CBH enables all basic management of authentication, authorization, account, and audit, or AAAA. It also provides features such as efficient O&M and ticket application.
Credential Authentication
CBH uses multi-factor authentication and remote authentication technologies to enhance O&M security.
- Multi-factor authentication: CBH authenticates system users by mobile one-time password (OTP), SMS message, USB key, and/or OTP token. This greatly reduces O&M risks caused by leaked credentials.
- Remote authentication: CBH interconnects with third-party authentication services or platforms to perform remote system user account authentication to prevent credential leakage and ensure secure O&M. Currently, Active Directory (AD), Remote Authentication Dial-In User Service (RADIUS), Lightweight Directory Access Protocol (LDAP), and Azure AD remote authentication are available. In addition, CBH allows you to synchronize system users from the AD domain server directly without having to modify the original user deployment structure.
Account Management
With a CBH system, you can centrally manage system user accounts and managed resource accounts, establishing a visible, controllable, and manageable O&M system covering the entire account lifecycle.
Table 1 Account management
|
Feature |
Description |
|
System user accounts |
CBH enables you to grant a unique account of certain permissions to an individual system user based on their duties to eliminate security risks resulted from use of shared accounts, temporary accounts, or privilege escalation.
- Batch importing
CBH enables you to synchronize system users from a third-party server or import system users in batches, eliminating the need to create system users repeatedly.
- User groups
CBH allows you to add users of the same type in a group and assign permissions by user group.
- Batch management
CBH enables you to manage user accounts in batches, including deleting, enabling, and disabling user accounts, resetting user passwords, and modifying basic user configurations.
|
|
Managed resource accounts |
With a CBH system, you can centrally manage accounts of resources managed in the CBH system through the entire account lifecycle, log in to managed resources by Single Sign-On (SSO) tool, and seamlessly switch over between resource management and O&M.
- Resource types
CBH supports management of a wide range of resource types, including host (such as Windows and Linux hosts), Windows application, and database (such as MySQL and Oracle) resources.
- Host resources of the client-server architecture, including hosts with the Secure Shell (SSH), Remote Desktop Protocol (RDP), Virtual Network Computing (VNC), Telnet, File Transfer Protocol (FTP), SSH File Transfer Protocol (SFTP), DB2, MySQL, SQL Server, Oracle, Secure Copy Protocol (SCP), or Rlogin protocol configured.
- Application resources of the browser-server architecture or the client-server architecture, including more than 12 types of browser- and client-side Windows applications, such as Internet Explorer, Google Chrome, and Oracle tools.
- Resource management
- Batch importing
CBH enables quick auto-discovery, synchronization, and bulk importing of cloud resources, such as Elastic Cloud Server (ECS) and Relational Database Server (RDS) DB instances on the cloud for centralized O&M.
- Account group management
CBH manages resource accounts by group. By placing resource accounts of the same attribute in the same group, you can assign permissions on a group basis and let accounts inherit such permissions directly from the group they belong to.
- Password autofill
CBH uses the Advanced Encryption Standard (AES) 256-bit encryption technology to encrypt managed resource accounts and uses the password auto-filling technology to encrypt shared accounts to prevent account leakage risks.
- Automatic password change of managed resource accounts
CBH supports password change policies so that you can periodically change account passwords to keep managed accounts secure.
- Automatic synchronization of managed resource accounts
CBH allows you to configure account synchronization policies so that you can periodically check and synchronize accounts information between the CBH system and the managed host resources, including creating, deleting, and modifying managed accounts. In this way, you can ensure that only healthy accounts are used.
- Batch management
CBH allows you to batch manage information and accounts of managed resources, including deleting a resource, adding a resource label, modifying resource information, verifying a managed account, and deleting a managed account.
|
Permissions Management
CBH supports fine-grained permission management so that you have complete control over who can access the CBH system and which managed resources can be accessed by a specific system user, safeguarding both the CBH system and the managed resources.
Table 2 Permissions management
|
Function |
Description |
|
CBH system access permission |
You can assign permissions to a single system user to log in to a CBH system and use different functional modules in the CBH system according to their duties.
- System user roles
CBH supports role-based and module-based permission management so that you can allow an individual system user to access specific functional modules based on their duties.
You can use default user roles or customize diversified roles by adding different functional modules to them.
- Departments
CBH enables department-based system user management so that you can specify departments of different levels for individual system users. There are no limits on the number of department levels.
- Login restrictions
CBH controls system user logins from many dimensions, including login validity period, login duration, multi-factor verification, IP addresses, and MAC addresses.
|
|
Managed resource access permission |
You can assign permissions for resources by user, user group, account, and account group.
- Access control
You can control resource access by resource access validity period, access duration, and IP address. CBH also allows you to assign permissions to different system users for file uploading and downloading, file transfer, and clipboard. A watermark of authorized system user will be displayed on the O&M session.
- Two-person authorization
You can configure multi-level authorization for different system users to access a specific resource, safeguarding sensitive and mission-critical resources.
- Command interception
You can set command control policies or database control policies to forcibly block sensitive or high-risk operations on servers or databases, generate alarms, and review such operations. This enhances control over key operations.
- Batch authorization
You can grant permissions for multiple resources to multiple system users by user group or account group.
|
Operation Audit
In a CBH system, each system user has a unique identifier. After a system user logs in to the CBH system, the CBH system logs their operations and monitors and audits their operations on managed resources based on the unique identifier so that any security events can be discovered and reported in real time.
