certificate Authority chain for the x.509 certificate that will be used to authenticate the user into the BoKS Manager database.The certificate that issued the user’s certificate should be classified as VERIFY and LOGON.

7. Map the user’s x.509 certificate to the user using the mapcert program.See the BoKS man page for mapcert.

8. Assign the user an Access Route from the BoKS SSH Client for Windows PC to the target host or Host Group.

9. Specify SSH Certificate authentication for the Access Route.You can optionally specify SSH Certificate, Enforced SSH Certificate or Optional SSH Certificate as the authentication method. With Optional SSH Certificate, you can specify a backup authentication method for the Access Route.

On the BoKS Server Agent for Unix/Linux host:

1. Make sure the user has a local account on the host.

2. Make sure the host has a Host Virtual Card installed. Create a Virtual Card for the host using the Virtual Card Administration > Create Host Virtual Card menu in the BoKS Administration GUI, making sure you check the Install on Host checkbox.

On the PC running BoKS SSH Client for Windows:

1. Import the BoKS Root CA certificate. This enables the Client to verify the identity of the target server.

2. Import the user’s x.509 user certificate from the third party certificate authority.

3. Configure appropriate access on the Client, specifying certificate as the authentication method.

Using Agent Forwarding With SSH Certificate Authentication

SSH agent forwarding is supported for sessions from a PC running BoKS SSH Client for Windows with x.509 certificate authentication. This means that a user who has logged into the PC Client using a certificate can move from the first server to which they logged in to other servers without authenticating again, as long as agent forwarding is enabled on the servers and, in a BoKS server environment, the user has appropriate Access Routes to servers.

Page 144 BoKS Manager 6.6.2 Installation Guide

Page 145: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

Deploying SSH Certificate Authentication Example

In this example, x.509 certificate authentication is to be applied to the secure copy access granted to user jsingh from the PC JSINGH_PC to the UNIX Host Group ORADEV. jsingh is to use the x.509 certificate jsingh.pem Certificates are provided by a third-party CA, 3PCA.

1. Create Host Virtual Cards for all the hosts in ORADEV.

2. Create the BoKS user ORADEV:jsingh.

3. Import 3PCA’s Certificate Authority chain into the BoKS Manager database.

4. Import the BoKS Root Certificate onto JSINGH_PC.

5. Register JSINGH_PC in the BoKS database using the host type Other Host.This step is optional. You can also allow access from all hosts using the wildcard ANY/* for the fromhost in the Access Route.

6. Map the BoKS user ORADEV:jsingh to the certificate jsingh.pem using the mapcert program.

7. Assign the following Access Route for ORADEV:jsingh:

SSH_SCP,SSH:JSINGH_PC->ORADEV

8. Assign an SSH Certificate authenticator to user ORADEV:jsingh.You can choose whether or not jsingh must use the SSH certificate.

9. Assign SSH Certificate authentication to the Access Route SSH_SCP,SSH:JSINGH_PC->ORADEV.

You can choose whether or not SSH certificate authentication is enforced for the Access Route.

See also:

• The chapter “Managing Authentication on Access Routes” in the Administration Guide

• The chapter “Managing Authenticators” in the Administration Guide

• Configuring SSH in the Administration Guide

Importing Smart Cards and Users

You can create or import user accounts that have associated smart cards in a number of ways in BoKS Manager, dependent on the type of smart card and the environment. Before importing users and their smart cards, discuss your environment and needs with your Fox Technologies representative, who can provide valuable information on how to proceed.

This section outlines three ways:

BoKS Manager 6.6.2 Installation Guide Page 145

Page 146: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• Importing a Smart Card with Serial Number

• Importing a Rainbow iKey User

• Importing Smart Cards Using LDAP

When working from the command line to import users with smart cards, useful programs are:

• mapcert - import user certificates and map to virtual cards and in the BoKS database

• usrcreds - manage user virtual cards and certificates in the BoKS database

• cacreds - manage CA virtual cards and certificates in the BoKS database

• vcgen - generates virtual cards

• lockpsd - manages locking mechanisms for virtual cards

• tfsca - produce certificates based on profiles (user, host, key recovery, root and CA

• certinfo - list contents of a certificate

See also:

• “BoKS Desktop Background” on page 132

• Technical Notes on the Fox Technologies web site www.foxt.com

• About Importing Users from an /etc/passwd or NIS Map File in the chapter “User Administration” in the Administration Guide

• Extension Virtual Cards Basics in the chapter “Managing Virtual Cards” in the Administration Guide

• Creating Extended Smart Cards from the Command Line in the chapter “Managing Virtual Cards” in the Administration Guide

• LDAP Synchronization with Extension Virtual Cards and Multiple Certificates in the chapter “LDAP User Provisioning” in the Administration Guide

• The BoKS man pages for the programs mapcert, lockpsd, and vcgen

Importing a Smart Card with Serial Number

Use this procedure to assign (map) a smart card that has a visible serial number to a user account in BoKS Manager. If the serial number is not visible on the card, you can read the serial number from the certificate itself with the help of a card reader.

