- What's New
- Function Overview
- Service Overview
- Getting Started
-
User Guide
-
Instances
- Permissions Management
- Assigning Permissions Using IAM
- Creating a CBH Instance
- Checking Instance Details
- Resetting the Login Method for User admin
- Resetting the Password of User Admin
- Upgrading the CBH System Version
- Starting a CBH Instance
- Stopping a CBH Instance
- Restarting a CBH Instance
- Changing a VPC for a CBH Instance
- Changing Security Groups
- Binding an EIP to a CBH Instance
- Unbinding an EIP from a CBH Instance
- Allowing Access to Cloud Assets
- Managing Tags
- Key CBH Instance Operations Recorded by CTS
-
Logging In to the CBH System
- Overview
- Using a Web Browser to Log In to Your Bastion Host
- Using a Client to Log In to Your Bastion Host
- Configuring Multifactor Verification
-
Managing Login Security
- Configuring User Login Lockout
- Configuring the Login Password Policies
- Configuring Web Login Timeout and Authentication
- Updating a System Web Certificate
- Configuring the Mobile OTP Type
- Configuring the USB Key Vendor
- Configuring Policies to Disable Zombie Users (Available in V3.3.30.0 and Later Versions)
- Configuring the RDP Resource Client Proxy (Available in 3.3.26.0 and Later Versions)
- Enabling API Configuration (Included in V3.3.34.0 and Later Versions Only).
- Configuring Automatic Inspection (Available in V3.3.36.0 and Later)
- Configuring a Resource Account
- Configuring Client Login
- Configuring a User Expiration Reminder
- Configuring Session Limit
- Dashboard of the CBH System
- Department
- User
- Resource
- Policy
- Ticket
-
Operation
-
Host Operation
- Viewing the Host Resource List and Setting Resource Labels
- Logging In to Managed Resources Using a Web Browser for O&M
- Logging In to Resources Using an SSH Client for O&M
- Logging In to File Transfer Resources Using an FTP or SFTP Client
- Logging In to and Maintaining Database Resources Using an SSO Client
- Logging In to Hosts in Batches for O&M
- File Transmission
- Cooperation
- Enabling Forcible RDP Connections
- Application Operation
-
Host Operation
- Audit
- System Management
- Installing an Application Server
- Monitoring
-
Instances
- API Reference
- Best Practices
-
FAQs
-
Product Consulting
- What Are the Differences Between a CBH Instance and a CBH System?
- Which Security Hardening Measures Does CBH Provide?
- What Is the Number of Assets?
- What Is the Number of Concurrent Requests?
- Can I Use a CBH System to Centrally Manage My Cloud ERP or SAP Services?
- What Does Automatic O&M Include?
- How Do I Obtain an Enterprise Agreement Number?
- How Can I Configure Ports for a CBH Instance?
- Can CBH Manage Resources Under Multiple Subnets?
- Which Types of Databases Can I Manage in a CBH System?
- Regions and AZs
- About Purchase
- License
- About Backup, Specification Change, and Upgrade
-
About File Transfer
- What File Transfer Methods Can be Used in a CBH System?
- How Do I Use FTP/SFTP to Transfer Files to or From an SSH Host?
- How Do I Upload or Download Files When I Log In to Managed Hosts Using a Web Browser?
- What Is the Netdisk of a CBH System?
- How Do I Clear the Personal Net Disk Space?
- How Do I Configure File Management Permissions?
- Does CBH Check Security of Uploaded Files?
-
Billing, Renewals, and Unsubscriptions
- How Do I Renew a CBH Instance and Update the Mapped System Authorization?
- How Is CBH Billed?
- Can I Unsubscribe from a CBH Instance?
- How Is the CBH Instance Billed After I Change Specifications of the Instance?
- Will I Be Billed for Upgrading the CBH Software Version?
- How Do I Increase the CBH Instance Quota?
- How Do I Purchase a CBH Instance When the System Prompts that Resources Are Sold Out?
-
About CBH System Login
- Login Methods and Password Issues
-
Multifactor Verification
- How Can I Install an OTP Authentication Application on the Mobile Phone?
- Why Does the Mobile OTP Application Binding Operation Fail?
- How Do I Enable Mobile SMS Authentication For Logging In to the CBH System?
- How Do I Cancel Mobile SMS Authentication?
