Administering Users and Permissions
Administering Users and Permissions
Nokia is committed to diversity and inclusion. We are continuously reviewing our customer documentation and consulting with standards
bodies to ensure that terminology is inclusive and aligned with the industry. Our future customer documentation will be updated accordingly.
This document includes Nokia proprietary and confidential information, which may not be distributed or disclosed to any third parties without
the prior written consent of Nokia.
This document is intended for use by Nokia’s customers (“You”/”Your”) in connection with a product purchased or licensed from any company
within Nokia Group of Companies. Use this document as agreed. You agree to notify Nokia of any errors you may find in this document;
however, should you elect to use this document for any purpose(s) for which it is not intended, You understand and warrant that any
determinations You may make or actions You may take will be based upon Your independent judgment and analysis of the content of this
document.
Nokia reserves the right to make changes to this document without notice. At all times, the controlling version is the one available on Nokia’s
site.
This document is Nokia’ proprietary and confidential information, which may not be distributed or disclosed to any third parties without the
prior written consent of Nokia.
Copyright and trademark: Nokia is a registered trademark of Nokia Corporation. Other product names mentioned in this document may be
trademarks of their respective owners.
© 2021 Nokia.
Contents
1 Administering NetAct system users and password.................................................................................. 10
1.1 NetAct default system users................................................................................................................... 10
1.2 Guidelines for changing password..........................................................................................................45
1.3 Changing password of directory server, database, OS, and active directory users................................45
1.3.1 Changing password of users using password-tool.........................................................................46
1.3.2 Changing password of users in Active Directory........................................................................... 49
1.4 Changing password of datacenter and virtualization infrastructure users.............................................. 49
1.4.1 Changing the [email protected] password of the VMware vCenter Server Appliance .. 50
1.4.2 Changing the root password of the VMware vCenter Server Appliance........................................ 51
1.4.3 Changing root password of an ESXi host...................................................................................... 52
1.4.4 Changing the vmanager user password........................................................................................ 52
1.5 Changing password for hardware devices............................................................................................. 54
1.5.1 Changing password for storage devices........................................................................................ 54
1.5.1.1 Changing admin user password of EMC Unity Storage........................................................ 54
1.5.1.2 Changing admin user password of HPE MSA 2040/2050 Storage........................................55
1.5.1.3 Changing admin user password of HPE 3par Storage.......................................................... 56
1.5.1.4 Changing admin user password of EMC VNX Storage......................................................... 56
1.5.2 Changing password for switches and HPE Virtual Connect.......................................................... 57
1.5.2.1 Changing admin user password for HPE Virtual Connect..................................................... 57
1.5.2.2 Changing admin user password for HPE Brocade SAN switch............................................. 58
1.5.2.3 Changing admin user password for HPE 5900/5500/5510/6127 Network switch.................. 59
1.5.3 Changing password for servers......................................................................................................60
1.5.3.1 Changing password for HPE iLO 4 server............................................................................ 60
1.5.3.2 Changing password for HPE iLO 5 server............................................................................ 61
1.5.3.3 Changing password for HPE Onboard Administrator............................................................ 62
1.6 Changing password of Avamar Virtual Edition....................................................................................... 62
1.6.1 Changing passwords of Avamar Virtual Edition users................................................................... 63
1.6.2 Changing password of Avamar Virtual Edition Combined Proxy................................................... 63
1.7 Changing password of omc user through User Management................................................................ 63
5 Controlling network element access with Network Element Access Control application..................... 85
6 Controlling network element access with Centralized Network Element User Management.................88
6.1 NetAct prerequisites................................................................................................................................ 89
6.1.1 Checking if CNUM license is installed........................................................................................... 89
6.1.2 Ensure that LDAP certificate is installed........................................................................................ 90
6.1.2.1 Checking if LDAP certificates are installed............................................................................ 91
6.1.3 Service user for CNUM provisioning.............................................................................................. 92
6.1.4 Service user usage post CNUM activation.................................................................................... 92
6.1.5 Network element permissions........................................................................................................ 92
6.1.6 Restricted anonymous login to the LDAP directory....................................................................... 93
6.2 Network element specific prerequisites and procedures........................................................................ 94
6.2.1 Configuring CNUM for Flexi NS..................................................................................................... 94
6.2.1.1 CNUM Prerequisites for Flexi NS.......................................................................................... 94
6.2.1.2 Limitations...............................................................................................................................95
6.2.1.3 Installing and activating Network Element Certificate............................................................ 95
6.2.1.3.1 Applying certificates for Flexi NS...................................................................................95
6.2.1.4 Checking Flexi NS permissions........................................................................................... 100
6.2.1.5 Activating and deactivating CNUM.......................................................................................102
6.2.1.5.1 Activating CNUM for Flexi NS..................................................................................... 102
6.2.1.5.2 Verifying CNUM activation........................................................................................... 103
6.2.1.5.3 Deactivating CNUM for Flexi NS................................................................................. 105
6.2.1.5.4 Verifying CNUM deactivation....................................................................................... 105
6.2.1.6 Troubleshooting CNUM........................................................................................................ 106
6.2.1.6.1 Activation fails.............................................................................................................. 106
6.2.1.6.2 Deactivation fails.......................................................................................................... 108
6.2.1.6.3 Unable to log in to NE using NetAct user credentials after CNUM is activatedProblem. 108
6.2.1.6.4 Changing password fails..............................................................................................108
6.2.1.6.5 Unable to perform specific operation on NE after CNUM is activated......................... 109
6.2.2 Configuring CNUM for Open BGW.............................................................................................. 109
10 Session management................................................................................................................................248
10.1 Configuring user session.................................................................................................................... 248
10.2 Enabling simultaneous session access login failure message in NetAct login page.......................... 250
10.3 Changing time interval for auto invalidation of disconnected session................................................ 251
10.4 Checking session management license............................................................................................. 252
11 Appendix..................................................................................................................................................... 254
11.1 Type and individual operation way of password tool.......................................................................... 254
11.2 Retrieving password of system users................................................................................................. 258
11.3 SCA type and instance....................................................................................................................... 259
11.4 Service restarts needed after password change of system user........................................................ 260
11.5 Special characters allowed in system user’s password......................................................................262
11.6 Users unsupported in type mode of operation................................................................................... 262
• Directory server users: Users stored in NetAct LDAP directory server, which are used to run
NetAct internal services such as mediations, northbound services, and southbound services.
• Oracle database users: System User needed for access to data stored in Oracle DB. These
users are also used by WebSphere datasource using JAAS alias. Refer to below list for users
having such configuration.
• Linux OS users: System User stored in Linux Operating System specific repositories, such as, /
etc/passwd. Only local resources of the node can be accessed by the users.
• Windows OS and Active directory users: System User stored in Windows Active Directory or
Windows OS.
• Admin Server users: System users existing in Admin Server VM used for commissioning of
NetAct system.
• DC Infra and Virtualization users: System users existing in data center and virtualization
infrastructure such as VMWare vCenter and ESXi hypervisor. Presence of this users varies based
on the software only delivery mode of NetAct.
Each of the above repository can have users for administrative and non administrative purpose. Ad-
ministrative users are used for administration and maintenance purpose.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
atuser sysop,sshaccess SLNBI No No No Created for SLNBI. The account is used to run Audit Trail File
Collector. Password for this is user is randomly generated dur-
ing installation. No default password.
cmauto sysop Configurator No No No Provides visibility on CM workflows that have been triggered/
executed automatically without human user. Used by Intelli-
gent Configuration Synchronization for LTE feature for making
upload to eNB.
cmbscres cmauto Configurator No No No Provides visibility on Network Resiliency for mcBSC that have
been triggered/executed automatically without human user.
Used by Network Resiliency for mcBSC feature for upload and
export operation.
cmretry cmauto Configurator No No No Provides visibility on CM workflows that have been triggered/
executed automatically without human user. Used by CM Au-
tomatic Retry Mechanism feature for running plan provisioning
to NE.
cn=atwasproxy n/a SLNBI No No No This user is created during installation of SLNBI system as
integrated with NetAct 8 LDAP. It is used internally by Web-
sphere to authorize to LDAP if anonymous LDAP login is dis-
abled.
httpdproxy n/a n/a No No No This user is created during installation or upgrade. It is used
internally by NE3SWS to disable anonymous LDAP login from
Apache HTTPD.
ihsproxy n/a n/a No No No This user is created during installation or upgrade. It is used
internally by CM for IHS HTTPD to bind to ldap .
cn=replication man- n/a CPF No No Yes This user is created during installation. It is used internally to
ager replicate data between dirsrv primary and secondary
sysproxy n/a n/a No No No This user is created during installation or upgrade. It is used
internally by Linux Pluggable Authentication Module (PAM) in
all VM nodes to disable anonymous LDAP login from PAM ser-
vice.
wasproxy n/a n/a No No No This user is created during installation or upgrade. It is used
internally by Websphere LdapUserRegistry to disable anony-
mous LDAP login from WAS service.
dauser sysop,sshaccess,smxmediations
Dynamic Adaptation No No No Created for ne3sws_dynamicadaptation mediation.
genmdsrv sysop, smxmedia- generic mediation No No No generic_mediations Service Mix instance. User available only
tions in upgraded environment of NetAct.
lteauser sysop LTEA SNMP FM, CM No No No lteauser will be used for the running the LTEA mediation con-
& Auto Discovery tainer process and also for WAS communication from the con-
Mediations tainer Instance
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
lteapm sysop, LTEA SNMP PM Me- No No No lteapm will be used for the running the LTEA PM mediation
diation container process and also for WAS communication from the
container Instance
nbi3gcom sysop,smxmediations 3GPP NBI COM No No No Provide Open source JacORB Naming Service and Notifica-
tion Service.
nbi3gcpm sysop, 3GPP PM NBI No No No Created by Mediation Framework. 3GPP XML format PM NB
smxmediations,ftirpftp mediation running with this user.
nbisnmp sysop, smxmedia- SNMP FM NBI No No No Created by Mediation Framework. SNMP NB mediation run-
tions ning with this user.
ne3sws sysop,sshaccess,smxmediations
NE3SWS Mediation No No No NE3SWS mediation runs with this user
nwi3 sysop, smxmedia- NWI3 South bound No No No for NWI3 South bound mediation.
tions mediation
nwi3ftp nwi3ftp, sysop NWI3 South bound No No No Created by NetAct Base. NE uses this to access the NetAct
mediation FTP/HTTP server, NWI3 mediation passes the credentials
to NE. Mediation sends FTP credentials to NE and NE uses
those to access the NetAct FTP server.
nwi3system nwi3-nms-access NWI3 South bound No No No Created by NetAct Base. NE uses this user for accessing
mediation NWI3 registration service, NWI3 mediation can configure it.
NE must give credentials when it registers to NWI3 registration
service.
nx2suser sysop,sshaccess,smxmediations
NX2S Mediation No No No NX2S mediation running with this user. nx2suser is the FTP
MML & SCLI Media- user for the NX2S interface for NE.
tion
omc sysop,sshaccess,sqm_ Mediations and oth- No No No LINUX OS user and group created by Cpf (moved to ldap later
admin ers by IFW) for e.g. FM pipe, WebSphere application server and
MML/SCLI mediations to retrieve NE credentials from NEAC.
pm2sol sysop NetAct PM No Yes No This user is needed for establish authenticated communication
between PM and other NetAct clusters for PM applications.
q3usr sysop,sshaccess,smxmediations
Q3/IP South Bound No No No Created by Mediation Framework. User is used for starting
Mediations servicemix for Q3 mediations and also for using some EM
launches. Bash will be used
raccli raccli Configurator No No No User used internally for authentication purposes by webser-
vice-based racclimx implementation.
racftam racftp,sshaccess Configurator No No No NE uses this account to access the FTAM server
racftp racftp,sshaccess Configurator No No No Created by NetAct Base. NE uses this to access the NetAct
FTP server.
rachttp rachttp,sshaccess Configurator No No No Created by NetAct Base. NE uses this to access the NetAct
HTTP server.
rac3gp sysop,sshaccess,smxmediations
NBI No No No Runs as a standalone java process invoked by NMS, invokes
EJB interface provide by CM on Websphere Application Serv-
er.
ruim_admin ruim_admin PEM No No No POSIX user and group created by Installation FW. LDAP ad-
ministrator account under the NetAct Admin user. ruim_ad-
min is needed for read or write access to ruim-tree in NetAct
DirSrv e.g. by Permission Management (PEM). The permis-
sion to modify the ruim branch is granted only to ruim_admin.