To import a smart card with a serial number into BoKS Manager:

Work in the BoKS Manager administration GUI for this procedure.

1. Import the root CA-certificates that signed the smart cards (if this has not already been done), either from a file or pasted into the BoKS Manager Administration GUI as follows:

• Save the CA certificate(s) at a location accessible from the BoKS Master.

Page 146 BoKS Manager 6.6.2 Installation Guide

Page 147: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• Log in to the BoKS Administration GUI.

• Select Certificate Authority Administration > Import CA.

• Provide the certificate by either typing the path to the CA certificate in the CA Certificate File box or pasting the certificate into the box Base64 Encoding.

• In the Label list, select USER if you want the smart cards to entitle BoKS Desktop user logon, or ADMIN if you want the smart cards to entitle BoKS Desktop administrator logon.

• In the Classification list, select VERIFY and LOGON for a CA that signs logon smart cards. If the smart cards are to be used as Extended Smart Cards to lock virtual cards, then add the classification SCLOCK.

• Click Execute to import the CA certificate.

2. In the BoKS administration GUI, create a user account or modify an existing account using User Administration > Create User or Modify User, filling in the name, Host Group, and other required or optional fields as usual. In the UUID field, enter the smart card’s Serial Number. For example:

7201230506

The user is now ready to authenticate from their BoKS Desktop to BoKS Manager using their smart card and password as set in BoKS Manager.

See also:

• “Importing Smart Cards and Users” on page 145

• “BoKS Desktop Background” on page 132

• <Italic>UUID Basics and Smart Card Management on page 255 in the Administration Guide

Importing a Rainbow iKey User

BoKS Desktop can be configured to work with the Rainbow iKey 2000 USB Token much the same way as smart cards are used. This section gives a brief overview of the setup procedure.

• Before doing this step, discuss your environment and needs with your Fox Technologies representative, who can provide valuable information on how to proceed.

Complete the following procedure, working partly on the BoKS Desktop Windows workstation, the Enrollment PC and in the BoKS Manager administration GUI:

To Import a Rainbow iKey User

1. Import the root CA-certificate (if this has not already been done), either from a file or pasted into the BoKS Manager Administration GUI as follows:

• Save the root CA certificate(s) at a location accessible from the BoKS Master.

BoKS Manager 6.6.2 Installation Guide Page 147

Page 148: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• Log in to the BoKS Administration GUI.

• Select Certificate Authority Administration > Import CA.

• Provide the certificate by either typing the path to the CA certificate in the CA Certificate File box or pasting the certificate into the box Base64 Encoding.

• In the Label list, select USER if you want the smart cards to entitle BoKS Desktop user logon, or ADMIN if you want the smart cards to entitle BoKS Desktop administrator logon.

• In the Classification list, select LOGON.

• Click Execute to import the CA certificate.

2. On the BoKS Desktop Windows workstation, install the Rainbow iKey Software, if it is not already installed, as follows:

• Insert the CD that came with your token.

• Launch the install program (start.exe).

• Select the option Install Rainbow iKey 2000 Series Authentication Solution

• When prompted, select the following utilities to install:PassPhrase UtilityAutomatic Cert Registration UtilityCIP Utilities

• When prompted, select the following reader driver to install:iKey 2000

• After the installation is done, you will find the driver that BoKS Desktop needs in the Windows System directory. This file is named dkck201.dll.

• Restart your machine if the Rainbow Installation program prompts you to reboot.

3. On the Windows workstation that serves as your Enrollment Station, initialize the USB Token and enroll for the certificate as follows:

• Start the Rainbow configuration utility CIP, select the slot, then right click and select Initialize Token.

• Select CSP type: DataKey RSA CSP

• In Internet Explorer > Internet Options > Content > Certificates, select the certificate.

• Click Export, which starts a wizard.

• Select Base64 Encoded.

• Click Save, and save to a file, for example DT_Cert

• Open a terminal window on the BoKS Master.

Page 148 BoKS Manager 6.6.2 Installation Guide

Page 149: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

• Copy the file to from the Windows workstation to a temporary location on the Master, for example, to the directory /tmp, using ftp or whatever means you wish.

• In the terminal window on the Master, launch the BoKS CLI administration program by typing (assuming the default installation directory /opt/boksm/sbin):

# cd /opt/boksm/sbin

# ./boksadm -S

This gives the BoKS Manager prompt:

BoKS #

• Run the mapcert program to map the user to the certificate by typing:

BoKS # mapcert -u <username> -c <filename>

where <username > is the BoKS user account name and <filename> is the full path to the file on the Master that contains the certificate (file DT_Cert, in the example earlier). This creates the MD5 hash for the user’s certificate and maps it to the user’s BoKS account.

