- What's New
- Function Overview
- Service Overview
- Getting Started
-
User Guide
-
Instances
- Permissions Management
- Assigning Permissions Using IAM
- Creating a CBH Instance
- Checking Instance Details
- Resetting the Login Method for User admin
- Resetting the Password of User Admin
- Upgrading the CBH System Version
- Starting a CBH Instance
- Stopping a CBH Instance
- Restarting a CBH Instance
- Changing a VPC for a CBH Instance
- Changing Security Groups
- Binding an EIP to a CBH Instance
- Unbinding an EIP from a CBH Instance
- Allowing Access to Cloud Assets
- Managing Tags
- Key CBH Instance Operations Recorded by CTS
-
Logging In to the CBH System
- Overview
- Using a Web Browser to Log In to Your Bastion Host
- Using a Client to Log In to Your Bastion Host
- Configuring Multifactor Verification
-
Managing Login Security
- Configuring User Login Lockout
- Configuring the Login Password Policies
- Configuring Web Login Timeout and Authentication
- Updating a System Web Certificate
- Configuring the Mobile OTP Type
- Configuring the USB Key Vendor
- Configuring Policies to Disable Zombie Users (Available in V3.3.30.0 and Later Versions)
- Configuring the RDP Resource Client Proxy (Available in 3.3.26.0 and Later Versions)
- Enabling API Configuration (Included in V3.3.34.0 and Later Versions Only).
- Configuring Automatic Inspection (Available in V3.3.36.0 and Later)
- Configuring a Resource Account
- Configuring Client Login
- Configuring a User Expiration Reminder
- Configuring Session Limit
- Dashboard of the CBH System
- Department
- User
- Resource
- Policy
- Ticket
-
Operation
-
Host Operation
- Viewing the Host Resource List and Setting Resource Labels
- Logging In to Managed Resources Using a Web Browser for O&M
- Logging In to Resources Using an SSH Client for O&M
- Logging In to File Transfer Resources Using an FTP or SFTP Client
- Logging In to and Maintaining Database Resources Using an SSO Client
- Logging In to Hosts in Batches for O&M
- File Transmission
- Cooperation
- Enabling Forcible RDP Connections
- Application Operation
-
Host Operation
- Audit
- System Management
- Installing an Application Server
- Monitoring
-
Instances
- API Reference
- Best Practices
-
FAQs
-
Product Consulting
- What Are the Differences Between a CBH Instance and a CBH System?
- Which Security Hardening Measures Does CBH Provide?
- What Is the Number of Assets?
- What Is the Number of Concurrent Requests?
- Can I Use a CBH System to Centrally Manage My Cloud ERP or SAP Services?
- What Does Automatic O&M Include?
- How Do I Obtain an Enterprise Agreement Number?
- How Can I Configure Ports for a CBH Instance?
- Can CBH Manage Resources Under Multiple Subnets?
- Which Types of Databases Can I Manage in a CBH System?
- Regions and AZs
- About Purchase
- License
- About Backup, Specification Change, and Upgrade
-
About File Transfer
- What File Transfer Methods Can be Used in a CBH System?
- How Do I Use FTP/SFTP to Transfer Files to or From an SSH Host?
- How Do I Upload or Download Files When I Log In to Managed Hosts Using a Web Browser?
- What Is the Netdisk of a CBH System?
- How Do I Clear the Personal Net Disk Space?
- How Do I Configure File Management Permissions?
- Does CBH Check Security of Uploaded Files?
-
Billing, Renewals, and Unsubscriptions
- How Do I Renew a CBH Instance and Update the Mapped System Authorization?
- How Is CBH Billed?
- Can I Unsubscribe from a CBH Instance?
- How Is the CBH Instance Billed After I Change Specifications of the Instance?
- Will I Be Billed for Upgrading the CBH Software Version?
- How Do I Increase the CBH Instance Quota?
- How Do I Purchase a CBH Instance When the System Prompts that Resources Are Sold Out?
-
About CBH System Login
- Login Methods and Password Issues
-
Multifactor Verification
- How Can I Install an OTP Authentication Application on the Mobile Phone?
- Why Does the Mobile OTP Application Binding Operation Fail?
- How Do I Enable Mobile SMS Authentication For Logging In to the CBH System?
- How Do I Cancel Mobile SMS Authentication?
- How Can I Cancel Mobile OTP Authentication If No Mobile OTP Application is Bound to My Account?
