Non-Administrative User Accounts
LeasePak Documentation Suite NETSOL website
User Accounts

LeasePak Server Configuration and Maintenance

Non-Administrative User Accounts

Non-Administrative User Accounts

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

Non-Administrative Account Holders have LeasePak Security Records

This section discusses the LeasePak non-administrative accounts, which include:

  • LeasePak Supervisor – the supervisor can be likened to the "super-user" of LeasePak; this user has application host access, is empowered to perform all updates and perform all functions allowed by LeasePak, and to configure the following classes of users:
  • Regular Users – these are the primary back-office users; they use the LeasePak client, performing a mix of updates and reports as determined by the LeasePak Supervisor to match their roles. These users generally do not require application host access.
  • Restricted Users – there are two groups of Restricted Users: Report Users and Partial Update Users; they differ only slightly.
    • Report Users – this group of users is restricted to running only report functions in the LeasePak client. They also do not require application host access.
    • Partial Update Users – these users only have access to [U08] Application, [U0203] Lessee, [U0201] Vendor and to the [R] Report menu. They do not require application host access, and may enter LeasePak through the LeasePak Client or through a separate origination tool.
    • The LeasePak Supervisor may further restrict the reports that these users have access to by using [U0706] Security.
  • Proxy User – there needs to be only one proxy user per server. One proxy user can host for multiple LeasePak users, in multiple environments and multiple instances and multiple releases. The proxy user requires a Unix account (password should be blocked), and a DBMS account, with a password of the Administrator's choosing. This password will be needed to activate the shared port. See Shared User Overview.
  • Hosted User – a sub-class of users with LeasePak credentials but no dedicated Linux or DBMS accounts. Hosted users count against the Leasepak license file's user limits. Every Hosted User is a member of one of the license classes: Regular, Report, or Partial. See Shared User Overview. These are the users who access LeasePak on the server via the proxy user.

Non-Administrative User Types Compared

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

Table of User Features
User Type OS Acct? DBMS Acct? Shell Access? Has RSC? Security Record Created By Range of available options License Class
LeasePak Supervisor yes yes yes yes Util 108 All Client and Server Functions User
Regular User yes yes no yes [U0706] Security Updates and reports determined by Supervisor User
Report User yes yes no yes [U0706] Security Restricted: Reports only Report
Partial Update User yes yes no yes [U0706] Security Restricted: Reports and a few Updates only Partial
Proxy User yes yes yes no None None None
  • User Type – one of the four types of non-administrative users described in this section.
  • OS Acct? – does this type of user require an OS user account?
  • DBMS Acct? – does this type of user require an account under the a database server?
  • Shell Access? – does this type of user require direct access to a command shell running on the application host?
  • Has RSC? – does this type of user have an RSC (Security) record? All users who will use the LeasePak Client must have RSC records.
  • Security Record Created By – which utility is used to create the security record for this type of user? Util 108 or [U0706] Security.
  • Range of Available Options – which LeasePak menu options are available to this type of user?
  • License Class – The LeasePak license authorizes certain numbers of security records to be created. There are three classes of users involved in this authorization; this column specifies which class each of the user types is authorized by: User, Report or Partial.

LeasePak Supervisor

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

About the LeasePak Supervisor or LpAdmin
Admin? N OS? Y DBMS? Y RSC? Y
See User Features
  • For each environment created within a LeasePak installation, NetSol recommends that the system administrator create a separate LeasePak supervisor. At least one user of this type is required, even if it is shared among environments.
  • This is a user who can log on the LeasePak client, the application host, and the database server to perform advanced LeasePak operational tasks such as End of Period administration, submission of LeasePak batch jobs, tasks within the Leasepak /util menu, and user security through [U0706] Security. The LeasePak supervisor counts as a regular user for license purposes.
  • NetSol refers to this user as the LeasePak supervisor or LPAdmin, and recommends the name lpsup76a or env-name76a, where env-name is the name of the environment. Some systems restrict the length of a user name to 8 characters, so the System Administrator may have to be clever in the construction of useful names.
  • If the Shared User module is active, the LeasePak Supervisor can switch between the dedicated port and the shared port. However, the Supervisor must be aware that the [U0706] Security update behaves differently according to which port the client is running on. If the Supervisor is running on the dedicated port, then U0706 works with RSC records belonging only to dedicated users. If the Supervisor is running on the shared port, then U0706 works with RSC records belonging only to hosted users.
  • The basic steps for setting up this kind of user can be found below with the Non-Administrative User Worksheet.