- How Can I Cancel Mobile OTP Authentication If No Mobile OTP Application is Bound to My Account?
- Why Does Login Fail When an Account That Has Mobile OTP Application Bound Is Used to Log In?
- Login Security Management
-
User, Resource, and Policy Configuration in a CBH System
- Users
-
Adding Resources to a CBH System
- How Do I Change the Password of a Managed Resource Account?
- How Do I Set a Sudo Privilege Escalation Account for the Managed Resource?
- How Do I Add a Label to Resources Managed in a CBH System?
- How Do I Import or Export Information of Host Resources in Batches?
- What Are the AK and SK of an Imported Host? How Can I Obtain Them?
- What Are the Statuses of a Managed Resource Account in a CBH System?
- Can I Share Labels of Managed Resources with Other System Users?
- Can I Manually Enter a Password to Log In to a Managed Resource Through the CBH System?
- Why Does the CBH System Fail to Identify Hosts Imported in Batches?
- How Do I Access Services Provided by the Intranet Through a CBH Instance?
- How Do I Add a Server with an IPv6 Address to a CBH Instance?
- What is an Empty Account?
- Policy Management
- System Configuration
-
Resources Managed in a CBH System
- Operation Management
-
O&M Operations
- What Login Methods Does CBH Provide?
- How Do I Create a Collaborative O&M Session?
- How Do I Use Resource Labels in the CBH System?
- How Do I Set the Resolution of the O&M Session Window When I Use a Web Browser for O&M?
- How Can I Use Shortcut Keys to Copy and Paste Text When a Web Browser Is Used for O&M?
- What Are the Shortcut Keys for O&M in CBH?
-
O&M Log Audit
- What Audit Logs Does CBH Provide?
- Can I Download Operation Recordings?
- Can I Delete CBH O&M Data for a Specific Day?
- Can I Back Up System Audit Logs to an OBS Bucket?
- How Long Can I Store Audit Logs in the CBH System?
- How Are Audit Logs in the CBH System Processed?
- Can I Audit User Operations If a User Logs In to Server A Through the CBH System and Then Logs In to Server B from Server A?
- Why Is the Playable Duration Shorter Than the Total Duration of a Session?
- Why Is There No Login Record in History Sessions While I Received a Resource Login Message?
-
Troubleshooting
-
CBH System Login Failures
- What Does a Login Exception Occur?
- Why Is the IP Address or MAC Address Blocked When I Log In to the CBH System?
- Why Am I Seeing Error Code 404 When I Log In to the CBH System?
- Why Am Seeing Error Code 499 When I Log In to the CBH System?
- What Are Possible Faults If I Log In to the CBH System as an Intranet User?
- Why Is a Host Inaccessible Through CBH?
- Why Does CBH Login Fail Through an ECS in a New VPC Connected with the VPC Where CBH Is via VPN or a VPC Peering Connection
-
CBH Managed Resource Login Failures
- Why Does an Exception Occur When I Log In to My Resources Managed in CBH?
- Why Am I Seeing Login Errors of Code: T_514 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: T_1006 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_515 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_519 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_769 When I Use a Web Browser for Resource O&M?
- Why Cannot I See the Accessible Resources in the Resource List?
- Why Does the Session Page Fail to Load When I Log In to the Managed Host Using a Web Browser?
- Why Is the Application Resource Inaccessible through CBH?
- Why Are Databases Managed in CBH Inaccessible with an SSO Tool?
- Why Does the Number of Concurrent Sessions Reach the Limit When I Use CBH to Log In to a Host Resource?
- Why a Black Block Is Displayed on the Mouse When the MSTSC Client Is Used to Access a Server Resource?
-
Maintenance Issues
- Why Does SMS Verification Code Fail to Send When I Log In to a CBH Instance?
- Why Am I Seeing a Message Indicating that the Number of Resources Has Reached the Limit When I Add a Resource to CBH?
- Why Does Verification of An Account for a Managed Host Fail?
- Why Am I Seeing Garbled Characters When I Open a System Data File?
- Why Does Login Timeout Frequently Occur During an O&M Session?
- Why Does the PL/SQL Client Display Garbled Characters During Application O&M?
- Why Is the Requested Session Denied After I Log In to a Managed Host?