- Why Does Login Fail When an Account That Has Mobile OTP Application Bound Is Used to Log In?
- Login Security Management
-
User, Resource, and Policy Configuration in a CBH System
- Users
-
Adding Resources to a CBH System
- How Do I Change the Password of a Managed Resource Account?
- How Do I Set a Sudo Privilege Escalation Account for the Managed Resource?
- How Do I Add a Label to Resources Managed in a CBH System?
- How Do I Import or Export Information of Host Resources in Batches?
- What Are the AK and SK of an Imported Host? How Can I Obtain Them?
- What Are the Statuses of a Managed Resource Account in a CBH System?
- Can I Share Labels of Managed Resources with Other System Users?
- Can I Manually Enter a Password to Log In to a Managed Resource Through the CBH System?
- Why Does the CBH System Fail to Identify Hosts Imported in Batches?
- How Do I Access Services Provided by the Intranet Through a CBH Instance?
- How Do I Add a Server with an IPv6 Address to a CBH Instance?
- What is an Empty Account?
- Policy Management
- System Configuration
-
Resources Managed in a CBH System
- Operation Management
-
O&M Operations
- What Login Methods Does CBH Provide?
- How Do I Create a Collaborative O&M Session?
- How Do I Use Resource Labels in the CBH System?
- How Do I Set the Resolution of the O&M Session Window When I Use a Web Browser for O&M?
- How Can I Use Shortcut Keys to Copy and Paste Text When a Web Browser Is Used for O&M?
- What Are the Shortcut Keys for O&M in CBH?
-
O&M Log Audit
- What Audit Logs Does CBH Provide?
- Can I Download Operation Recordings?
- Can I Delete CBH O&M Data for a Specific Day?
- Can I Back Up System Audit Logs to an OBS Bucket?
- How Long Can I Store Audit Logs in the CBH System?
- How Are Audit Logs in the CBH System Processed?
- Can I Audit User Operations If a User Logs In to Server A Through the CBH System and Then Logs In to Server B from Server A?
- Why Is the Playable Duration Shorter Than the Total Duration of a Session?
- Why Is There No Login Record in History Sessions While I Received a Resource Login Message?
-
Troubleshooting
-
CBH System Login Failures
- What Does a Login Exception Occur?
- Why Is the IP Address or MAC Address Blocked When I Log In to the CBH System?
- Why Am I Seeing Error Code 404 When I Log In to the CBH System?
- Why Am Seeing Error Code 499 When I Log In to the CBH System?
- What Are Possible Faults If I Log In to the CBH System as an Intranet User?
- Why Is a Host Inaccessible Through CBH?
- Why Does CBH Login Fail Through an ECS in a New VPC Connected with the VPC Where CBH Is via VPN or a VPC Peering Connection
-
CBH Managed Resource Login Failures
- Why Does an Exception Occur When I Log In to My Resources Managed in CBH?
- Why Am I Seeing Login Errors of Code: T_514 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: T_1006 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_515 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_519 When I Use a Web Browser for Resource O&M?
- Why Am I Seeing Login Errors of Code: C_769 When I Use a Web Browser for Resource O&M?
- Why Cannot I See the Accessible Resources in the Resource List?
- Why Does the Session Page Fail to Load When I Log In to the Managed Host Using a Web Browser?
- Why Is the Application Resource Inaccessible through CBH?
- Why Are Databases Managed in CBH Inaccessible with an SSO Tool?
- Why Does the Number of Concurrent Sessions Reach the Limit When I Use CBH to Log In to a Host Resource?
- Why a Black Block Is Displayed on the Mouse When the MSTSC Client Is Used to Access a Server Resource?
-
Maintenance Issues
- Why Does SMS Verification Code Fail to Send When I Log In to a CBH Instance?
- Why Am I Seeing a Message Indicating that the Number of Resources Has Reached the Limit When I Add a Resource to CBH?
- Why Does Verification of An Account for a Managed Host Fail?
- Why Am I Seeing Garbled Characters When I Open a System Data File?
- Why Does Login Timeout Frequently Occur During an O&M Session?
- Why Does the PL/SQL Client Display Garbled Characters During Application O&M?
- Why Is the Requested Session Denied After I Log In to a Managed Host?
- Why Does the CBH Traffic Bandwidth Exceed the Threshold?
- Why Text Cannot Be Copied When I Perform O&M Through a Web Browser?
- Which Types of Failures May Occur During the O&M?