Regular LeasePak Users

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

About Regular LeasePak Users
Admin? N OS? Y DBMS? Y RSC? Y
See User Features
A Regular User may be a dedicated user or a hosted user. Dedicated users have all the features discussed below, while hosted users do not have OS user accounts or database server accounts. Further, neither the system administrator nor the DBA need be involved in setting up hosted users. The setup for hosted users is entirely within the scope of the LeasePak Supervisor or LPAdmin.
  • Each dedicated user assigned to work with the LeasePak client updates should have his or her own regular accounts, that is, an OS user account on the application host, and an account under the database server on the database host.
  • The System Administrator or LeasePak Supervisor should insure that the user names for the regular users conform to site policies, and are in accordance with the appropriate OS and database system guidelines.
  • The System Administrator will assign initial passwords to the dedicated regular users; the system administrator and the LeasePak Supervisor have the ability to change the user's password at a later time. Site policies regarding password formulation and changes should be estabished and followed. See Custom General [U0712]:Miscellaneous Customizations for information on how to use LeasePak to help implement site password policies.
  • The LeasePak Supervisor can handle the passwords for the hosted users without System Admin asssistance.
  • The basic steps for setting up this kind of user can be found below after the Non-Administrative User Worksheet.

Restricted Users

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

LeasePak Report Users and Partial Update Users
Admin? N OS? Y DBMS? Y RSC? Y
See User Features
A Restricted User may be a dedicated user or a hosted user. Dedicated users have all the features discussed below, while hosted users do not have OS user accounts or database server accounts. Further, neither the system administrator nor the DBA need be involved in setting up hosted users. The setup for hosted users is entirely within the scope of the LeasePak Supervisor or LPAdmin.
  • There are two types of restricted users: Report users and Partial Update users. The feature they have in common is that they both have access to the entire [R] report menu. Where they differ is that the Partial Update user also has access to a handful of [U] updates.
  • These are specialized users that log on the LeasePak client, do not have direct application host logon privileges, and have restricted menu access as described above. The LeasePak Supervisor can further restrict which reports these users have access to by using [U0706] Security.
  • The administrator or Supervisor should insure that the user names for these users conform to site policies, and are in accordance with the appropriate OS and database system guidelines.
  • The administrator or the Supervisor will assign the initial password to these users; the System Administrator and the LeasePak Supervisor have the ability to change their passwords at a later time. Site policies regarding password formulation and changes should be estabished and followed. See Custom General [U0712]:Miscellaneous Customizations for information on how to use LeasePak to help implement site password policies.
  • The basic steps for setting up these users can be found below with the Non-Administrative User Worksheet.
Note that users can be barred from accessing the application host via the OS shell by simply not providing them with the translated OS passwords.
Further, note that since hosted users do not have OS Accounts, they cannot be given shell access at all.
A more certain and secure way of disabling the shell account of a dedicated user is by using /usr/bin/false (HP-UX and Solaris) or /sbin/nologin (Linux) as the user's shell (set by the administrator in /etc/passwd). The LeasePak internet services, leasepakd and mpowerd, can still access the stored passwords for proper authentication for the LeasePak client for dedicated users. Passwords stored on the RSC table are validated during hosted access to the server. Because these users cannot log onto the application host, they cannot each maintain their respective home directories; the administrator should make arrangements for this maintenance.

Proxy User

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

LeasePak Proxy User provides a channel for Hosted Users
Admin? N OS? Y DBMS? Y RSC? N
See User Features
Typically there will be only one Proxy User per server. The Proxy User's purpose is to provide a UID for client connections made from users who are unknown on the server. A secondary leasepakd or mpowerd internet service accepts connections from clients who know the protocol of leasepakd, and spawn drivers that authenticate the connections using the RSC string password.
The Proxy User caches the proxy database user's password, which may be, but is not required to be, the product of lease /util 112. It is cached in an encrypted file in the proxy user's home directory, written by lease /util 110.
Besides keeping the key to the database for the hosted users and providing a UID for the processes created by the hosted users, it also provides them each with a home directory where various reports and other LeasePak files are written. This home directory is a subdirectory of the proxy user's home directory, created by the administrator or by the LeasePak Supervisor when running [U0706] Security.
Even though the proxy user is not a real person, and even though it is not directly involved with the connections that are made in its name, it must remain in the /etc/passwd file so that its UID is kept reserved and in use.
See the Shared User Overview for more information.

Non-Administrative User Worksheet

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

Note the following values for setting up Dedicated Non-Administrative Users
Type Name OS Acct? DBMS Acct? UID Password Notes
$NSTGROUP nst no no GID none Every user has the same group name/GID
LeasePak Supervisor env-name+"76a" or
lpsup76a
yes yes UID client string password
SQL Server string password
Unix string password
Add LeasePak Security Record in Utility 108
Regular User yes yes UID client string password
SQL Server string password
Unix string password
Add LeasePak Security Record in [U0706] Security
Set Account Type to Regular User
Report User yes yes UID client string password
SQL Server string password
Unix string password
Add LeasePak Security Record in [U0706] Security
Set Account Type to Report User
Partial Update User yes yes UID client string password
SQL Server string password
Unix string password
Add LeasePak Security Record in [U0706] Security
Set Account Type to Partial Upd. User
Proxy User yes yes UID Do not set the Proxy user's Unix Password. SQL Server string password Do not assign the proxy user a LeasePak Security Record.
Note the following values for setting up Hosted Non-Administrative Users
Type Name OS Acct? DBMS Acct? UID Password Notes
Regular User no no none RSC string password Add LeasePak Security Record in [U0706] Security
Set Account Type to Regular User
Report User no no none RSC string password Add LeasePak Security Record in [U0706] Security
Set Account Type to Report User
Partial Update User no no none RSC string password Add LeasePak Security Record in [U0706] Security
Set Account Type to Partial Upd. User