The ruim_admin user account is defined as a combination of
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
sauuser sysop, SAU mediation No No No SAU mediation runs with this user
smxmediations,sshaccess
system sysop,sshaccess WAS processes No No No LINUX OS user and group created by Cpf (moved to ldap later
by IFW). WebSphere Application Server's process user.
wasadmin wassrvid SLNBI No No No Used to administer Websphere on SLNBI server, when SLNBI
WAS is connected to NetAct LDAP registry
wassrvid wassrvid WebSphere Applica- No No Yes Created by CPf. The wassrvid user account is used for ac-
tion Server cessing WebSphere Application Server. This user account is
defined as a combination of the account and simpleSecurity-
Object object classes defined in RFC 4524.
xohuser sysop,sshaccess,smxmediations
XOH Mediation No No No XOH mediation runs with this user
trexuser sysop Trace Expert No No No Internal communication between Trace Expert services, also to
communicate with CM web services
cmcompsrv sysop PnP Compatibility No No No User will be used for running new NetAct service "PnP Com-
Service patibility Service." This new service will be managed by sman-
ager and will in part replace old service "pnpserver". Sysop
group is required for sending alarms to FM
tpuser tandp T&P No No No Created for Thresholder and Profiler. The account is used to
request Performance Manager in order to run TandP reports.
Password for this is user is randomly generated during instal-
lation. No default password.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
cpfvcs sysop Yes n/a No Required for start, stop cpfvcenterselfmon application
cpfvman sysop Yes n/a No Required for start, stop selfmon cpfvmanager application
dcfw sysop Yes No No Data collection framework user. Key based authentication is
used for authentication.
dirsrv dirsrv Yes No No User created for management of directory server packages in
RHEL8.
ftirpuser ftirpftp 3GPP PM NBI IN- No NA No Created for external NMS using ftp/sftp service to download
VENTORY NBI 3GPP measurement and inventory files.
ftirpuser2 ftirpftp 3GPP PM NBI IN- No NA No Created for external NMS using ftp/sftp service to download
VENTORY NBI 3GPP measurement and inventory files.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
ftirpuser3 ftirpftp 3GPP PM NBI IN- No NA No Created for external NMS using ftp/sftp service to download
VENTORY NBI 3GPP measurement and inventory files.
gopher gopher Yes No No Linux Standard Base required user available only in upgraded
labs
haldaemon haldaemon Yes No No HAL Daemon user available only in upgraded labs
isdkuser sftpchroot,smxmediations,sysop,isdkmediations No NA No NE uses this account to access the directory to PUT the raw
files. The home directory of isdkuser is used by the NE to PUT
files.
oracle dba No NA Yes Local user required for starting oracle database, also used for
oracle database client.
pmflmgr sysop PM file merger Yes No No Used to run PM file merger service and generate merged PM
files in sysop group
polkitd polkitd Yes No No User for managing policy kit system service in RHEL8.
rdsftp rdgroup RESTful Web Ser- No No No Created for external NMS using sftp service to download rest-
vice Data Access da result files
API(restda)
root root No NA Yes RHEL Super User. System User with login. Home directory
disabled during hardening.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
saslauth saslauth Yes No No Linux Standard Base required user. Available only in upgrade
environment.
sockd sockd Yes No No sockd is secure socket proxy server. It provide hosts within a
firewall access to resources outside of the firewall.
tss tss Yes No No User for managing trusted computing resources. Available only
in upgrade environment.
uucp uucp Yes No No Linux Standard Base required user. Available only in upgrade
environment.
vcsa vcsa Yes No No Virtual console memory owner. Available only in upgrade envi-
ronment.
admusr sysop Yes No No As adm User (non-root) under sysop group should be able to
Activate the D3B2 , Confmeta artifact
frr frr DR NCS Yes N No User used to run the BGPd service.
frr frrvty DR NCS Yes N No User used to run the BGPd service.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
AC n/a FM Yes No No Schema used for storing data related to alarm correlation.
ANONYMOUS n/a Yes No No Oracle default user: NetAct expires and locks the account.
Used for storing/managing all data and metadata required by
Oracle Quality of Service Management.
AOM n/a AoM Yes No No Created by NetAct component during installation. The schema
is used for storing the plan and template information related to
administration of measurements.
APPQOSSYS n/a Yes No No Oracle default user: Stores/Manages data required by Oracle
Quality of Service Management. Locked and expired by de-
fault
ATL n/a ATL Yes No No Schema used for storing information about log collections
scheduled from Audit Trail server
AUDSYS n/a Yes No No Oracle default user: Used for having unified audit records.
Locked and expired by default
CGNEPM n/a PM Adapt Yes No No Schema created as part of Cisco Network Element adaptation
deployment. Used for storing aggregation data.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CGNEPMRAW n/a PM Adapt Yes No No Schema created as part of Cisco Network Element adaptation
deployment. Used for storing raw data.
CMDAHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDALB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDAMR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDAN3 n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDANP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDANT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDASRNC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDASRNCIP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDATH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDAWS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDAXC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBCU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBCUM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBFM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBGA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBGW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBSC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBSR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBSRA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBTC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBTF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDBTH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMDBTU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCDA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCDH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCDS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCFC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCFI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCFP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCMV n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCODS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCOM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCON n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCRA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCSA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCSC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCSF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCSI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDCTP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDLB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDLC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDRA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDRC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDRI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDRM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDXH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDXT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMDERF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDEXR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFDHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFNA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFNG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFNS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFTM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFZCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDFZCPCA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDGGA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDGGS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDGLD n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDGOM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDGPB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHFC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHFE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHFI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHLA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHLH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHLR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHLRC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHMV n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHPH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHPHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMDDHSCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHSE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHSF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHSG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHSI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHSM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIHF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIHR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIMH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDINT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIOA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIOM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIPA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDIPL n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDISC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDJUN n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLBA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLBC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLBI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLBS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLCC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLTE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDLTTHC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMDMCHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMGA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMGW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMPL n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMRC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMRCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMRS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMSH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDMSS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDN3A n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNCO n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNDA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNDB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNDM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNDN n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNDP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNE3 n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNET n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNFM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNSG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNTA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDNTAS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMDOGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDOGW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDOMA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDOMC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDOPF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDPCC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDPCL n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDPF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDPGD n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDPLA n/a CM Adaptation Yes No No Schema used for storing common part of all configuration data
of Configuration Management.
CMDPNP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDPSA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDPSG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDQ3A n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDRACS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDRCU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDRDA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDRNC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDRNCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDRPO n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSBTS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSBTSHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSGA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSGS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMDSMM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSMMHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDSR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDSRE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDDSRER n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSRG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSRHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSRIU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSRM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSRT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSRW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDSUH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTAH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTAM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTAS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTIA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTIC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTII n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTIM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDTLC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDUHC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDUHI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDUHS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDUHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDV2G n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMDV3G n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVDU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVEX n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVHSC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVHSI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVHSS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVLT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVLSB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDVTE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDWIFI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHAHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMDHALB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHAN3 n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHANP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHANT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHASRNC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHASRNCIP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHATH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHAWS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHAXC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBCU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBCUM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBFM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBGW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMHBHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBLC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBMED
CMHBSC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBSR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBTC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBTF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBTH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHBTU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCDH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCDS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCFC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCFI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCFP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCMV n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCODS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCOM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCRA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCSA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCSC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCSF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHCSI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHDLB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHDLC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHDRA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMHDRC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHDRI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHDRM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHDXH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHDXT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHERF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHEXR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHFDHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHFHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHFNG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHFNS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHFTM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHFZCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHFZCPA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHGGS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHGOM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHGPB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHFC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHFE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHFI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHLH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHLR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHPH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHLRC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHMV n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMHHPH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHPPW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHSCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHSE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHSF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHSG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHSI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHHSM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIHF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIHR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIMH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIOA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIOM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIPA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHIPL n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHISC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHJUN n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHLBA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHLBC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHLBI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHLBS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHLCC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHLHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHLTE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMHLTTHC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMCHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMGW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMPL n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMRC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMRCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMRS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMSH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHMSS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHN3A n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNDA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNDB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNDN n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNDP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNFM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNGNHW
CMHNHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNSG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHNTAS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHOGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHOGW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHOMC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHOPF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMHPCC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHPCL n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHPF n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHPGD n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHPNP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHPSG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHRACS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHRCU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHRDA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHREP n/a CM Adaptation Yes No No Schema used for storing Configuration Management history
topology related data.
CMHRNC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHRNCP n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHRPO n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSBTS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSBTSHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSGH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSGS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSMM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSMMHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSRE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSRER n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSRG n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSRHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSRIU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMHSRM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSRT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSRW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHSUH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHTAH n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHTAS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHTIA n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHTIC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHTII n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHTIM n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHTLC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHUHC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHUHI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHUHS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHUHW n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHV2G n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHV3G n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVDU n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVEX n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVHSC n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVHSI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVHSS n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVLT n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVSLB n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMHVTE n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
CMHWIFI n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
CMPOLMGR n/a CM Adaptation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
COMMODEL n/a Adaptation Manager Yes No No Created by Adaptation Manager during installation for its own
DB schemas.
COMMON_ n/a Mediation Frame- Yes No No Created by MF during installation for its own DB schemas and
MEDIATIONS work DB user accounts.
CSCACH n/a NetAct PM Yes No No Created by Core Platform (COP) during installation for its own
DB schemas.
CTXSYS n/a Yes No No Oracle default user created for Oracle Text management. This
is used for linguistic analysis on documents and search text
using various strategies. NetAct expires and locks the account
DBPM n/a NetAct PM Yes No No Created by Database Partitioning Management during installa-
tion for its own DB schemas.
DBSNMP n/a Yes No No Locked by default. The account used by the Management
Agent component of Oracle Enterprise Manager to monitor
and manage the database. Unlocked when oracle enterprise
manager is enabled and locked when disabled
DES n/a Yes No No Schema used for storing data related to Defra (Workspace set-
ting of monitor).
DIP n/a Yes No No Oracle default user. Generic user account DIP for processing
events propagated by DIP. This account would be used by all
applications using the DIP provisioning service when connect-
ing to the database. NetAct expires and locks the account
DVF n/a Yes No No Oracle default user contains public functions to retrieve (at run
time) the factor values set in the Oracle Database Vault access
control configuration.
DVSYS n/a Yes No No Oracle default user which stores the database objects needed
to process Oracle data for Oracle Database Vault.
EJBTIMERCM Yes Yes No EJB Timer service for CM cluster of WebSphere. Configured
datasource in websphere has alias: ium_jaas_ejbtimercm
EJBTIMERFM n/a WebSphere No Yes No EJB Timer service for FM cluster of WebSphere. Configured
datasource in websphere has alias: ium_jaas_ejbtimerfm
EJBTIMERINTG n/a WebSphere No Yes No EJB Timer service for INTG cluster of WebSphere. Configured
datasource in websphere has alias: ium_jaas_ejbtimerintg
EJBTIMERITSM n/a WebSphere No Yes No EJB Timer service for ITSM cluster of WebSphere. Configured
datasource in websphere has alias: ium_jaas_ejbtimeritsm
EJBTIMERPM n/a WebSphere No Yes No EJB Timer service for PM cluster of WebSphere. Configured
datasource in websphere has alias: ium_jaas_ejbtimerpm
EJBTIMERSOL n/a WebSphere No No No EJB Timer service for SOL cluster of WebSphere.
EJBTIMERSYS n/a WebSphere No Yes No EJB Timer service for SYS cluster of WebSphere. Configured
datasource in websphere has alias: ium_jaas_ejbtimersys
ERL n/a NetAct PM Yes No No Created by Erlang B during installation for its own DB
schemas.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
ETRDXT n/a Yes No No Schema created as part of Tetra NE deployment. Used for
storing aggregation data.
ETRDXTRAW n/a Yes No No Schema created as part of Tetra NE deployment. Used for
storing raw data.
FM n/a FM Yes No No Schema used for storing data related to Fault management
metadata, Alarms and GEP rules.
FMGUI n/a FM Yes No No Schema used for storing data related to FM monitor (Views,
CMUI metadata information)
FMSNMPMODEL n/a SNMP Mediation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
FNSMED n/a Mediation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
GEN- n/a Mediation Yes No No Created by NetAct component during installation for its own
ERIC-MEDIATIONS DB schemas and DB user accounts.