- What Do I Do If an Exception Occurs When I Enter Chinese Characters Using WPS During the O&M of a Windows Server?
-
CBH System Login Failures
-
Product Consulting
- Videos
Creating a Command Rule
Command rules are used to control permissions for critical O&M operations on managed resources, implementing fine-grained control over the execution of commands on Linux hosts.
For hosts using SSH and Telnet protocols, a bastion host can record O&M session operations, trigger dynamic authorization, and disconnect connection to an operation session. A bastion host uses the guacd proxy to audit and filter the commands executed during operations based on the rule configured by the administrator. The proxy will return the audited commands, filtering results, and command output content for session operation recording, dynamic authorization, and disconnection.
With command rules, you can:
- Sort command rules by priority. The rule in the upper position has the higher priority than the ones in a lower position.
- Configure four command execution actions, including permitting, rejecting, requiring dynamic approval, and disconnecting the connection.
- Permit: When a command rule is triggered, the system continues to execute the command. By default, all operations are allowed.
- Reject command: After a command rule is triggered, the system rejects to execute the command and displays a message indicating that the command has been intercepted.
- Disconnect: After a command rule is triggered, the system rejects to execute the command and disconnects the O&M session. The system displays a message indicating that the connection is forcibly disconnected by the administrator.
- Dynamic approval: After a command rule is triggered, the system rejects to execute the command. The system displays a message indicating that the command has been intercepted and asking you to submit a command approval ticket. A command approval ticket is automatically generated. The command can be executed only after the ticket is submitted and approved.
Constraints
Command rules apply only to Linux hosts using the SSH or Telnet protocol for fine-grained permission control.
Prerequisites
You have obtained the permissions to manage the Cmd Rules module.
Creating a Command Rule
- Log in to your bastion host.
- Choose Policy > Cmd Rules > Cmd Rules.
Figure 1 Cmd Rules
- Click New in the upper right corner of the page to switch to the New Command Rule dialog box.
NOTE:
You can also select a command rule and choose More > Insert to create a command rule. After the configuration is complete, a new rule is created.
- Configure the basic information.
Figure 2 New Command Rule
Table 1 Basic information parameters Parameter
Description
Rule Name
Name of a command rule. The rule name must be unique in a bastion host.
Action
Action executed by the command rule.
The options are Disconnect, Reject command, Dynamic approval, and Permit.
- Disconnect: When a session runs the command to bring the rule into effect, the session is disconnected.
- Reject command: When a session runs the command to bring the rule into effect, the command is rejected directly.
- Dynamic approval: When a session runs the command to bring the rule into effect, the command is rejected directly. The command must be submitted to the administrator for approval to be executed.
- Permit: When a session runs the command to bring the rule into effect, the system runs the command.
Period of validity
Effective time and expiration time of the rule
Time Limit
Validity period of a rule
- Click Next and start to relate the command rule to one or more commands or command sets.
- Relate Command: Enter one command in each line. You can enter multiple commands. For more details, see User-defined Commands That Can be Related to a Command Rule.
- Relate Command Set: Relate the command rule to a created command set. For details about command sets, see Managing Command Sets.
- Click Next and start to relate the command rule to one or more users or user groups.
- After a user group is related to a command rule, users automatically obtain the permissions of the command rule the instant they are added to the user group.
- Select a created account or account group.
- After a command rule is related to an account group, accounts automatically obtain the permissions of the rule the instant they are added to the account group.
- Click OK. You can then view the created command rule in the rule list.
During O&M, when a command rule is triggered, the system executes configured actions accordingly.
NOTE:
Users in the Relate User and Relate User Group must have been assigned a role that has ticket approval permissions. Otherwise, users cannot view the command approval ticket module or submit a ticket to obtain required permissions.
Follow-up Operations
In your bastion host, you can manage all command rules on the rule list page, including managing related users or resources, deleting, enabling, or disabling one or more command rules, and sorting command rules by priority.
- To quickly relate a command rule to more users, user groups, accounts, or account groups, select the rule and click Relate in the Operation column.
- To delete a command rule, select the rule and click Delete in the Operation column.
- To disable command rules, select the ones you want to disable and click Disable at the bottom of the list. When the status of those rules changes to Disabled, they become invalid.
- To change the priority of a command rule, select the rule and drag and drop it to an upper or lower position.
Feedback
Was this page helpful?
Provide feedbackThank you very much for your feedback. We will continue working to improve the documentation.