Table 3 Operation audit description
|
Function |
Description |
|
System operation audit |
All operations in a CBH system are recorded, and alarms are reported for mistaken operations, malicious operations, and unauthorized operations.
- System login logs
Details about a login, including the login mode, system user, source IP address, and login time, are recorded. All system login logs can be exported with just a few clicks.
- System operation logs
All system operation actions are recorded. All system operation logs can be exported with just a few clicks.
- System reports
CBH displays all operation details of system users in one place, including user statuses, user and resource creation, login methods, abnormal logins, and session controls.
System reports can be exported with just a few clicks and periodically reported by email.
- Alarm notification
You can configure different alarm reporting methods and alarm severity levels for system operation and environment so that the CBH system can send alarm notifications by email or system message once it discovers system exceptions and abnormal user operations.
|
|
Resource O&M audit |
A CBH system records user operations throughout the entire O&M process and supports multiple O&M audit technologies and audit methods. It can audit user operations at any time, identify O&M risks, and provide basis for security event tracing and analyzing.
- Audit technologies
- Linux command audits
For command operations through character protocol (such as SSH and Telnet), a CBH system records the entire O&M process, parses operation commands, reproduces operation commands, and quickly locates and replays operations using keywords in input and output results.
- Windows operation audits
For operations on terminals and applications through graphics protocol (such as RDP and VNC), the CBH system records all remote desktop operations, including keyboard actions, function key operations, mouse operations, window instructions, window switchover, and clipboard copy.
- Database command audit
For command operations through database protocol (such as DB2, MySQL, Oracle, and SQL Server), the CBH system records the entire process from single sign-on (SSO) to database command operations, parses database operation instructions, and reproduces all operating instructions.
- File transfer audits
For file transfer operations through remote desktop protocol (such as FTP, SFTP, and SCP), the CBH system audits the entire file transfer process on web browsers or clients, and records the names and destination paths of transferred files.
- OCR-aid audits
CBH uses the Optical Character Recognition (OCR) technology to convert images generated for O&M operations to text files, improving image audit efficiency.
- O&M audit methods
- Real-time monitoring
Ongoing O&M sessions can be monitored, viewed, and terminated.
- History logs
All O&M operations are recorded and history session logs can be exported with just a few clicks.
- Session videos
Linux commands and Windows operations can be recorded by video.
Video files can be downloaded with just a few clicks.
- Ops reports
CBH uses diversified reports to display O&M statistics in one place, including O&M action distribution over time, number of resource access times, session duration, two-person authorization, command interception, number of commands, and number of transferred files.
Ops reports can be exported with just a few clicks and periodically reported by email.
- Log backup
CBH allows you to back up history session logs to a remote Syslog server, FTP/SFTP server, and OBS bucket for disaster recovery.
|
Efficient O&M
CBH supports multiple architectures, tools, and methods to manage a wide range of resources.
Table 4 Efficient O&M functions
|
Function |
Description |
|
O&M using a web browser |
By leveraging HTML5 for remote logins, O&M engineers can implement O&M such as real-time operation monitoring and file uploading and downloading without having to install a client.
- One-stop O&M
O&M engineers can complete remote O&M anytime anywhere through Internet Explorer, Google Chrome, or Mozilla Firefox browsers on Windows, Linux, Android, and iOS operating systems without having to install plug-ins.
- Batch login
CBH supports one-click login to multiple authorized resources so that O&M engineers can manage those resources on the same tab page of a browser.
- Collaborative session
Allows multiple participants to perform O&M through a shared O&M session. The user who initiates the O&M session can invite other O&M personnel or experts to join in the on-going session to locate problems together. This can greatly improve O&M efficiency when multiple O&M engineers work together.
- File transmission
CBH uses the wss-based file management technology to upload, download, and manage files online, enabling file sharing among several hosts.
- Command group-sending
CBH supports the group sending function for multiple Linux resources. With this function enabled, when a command is executed in a session window, the same operation is performed in other session windows.
|
|
Third-party client O&M |
CBH enables one-click interconnection with multiple O&M tools so that you can perform O&M without having to change the original client usage habits.
- O&M tools
SecureCRT, Xshell, Xftp, WinSCP, Navicat, and Toad for Oracle
- SSH clients
For host resources with character protocols configured, O&M engineers can log in to them through SSH clients.
- Database clients
For database-deployed host resources, O&M engineers can log in to databases using configured SSO tools.
- File transfer clients
For host resources with file transfer protocols configured, O&M engineers can log in to them through FTP, SFTP, or SCP client.
|
|
Automatic O&M |
CBH enables automated O&M to simplify online complex operations, eliminating repetitive manual workloads and improving efficiency.
- Script management
CBH manages offline scripts, including Shell and Python scripts.
- O&M tasks
CBH automatically executes one or more preset O&M tasks, such as command execution, script execution, and file transfer tasks.
|
Ticket Application
During the O&M, if a system user does not have the required permissions for a certain resource, they can submit a ticket to apply for the permissions.
- For O&M personnel, they can:
- Manually or automatically trigger the ticket system and submit access approval tickets, command approval tickets, and database approval tickets.
- Submit, query, remind approval of, cancel, and delete tickets.
- For system administrators, they can:
- Customize approval processes, including multi-level approval processes.
- Approve one or more tickets at a time, as well as reject, cancel, query, and delete tickets.
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.