GENMED n/a Mediation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
GSMADMIN_INTER- n/a Yes No No Schema used for storing data related to global service manag-
NAL er. Locked and expired by default
GSMCATUSER n/a Yes No No Schema used for storing data related to global service manag-
er. Locked and expired by default
rda n/a Many components No Yes No Created by NetAct component during installation for its own
DB schemas and DB user accounts. Used for Read only ac-
cess to NetAct Data.Configured datasource in websphere has
alias: ium_jaas_rda
GSMUSER n/a Yes No No Schema used for storing data related to global service manag-
er. Locked and expired by default
HPSIM n/a HPSIM service No No No This schema is for HPESIM application. This is used for col-
lecting HW alarms information.
IBLDNS n/a PM Adapt Yes No No Schema created as part of Infoblox DNS DHCP adaptation de-
ployment. Used for storing aggregation data.
IBLDNSRAW n/a PM Adapt Yes No No Schema created as part of Infoblox DNS DHCP adaptation de-
ployment. Used for storing raw data.
ICDCMD n/a PM Adapt Yes No No Schema created as part of Charge At Once Mediate adapta-
tion deployment. Used for storing aggregation data.
ICDCMDRAW n/a PM Adapt Yes No No Schema created as part of Charge At Once Mediate adapta-
tion deployment. Used for storing raw data.
ICDIPP n/a PM Adapt Yes No No Schema created as part of Serve Advance Activation Manager
adaptation deployment. Used for storing aggregation data.
ICDIPPRAW n/a PM Adapt Yes No No Schema created as part of Serve Advance Activation Manager
adaptation deployment. Used for storing raw data.
ICF n/a P Yes No No Schema used for storing registration data for Mediator Dis-
patcher and Notification Dispatcher. Configured datasource in
websphere has alias: icfAlias
IMSBNG n/a d3btool Yes No No Schema created as part of dynamic adaptation upgrade to IMS
BNG Load Balance 11.0. Used for storing aggregation data.
IMSBNGRAW n/a d3btool Yes No No Schema created by part of dynamic adaptation upgrade to IMS
BNG Load Balance 11.0. Used for storing raw data.
IMSCSF n/a d3btool Yes No No Schema created as part of dynamic adaptation upgrade IMS
Call Session Control Function 11.0. Used for storing aggrega-
tion data.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
IMSCSFRAW n/a d3btool Yes No No Schema created as part of dynamic adaptation upgrade IMS
Call Session Control Function 11.0. Used for storing raw data.
IMSDRA n/a d3btool Yes No No Schema created as part of Diameter Routing Agent dynamic
adaptation deployment . Used for storing aggregation data.
IMSDRARAW n/a d3btool Yes No No Schema created as part of Diameter Routing Agent dynamic
adaptation deployment . Used for storing raw data.
IMSHSS n/a d3btool Yes No No Schema created as part of dynamic adaptation upgrade to IMS
Home Subscriber Server Front End 11.0. Used for storing ag-
gregation data.
IMSHSSRAW n/a d3btool Yes No No Schema created by part of dynamic adaptation upgrade to IMS
Home Subscriber Server Front End 11.0. Used for storing raw
data.
IMSTIA n/a d3btool Yes No No Schema created as part of dynamic adaptation upgrade to IMS
TSP Installation, Admin and Management Server 11.0. Used
for storing aggregation data.
IMSTIARAW n/a d3btool Yes No No Schema created by part of dynamic adaptation upgrade to IMS
TSP Installation, Admin and Management Server 11.0. Used
for storing raw data.
ISDK n/a ISDK Yes No No Created by ISDK for during installation for its own DB schemas
and DB user accounts
JMBCOM n/a PM Adapt Yes No No Schema created as part of Juniper Network Element adapta-
tion deployment. Used for storing aggregation data.
JMBCOMRAW n/a PM Adapt Yes No No Schema created as part of Juniper Network Element adapta-
tion deployment. USed for storing raw data.
LACAFM n/a PM Adapt Yes No No LACAFM is coming as part of AFM Network Element adapta-
tion deployment. Used for storing aggregation data.
LACAFMRAW n/a PM Adapt Yes No No Schema created as part of AFM Network Element adaptation
deployment. Used for storing raw data.
LACCOD n/a PM Adapt Yes No No Schema created as part of RACS-CODS Network Element
adaptation deployment. Used for storing aggregation data.
LACCODRAW n/a PM Adapt Yes No No Schema created as part of RACS-CODS Network Element
adaptation deployment. Used for storing raw data.
LACRCC n/a PM Adapt Yes No No Schema created as part of RACS-C Network Element adapta-
tion deployment. Used for storing aggregation data.
LACRCCRAW n/a PM Adapt Yes No No Schema created as part of RACS-C Network Element adapta-
tion deployment. Used for storing raw data.
LACRCT n/a PM Adapt Yes No No Schema created as part of RACS-T Network Element adapta-
tion deployment. Used for storing aggregation data.
LACRCTRAW n/a PM Adapt Yes No No Schema created as part of RACS-T Network Element adapta-
tion deployment. Used for storing raw data.
LBACSYS Yes No No Oracle label security default user, which has the privileges
to manage Oracle label security administration. By default,
LBACSYS is created as a locked account with it's password
expired.
LIC n/a License Manager Yes No No Schema used by License Manager application for storing the
information about licenses distribution in the network and other
application-specific data.
LICENSE n/a OSSMW Licensing Yes No No Schema used for storing the data about all LK installed to Net-
Act.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
LTEA Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
MADBRS n/a PM Adapt Yes No No Schema created as part of Backup and Restore Server adap-
tation deployment. Used for storing aggregation data.
MADBRSRAW n/a PM Adapt Yes No No Schema created as part of Backup and Restore Server adap-
tation deployment. Used for storing raw data.
MADNHR n/a PM Adapt Yes No No Schema created as part of New technology Home Location
Register adaptation deployment. Used for storing aggregation
data.
MADNHRRAW n/a PM Adapt Yes No No Schema created as part of New technology Home Location
Register adaptation deployment. Used for storing raw data.
MADNTM n/a PM Adapt Yes No No Schema created as part of Serve atOnce Device Manager
adaptation deployment. Used for storing aggregation data.
MADNTMRAW n/a PM Adapt Yes No No Schema created as part of Serve atOnce Device Manager
adaptation deployment. Used for storing raw data.
MADODC n/a PM Adapt Yes No No Schema created as part of One NDS adaptation deployment.
Used for storing aggregation data.
MADODCRAW n/a PM Adapt Yes No No Schema created as part of One NDS adaptation deployment.
Used for storing raw data.
MADPKA n/a PM Adapt Yes No No Schema created as part of PKI INSTA Network Element adap-
tation deployment. Used for storing aggregation data.
MADPKARAW n/a PM Adapt Yes No No MADPKA is coming as part of PKI INSTA Network Element
adaptation deployment. Used for storing raw data.
MDDATA n/a Yes No No Oracle default user. The schema used by Oracle Spatial for
storing Geocoder and router data. NetAct expires and locks
the account
MDSYS n/a Yes No No Oracle default user. The Oracle Spatial and Oracle interMedia
Locator administrator account. NetAct expires and locks the
account
MF_COMMON n/a Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
MOVMMS n/a PM Adapt Yes No No Schema created as part of Movius Moreon6000 Media Server
adaptation deployment. Used for storing aggregation data.
MOVMMSRAW n/a PM Adapt Yes No No Schema created as part of Movius Moreon6000 Media Server
adaptation deployment. Used for storing raw data.
MPF n/a NetAct PM Yes No No Schema used for storing CertGen certification authority details
to manage certificates.
MWSCOMSCHED n/a Scheduler Yes No No Schema used for storing lock info for EJB Scheduler
MWSQUARTZSCHED n/a Quartz Scheduler Yes No No Schema used for storing scheduled jobs data for applications
which use Quartz Scheduler
NASDA n/a NASDA Yes No No Schema used for storing NetAct System Data.
NBI3GC n/a 3GPP FM NBI 3GPP Yes No No Created by Mediation Framework when mediation deployed.
PM NBI During normal operation this account is not used by NBI direct-
ly, but the JBossCache will use it.
NBI3GCPM n/a 3GPP PM NBI Yes No No Created by Mediation Framework when mediation deployed.
During normal operation this account is not used by NBI direct-
ly, but the JBossCache will use it.
NBISNMP n/a SNMP FM NBI Yes No No Created by Mediation Framework when mediation deployed.
During normal operation this account is not used by NBI direct-
ly, but the JBossCache will use it.
NDSADM n/a PM Adapt Yes No No The user will be created only after dynamic adaption
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
NDSADMRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSBDS n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSBDSRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSPDS n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSPDSRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSPGW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSPGWRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSRDS n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NDSRDSRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NE3SFM n/a NE3S FM Mediation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
NE3SPM n/a NE3S PM Mediation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
NE3SWS n/a NE3SWS Mediation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
NE3SWS_DYNAMI- n/a NE3SWS Mediation Yes No No Created by NetAct component during installation for its own
CADAPTATION DB schemas and DB user accounts.
NEAC n/a NEAC Yes No No Schema used to service user related data
NECERT n/a Yes No No Schema used for storing operations related to certificate man-
agement operations performed on Network Element
NEIW n/a NEIW Yes No No Schema used for storing data related to NEIW application
NOKACS n/a PM Adapt Yes No No Schema created as part of RACS Network Element adaptation
deployment. Used for storing aggregation data.
NOKACSRAW n/a PM Adapt Yes No No Schema created as part of RACS Network Element adaptation
deployment. Used for storing raw data.
NOKAXC n/a PM Adapt Yes No No Schema created as part of ATM Cross Connect adaptation de-
ployment. Used for storing aggregation data.
NOKAXCRAW n/a PM Adapt Yes No No Schema created as part of ATM Cross Connect adaptation de-
ployment. Used for storing raw data.
NOKBCU n/a PM Adapt Yes No No Schema created as part of BCU3 adaptation deployment.
Used for storing aggregation data.
NOKBCURAW n/a PM Adapt Yes No No Schema created as part of BCU3 adaptation deployment.
Used for storing raw data.
NOKBSC n/a PM Adapt Yes No No Schema used for storing GSM(BSC) PM aggregation data.
NOKBSCRAW n/a PM Adapt Yes No No Schema used for storing GSM(BSC) PM raw data.
NOKBSR n/a PM Adapt Yes No No Schema used for storing GSM Railway (BSC) PM aggregation
data.
NOKBSRRAW n/a PM Adapt Yes No No Schema used for storing GSM Railway (BSC) PM raw data.
NOKCAM n/a PM Adapt Yes No No Schema created as part of Cloud application adaptation de-
ployment. Used for storing aggregation data.
NOKCAMRAW n/a PM Adapt Yes No No Schema created as part of Cloud application adaptation de-
ployment. Used for storing raw data.
NOKCFZ n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
NOKCFZRAW n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
NOKDXA n/a PM Adapt Yes No No Schema created as part of DX HLR adaptation deployment.
Used for storing aggregation data. Note: the user is unavail-
able in the scratch installed NetAct.
NOKDXARAW n/a PM Adapt Yes No No Schema created as part of DX HLR adaptation deployment.
Used for storing raw data. Note: the user is unavailable in the
scratch installed NetAct.
NOKEUM n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NOKEUMRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NOKFTO n/a PM Adapt Yes No No Schema created as part of Femto Gateway adaptation deploy-
ment. Used for storing aggregation data.
NOKFTORAW n/a PM Adapt Yes No No Schema created as part of Femto Gateway adaptation deploy-
ment. Used for storing raw data.
NOKFZC n/a PM Adapt Yes No No Schema created as part of Flexi Zone Controller platform de-
ployment. Used for storing aggregation data.
NOKFZCRAW n/a PM Adapt Yes No No Schema created as part of Flexi Zone Controller platform de-
ployment. Used for storing raw data.
NOKIUM n/a PM Adapt Yes No No Schema created as part of Intelligent Number Mapping adap-
tation deployment. Used for storing aggregation data.
NOKIUMRAW n/a PM Adapt Yes No No Schema created as part of Intelligent Number Mapping adap-
tation deployment. Used for storing raw data.
NOKIWW n/a PM Adapt Yes No No Schema created as part of Flexi Direct BTS/RNC adaptation
deployment. Used for storing aggregation data.
NOKIWWRAW n/a PM Adapt Yes No No Schema created as part of Flexi Direct BTS/RNC adaptation
deployment. Used for storing raw data.
NOKKCC n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
NOKKCCRAW n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
NOKLAS n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
NOKLASRAW n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
NOKLTE n/a PM Adapt Yes No No Schema created as part of LTE Base Station adaptation de-
ployment. Used for storing aggregation data.