• In User Administration > Modify User in the BoKS administration GUI on the Master, remove the user’s UUID from the UUID field (so that the user does not have both an MD5 hash and a UUID mapping)

4. In the BoKS Manager Administration GUI, map the user to the token's login certificate as follows:

• Create a user account or modify an existing account using User Administration > Create User or Modify User, filling in the name, Host Group and other required or optional fields as usual. In the UUID field, register the identifier for the user's login certificate, which may be the serialNumber, the uniqueIdentifier or an rFC822 email address. For example, using the email address in the certificate:[email protected]

The user now has an account with the appropriate certificate assigned, and the necessary CA certificate available in BoKS Manager to verify the user’s certificate.

5. On the BoKS Desktop Windows workstation, configure BoKS Desktop to use Rainbow iKey as a PKCS #11 Reader as follows, if it is not already configured:

• This procedure can be done during installation of BoKS Desktop or later. If BoKS Desktop is already installed, use Control Panel > Add or Remove Programs > BoKS Desktop to launch the BoKS Desktop InstallShield Wizard to modify your BoKS Desktop installation:

• In the BoKS Desktop Custom Setup window under Smart Card, select PC/SC Reader:

BoKS Manager 6.6.2 Installation Guide Page 149

Page 150: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

6. When prompted to enter the name of the PKCS #11 device driver, enter the name of the driver, which is dependent on the card you are using. You can find the name of the driver in the iKey CIP program window. For example, enter:dkck201.dll

7. Click Next and Finish.This completes the driver installation.

The user is now ready to authenticate from their BoKS Desktop to BoKS Manager using their iKey Rainbow token and password.

See also:

• “Importing Smart Cards and Users” on page 145

• “BoKS Desktop Background” on page 132

Importing Smart Cards Using LDAP

You can import user certificates stored in an LDAP directory at the same time as you import the user using the LDAP Synchronization function in BoKS Manager. The certificates can be used for logon, signing or for locking virtual cards. Multiple certificates can be imported for a user.

See the chapter “LDAP User Provisioning” in the Administration Guide for further details.

Before importing users and their smart cards, discuss your environment and needs with your Fox Technologies representative, who can provide valuable information on how to proceed.

Page 150 BoKS Manager 6.6.2 Installation Guide

Page 151: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

See also:

• Creating Extended Smart Cards from the Command Line in the chapter “Managing Virtual Cards” in the Administration Guide

• LDAP Synchronization with Extension Virtual Cards and Multiple Certificates in the chapter “LDAP User Provisioning” in the Administration Guide

• “Importing Smart Cards and Users” on page 145

• “BoKS Desktop Background” on page 132

BoKS Manager 6.6.2 Installation Guide Page 151

Page 152: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

5 Deploying BoKS Desktop

Page 152 BoKS Manager 6.6.2 Installation Guide

Page 153: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application AgentsThis chapter describes how to install and deploy BoKS Application Agents used together with BoKS Manager in the FoxT ApplicationControl solution.

Topics include:

• BoKS Application Agents Background

– System Overview with BoKS Application Agents

– BoKS Application Agent Versions

– Prerequisites for BoKS Application Agents

– About Deploying BoKS Application Agents

• Installing BoKS Application Agents in Overview

– FoxT ApplicationControl Quick Start

– Installing BoKS Application Agents in Overview

– Setting Up Encrypted Telnet

See also:

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed

• The chapter “Deploying BoKS Desktop”

• “Upgrading With BoKS Application Agents” on page 104

• The chapter “A Guided Tour” in the Administration Guide

• BoKS Desktop and the CSSP Server in the appendix “System Architecture” in the Administration Guide

• BoKS Desktop Administrator’s Guide

• The chapter “Host Administration” in the Administration Guide.

• The chapter “User Administration” in the Administration Guide

• The chapter “Certificate Authorities” in the Administration Guide

• “Using Learn Mode” on page 68

BoKS Application Agents Background

Topics include:

• System Overview with BoKS Application Agents

BoKS Manager 6.6.2 Installation Guide Page 153

Page 154: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

• BoKS Application Agent Versions

• Prerequisites for BoKS Application Agents

• About Deploying BoKS Application Agents

See also:

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed.

• “Deploying a FoxT solution with BoKS Manager” on page 28

System Overview with BoKS Application Agents

With the FoxT ApplicationControl solution installed, a secure connection between the BoKS Desktop and a BoKS Application Agent is established over which a user communicates with the application. Authentication and authorization can be flexibly configured to meet the requirements of the environment. To configure a FoxT ApplicationControl service, there are a number of steps you must perform on the BoKS Manager Master and a number on the machine on which the BoKS Application Agent is installed (the Agent Host).

Agent Hostapplication server

FoxT ApplicationControl

esktop

BoKS ManagerMaster or Replica

Page 154 BoKS Manager 6.6.2 Installation Guide

Page 155: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

Configuration Steps

Following are the main steps to setting up a FoxT ApplicationControl environment. Most of these steps are only done once, when BoKS Manager is initially installed. Thereafter it is only a matter of maintaining user identity credentials and access rights.