- Why Does the CBH Traffic Bandwidth Exceed the Threshold?
- Why Text Cannot Be Copied When I Perform O&M Through a Web Browser?
- Which Types of Failures May Occur During the O&M?
- What Do I Do If an Exception Occurs When I Enter Chinese Characters Using WPS During the O&M of a Windows Server?
-
CBH System Login Failures
-
Product Consulting
- Videos
Secondary Authorization for High-Risk Database Operations
With CBH editions, you can delete, modify, and view your database instances by running commands. To secure sensitive database information and prevent key information from being lost or disclosed, CBH gives you the ability to configure an approval process for high-risk database operations and monitor key information.
Use administrator admin_A as an example to describe how to authorize O&M user User_A to perform secondary authorization for high-risk operations on MySQL database instance RDS_A.
Application Scenarios
With Cloud Bastion Host (CBH), you can dynamically identify and intercept high-risk commands (including deleting databases, modifying key information, and viewing sensitive information) to interrupt database O&M sessions by setting database control policies and preset command execution policies. In addition, the system automatically generates a database authorization ticket and sends it to the administrator for secondary authorization. O&M users can resume interrupted O&M sessions only after the administrator approves the ticket and authorizes the high-risk operations.
Constraints
Currently, secondary authorization of high-risk operations only applies to the commands executed on the MySQL or Oracle database instances.
Prerequisites
- The to which the CBH instance belongs has enabled the database access port, and the network connection between the database and the CBH system is normal.
- Database RDS_A has been managed as a host resource.
- O&M user User_A has obtained the access control permission for RDS_A.
Configuring the Secondary Authorization Policy
To approve high-risk operations on database instances, you need to preset command rules on the DB Rules page in the Policy module and enable Dynamic approval in the Action field.
- Log in to the CBH system as admin_A.
- Choose Policy > DB Rules to go to the DB Rules page.
- Configure the database rule set and select the preset high-risk operation commands.
- Click the RegSet tab.
Figure 1 RegSet
- Click New to create a rule set for MySQL databases. Use the DB-test rule set as an example.
Figure 2 New RegSet
- Click Add Regulation in the Operation column of the DB-test row to add a library, table, or command rule. The following describes how to add the DELETE command for deleting table content.
NOTE:
- The Cmd field is mandatory. You must select at least one command. You can select multiple commands at a time.
- Set the Lib or Table field to restrict operation commands on the database library or tables.
- If the Lib or Table field is left blank, all operation commands in the database are restricted.
Figure 3 Add regulation
- Click the RegSet tab.
- Configure a DB rule.
- Click the DB Rules tab.
Figure 4 DB Rules
- Click New to create a Dynamic approval rule for the database. Use database rule DB-ACL as an example.
Figure 5 Configuring dynamic approval
- Relate the rule to rule set DB-test.
Figure 6 Relating a new database rule to a rule set (RegSet)
- Relate user User_A to resource RDS_A.
Figure 7 Relating users to resources
- Click the DB Rules tab.
Verifying the Secondary Authorization Policy
An O&M user performs a high-risk operation and applies for operation permissions after the operation is intercepted. The administrator authorizes the high-risk operation after review to strengthen the management and control of core database assets.
- Log in to RDS_A as O&M user User_A.
- Log in to the CBH system.
- Choose Operation > Host Ops.
- Click Log In to log in to database resource RDS_A using an .
Figure 8 Database login
- Use the Navicat client as an example. O&M user User_A deletes table content from RDS_A. The DELETE command is automatically intercepted, and a message is displayed indicating that User_A does not have the permission to delete the table content.
- O&M user User_A submits a database authorization ticket to administrator admin_A for approval of the deletion operation.
- Log in to the CBH system as O&M user User_A.
- Choose Ticket > DB Tickets and view the tickets generated due to the interception of the deletion.
- Click Submit to submit the application for granting the required permissions on RDS_A.
Figure 9 DB Tickets
- The admin_A approves or rejects the O&M operations performed by User_A based on situation.
- Log in to the CBH system as administrator admin_A.
- Choose Ticket > Approve and review the ticket submitted by User_A.
- Click Approve or Reject to approve or reject the ticket.
NOTE:
Only after the administrator approves the ticket, the O&M user can resume the intercepted high-risk operations.
Figure 10 Ticket approval
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.