NOKLTERAW n/a PM Adapt Yes No No Schema created as part of LTE Base Station adaptation de-
ployment. Used for storing raw data.
NOKMWW n/a PM Adapt Yes No No Schema created as part of Multimedia Gateway adaptation de-
ployment. Used for storing aggregation data.
NOKMWWRAW n/a PM Adapt Yes No No Schema created as part of Multimedia Gateway adaptation de-
ployment. Used for storing raw data.
NOKOBW n/a PM Adapt Yes No No Schema created as part of Open Border Gateway adaptation
deployment. Used for storing aggregation data.
NOKOBWRAW n/a PM Adapt Yes No No Schema created as part of Open Border Gateway adaptation
deployment. Used for storing raw data.
NOKOMW n/a PM Adapt Yes No No Schema created as part of Open Multimedia Gateway adapta-
tion deployment. Used for storing aggregation data.
NOKOMWRAW n/a PM Adapt Yes No No Schema created as part of Open Multimedia Gateway adapta-
tion deployment. Used for storing raw data.
NOKRWW n/a PM Adapt Yes No No Schema created as part of WCDMA Base Station/RNC adap-
tation deployment. Used for storing aggregation data.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
NOKRWWRAW n/a PM Adapt Yes No No Schema created as part of WCDMA Base Station/RNC adap-
tation deployment. Used for storing raw data.
NOKSAU n/a PM Adapt Yes No No Schema created as part of Simultaneous Active Users counter
for MSS/TAS adaptation deployment. Used for storing aggre-
gation data.
NOKSAURAW n/a PM Adapt Yes No No Schema created as part of Simultaneous Active Users counter
for MSS/TAS adaptation deployment. Used for storing raw da-
ta.
NOKSEE n/a PM Adapt Yes No No Schema created as part of OpenTAS Service execution envi-
ronment deployment. Used for storing aggreation data.
NOKSEERAW n/a PM Adapt Yes No No Schema created as part of OpenTAS Service execution envi-
ronment deployment. Used for storing raw data.
NOKSRN n/a PM Adapt Yes No No Schema created as part of Single RAN Base Transceiver Sta-
tion deployment. Used for storing aggregation data.
NOKSRNRAW n/a PM Adapt Yes No No Schema created as part of Single RAN Base Transceiver Sta-
tion deployment. Used for storing raw data.
NOKTAS n/a PM Adapt Yes No No Schema created as part of Telecom Application Server adapta-
tion deployment. Used for storing aggregation data.
NOKTASRAW n/a PM Adapt Yes No No Schema created as part of Telecom Application Server adapta-
tion deployment. Used for storing raw data.
NSISGW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NSISGWRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
NTCAPP n/a Yes No No Schema user created for storing data relevant to NTCAPP.
NWI3 n/a Yes No No Schema user created for storing data relevant to NWI3 media-
tion
NWI3MED n/a NWI3 South bound Yes No No NWI3 DB schema owner. NWI3 mediation has nwi3med Ora-
mediation cle user for NWI3 DB tables.
NX2S n/a Yes No No Schema user created for storing data relevant to NX2S media-
tion
OJVMSYS n/a Yes No No Oracle default user. Locked and Expired by default.
OLAPSYS n/a Yes No No Oracle default user. Locked and Expired by default. Account
that owns the OLAP Catalog.
OMC n/a many components No Yes Yes This is the NetAct Oracle Standard User. Configured data-
source in websphere has alias: ium_jaas_omc
ONEAAA n/a PM Adapt Yes No No The user will be created only after dynamic adaption
ONEAAARAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
ORACLE_OCM n/a Yes No No Oracle default user: NetAct expires and locks the account.
This account contains the instrumentation for configuration col-
lection used by the Oracle Configuration Manager
ORDDATA n/a Yes No No Oracle default user: NetAct expires and locks the account. Ac-
count that contains the Oracle Multimedia DICOM data model.
ORDPLUGINS n/a Yes No No Oracle default user: NetAct expires and locks the account. Or-
acle Multimedia user: Plug-ins supplied by Oracle and third-
party, format plug-ins are installed in this schema
ORDSYS n/a Yes No No Oracle default user: NetAct expires and locks the account. Or-
acle Multimedia administrator account.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
OSSSYS n/a Yes No No Oracle account used for J2EE applications: Database adminis-
trator
OUTLN n/a Yes No No Oracle default user: NetAct expires and locks the account.
The account that supports plan stability. Plan stability prevents
certain database environment changes from affecting the per-
formance characteristics of applications by preserving execu-
tion plans in stored outlines. OUTLN acts as a role to centrally
manage metadata associated with stored outlines
OWBSYS n/a Yes No No Oracle default user: NetAct expires and locks the account. Ac-
count for administrating the Oracle Warehouse Builder reposi-
tory.
OWBSYS_AUDIT n/a Yes No No Expired and locked by default. This account is used by the
Warehouse Builder Control Center Agent to access the hetero-
geneous execution audit tables in the OWBSYS schema
PCOFNG n/a PM Adapt Yes No No Schema created as part of Flexi Network Gateway adaptation.
Used for storing aggreation data.
PCOFNGRAW n/a PM Adapt Yes No No Schema created as part of Flexi Network Gateway adaptation.
Used for storing raw data.
PCOFNS n/a PM Adapt Yes No No Schema created as part of Flexi Network Server adaptation.
Used for storing aggreation data.
PCOFNSRAW n/a PM Adapt Yes No No Schema created as part of Flexi Network Server adaptation.
Used for storing raw data.
PCOGGN n/a PM Adapt Yes No No Schema created as part of Gateway GPRS Support Node
adaptation. Used for storing aggreation data.
PCOGGNRAW n/a PM Adapt Yes No No Schema created as part of Gateway GPRS Support Node
adaptation. Used for storing raw data.
PCOLIB n/a PM Adapt Yes No No Schema created as part of Lawful Interception adaptation de-
ployment. Used for storing aggreation data.
PCOLIBRAW n/a PM Adapt Yes No No Schema created as part of Lawful Interception adaptation de-
ployment. Used for storing raw data.
PCOLIC n/a PM Adapt Yes No No Schema created as part of Lawful Interception controller adap-
tation deployment. Used for storing aggreation data.
PCOLICRAW n/a PM Adapt Yes No No Schema created as part of Lawful Interception controller adap-
tation deployment. Used for storing raw data.
PCOPCN n/a PM Adapt Yes No No Schema created as part of RedKnee Policy control adaptation
deployment. Used for storing aggreation data.
PCOPCNRAW n/a PM Adapt Yes No No Schema created as part of RedKnee Policy control controller
adaptation deployment. Used for storing raw data.
PCOPDG n/a PM Adapt Yes No No Schema created as part of Genband Evolved Packet Data
Gateway adaptation deployment. Used for storing aggregation
data.
PCOPDGRAW n/a PM Adapt Yes No No Schema created as part of Genband Evolved Packet Data
Gateway adaptation deployment. Used for storing raw data.
PCOSGN n/a PM Adapt Yes No No Schema created as part of NSN Serving GPRS Support Node
adaptation. Used for storing aggreation data.
PCOSGNRAW n/a PM Adapt Yes No No Schema created as part of NSN Serving GPRS Support Node
adaptation. Used for storing raw data.
PCOSGS n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
PCOSGSRAW n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
PEM n/a PEM Yes No No Schema used for storing presentation data of permission relat-
ed objects created in NetAct (e.g. Roles)
PMACCD n/a PM Adapt Yes No No Schema created as part of Accedian Network Element adapta-
tion deployment. Used for storing aggregation data.
PMACCDRAW n/a PM Adapt Yes No No Schema created as part of Accedian Network Element adapta-
tion deployment. Used for storing raw data.
PMASBC n/a PM Adapt Yes No No Schema created as part of Acme Packet SBC adaptation de-
ployment. Used for storing aggregation data.
PMASBCRAW n/a PM Adapt Yes No No Schema created as part of Acme Packet SBC adaptation de-
ployment. Used for storing raw data.
PMFPRB n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PMFPRBRAW n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PMKVS n/a NetAct PM Yes No No This schema user is created for KPI Value Storage. Where cal-
culated KPI values are persistently stored on DB.
PMLITE n/a PM Adapt Yes No No Schema created as part of Microwave Radio Lite Network Ele-
ment adaptation deployment. Used for storing raw data.
PMLITERAW n/a PM Adapt Yes No No Schema created as part of Microwave Radio Lite Network Ele-
ment adaptation deployment. Used for storing aggregation da-
ta.
PMR n/a NetAct PM No Yes No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.Configured
datasource in websphere has alias: ium_jaas_pmr
PMSNMPMODEL n/a SNMP Mediation Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PMW n/a NetAct PM No Yes No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts. Used for Read
and Write access to NetAct Data. Configured datasource in
websphere has alias: ium_jaas_pmw
PM_CMA n/a Yes No No Schema created as part of Connection Master Network Ele-
ment adaptation deployment. Used for storing aggregation da-
ta.
PM_CMARAW n/a Yes No No Schema created as part of Connection Master Network Ele-
ment adaptation deployment. Used for storing raw data,
PM_FMI n/a PM Adapt Yes No No Schema created as part of First Mile 200i Network Element
adaptation deployment. Used for storing aggregation data.
PM_FMIRAW n/a PM Adapt Yes No No Schema created as part of First Mile 200i Network Element
adaptation deployment. Used for storing raw data.
PM_MWT n/a PM Adapt Yes No No Schema created as part of Microwave Radio Transport (MWT)
Network Element adaptation deployment. Used for storing raw
data.
PM_MWTRAW n/a PM Adapt Yes No No Schema created as part of Microwave Radio Transport (MWT)
Network Element adaptation deployment. Used for storing ag-
gregation data.
PM_NVA n/a PM Adapt Yes No No Schema created as part of Netviewer Network Element adap-
tation deployment. Used for storing aggregation data.
PM_NVARAW n/a PM Adapt Yes No No PM_NVA is coming as part of Netviewer Network Element
adaptation deployment. Used for storing raw data.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
PM_PHV n/a PM Adapt Yes No No Schema created as part of HighCap Radio NMS (Ceragon)
CBBW Network Element adaptation deployment. Used for
storing aggregation data.
PM_PHVRAW n/a PM Adapt Yes No No Schema is coming as part of HighCap Radio NMS (Ceragon)
CBBW Network Element adaptation deployment. Used for
storing raw data.
PM_SER n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_SERRAW n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_SMM n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_SMMRAW n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_SWI n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_SWIRAW n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_TLA n/a PM Adapt Yes No No Schema created as part of Tellabs Network Element adapta-
tion deployment. Used for storing aggregation data.
PM_TLARAW n/a PM Adapt Yes No No Schema created as part of Tellabs Network Element adapta-
tion deployment. Used for storing raw data.
PM_UER n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_UERRAW n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_WDM n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PM_WDMRAW n/a PM Adapt Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
PREF n/a Preference Yes No No Schema used for storing preferences data. Configured data-
source in websphere has alias: prefAlias
PT n/a FM Yes No No Schema used for storing data related to state and logs of
progress tracker tool used in Monitor
Q3_COMMON n/a Q3/IP South Bound Yes No No Created by NetAct component during installation for its own
Mediations DB schemas and DB user accounts.
Q3_TM n/a Q3/IP South Bound Yes No No Created by NetAct component during installation for its own
Mediations DB schemas and DB user accounts.
Q3USER n/a Q3/IP South Bound Yes No No Created by NetAct component during installation for its own
Mediations DB schemas and DB user accounts.
RADCMS n/a PM Adapt Yes No No Schema created as part of NetAct CMS 3000/9000 adaptation
deployment. Used for storing aggregation data.
RADCMSRAW n/a PM Adapt Yes No No Schema created as part of NetAct CMS 3000/9000 adaptation
deployment. Used for storing raw data.
RADMRF n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
RADMRFRAW n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
RASWPM n/a PM Adapt Yes No No Schema created as part of RACS-Switch Network Element
adaptation deployment. Used for storing aggregation data.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
RASWPMRAW n/a PM Adapt Yes No No Schema created as part of RACS-Switch Network Element
adaptation deployment. Used for storing raw data.
RDR n/a NetAct PM No No No Created by NetAct component during installation for its own
DB schemas and DB user accounts. Used for Read access to
NetAct Data.
REPALS n/a Thresholder & Profil- Yes No No Created by T&P during installation for its own DB schemas
er and DB user accounts.
REPAOA n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.
REPDAR n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.
REPOBH n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.