1. Initialize the BoKS CA on the BoKS Manager Master.

2. Configure BoKS Application Agent services.

3. Create virtual cards for users and hosts.

4. Install and configure BoKS Application Agents on Agent Hosts.

5. Set up BoKS Application Agent Access Routes on the BoKS Manager Master.

6. Map users to an application identity.

7. Install and configure BoKS Desktop on the personal computers.

See also:

• “Solutions Overview with BoKS Manager” on page 14

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed

• “About Deploying BoKS Desktop” on page 133

BoKS Application Agent Versions

For detailed instructions on installing and configuring BoKS Application Agents, see your BoKS Application Agent documentation set. This section contains information about how BoKS Manager 6.6.2 works with BoKS Application Agents.

Compatible BoKS Application Agent versions:

• BoKS 5.6 Agents or later (see exception R/3 below)

Note: Exceptions to the above are the following BoKS Application Agents, which must be upgraded before you install BoKS Manager 6.6.2:BoKS Application Agent 5.6 for R/3 must be upgraded to BoKS Application Agent 5.7 for R/3

Encryption for Agents

BoKS Application Agents up to version 6.0.1 do not support the default BoKS Manager encryption level of AES256. You must configure the Master and Replicas so that communication with Agent Hosts running a version 6.0.1 or earlier Agent Base System use RC5-128 encryption.

BoKS Manager 6.6.2 Installation Guide Page 155

Page 156: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

You can set appropriate encryption levels for communication with Agent Hosts using the $BOKS_etc/bremotever file or the BRIDGE_CRYPT variable in the $BOKS_etc/ENV file on the Master and Replicas.

Prerequisites for BoKS Application Agents

Requirements for deploying BoKS Application Agents in the BoKS Manager are dependent on the Agent and the intended usage implementation. Requirements often include the following:

• BoKS Manager is installed, initialized and basic configuration has been completed on the Master.

• For certain features and implementations, such as single sign on, BoKS Desktops must also be installed and configured.

See also:

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed

About Deploying BoKS Application Agents

Deploy BoKS Application Agents on hosts in the domain after:

• You have installed the Master and done Basic Configuration

• Imported or set up users in the database

• Imported or created user virtual cards or smart cards

The recommended deployment method is to first set up and test the Agent and configure it the way you want it, while allowing existing user access to run in parallel with the Agent.

Install and configure Agents, one at a time. To install a BoKS Application Agent, see the Installation and Administration Guide for the product version that you are using.

Configure the Agent on the Master, including:

• Specify the Agent host hostname and IP address and port number for communications in the BoKS Administration menu BoKS Application Agent Configuration.

• Set up Access Routes for users in the BoKS Administration menu BoKS Application Agent Configuration. For a new domain, you can disable Access Route Access Control while you study access patterns of users and set up your Access Routes. See “Using Learn Mode” on page 68 for details.

Page 156 BoKS Manager 6.6.2 Installation Guide

Page 157: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

• Set up user role mappings for the application, in the BoKS Administration menu BoKS Application Agent User Administration.

Test the Agent:

• Make sure that the Master and any Replicas that will service a particular Agent, and authorize user access to the application, while allowing existing user access to run in parallel with the Agent.

When it is time for switchover to BoKS application control, configure the application to only listen to the Agent. The method for doing this depends on the application and BoKS Application Agent. For proxy Agents, it involves setting the application listener process to listen to Local Host only.

See also:

• Deploying a FoxT solution with BoKS Manager

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed

Deploying BoKS Application Agents

Topics include:

• FoxT ApplicationControl Quick Start

• Installing BoKS Application Agents in Overview

• Setting Up Encrypted Telnet

See also:

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed

• The chapter “Deploying BoKS Desktop”

• “Using Learn Mode” on page 68

FoxT ApplicationControl Quick Start

To start working with application protection:

1. Install the BoKS Application Agent server modules on the BoKS Master.For details, see your BoKS Application Agent Installation and Configuration Guides.

2. Install the Agent Base System on the machine(s) on which you want to install BoKS Application Agent(s) to protect applications.

BoKS Manager 6.6.2 Installation Guide Page 157

Page 158: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

The machine on which the Agent is installed is known as the Agent Host. Note that the Agent can be installed on a Master, Replica or BoKS Server Agent for Unix/Linux host.For details, see your BoKS Application Agent Installation and Configuration Guides.

3. Add the Agent Host(s) to the BoKS security database using Host Administration > Register Host.

Note: If the Agent is installed on a Master, Replica or BoKS Server Agent for Unix/Linux host, the host will already be registered in the BoKS database.

4. Create a Host Virtual Card for the Agent Host(s) (one per host) using Virtual Card Administration > Create Host Virtual Card.

