Guidelines for Authorization
Authorization is the act of validating the privileges and permissions of an authenticated subject. To avoid exploiting authorization, you must implement a policy of segregation of duties. This means no one person should be given responsibility for more than one related function.
Enterprise Manager users may vary widely among a company, and they may have very different roles and purposes.
Enterprise Manager comes with several Oracle-defined roles that provide role based authentication for various operational roles. Segregation of Operator, Designer and Administrator functions for Patching, Provisioning, Cloud, Compliance, and Plug-ins allow more granular authentication for users. Use the Create Like feature to further enhance or restrict as required for your operations.
Note:
Performing a Create Like operation on an existing role enables the newly created role to contain all of the privileges of the original role.
With using Role Based Access Control (RBAC), privilege management becomes easier; managing role grants is simpler than managing privilege grants. For a complete list of the out-of-the-box roles see the Privileges and Roles section of the Oracle Enterprise Manager Administrator's Guide.
With Enterprise Manager we have the ability to specify target privileges and resource privileges. Target privileges allow an administrator to perform operations on a target. Some of the new target privileges include Connect to any Viewable Target, Execute Command Anywhere, Execute Command as any Agent and more. The target privileges can be assigned for all targets or for specific targets. Resource privileges grant access to a function, button or page within Enterprise Manager. Some of the new resource privileges include Backup Configurations, Cloud Policy, Compliance Framework, Enterprise Manager Plug-in, Job System, Patch Plan, Self Update and Template Collection. For a complete list, see Configuring Privileges and Role Authorization. With these new privileges, it's easier to implement the Principal of Least Privilege by creating specific roles with very fine grained privileges assigned that match the job duties.
An extended auditing system makes it easy to monitor the privilege grants on a regular basis and also keep track of which users exercised what privileges. Some of the key privilege related auditable actions are listed here:
-
Grant job privilege
-
Grant privilege
-
Grant role
-
Grant target privilege
-
Grant system privilege
-
Revoke job privilege
-
Revoke privilege
-
Revoke role
-
Revoke target privilege
-
Revoke system privilege
Super Administrators have special privileges on targets, reports, templates and jobs. See Classes of Users. The Super Administrator privilege should be granted with caution. Use the following query to get the list of Super Administrators:
SELECT grantee FROM MGMT_PRIV_GRANTS WHERE PRIV_NAME = ‘SUPER_USER'
Best Practices for Privilege and Role Management
-
Create meaningful roles and grant roles to users instead of granting privileges to users.
-
Grant only the minimum set of privileges a user needs for carrying out his/her responsibilities by granting the fine-grained privileges/roles only when needed.
-
Audit privilege and role actions for complete monitoring and accountability.
-
Limit the number of Super Administrators
Use Principle of Least Privileges for Defining Roles/Privileges
The fine granularity of privileges provided in Enterprise Manager allows for the Principle of Least Privileges to be implemented, this recommends that an Administrator must only be able to access the information or resources that are necessary for legitimate purposes.
Use Privilege Propagation Groups
Using groups and systems to organize your targets helps reduce security administration overhead. There are two types of groups available in Enterprise Manager that help simplify privilege management and authorization. By granting roles to groups, instead of users and using privilege propagating groups, you can reduce the direct grants and ensure users have access to the targets as needed.
Privilege Propagating Groups simplify the privilege assignment, revocation, and administration along with group management by propagating the assigned privileges to all members of the group. For example, a user can be granted access to a privilege propagating group Sales, and they in turn receive access to all targets within that group.
Administration Groups are privilege propagating groups that automate the application of monitoring settings to targets upon joining the group. Targets cannot be assigned directly to the group, rather they are automatically added based on membership criteria.
Systems are also privilege propagating and allow you to group all related targets of a particular application or function into a system.
Best Practices for Groups and Systems
-
Create meaningful roles and grant roles to users instead of granting privileges to users.
-
Grant only the minimum set of privileges a user needs for carrying out his/her responsibilities by granting the fine-grained privileges/roles only when needed.
-
Utilize privilege propagating groups and systems to reduce administration overhead