REPPCO n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
REPPCORAW n/a PM Adapt Yes No No Created by PM Adaptation during installation for its own DB
schemas and DB user accounts.
REPRHM n/a NetAct PM Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
REPRPE n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.
REPRPL n/a Thresholder & Profil- Yes No No Created by T&P during installation for its own DB schemas
er and DB user accounts.
REPSPA n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for Reporter adaptation for self-performance RAW data
REPSPARAW n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for Reporter adaptation for self-performance AGG data
REPSPM n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.
REPWH n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.
REPWMR n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for Topology Editor
REPWSS n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for Working Set Synchronizer
SAMSRV n/a PM Adapt Yes No No The user will be created only after dynamic adaption
SAMSRVRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
SAUCNT n/a SAU South Bound Yes No No Created by NetAct component during installation for its own
Mediations DB schemas and DB user accounts.
SCA n/a SCA Yes No No Schema used for storing token information for users in System
Credential Access.
SDMAAA n/a PM Adapt Yes No No The user will be created only after dynamic adaption
SDMAAARAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
SDMBIG n/a PM Adapt Yes No No Schema created as part of BIG-IP product suite adaptation de-
ployment. Used for storing aggregation data.
SDMBIGRAW n/a PM Adapt Yes No No Schema created as part of BIG-IP product suite adaptation de-
ployment. Used for storing raw data.
SDMPCC PM Adapt Yes No No Schema created as part of Point Code Concentrator Solution
adaptation deployment. Used for storing aggregation data.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
SDMPCCRAW n/a PM Adapt Yes No No Schema created as part of Point Code Concentrator Solution
adaptation deployment. Used for storing raw data.
SDMSDM n/a PM Adapt Yes No No Schema created as part of Subscriber Data Management
adaptation deployment. Used for storing aggregation data.
SDMSDMRAW n/a PM Adapt Yes No No Schema created as part of Subscriber Data Management
adaptation deployment. Used for storing raw data.
SEMNPC n/a PM Adapt Yes No No Schema created as part of Policy server adaptation deploy-
ment. Used for storing aggregation data.
SEMNPCRAW n/a PM Adapt Yes No No Schema created as part of Policy server adaptation deploy-
ment. Used for storing raw data.
SI_INFORMTN_ n/a Yes No No Oracle default user: NetAct expires and locks the account. Ac-
SCHEMA count that stores the information views for the SQL/MM Still
Image Standard
SIGNLB n/a PM Adapt Yes No No The user will be created only after dynamic adaption
SIGNLBRAW n/a PM Adapt Yes No No The user will be created only after dynamic adaption
SMAMFA n/a PM Adapt Yes No No Schema created as part of Mediation Framework Monitoring
deployment. Used for storing aggregation data.
SMAMFARAW n/a PM Adapt Yes No No Schema created as part of Mediation Framework Monitoring
deployment. Used for storing raw data.
SMU Yes No No Schema used for storing system monitoring unit data.
SMAMPA n/a PM Adapt Yes No No Schema created as part of Monitoring NetAct system adapta-
tion deployment. Used for storing aggregation data.
SMAPMARAW n/a PM Adapt Yes No No Schema created as part of Monitoring NetAct system adapta-
tion deployment. Used for storing raw data.
SPATIAL_CSW_AD- n/a Yes No No Oracle default user: NetAct expires and locks the account. The
MIN_USR Catalog Services for the Web (CSW) account. It is used by
the Oracle Spatial CSW cache manager to load all record type
metadata, and record instances from the database into the
main memory for the record types that are cached
SPATIAL_WFS_AD- n/a Yes No No Oracle default user: NetAct expires and locks the account. The
MIN_USR Web Feature Service (WFS) account. It is used by the Oracle
Spatial WFS cache manager to load all feature type metadata,
and feature instances from the database into main memory for
the feature types that are cached
SQM n/a T&P No No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
SWAM n/a SWAM Yes No No Schema used by Software Asset Monitoring application for
storing information about reports, modules and other applica-
tion-specific data.
SWM n/a SWM Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
SYS n/a many components No No Yes Oracle default user. Oracle Data Dictionary/ Catalog account.
Also,used to perform database administration tasks.
SYSBACKUP n/a Yes No No Oracle default user. Used for data guard related operations.
NetAct expires and locks the account.
SYSDG n/a Yes No No Oracle default user. Used for data vault related administrative
operations. NetAct expires and locks the account.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
SYSKM n/a WebSphere No Yes Yes Oracle default users acc. to Oracle Security Guide. Another
account used to perform database administration tasks.Ora-
cle Administrative User - Open. Configured datasource in web-
sphere has alias: ium_jaas_system
SYSTEM n/a NetAct PM Yes No No Created by NetAct Performance Manager during installation
for its own DB schemas and DB user accounts.
TCMPTL n/a PM Adapt Yes No No Schema created as part of IP/MPLS Agent Network Element
adaptation deployment. Used for storing aggregation data.
TMAIPM n/a PM Adapt Yes No No Schema created as part of IP/MPLS Agent Network Element
adaptation deployment. Used for storing raw data.
TMAIPMRAW n/a PM Adapt Yes No No Schema created as part of Q1 Agent Network Element adapta-
tion deployment. Used for storing aggregation data.
TMAQ1A n/a PM Adapt Yes No No Schema created as part of Q1 Agent Network Element adapta-
tion deployment. Used for storing raw data.
TMAQ1ARAW n/a User Management Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts. Configured datasource in
websphere has alias: tmfAlias
TMF n/a NetAct TraceViewer Yes No No Schema used for storing data related to TraceViewer applica-
tion: Network Element traces messages and calls and to man-
age tracing network elements
TRC n/a User Management Yes No No Schema used for storing user profile and some of policy con-
figurations. Configured datasource in websphere has alias: ua-
mAlias
UAM n/a NetAct PM Yes No No Created by NetAct component during installation for its own
DB schemas and DB user accounts.
UMA n/a Yes No No Oracle default user: NetAct expires and locks the account.
Used to store the metadata information for Oracle Workspace
Manager
WMSYS n/a Yes No No Oracle default user: NetAct expires and locks the account.
Used for storing Oracle XML DB data and metadata
XDB n/a PM Adapt Yes No No Schema created as part of 2G Core/HLR Adaptation deploy-
ment. Used for storing aggregation data.
XMLNSS n/a PM Adapt Yes No No Schema created as part of 2G Core/HLR Adaptation deploy-
ment. Used for storing raw data.
XMLNSSRAW n/a Yes No No Schema user created for storing data relevant to XOH media-
tion
XOH n/a Yes No No Oracle default user: NetAct expires and locks the account. An
internal account that represents the absence of a user in a
session. XS$NULL has no privileges and no one can authenti-
cate as XS$NULL, nor can authentication credentials ever be
assigned to XS$NULL
XS$NULL n/a PM Adapt Yes No No Schema created as part of SDL adaptation deployment. Used
for storing aggregation data.
SDMSDL n/a PM Adapt Yes No No Schema created as part of SDL adaptation deployment. Used
for storing raw data.
SDMSDLRAW n/a PM Adapt Yes No No Schema created as part of PGW adaptation deployment. Used
for storing aggregation data.
SDMPGW n/a PM Adapt Yes No No Schema created as part of PGW adaptation deployment. Used
for storing raw data.
SDMPGWRAW n/a PM Adapt Yes No No Schema created as part of SDME adaptation deployment.
Used for storing aggregation data.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
SDMSDE n/a PM Adapt Yes No No Schema created as part of SDME adaptation deployment.
Used for storing raw data.
SDMSDERAW n/a keycloak Yes No No Schema created as part of keycloak service. Used for storing
raw data.
KEYCLOAK
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
administrator NA No No Yes
@vsphere.local
(VMWare vCenter
Server)
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
named named
polkitd
root root No NA Yes RHEL Super User. System User with login. Home directory
disabled during hardening.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
administrator n/a Node Manager No NA Yes Windows Node Manager user. Built-in account for administer-
ing the computer and domain
Guest n/a Node Manager Yes NA No Windows Node Manager user. Built-in account for guest ac-
cess to the computer and domain. Disabled by default.
Ctx_ConfigMgr n/a Node Manager Yes NA No Windows Node Manager user. Citrix built-in user which is cre-
ated during Citrix installation. Disabled in Security hardening.
Ctx_StreamingSvc n/a Node Manager Yes NA No Windows Node Manager user. Citrix built-in user which is cre-
ated during Citrix installation.
Ctx_cpuuser n/a Node Manager Yes NA No Windows Node Manager user. Citrix built-in user which is cre-
ated during Citrix installation.
Admin
1 2
System User Id System User Group Component Locked JAAS Description
User
superadmin master SM No No Yes Used to manage all Keycloak's realm admin users. Realm is
master realm
ckeyadmin ntcapp NTCApp No No No user name “ckeyadmin” and realm “ntcapp” used for CBAM
integration using OAuth2.0
For more information, see Service restarts needed after password change of system user, Special
characters allowed in system user’s password, and Changes in NE configuration post password
change.
• It is recommended to know the password policies applicable for user prior to changing of
passwords. This helps in determining the password which will match existing policy and also
avoids repeated execution of tool due to password validation failure.
For more information about how to know current policy in place, see Administering user policies.
• It is suggested to know the current password of users before password change is attempted for
users. For more information about the users whose password can be retrieved, see Retrieving
password of system users.
• In case of password change for system user fails for any unforeseen reason, see Troubleshooting
Password-Tool Execution Failures in Troubleshooting Security Management to resolve issues re-
lated to password change failures.
Prerequisites
Before initializing the password change, see Guidelines for changing password.
NetAct password-tool is a command line tool, used for changing NetAct default system users's pass-
word. password-tool provides mechanism to change the password of system users stored in multiple
repositories such as Directory server, Oracle database and OS repository.
The password-tool automates all the steps required for successful password change of system
user including the necessary restarts and configuration changes. The tool also supports changing
user’s password collectively in group within single execution and eases the password change
operation by minimizing the downtime caused due to service restarts in an optimal way. Health check
of the system is also done before password change is attempted to avoid failures in password change.
Note:
• To obtain the list of users supported by password-tool, log in as omc or root user to the
NetAct VM hosting the dmgr service and enter:
• In a Disaster Recovery (DR) environment, file system synchronization between two sites
can indicate as non-functional during or after the password change. This is due to simul-
taneous execution of commands in standby site involving enable or disable of root login
and file system synchronization cron job running every 15 minutes. This synchroniza-
tion will be recovered during subsequent invocation of the cron job. The execution of the
password-tool before the subsequent invocation of the cron job will fail during the DR
status check. If the file system synchronization is not functional post subsequent invoca-
tion of cron job after a password change, contact Nokia Technical Support.
• Password change of non administrative users for which random passwords are generated inter-
nally according to relevant password policy.
• Password change of administrative users for which password needs to be provided manually by
the user of the tool.
• Passwords of critical administrative users and users requiring configuration changes outside Net-
Act (like on NE, AuditTrail etc) needs to be changed individually.
This classification is done considering the criticality of user, usage for administrative purpose and
changes needed in network element post successful password change in NetAct.
1. Log in as omc user to VM where dmgr service is running and switch to root user.
To locate the correct virtual machine, see Locating the right virtual machine for a service in Admin-
istering NetAct Virtual Infrastructure.
2. To change password of all non administrative users supporting random password, execute:
Upon execution of above command, following are prompted before password change is attempted:
• Root login password: root user password is needed for restarting services after performing
password change if applicable. Provided root user password will be validated and tool will ter-
minate if incorrect password was provided.
• Confirmation for service restarts: It will be prompted and asked for confirmation only when
service restarts are needed after password change of user. Tool will be terminated if options
apart from Y (case insensitive) is provided upon prompt.
Password change will then be performed by generating random password meeting the configured
policy of the relevant type. For all successfully changed user’s password, post password change
action are performed and service restarts are combined and restarted in an optimal way leading to
minimal downtime of services.
Password change will continue even if password change fails for any of user. Password will be re-
verted back to old password in case of any failure if old password is retrievable. It is recommended
to check the logs to analyze the failure of password change before continuing further. Refer, Trou-
bleshooting Password-Tool Execution Failures in Troubleshooting Security Management for resolv-
ing any password change issues.
3. To change password of all administrative users not supporting random password, execute:
Upon execution of above command, following are prompted before password change is attempted:
• Root login password: root user password is needed for restarting services after performing
password change if applicable. Provided root user password will be validated and tool will ter-
minate if incorrect password is provided.
• Confirmation for service restarts: It will be prompted and asked for confirmation only when
service restarts are needed after password change of user. Tool will be terminated if options
apart from Y (case insensitive) is provided upon prompt.