5. Export the Host Virtual Card for the Agent Host(s) from BoKS Manager using Virtual Card Administration > Export Virtual Card.

6. Save the Host Virtual Card you exported in the previous step into the Agent Base System on the Agent Host(s).For details, see your BoKS Application Agent Installation and Configuration Guides.

7. Install the appropriate BoKS Application Agents on the Agent Hosts on which you have already installed the Agent Base System.For details, see your BoKS Application Agent Installation and Configuration Guides.

8. Configure the appropriate Agents in BoKS Manager using BoKS Agent Configuration > Setup BoKS Agent.

Important: When you install and set up a BoKS Application Agent, the $BOKS_etc/method.conf on the Master and all Replicas is updated with the Agent method. However, if changes are made later, or new Replicas are added, the $BOKS_etc/method.conf file is not updated automatically, it must be updated manually.

9. Add BoKS Application Agent Access Routes for the appropriate users or User Classes in BoKS Manager. The access method is the BoKS Application Agent you installed in the previous step.For details, see The section “Adding BoKS Agent Access Routes” on page 909 in the Administration Guide.

10. Map the appropriate user accounts to their application login data.For details, see Mapping a User to an Application Identity on page 917 in the Administration Guide.

11. Make sure the user has a working installation of BoKS Desktop, and appropriate virtual card.

12. Setup protected ports on the BoKS Desktop Windows workstation.

Page 158 BoKS Manager 6.6.2 Installation Guide

Page 159: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

See your BoKS Desktop documentation.

Users are now ready to start securely accessing protected applications.

See also:

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed

• The chapter “Deploying BoKS Desktop”

• The chapter “Certificate Authorities” in the Administration Guide

• “Using Learn Mode” on page 68

Installing BoKS Application Agents in Overview

To install a BoKS Application Agent, read and follow the specific documentation for that Agent. The following general overview is taken from the BoKS Application Agent Introduction.

A typical sequence for installing and configuring a BoKS Application Agent is as follows:

1. Install the Agent Server module, that is, the Agent Definition Files, on the BoKS Manager Master.

2. Carry out administration operations on BoKS Manager.

3. Install and configure the Agent module and, if necessary, the BoKS Application Agent Base System, on each machine that is to act as an Agent Host.

4. Install and configure the Agent Desktop module (if any) on each BoKS Desktop.

The following procedures illustrate the steps typically required to perform the installation and configuration sequence. Further details about these procedures are given in the documentation for the specific BoKS Application Agents and for the relevant version of BoKS Manager.

To manage BoKS Manager:

1. Create an Agent Host definition.

2. Register the host as an Agent Host and set the node key.If this host uses a time zone different from the Master or the host’s configured Replica, add a line to the $BOKS_etc/timezones file on the Master defining the time zone for the host:

<hostname> <timezone>

3. Export the Agent Host Virtual Card.

4. Define the Agent access methods.

5. Define user rights to access the Agent methods.

BoKS Manager 6.6.2 Installation Guide Page 159

Page 160: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

To install and configure the Agent module and Base System on the Agent Host:

You must install and configure the Agent module and the Base System on every machine that is to act as an Agent Host.

You install the Base System only once on each Agent Host before you install any BoKS Application Agents on that Agent Host.

1. Install the BoKS Application Agent files and the Base System.

2. Configure the Base System on the Agent Host:

• Install the Agent Host Virtual Card.

• Define a domain port number and the node key.

3. Configure the Agent module on the Agent Host:

• Define the Agent access method.

• Define the Agent port number.

• Select the security protocol.

• Define the application server host and port number.

To install and configure the Agent Desktop module on BoKS Desktop:

You must install the Agent Desktop module on every BoKS Desktop that needs secure access to application servers.

1. Install the BoKS Application Agent files on BoKS Desktop (if required).

2. Register a new port definition in BoKS Desktop.

See also:

• BoKS Application Agents Introduction

• BoKS Application Agent Guide(s) for the specific Agents to be installed

• The chapter “Deploying BoKS Desktop”

• The chapter “Certificate Authorities” in the Administration Guide

Setting Up Encrypted Telnet

BoKS Manager 6.6.2 supports the following authentication and encryption protocols for Telnet:

• Encrypted telnet between BoKS-protected UNIX hosts (Master, Replica and Server Agents for Unix/Linux) using the old proprietary protocols DASP/bosk (line encryption key negotiation) and DASP/bosas (Single Sign-On based on node key secrets)

• SSL between BoKS Desktop and BoKS-protected UNIX hosts

Page 160 BoKS Manager 6.6.2 Installation Guide

Page 161: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

Single Sign-On is handled by the login program while line encryption is handled by telnetd.

However, with SSL-telnet, line encryption is handled by a separate program called sslproxy on the BoKS-protected host. The sslproxy listens to port 992 and communicates with the local telnetd via a Unix Domain Socket.