Creating Non-Administrative Users

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create

Overview of New Account Setup Process

Topics

  • Environments
    • production environment
    • test environment
    • visitor environment
    • setup_new_env
  • Hosts
    • dbms host
    • application host
  • LLDB
    • LLDB properties
      • database type
      • database owner
    • database system
    • database server
  • LeasePak
    • LeasePak instance
    • SETUP
    • Dedicated Port
    • Shared Port
  • General
    • shell
      • command prompt
    • OS start-up files
      • .login
      • .profile
  • Users & Roles
    • LeasePak administrative users
      • LeasePak Supervisor
      • $NSTADMIN
        • LeasePak release administrator
      • $NSTDBA
        • LeasePak database administrator
      • $SRVADM
        • Database Server Administrator
      • DBO
        • Database owner
    • LeasePak non-administrative users
      • Regular user
      • Restricted user
        • Report user
        • Partial update user
      • Proxy User
      • Hosted User
  • Naming convention
    • Loose convention
    • Strict convention
Understanding and properly managing LeasePak's user accounts is an essential part of successfully implementing LeasePak.

The process for creating non-administrative users is straightforward, and very similar from one user-type to another. This section explains the common process, and also covers the places where the processes for the different user-types diverge.

Where the differences show up is between Dedicated Users and Hosted Users. The dedicated user has his or her own Unix UID, Unix password, DBMS account, and DBMS password, plus a security record in the LLDB. The hosted user has only a security record in the LLDB. The other features just listed are provided by the Proxy User and shared among all hosted users. This eliminates the need for several of the below commands in a shared user implementation.

The commands marked with a dagger (†) are not needed for hosted user administration.

The various commands cited below are explained in some detail in User Administration Commands.

The LeasePak user account user name is used in all LeasePak contexts without variation, therefore the name must be a legal user name in each of those contexts. The single client string password is used (sometimes in hashed, or "translated", form) in all of those contexts, which are:

  1. Select a LeasePak user name and an initial client string password for the user. The string must be between 6 and 8 characters in length and conform to site password policies. The System Administrator or the LeasePak Supervisor can change this client string (and the translated passwords with it) later through the LeasePak client Change Password function.
  2. Use Lease /util 112 Unix and SQL Server password translation to determine the translated passwords based on the client string password. For dedicated users, note the Unix string password for the application host and the DBMS host, and note the SQL server string password for the DBMS. For hosted users, note the RSC string password. (lease /util 112)
  3. † Create an application host account for the dedicated user using a command like useradd. Use the selected user name and the $NSTGROUP, and set the password to the Unix string password obtained from Utility 112. (useradd, passwd)
  4. † The Unix string password must be used on every OS user account for that user regardless of host.
  5. † Create a DBMS user for the dedicated user under each installed database system. Use the selected user name, the DBMS group msi, and set the password to the SQL server string password obtained from Utility 112. (db_add_login)
  6. † Add the dedicated user to the LeasePak Logical Database associated with the desired environment. (db_add_user)
  7. † If the dedicated user is to have shell access, modify the user's .login and .profile files to read the .lplogin and .lpprofile, or use the sample.login and sample.profile files copied over from the $live/lib directory. (LeasePak startup files)
  8. † Copy the .lplogin and .lpprofile files from the appropriate environment's $top/env/env-name/etc directory to the dedicated user's home directory. (change_env)
  9. † Find out relevant LeasePak information about the current shell session. (whatami)
  10. Add a LeasePak security record to the LLDB:

IMPORTANT NOTE

LeasePak Security Records

[U0706] Security vs. lease /util 108

It is very important to understand the difference between the "mainstream" user security record maintenance update, [U0706] Security and the non-graphical lease /util 108 utility. The utility option creates a user security record with all LeasePak options that are available under the site's license enabled for that user. The user then is essentially omnipotent, which is usually undesirable. [U0706] Security offers much finer control over user capabilities.

The user security record created by [U0706] Security has typically no menu options enabled, default values everywhere else, and is not a user who can actually perform any business functions until the LeasePak supervisor sets up his or her privileges.

Over the history of LeasePak, many sites have used lease /util 108 improperly to set up regular users, and found themselves with over-enabled users in possession of too much access, leading to errors and audit issues.

It is for this reason that access to lease /util 108 requires an additional Password of the Day that can be obtained by contacting the NetSol Help Desk. The user is advised to use lease /util 108 only once to set up a template LeasePak Supervisor. The supervisor can then clone his or her own record and use it as a means of producing additional templates of users to be themselves cloned to provide security records for staff. This results in a major improvement in uniformity of user capabilities and IT accountability for the LeasePak-enabled enterprise.

Top Overview Non-Admin User Comparison LeasePak Supervisor

Regular User Restricted User Proxy User WorkSheet How to Create