• Old password: Old password is current password of user and is optional. It will be prompted
only if tool was invoked without --skip old_password or -s op option.
• New password: It is mandatory and provided password will be validated against the config-
ured policy of relevant type. For OS users, it is recommended to check the score of the new
password prior to password change. For more information on password score, see Checking
password score for OS users.
• Confirm New password: It is mandatory and should match the password provided during
prompt of New password.
Note:
• New password and Confirm New password will be prompted for each user at-
tempted. It will be re-prompted twice upon providing invalid password.
• Old password will be prompted if tool was invoked without --skip
old_password or -s op option. It will be re-prompted twice upon providing in-
correct password.
Password change of users will continue even if password change failed for attempted user. Service
restart will be done only for associated services of successfully changed users. Password will be
reverted for user in case of failure in password change. Reverting to old password upon failure will
be attempted only if old password was provided or is retrievable.
For example: If execution involves two users (U1 & U2) and password change of U1 fails, then it’s
password will be reverted back and password change will be continued for U2. If password change
was successful for U2, only service restarts applicable for U2 will be performed.
Progress of password change and overall summary status of the performed operation is shown in
the console. If any failures are detected in password change, it is recommended to check the rea-
son for failure before continuing further. Refer Troubleshooting Password-Tool Execution Failures
in Troubleshooting Security Management for resolving any password change issues.
4. Passwords of critical administrative users and users requiring configuration changes in NE needs
to be changed individually. Users falling under this category are mentioned in Users unsupported
in type mode of operation. Refer to Changing password of system users individually regarding in-
structions to be followed for password change of such users.
Note: password-tool also supports changing password of users under particular type and
individually. Refer to section Type and individual operation way of password tool for the in-
structions.
Note:
• Information regarding Node manager domain controller and member server nodes can
be obtained from local installation team.
1. Log in to the Node Manager domain controller as the Domain Administrator, that is, administrator.
2. Click Start → Windows Administrative Tools → Active Directory Users and Computers and
expand <domain_name> → Users on the right panel, right-click Administrator and select Reset
Password.
3. Enter new password and confirm new password, un-check User must change password at next
login and click OK.
Note:
No need to log in to other Domain Controller or Member server to do same steps, be-
cause domain administrator is global account for all servers in same domain.
4. Reconfigure the scheduled tasks after you change the password of the Domain Administrator. For
more information, see Appendix G: Reconfiguring scheduled tasks in Administering Node Manager
Server.
1. Log in to the Node Manager member as the Local Administrator, that is, administrator.
2. Click Start → Windows Administrative Tools → Server Manager, expand Configuration →
Local Users and Groups on the right-panel, right-click Administrator and select Set Password.
3. Click Proceed.
4. Enter new password and confirm new password and click OK.
5. Repeat step1 to step 4 on other member servers.
Note: It is mandatory to have the same password for root and [email protected]
users and follow the same password policy for both root and [email protected]
users.
Note: Ensure to follow the password policy stated under VMware vCenter Server Appliance
password policy for root and [email protected] user.
1. Go to the configuration address that your VMware vCenter Server Appliance virtual machine
provides:
2. Enter your user name as [email protected] and enter the password, and click
Login.
5. In the Users tab, from the Domain drop-down list, select vsphere.local.
7. Click Edit.
11. After changing the [email protected] vCenter user password, you must re-register
Avamar with vCenter with the new password if [email protected] is used inside AVE. To
re-register vCenter in Avamar, see Updating the vCenter user password in AVE in Administering
Backups.
Note: This is applicable only if AVE is used as a Backup and Restore solution in NetAct.
1.4.2 Changing the root password of the VMware vCenter Server Appliance
Prerequisites
Note:
1. Go to the configuration address that your VMware vCenter Server Appliance virtual machine
provides:
2. Type your root user name and password, and click Login.
8. Click SAVE.
Note: If vCenter root user is used to register vCenter with AVE, then you must update
the new changed password in AVE. For more information, see Updating the vCenter user
password in AVE in Administering Backups. This is applicable only if AVE is used as a
Backup and Restore solution in NetAct.
Note: Ensure to follow the password policy stated under ESXi password policy for root user.
1. Connect to the management interface, HPE Integrated Lights-Out (ILO) site, of your ESXi host.
Note: It is recommended to use Internet Explorer when logging in to the HPE ILO site.
You can use either .NET Integrated Remote Console (.NET IRC) or Java Integrated Remote
Console (Java IRC) to launch the remote console.
4. Click Run.
A console appears.
5. In the remote console window, press F2 and log in with root credentials.
6. In the System Customization menu of the ESXi host, use the keyboard arrows to select
Configure Password and press Enter.
7. Fill the required fields to change the password and press Enter.
vmanager is the default username configured in vCenter with the privilege to query the status, reboot
the GuestOS and to reset the virtual machine. The NetAct cpfvmanager service uses the vmanager
user to restore the virtual machine from any critical NetAct unrecoverable service failures.
Note: It is recommended to store the changed password in a safe and secure place
after successful password change, as vmanager user password cannot be retrieved with
syscredacc.sh tool.
Perform the following instructions to change the vmanager user password at runtime:
1. Log in to the virtual machine (VM) where the cpfvmanager service is running and switch to root
user.
To locate the right virtual machine, see Locating the right virtual machine for a service in
Administering NetAct Virtual Infrastructure.
Alternatively, you can also access vCenter VM through vCenter Client by performing the following
steps:
6. Access the appliance shell and log in as a user who has a super administrator role by entering:
[root]# appliancesh
11. Log in to the VM where the cpfvmanager service is running and switch to root user.
To locate the right virtual machine, see Locating the right virtual machine for a service in
Administering NetAct Virtual Infrastructure.
12. Update the cpfvmanager service properties with the latest password by entering:
[root]# /opt/cpf/install/bin/cpfvcenter_update_credentials.sh --
vmanager
Ensure that the output of the above command is started OK and there are no errors or warnings
seen in /var/log/vmanager/vmanager.log file.
14. Update the vcenterselfmon service properties with the latest password by entering:
[root]# /opt/cpf/install/bin/cpfvcenter_update_credentials.sh --
vcenterselfmon
Ensure that the output of the above command is started OK and there are no errors or warnings
seen in /var/log/vcenterselfmon/logfile.log.0 file.
This section provides information about changing the password of storage devices.
• minimum of 8 characters
• one upper case character
• one lower case character
• one numeric character
• one special character
7. Click OK.
Note: For Disaster Recovery based systems, the hardware level security settings must be
done on both active and standby sites.
1. Log in to HPE MSA 2040/2050 Storage GUI console with manage user account.
• minimum of 8 characters
• one upper case character
• one lower case character
Note: For Disaster Recovery based systems, the hardware level security settings must be
done on both active and standby sites.
1. Log in to HPE 3par Storage IP or FQDN with 3paradm user using SSH option.
setpassword -u 3paradm
For example,
• minimum of 8 characters
• one upper case character
• one lower case character
• one numeric character
• one special character
Note: For Disaster Recovery based systems, the hardware level security settings must be
done on both active and standby sites.
The administrator can change the admin user password of EMC VNX Storage in adherence to the
current password policy.
2. Go to Settings.
• minimum of 8 characters
• one upper case character
• one lower case character
• one numeric character
• one special character
7. Click OK.
8. Click Yes.
9. Click OK.
Note: For Disaster Recovery based systems, the hardware level security settings must be
done on both active and standby sites.
This section provides information about changing the password of switches and HPE Virtual Connect.
• minimum of 8 characters
• one upper case character
• one lower case character
• one numeric character
• one special character
Note: The optional fields such as Full Name and Contact Info can be updated, if
required.
7. Click Apply.
Note: For Disaster Recovery based systems, the hardware level security settings must be
done on both active and standby sites.
1.5.2.2 Changing admin user password for HPE Brocade SAN switch
The administrator can change the existing admin user password of HPE Brocade SAN switch in
adherence to the current password policy.
1. Log in to HPE Brocade SAN switch IP with admin user using the SSH option.
sw1:admin> passwd
while changing password, you must provide the existing password, then type the new password
and confirm password by retyping the new password.
For example,
Enc23-fsw1:admin> passwd
Changing password for admin
Enter old password:
Enter new password:
Re-type new password:
passwd: all authentication tokens updated successfully
Saving password to stable storage.
Password saved to stable storage successfully.
• minimum of 8 characters
• one upper case character
• one lower case character
• one numeric character
• one special character
Note: For Disaster Recovery based systems, the hardware level security settings must be
done on both active and standby sites.
1.5.2.3 Changing admin user password for HPE 5900/5500/5510/6127 Network switch
The administrator can change the existing admin user password of HPE 5900/5500/5510/6127
Network switch in adherence to the current password policy.
1. Log in to HPE Network switch IP with admin user using the SSH option.
[comware] system-view
• minimum of 8 characters
• one upper case character
• one lower case character
For example,
<dcnL3switchstack>system-view
System View: return to User View with Ctrl+Z.
[dcnL3switchstack]local-user admin
[dcnL3switchstack-luser-manage-admin]password simple Password_123
[dcnL3switchstack-luser-manage-admin]quit
[dcnL3switchstack]save force
Validating file. Please wait...
Saved the current configuration to mainboard device successfully.
Note: For Disaster Recovery based systems, the hardware level security settings must be
done on both active and standby sites.
3. In the Local Users area, select the check box next to the ilouser user, and then click Edit.
• minimum of 8 characters
• one upper case character
• one lower case character
Expected outcome
4. For the ilouser, select the check box if it is not selected by default, and then click Edit.
• minimum of 8 characters
• one upper case character
• one lower case character
• one numeric character
• one special character
Expected outcome
The administrator can change the existing password of the HPE Onboard Administrator (OA) in
adherence to the current password policy.
3. Select the check box next to the Administrator user and click Edit.
Note: You can also open the Edit Local User window by doing the following:
• In the left pane, expand Users/Authentication → Local Users, and then click
Administrator.
• minimum of 8 characters
• one upper case character
• one lower case character
• one numeric character
• one special character
Expected outcome
For instructions to change the passwords for the operating system accounts, that is, admin and root
and to change the passwords for the internal Avamar server accounts, that is, root, MCUser, repluser,
and viewuser, see Changing Avamar Virtual Edition user passwords in Administering Backups.
For instructions to change the passwords for the operating system accounts, that is, admin and root
use of Avamar Virtual Edition Combined Proxy (AVECP), see Changing Avamar Virtual Edition Com-
bined Proxy user passwords in Administering Backups.
Refer to Changing NetAct end users password for specific steps involved in changing the password.
To change the password of your account using User Management application, do the following:
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
The User Management application opens. The List users page appears displaying all the active
and inactive users configured in NetAct.
5. Click Save.
Expected outcome
User profile details updated successfully message appears and the user password is
changed successfully.
Note:
• You cannot change the password of system users (except omc) using User
Management application. Use password tool to change the password of system users.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
The User Management application opens. The List users page appears displaying all the active
and inactive users configured in NetAct.
3. In the List users page, select the check box next to the user.
4. Click Modify.
5. In the Login details area, select the check box next to the Login name.
6. Click Modify.
The Modify user page appears and the user information is populated.
8. Click Modify.
9. Click Save.
Expected outcome
User profile details updated successfully message appears and the user password is
changed successfully.
Note: If direct SSH access to root is disabled, then log in as a different user. For example,
omc for which SSH access is enabled and switch the user to root (su - root).
1. Obtain the list of all NetAct users with SSH access status by entering:
Expected outcome
Account Name Home Dir Login Shell SSH Group SSH/SFTP Access
IllegalPrimaryGrp
------------------------------------------------------------------------
--------------
atuser /home/atuser /bin/bash yes yes
cmauto NA/cmauto /bin/false no no
…
demo1 /home/demo1 /bin/bash no no
demo2 /home/demo2 /bin/bash yes yes
demo3 /home/demo3 /bin/false no no
…
hwchange NA/hwchange /bin/false no no
isdk NA/isdk /bin/false no no
isdkcorb /home/isdkcorb no no
------------------------------------------------------------------------
--------------
where, <user-name> is the name of the user, for which the SSH access has to be enabled.
• for a list of users, enter:
where, <fileName> is the absolute path of the file which has list of users, for which the SSH
access has to be enabled. Each username must be present in separate lines.
Note:
• The $HOME directory for the user is created automatically incase it does not exist.