To set up telnet over SSL from a BoKS Desktop:

1. Install BoKS Manager 6.6.2

2. Install BoKS Desktop and include the Communication Protection module.

3. Create a user in BoKS and issue a virtual card for the user, or map a smart card certificate to the user.

4. Test to make sure the user can log in to the BoKS Desktop.

To configure the BoKS Desktop:

1. In the configuration program on the BoKS Desktop (BoKS Desktop Configuration), open the Communication Protection module.

2. Add a new V5 Agent, for example with the name “telnetssl”.

• In Original port, set either 23 or 992. If you use 23 you can restrict the servers to connect to, using the server field below. If you use 992 you can configure the port in the telnet client, using Microsoft telnet as follows:

telnet <hostname> 992

• Set Mapped port to 992.

• Leave Mapped port blank.

• In Server, select a BoKS Manager Master or Replica. If you leave this field blank (i.e. click Any) this definition will apply to all connections through the original port.

To configure BoKS Manager for Telnet SSO:

1. For each Master/Replica to which you will connect with telnet over SSL create a Host Virtual Card, if not already installed, using the menu Virtual Card Administration > Create Host Virtual Card. Fox Technologies recommends that you issue the Host Virtual Cards using the BoKS Root CA.

• If you don't do any further configuration in BoKS Manager, when you start a telnet session from the BoKS Desktop (via port 992), the session will be encrypted and you can login with user password as usual.

2. To achieve SSO, create a definition using Access Control Administration > Define Authentication and Encryption Methods.

• Select Login with Telnet.

BoKS Manager 6.6.2 Installation Guide Page 161

Page 162: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

6 Deploying BoKS Application Agents

• Under Authentication method, select either of Unix SSO or Secure SSO (both will work and have the effect that the sslproxy negotiates with the login program using the BOSAS protocol).

• Leave Encryption pre-selected as DES. (This setting is not actually used since the sslproxy will always encrypt the session using SSL).

• In From host, select the BoKS Desktop or a Host Group containing the Desktop host.

• In To host, select the BoKS Master/Replica or a Host Group containing BoKS servers.

You can later optionally delete the Encryption Method definition (DES) created by set up, since the sslproxy will always perform encryption.As an alternative to using the GUI to setup SSO you can use the command line utility bksdef. For example:

bksdef -n bosas -z 'TELNET:SSODT->SSOSRV' -b0 -e0 -w1234567

and then make sure the affected BoKS Desktop hosts are included in Host Group SSODT and BoKS servers in SSOSRV.

See also:

• The chapter “Deploying BoKS Desktop”

• Telnet SSO Basics in the chapter “Managing User Access to Applications” in the Administration Guide

• Configuring Telnet SSO Port in the chapter “System Configuration” in the Administration Guide

• BoKS Desktop and the CSSP Server in the appendix “System Architecture” in the Administration Guide

• The BoKS man page bksdef

Page 162 BoKS Manager 6.6.2 Installation Guide

Page 163: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Index

Symbols/etc/hosts file 65/etc/services file port settings 21, 24$BOKS_dir 18$BOKS_etc 18$BOKS_etc/brpf

updating file when upgrading 89$BOKS_var 18

Numerics128-bit secure connections (SSL) 195.6, 6.0 and 6.5 version compatibility 91

Aaccess methods

for BoKS SSH Client for Windows 142Access Routes

Learn mode for initial deployment 68accounts

root 27, 50, 73, 74, 109activating

sysreplace 68address

host 65advanced configuration of domain 71agent forwarding

with SSH certificate authentication 144architecture, domain 20audience, intended 7authentication

in BoKS SSH Client for Windows 141authentication with SecurID 31availability, Replicas for 22

Bbackoutpatch

program usage 82backup

of RBAC configuration 43backup for Master 73base port

BoKS Manager 30basic configuration, domain 66basics

Master 49Replica 72

bcastaddr file 21, 23, 72before deployment 30

BoKS 107BoKS Application Agents

access, quick reference 155installation overview 159password for Application Agent Host is

node key 26setting up encrypted telnet 160upgrading with 104

BoKS Application Application Agentsversions 155

BoKS Desktopaccess, quick reference 133first time logon 138installing 136quick start for CA and virtual cards 135setting password parameters 134setting up encrypted telnet 160unattended installation 134versions 133

BoKS Managerbase port 30BoKS Application Agent

compatibility 155BoKS Desktop compatibility 133BoKS Server Agents for Unix/Linux,

overview 107directories 38domain, overview 16install options and parameters 38installing on a host 49installing patches 80installing, overview 33Learn mode for deployment 68ports for multiple domains 40selecting Master, Replica or Server Agent

mode 53, 76, 115BoKS Manager administration

quick start 56requirements 18

BoKS Manager. See domain, BoKS ManagerBoKS Server Agent for Unix/Linux. See Server

