Updated on 2023-04-11 GMT+08:00

Verifying the CBH System configurations

After the instance specifications are changed, log in the CBH system as system administrator admin to verify system configuration consistence for each module in the navigation pane of the CBH system.

You need to verify system configurations in the department, user, resource, policy, ticket, audit, operation, and system modules. For more details, see Table 1

Table 1 System configuration verification

Level 1 Module

Level 2/3 Module

Verification Item

Department

None

Department level, department name, number of users, and number of hosts.

User

User

Number of users and basic information about each user, such as the login name, user name, status, role, and department.

User Group

Number of user groups, user group names, and group members.

Role

Role configuration.

Resource

Host

Number of managed hosts and basic information about each managed host, including the host name, host address, port number, protocol type, OS type, and number of accounts.

Application Publish

  • Number of applications, names, addresses, associated hosts, and department of each application.
  • Number of application servers, names, addresses, types, and department of each application server.

Account

  • Number of accounts and basic information about each account, including the account name, related resources, host or application address, port number, and department.
  • Whether accounts can be used. You can select accounts in batches and click Verify to check whether the selected accounts can be used to log in to the system.

Account Group

Number of account groups, account group names, members in an account group, and number of members in an account group.

Operation

Host label

Number of labels of managed hosts, such as the number of labels, names, and labeled hosts.

Application Label

Verify the configuration information about the number of tags, names, and tagged application resources released by the application.

Policy

ACL Rules

Number of ACL rules and basic information about each ACL rule, such as rule name, status, associated users, and associated accounts.

Cmd Rules

  • Number of policies, policy names, actions, and associated command sets.
  • Number of command sets, names, commands, and parameters.

Chpwd Rules

Number of policies and basic information about each policy, such as policy names, status, execution modes, and password change mode.

Audit

System Report

Auto Send configuration

Ops Report

Auto Send configuration

Ticket

ACL Ticket

Basic information about the authorization ticket, including ticket number, status, and application time

System

Security

System login security configuration, including user locking, policy password, web login, and SSH client login.

Outgoing

Email and SMS gateway configuration.

Authenticate

AD domain, RADIUS, and LDAP authentication configurations.

Ticket

Basic settings and approval process of tickets.

Alarm

Alarm channel and alarm level (severity)

Storage Mgmt

Auto deletion.

Log Backup

Remote backup to the Syslog server and remote backup to the FTP/SFTP server.

Backup&Restore

Automatic configuration backups.