The shell-start-up skeleton files are copied from /etc/skel. By default, the primary
group of the user is recursively assigned to the $HOME directory and all contents
within the directory. For more options and details, see Tool help.
• The SSH login using NetAct users are case sensitive. For example, username is
Testuser and user needs to login with the exact case. In this example, if user
enters lower case t instead of upper case T, then logging to SSH fails.
• Due to internal caching, SSH access takes maximum of 90 minutes to be effective.
To provide the immediate access, see Invalidating cache for effective shell access.
• Due to the security feature of Unix PAM modules, the SSH logins are case-sensitive
although the NetAct Start Page allows users to login with both upper and lower
cases.
• The NetAct Start Page login is case-insensitive. For example, user JohnPaul
can log in to the Start Page with JohnPaul or johnpaul username.
• The SSH login is case-sensitive. For example, the user JohnPaul can do SSH
login with JohnPaul but not with the johnpaul username.
Expected outcome
Sample output:
Note:
• By default, the $HOME directory is not deleted. If you want to delete the $HOME
directory implicitly, then use --rmhome option. User certificate will also be cleaned
up when --rmhome option is used. For more options and details, see Tool help.
• Due to internal caching, SSH access takes maximum of 90 minutes to be effective.
To provide immediate access, see Invalidating cache for effective shell access.
For the CLIs to communicate with WebSphere services, the user invoking the CLI needs to be authen-
ticated without a password as input.
1. Obtain the current NetAct user accounts configured with certificates and the remaining certificate
validity by entering:
Sample output:
Note:
Value of the remaining validity (Expiry) is rounded off to the previous value.
Where,
Example:
Expected outcome
Note: Preferred value for certificate validity is 1 year. For more options and details, see Tool
help.
Note: By default, System user in directory server will not expire and are excluded to be
shown from this tool.
Execute the below command in the VM where dmgr service is running as omc user. To locate the
correct virtual machine, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
OR
3.1 Configuring policy for system users and end users in directory
server
Password policy is a set of rules that governs how passwords are used in a given system. The
password policy mechanism allows you to manage minimum length of a password and lockout policies
of password.
Note: Password policies should only be modified using the User Management application
and not in Node Manager server updated manually.
One character class A password following One character class means the password contains
characters from any one of the above stated character classes.
Two character class A password following Two character class means the password contains
characters from any two of the above stated character classes.
Three character class A password following Three character class means the password con-
tains characters from any three of the above stated character classes.
Four character class A password following Four character class means the password contains
characters from all the above stated character classes.
Note: The special characters should be from the list of ASCII printable characters starting
from HEX 21 to HEX 7E.
Field Description
• Additionally, period (.) and hyphen (-) can be added to the set of
supported characters. However, period (.) is not allowed as the
last character and hyphen (-) is not allowed as the first character.
WARNING! In general, period (.) and hyphen (-) are known to cause
authentication failures with certain NEs and are not recommended. To
check if these characters are supported, see corresponding NE docu-
mentation.
Maximum length The maximum length allowed for a login name. The maximum length may vary
of login name between 8 and 20 characters.
Field Description
Password expiry Password expiry for users can be set to Yes or No.
Maximum password age Maximum duration (in days) the user can wait after
changing the password, before changing it again.
Password warning ^1 The duration (in days) to notify the users in advance
about password modification.
Password grace limit The number of successful login attempts for a user af-
ter the password expires.
CAUTION!
Note:
In active directory, expiration time is calculated based on user created time and last
password changed time independent of Password expiry configuration.
In RedHat directory server, expiration time gets calculated only when Password ex-
piry configuration is set to Yes.
• Password grace login is applicable for users logging in to NetAct Start page and
not applicable for users logging in to Node Manager Server (Remote desktop access/
Citrix).
• Password expiry warning is synched between RedHat directory server in NetAct and
Microsoft Active directory in Node Manager Server. It has a default value of 10 days.
1. Login into any of the node manager DC node as nmAdmin user using Remote Desktop Applica-
tion.
2. Open power shell command prompt as administrator and run the following commands.
Note: It will prompt for User Account Control, please select I want to complete this
action by entering my credentials on the authentic windows sign-in screen and fol-
low the instructions, which is given in the below prompts:
a. PS C:\Windows\system32> cd C:\Apps\Oss\platform_sw\Scripts
b. PS C:\Apps\Oss\platform_sw\Scripts>.\updatePasswordExpiryWarning.ps1 -
PasswordExpiry <Value>
Field Description
Minimum password age Minimum duration (in days) users have to wait after
changing their password, before they can change it
again. This is to prevent users from cycling through
the password history.
Note: Current password of user is not considered as history password. For example,
If Passwords in history is set to 3, user must not use the current password and the 3
previous passwords when trying to change the password.
The lockout policy works in conjunction with the password policy to provide further security. The ac-
count lockout feature protects against hackers who try to break into the directory by repeatedly trying
to guess a user password.
Note:
The temporarily locked user will be unlocked after the User account lockout duration.
Field Description
Lock user account User is locked out after a certain number of continu-
ous failed attempts in a given time period.
Maximum login attempts during Failed login count- This is the maximum number of continuous failed
ing period login attempts allowed for a user in Failed login
counting period. After exceeding the count, ac-
count will be locked. This count is reset:
Field Description
Note:
User account lockout duration Password lockout duration in hours is the period
of time during which users are prevented from ac-
cessing NetAct after entering wrong password for a
value greater than Maximum login attempts during
Failed login counting period.
Failed login counting period This time period counts the continuous failed lo-
gin attempts, in order to lock the account. This pe-
riod starts at the time when the user provides the
wrong password for the first time after the last re-
set of Maximum login attempts during Failed login
counting period.
Note:
• The User account lockout duration must be greater than the Failed login counting
period.
• User lock status is synchronized between NetAct Directory Server (NetAct DS) and Node
Manager Active Directory (NMS AD) every five minutes. During each scheduled invo-
cation, upto 50 locked accounts in NMS are synchronized to Nokia. The following differ-
ences are observed between Nokia DS and NMS AD:
• is updated in NMS AD but account will not be locked out. This leads to account
being locked on next failed login to NMS AD upon enabling of lockout policy.
• does not update in Nokia DS.
– For locked users, any failed login attempts within the Failed login counting period
in Nokia updates the time of account unlock in Nokia DS. Account lock status will be
synchronized to NMS AD upon subsequent account synchronization.
– Locked user account in NMS AD will be unlocked if change of Password never ex-
pires configuration is performed using User management application before the next
scheduler synchronization. For changing Password never expires configuration of
user account, see Modifying existing login profile in User Management Help.
Field Description
Reverse login name in password Usage of reverse login name in password. For example, if
xyz is the login name, you can use zyx as the password.
Minimum digits in password Minimum number of digits the password must contain.
Minimum lower case letters in pass- Minimum number of lower case letters the password must
word contain.
Minimum upper case letters in pass- Minimum number of upper case letters the password must
word contain.
Maximum character repeat in pass- Maximum number of times the same character can appear
word sequentially in the password.
Minimum count of special characters Minimum number of special characters that the password
in password must contain.
Unsupported special characters in The characters that are not supported in a password. Net-
password Act restricts #$*/@"'\` special characters by default.
These default special characters must not be removed
Field Description
Note:
Password syntax policy must be configured to greater than zero for at least three of the
following four fields:
Note:
The Administrator can activate the profile and clean up the login names if required. However, the secu-
rity alarms raised because of this policy must be cleared manually.
Field Description
Login names deactivation duration Duration in days after which the user profile of the
unused login names is disabled. Range is between
2 to 366. A major alarm (30004) is raised upon de-
activation of the profile.
Warning alarm sent before Day on which a minor alarm (30003) is sent for un-
used login names. An alarm is sent to NetAct Mon-
itor indicating that the user profile of the inactive
names will be disabled if no action is taken. The val-
ue in this field must be less than Login user deac-
tivation duration and must be in the range of 1 to
365 days. List of unused login names are included
in the alarm details.
Note:
• For user who has logged into NetAct at least once, change of user password by securi-
ty administrator using User Management application updates the last login time of user.
Calculation of account inactivity for such user will be determined from last password
changed time.
• To determine the account inactivity, 1500 user accounts are considered in a day. If there
are more than 1500 user accounts in NetAct, the remaining user accounts will be consid-
ered for the next day.
• User profile having account with Password never expires configured is not consid-
ered for unused user deactivation. For more information on listing the user accounts with
Password never expires configuration, see Listing non-expiring user accounts.
Note: Password history policy is not applicable for sys database account.
Note: In RHEL8.x more strict dictionary checks are applied and some of the password which
worked earlier in RHEL 7.x may not work after changing the password. However, existing
password will continue to work.
Note:
– There are no maximum password length settings in RHEL8.x but the password-tool
limits maximum password length to 50 characters for all Linux OS user password
changes through the tool.
– Password minimum length is configurable. For more information see, Setting pass-
word minimum length for OS users in Administering NetAct System Security.
• Password should contain characters from all four character classes which includes digits, upper
and lower case alphabets and special characters.
• Password cannot contain a dictionary word or part of a dictionary word.
• Password include a mix of characters from three or four character classes such as lowercase let-
ters, uppercase letters, numbers, and special characters. For the list of allowed special characters,
see Special characters allowed in system user’s password.
• Passwords cannot contain a dictionary word or part of a dictionary word.
Note:
• In a password, the following characters are not counted towards the number of character
classes used:
• By default, a maximum of five failed attempts is allowed before the account is locked.
(Security.AccountLockFailures = 5). The account is unlocked after 15 minutes by default.
(Security.AccountUnlocktime = 900 second)
3.6 VMware vCenter Server Appliance password policy for root and
[email protected] user
Note: It is mandatory to have the same password for root and [email protected]
users and follow the same password policy for both root and [email protected]
users.
This chapter provides information about the password policy configuration for vCenter
[email protected] user. This policy is used by the vCenter [email protected]
user at the time of password change.
Note:
– Even if the root password support 6 characters, Nokia recommends using the same
password policy for both root and [email protected] users. The root pass-
word must be 8-20 characters long.
– The password for the [email protected] user cannot be more than 20
characters long.
– Space character is not allowed.
– Non-ASCII characters are allowed.
– The underscore (_) character with any special character is allowed but only under-
score (_) without any special character is not allowed.
– Administrators can change the default password policy.
3.7 Avamar Virtual Edition password policy for Linux OS default user
accounts
For information on the password policies for Avamar Virtual Edition (AVE) Linux OS default user ac-
counts, see Common password policies for all AVE user accounts in Administering Backups.
3.8 Avamar Virtual Edition password policy for MCUser, repluser, and
Avamar root user
For information on the password policies for Avamar Virtual Edition (AVE) Linux OS default user ac-
counts, see Common password policies for all AVE user accounts in Administering Backups.
Note: The value of the login delay can be changed by NetAct administrator only.
1. Log in to any of VM where syswas service is running through SSH as omc user.
To locate the right NetAct VM, see Locating the right virtual machine for a service in Administering
NetAct Virtual Infrastructure.
5. Change other custom set values from backup file if taken in step 2 to /etc/opt/oss/global/
custom/conf/javaprefs/Authentication/Pref_system_login_settings.xml.
Remove the backup file after changing the custom set value.
You can do the following with the Network Element Access Control application:
The following can be done with NEAC CLI. It is useful if you need several network element cre-
dentials with identical permissions to the same network element.
• View groups.
Term Definition
Service type The service type is an interface or protocol used to communicate with the
network element. For example, FTP Access, FTAM Access, HTTP Access
and so on.
Profile The profile defines the commands that a service user can provide for a man-
aged object.
For example, if you select FTP Access as a service type, it supports the fol-
lowing profiles:
• FTP Read Access - The service user can perform only read operations
in the system.
• FTP Write Access - The service user can perform both read and write
operations in the system.
Term Definition
Group The group refers to the application groups present in the system. For exam-
ple, sysop, wassvrid and so on.
Service user A service user is a managed object user account with an ID, password and
authority profile. The user account is used by NetAct applications to access
managed objects through a specific service type.
Network element The network element is a system that can be managed, monitored, or con-
trolled in a network. It has multiple standard interfaces, and is identified by a
unique management address.
• All NE instances: It indicates that the credentials are applied to all the
NE instances present in the system for a service type and profile combi-
nation.
• NE Type: It indicates that the credentials are applied to a particular NE
type in the system for a service type and profile combination. These cre-
dentials are applied to all network elements of that particular NE type.
• Individual NE: It indicates that the credentials are applied to individual
network elements in the system for a service type and profile combina-
tion.