Agents. 107BoKS SSH Client for Windows

authorization for 142deploying 141deploying with certificate

authentication 143registering hosts for 143supported authentication methods 141

BoKS Manager 6.6.2 Installation Guide Page 163

Page 164: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Index

boks_bru 93boks_uname 127boks_upgrade 99, 103, 125

access to Server Agent over SSH 129boks_upgrade_rc

file for setting boks_upgrade environment 126

BOKSADM_BROWSER 55bosas 160branding 7bremotever

configuring encryption using 97BRIDGE_CRYPT

defining encryption using 98variable for configuring encryption 97

browser path, BoKS ENV variable 55browser requirements 19brpf 90brpf file

updating when upgrading 90

CCA

quick start 135certificate

authentication for BoKS SSH Client for Windows 143

certificatesusing fingerprint, example on Master 62

communicationconfiguring, domain 21domain 21ports 22

Communication Protection, in BoKS Desktop 161

configuringBoKS Application Agents 159domain communication 21domain, advanced 71domain, basic 66

cookies 19enabled for web administration 18

DDebug

troubleshooting installation process 138deploying

planning overview 13Replicas in a domain 74Server Agents in a domain 66

directory (home directory) 63

directory names, BoKS directories 38disk space requirements 17dns 30, 65documentation 8documentation in download package 36domain

See also multiple domainsarchitecture 20architecture, Replicas 22communication 21configuration, advanced 71configuration, basic 66configuring communication 21deploying Master in a domain 74installing multiple on same subnet 40installing, overview 28overview of BoKS Manager 16planning 13ports for multiple domains 40root accounts registered in 27, 50, 73,

74, 109security, planning 13topologies, examples with multiple

domains 23Domain Passwords

restrictions for mixed BoKS Desktop versions 133

download package contents 34dtlogin

close sessions before install/upgrade 52, 75, 94, 95, 114

Eemergency access to Server Agent for

Unix/Linux 129encryption

configuring for a mixed environment 96setting up encrypted telnet 160strengths for BoKS Application Agent

versions 155ENV variables

browser path 55environments, mixed 91errlog.ignore 101errlog.msgs 101ESX Server

WMwareinstalling BoKS on 47

examplesdomain with Replicas 22multiple domain topology 23

Page 164 BoKS Manager 6.6.2 Installation Guide

Page 165: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Index

FFast user switching, Windows XP 133fingerprint

host certificate for authentication of pre-registered hosts 120

MD5 hash of the Master certificate 62firewall 21, 30FoxT ServerControl

See also Server Agents 107deploying Server Agents 107system overview 108

FoxT solutionsnames and abbreviations 9

GGIDs 28, 31

synchronization 28group

assign UNIX group to user 63group passwords

removing at install 41GUI

quick start with password login 56

Hhome directory 63Host Groups

planning 25host type

deactivate before deleting host or changing host type 111

Host Virtual Cardpassword for Application Agent Host 26

host:username notation 28Hosts

registering for BoKS SSH Client for Windows 143

hostsaddress 65in multiple domains 21type Other Host 16

hotfixapplying with Solaris 10 zones 46

hotfixesinstalling 125

HTML 4 Transitional 19

Iimporting

user database 71

installation and deployment paths 20Installation Guide

organization 7recommended reading 9

installinga Master 51a Replica 74a second domain on same subnet 40a Server Agent 113BoKS Application Agents 159BoKS Desktop 136BoKS patches 80documentation in download package 36hotfixes, patches and upgrades

remotely 125IP address with multiple NICs 21Learn mode for deploying Access

Routes 68Master in a domain 74on a host 49OS patches 83overview 33package contents 34planning domain, overview 13program options and parameters 38Replicas in a domain 74script for unattended 112selecting Master, Replica or Server Agent

mode 53, 76, 115Server Agents in a domain 66shared memory setting 49, 90SSH, privilege separation, install

option 39uninstalling Server Agent 130unpacking the download package 36

installpatch 81IP address 65

define 30

Kkeys, node 26keystroke log files

during upgrade 90

LLearn mode for initial deployment 68learnmodelog program 70load balancing 22log backup on Replica 73

BoKS Manager 6.6.2 Installation Guide Page 165

Page 166: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Index

Logging onfirst time 138troubleshooting 140

MMapped port, in BoKS Desktop 161Master

certificate, MD5 hash 62installing 51planning basics 49Replica designated as backup 73root account in BoKS 50shared memory 49

method namesfor BoKS Application Agents,

re-registering 104mixed environments 91mode, selecting Master, Replica or Server

Agent 53, 76, 115multiple domains

examples, usage 23illustration 24installing on same subnet 40ports 40register host in 21See also domain

multiple NIC 21

Nname resolution 21naming convention 30NIC

multiple 21node keys 26

password for Application Agent Host Vir-tual Card 26

notation, usernames 28

Ooffline

login to a BoKS Server Agentenabling at setup 129

Other Host 16host type for outside domain 21

Ppackage, install package contents 34parameter

for pre-registered host setup 121

password hash algorithmsfor Unix users when upgrading 88

password login to GUI 56passwords

setting BoKS Desktop parameters 134patch

applying with Solaris 10 zones 46patches

directory structure 37installing BoKS 80, 125installing operating system patch 83uninstalling BoKS patch 82

paths, installation and deployment 20planning

See also domainBoKS domain, overview 13Host Groups 25

ports 22in multiple domains 40

pre-deployment tasks 30pre-registered host

install preparations for 119installing BoKS Server Agent for

Unix/Linux on 121setup parameters for 121

pre-registration typeusing when installing BoKS Server

Agent 120prerequisites

See also system requirements 16Server Agent for Unix/Linux 112

primary IP address 30primary NIC 21product documentation 8

Qquick start for remote administration 56

RRBAC

installation of 43rbac_saved_checksum

backup checksum of RBAC configuration 43

rbac_saved_config.tar.bkzbackup of local RBAC configuration 43

remote installation of upgrades 125

Page 166 BoKS Manager 6.6.2 Installation Guide

Page 167: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Index

Replicasavailability and load balancing 22basics 72configuring log file on 73designate as backup for Master 73installing 74log backup 73shared memory 90usage in domain 22

requirementsSee also system requirements 16BoKS Manager Administration GUI

browser 19disk space 17for installing BoKS Manager 16web administration 18web browser 19

root account 27, 50, 73, 74, 109RSA ACE/Server. See RSA Authentication

Manager 18RSA Authentication Manager 18RSA SecurID

RSA Authentication Manager server, sd-conf.rec file 31

token, requirements 18RSA SecurID token

using 140

Sscripts

unattended installation 112sdconf.rec

RSA Authentication Manager 31second domain, ports for 40secret

for pre-registered hosts 120SecurID

authentication 31semaphore sets required 17Server Agent upgrade

backed up files 100logging 99node keys 101program return codes 102

Server AgentsBoKS Server Agent for Unix/Linux

basics 109deactivate before uninstall or change host

type 111deploying in domain 109enabling offline login for 129installing 113installing hotfixes, patches and

upgrades 125overview 107packaging information 98, 109prerequisites for deploying 112scripts for unattended install 112system overview diagram 108uninstalling 130upgrading 98

Server field, in BoKS Desktop 161ServerControl

see FoxT ServerControl 107service and support, getting 11session timeout 19setting browser path 55setting up Master, Replica or Server Agent

mode 53, 76, 115setup

pre-registered Server Agent 121shared memory

same on Master and Replicas 49, 90SHM_SIZE 53, 76

solutions. See FoxT solutions 9SSH

emergency access to Server Agent during hotfix, patch or upgrade 129

setup privilege separation during install 39

SSH certificate authenticationusing agent forwarding with 144

SSO, setting up encrypted telnet 160support and service, getting 11sysreplace, using to activate BoKS Manager 68system requirements

browser 19general 16Master 49Replicas 72

system settings 66See also security level

Ttasks, pre-deployment 30

BoKS Manager 6.6.2 Installation Guide Page 167

Page 168: BoKS Manager 6.6.2 Installation Guide · Chapter 2: Installing BoKS Manager ... BoKS Manager is a part of the FoxT ServerControl solution and can be managed using ... The BoKS Manager

Index

telnet, setting up encrypted 160terminology, in documentation 9token requirements, RSA SecurID 18troubleshooting

Learn mode 68

UUIDs 63

synchronization 28user identifier 31

unattended installationBoKS Desktop 134scripts for 112Server Agent hotfix, patch or

upgrade 125uninstall -r

keep BoKS RBAC configuration 85uninstalling

BoKS Manager 84BoKS patch using backoutpatch 82

UNIX groupassign to user 63

UNIX, terminology includes Linux 10unpacking the download package 36upgrade

with Solaris 10 zones 46upgrade_client program 99upgrading

domain, overview 91files not backed up in Server Agent

upgrade 101overview 87Server Agent. See also Server Agent

upgrade 98Server Agents for Unix/Linux 98, 125

user accountsroot account 27, 50, 73, 74, 109

user database, importing 71usernames

notation 28uniqueness 28

usersassign UNIX group to user 63home directory 63importing to domain 71UID 63

Vvirtual cards

password for Application Agent Host is node key 26

quick start 135virtual servers

installing on 44VMware ESX Server

installing BoKS on 47

Wweb browser requirements 19Windows XP Fast User Switching 133

Xx.509 certificates

for authentication with BoKS SSH Client for Windows 143

XP, Windows, disabling Fast User Switching 133

xRBACinstallation of 43

Zzone

applying hotfixes and patches on Solaris with 46

compatibility with Solaris 46requirements for installing BoKS in Solar-

is environment with 45support in Solaris 10 45uninstalling BoKS from Solaris with 46upgrading with Solaris 46

Page 168 BoKS Manager 6.6.2 Installation Guide