• MR: It indicates that the credentials are applied to an MR with a particu-
lar service type and profile combination.
Maintenance Region The maintenance region (MR) is part of the network that is maintained by a
specific service organization. It also refers to a group of managed objects
defined by the system administrator. For example, managed objects located
in a specific geographical area can be grouped into a maintenance region.
Provisioning status The provisioning status of the service user is displayed. Also, it displays
if the provisioning is supported for the service user. For more information
about the provisioning status, see What to do when the network element
provisioning status is new, modified, or failed in Network Element Access
Control Help.
Enable auto provisioning NEAC automatically provisions the user accounts at the configured time only
when the network element has raised default password alarm and user ac-
counts are configured with auto provision at the maintenance region level.
This helps to mitigate security risks caused by default passwords on the net-
work elements.
Term Definition
By default, the Automated Default Password Change feature is disabled.
For more information about auto provisioning, enabling or disabling the Au-
tomated Default Password Change feature, and configuring the provision-
ing trigger time, see Manage auto provisioning of credentials in Network Ele-
ment Access Control Help.
Note: For few network elements, CNUM is not supported for all operations triggered from
NetAct, that means service users will still be in use for such operations. For more informa-
tion, see corresponding Network element specific prerequisites and procedures section.
This chapter describes the procedures for taking CNUM into use, for maintenance and rolling back to
using the local user management of the network elements.
CNUM in NetAct
The tools that are used to manage CNUM in NetAct are the Network Element Access Control (NEAC)
application for activating and deactivating CNUM in the network elements and the Permission Man-
agement (PEM) application, which is used to assign the necessary permissions to roles and user
groups. For information on how to use these applications, see corresponding online help.
a) In the address field of your internet browser, type the following URL address:
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Note: Login to NetAct as a user having permission to Launch the License manager.
Check if the feature code of the required CNUM license is present as per Network element specific
prerequisites and procedures. If it is not available, contact Nokia Technical Support team.
To verify if the LDAP certificate is already applied, see Checking if LDAP certificates are installed.
If the verification fails, then LDAP certificate is not installed on NetAct and it is required to install LDAP
certificate.
1. To install LDAP certificate, you can use either NetAct Smart Certificate (SmCert) CA or the third
party CA to generate LDAP certificate.
• Using SmCert CA (NetAct CA): In this case, you have to create CA using NetAct provided
scripts and use this CA to generate LDAP Certificate.
• Using third party CA: In this case, you can use any existing CA (third party CA) to generate
LDAP certificate.
To generate and install LDAP certificate, see Managing certificates in Administering NetAct System
Security.
To check LDAP certificate is applied successfully, execute the verification steps described in
Checking if LDAP certificates are installed.
Obtain the LDAP signer certificate by following the instruction provided in Root CA certificate for
NetAct services in Administering NetAct System Security by using dirsrv as service.
Copy the LDAP signer certificate on to the network element and install.
For more information, see Network element specific prerequisites and procedures.
Some NEs require NE certificate installation for secure LDAP connection and in such cases, NE
certificate and private key need to be generated and installed in NE. For more information, see
Network element specific prerequisites and procedures.
1. Log in to NetAct VM where dmgr service is running and switch to root user.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
2. Check if secure Directory Server (LDAP) search is successful by directly addressing each dirsrv-
node, through the ldapAccessFqdn:
Note:
For example,
For few network elements, CNUM is not supported for all operations triggered from NetAct, that means
service users will still be in use for such operations. For more information, see corresponding Network
element specific prerequisites and procedures section.
• User Group - Role association is scoped to the given NE/MR using Scope Editor in Permission
Management Help application before CNUM activation.
• If only NetAct default roles are planned to be used, it is sufficient if scoping of User Group - Role
association to NE/MR is ensured.
• For custom roles, required NE permissions must be granted to those custom roles and scoping
of User Group - custom Role association to NE/MR must be ensured. For more information, see
Granting permissions to a role in Permission Management Help.
Restricted access to LDAP directory server allows anonymous users read access to
ou=individual,ou=LDAPConfData,ou=Authorization,ou=ruim,<BASE_DN> LDAP node
and sub-nodes for reading CNUM related configuration data.
Check Network element specific prerequisites and procedures to know whether Restricted anony-
mous login needs to be enabled or not for the given network element. If it needs to be enabled, pro-
ceed with the following:
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
3. Find the current status of anonymous LDAP access by executing the following command:
/opt/oss/NSN-sm_hardening/bin/ConfigureAnonymousLdapBind.sh -status
If anonymous login to LDAP is disabled, the expected response is Anonymous LDAP access is
currently: ‘Disabled’.
/opt/oss/NSN-sm_hardening/bin/configureRestrictedLdapAccess.sh -e
Note: If anonymous login to LDAP was not disabled during NetAct hardening and if
the same needs to be disabled before CNUM activation (to follow recommendation),
ensure to perform Disabling anonymous bind to LDAP in Administering
NetAct System Security and then enable restricted anonymous access using
configureRestrictedLdapAccess.sh
Expected outcome
For information on the required procedures to be followed before CNUM activation, see network ele-
ment procedure in the respective network element integration document.
Flexi NS supports Centralized Network Element User Management (CNUM) in NetAct. For more
information on CNUM, see Controlling network element access with Centralized Network Element
User Management in Administering Users and Permissions.
Requirements Instructions
Requirements Instructions
Ensure port 389 is open from Flexi NS to LB WAS virtual IP during integration. In Network Element
Access Control application, get the NEUM Admin Access user which is the Network Element Access
Control admin user on Flexi NS. The user must have I=250 permission. This user is used to log in to
Flexi NS to perform operations in this document.
Enable restrictedSee Restricted anonymous login to the LDAP directory in Security Management → Security Man-
anonymous access agement Operating Procedures → Administering Users and Permissions → Controlling net-
work element access with Centralized Network Element User Management → NetAct prerequi-
sites.
6.2.1.2 Limitations
After CNUM is activated, the length of Flexi NS user name must be in the range of 3 to 6 for Flexi NS
18, and Flexi NS 18.5.
Note:
• Because of the limitation on Flexi NS, if the length of NetAct user name does not match
the rule, the user is not allowed to log in to Flexi NS, and NetAct falls back to Network
Element Access Control (NEAC) automatically.
• The password of Flexi NS must contain 6 to 15 characters, and consist of alphanumeric
characters, and ASCII characters from HEX 21 to HEX 7E.
You can either use local NetAct Smart Certificate (SmCert) CA, SmCert CA on a separate machine or
the 3rd party CA. Here we take local NetAct SmCert CA to sign certificates as an example.
Note: If NetAct LDAP certificate is signed by the root CA, use the root CA to sign Flexi NS
certificate. If NetAct LDAP certificate is signed by an intermediate CA, use this intermediate
CA's root CA to sign Flexi NS certificate.
1. Generate certificate signing request and key for Flexi NS by referring to Generating certificate
signing requests and keys in Administering NetAct System Security.
Expected outcome
/opt/oss/NSN-sm_conf_cert/generated/server/<systemName>_<certId>Key.pem
2. Generate certificate for Flexi NS by referring to Signing using NetAct CA in Administering NetAct
System Security.
Expected outcome
/opt/oss/NSN-sm_conf_cert/generated/server/<systemName>_<certId>Cert.pem
1. Log in to the NetAct VM where the dmgr service runs as the omc user, and switch to the root
user.
mkdir /tmp/FLEXINS_CERT/
cd /tmp/FLEXINS_CERT/
4. Get the password for the private key when you generate the certificate by executing:
cat /opt/oss/NSN-sm_conf_cert/templates/serverKey.pwd
5. Convert Flexi NS certificate from PEM format to DER binary OWNCERT.BIN by entering:
For example:
6. Convert Flexi NS private key from PEM format to DER binary OWNPRIV.BIN by entering:
For example:
Note: If the password is required, enter the password you got in step 4.
7. Convert the signer CA certificate for Flexi NS from PEM format to DER binary CACERT.BIN by
entering:
For example:
After the operations above, you have the following files available:
OWNCERT.BIN
OWNPRIV.BIN
CACERT.BIN
/opt/oss/NSN-sm_conf_cert/generated/server/<systemName>_<certId>Cert.pem
/opt/oss/NSN-sm_conf_cert/generated/server/<systemName>_<certId>Key.pem
6.2.1.3.1.3 Installing Flexi NS certificate, private key and the signer certificate
ZI3I:OMU;
Expected outcome
An example output:
Note: If the OMU unit exists as below and TLS is not used by other functions, remove it
by entering ZI3D:OMU;. The example output is as the following:
If TLS is used by other functions, contact Nokia Technical Support for further
investigation.
3. Transfer Flexi NS certificate, private key and the signer certificate from NetAct to Flexi NS through
FTP or SFTP.
a) Log in to the NetAct VM where the dmgr service runs as the omc user.
b) Navigate to /tmp/FLEXINS_CERT where you store the CA and private key.
c) Enter the following command:
Expected outcome
An example output:
You can find the directory of BIN files on Flexi NS by entering ZWQO:CR;. The example output
as the following:
Find the line where the value of DEF is Y, and the value of DIRECTORY in the line is the
directory of BIN files on Flexi NS. In the above example, N6_1_13_0 is the directory of BIN
files on Flexi NS.
e) Transfer the OWNCERT.BIN, OWNPRIV.BIN and CACERT.BIN into the default directory by
entering:
put OWNCERT.BIN
put OWNPRIV.BIN
put CACERT.BIN
f) Remove the OWNCERT.BIN, OWNPRIV.BIN and CACERT.BIN in the /tmp/FLEXINS_CERT
directory and the /tmp/FLEXINS_CERT temporary directory from NetAct.
Example:
ZQ4A:TLSPRIVATE,P:F,"DW0-/N6_1_13_0/OWNPRIV.BIN":;
ZQ4A:TLSNECERT,C:F,"DW0-/N6_1_13_0/OWNCERT.BIN":;
ZQ4A:TLSCACERT,C:F,"DW0-/N6_1_13_0/CACERT.BIN":;
Note: Check the existing key name in OMU key database by entering ZQ4L;, and make
sure the above key names are not the same as the existing ones.
6. Configuring Flexi NS for the installed certificates and private key by entering:
Example:
ZI3C:OMU:TLSNECERT,TLSPRIVATE:TLSCACERT:;
ZI3I;
ZDDS:;
ZE;
The supported NetAct management functions and their corresponding Flexi NS permissions are listed
in the following table:
logAc-
Management commandClass: timeLimit: Ses- dirPath: LowGranularObject:
cess: MM-
function A-Z sionTimeLimit DW0-/ SESSION
LLog
W: 50
Element man- A-Z: 250 900 not ap- not applica- not applicable
agement plicable ble
logAc-
Management commandClass: timeLimit: Ses- dirPath: LowGranularObject:
cess: MM-
function A-Z sionTimeLimit DW0-/ SESSION
LLog
W: 50
Network Ele- I: 250 900 not ap- not applica- not applicable
ment Access plicable ble
W: 150
Control
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to activate CNUM.
Tip: You can filter or sort the list, and select the desired network element.
7. Click Activate.
If the activation is unsuccessful, the CNUM status shows Failed activation. Click Failed activa-
tion link to view the causes of failure.
For more information about activating CNUM, see Activating Centralized Network Element User
Management in Centralized Network Element User Management Help.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
ZIAV:TYPE=ALL:LIM;
Expected outcome
An example output:
Ensure the IP address is the NetAct LB WAS Virtual IP address, and the CENTRALIZED USER
AUTHENTICATION STATUS is ACTIVE.
Expected outcome
CNUM is activated if the integration user logs in to Flexi NS in MML Session successfully.
An example output:
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to deactivate CNUM.
5. Click Deactivate.
6. Click Refresh.
If the deactivation is unsuccessful, the CNUM status shows Failed deactivation. Click Failed de-
activation link to view the causes of failure.
ZIAV:TYPE=ALL:LIM;
Expected outcome
An example output:
Problem
Possible causes
Solution
Expected outcome
Note: CA certificate and the end-entity certificate of Flexi NS must be in PKI PUB
type. The private key of Flexi NS must be in PKI PRI type.
3. Check whether the SSL/TLS server and client interfaces of a functional unit can be assigned to
apply the certificates to their SSL/TLS protocol-based connections by entering:
ZI3I;
Expected outcome
• Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
• Check Q3 mediation log from /var/opt/oss/log/q3user/ on the NetAct VM where q3user
service runs. To locate the VM where a specific service is running, see Locating the right virtual
machine for a service in Administering NetAct Virtual Infrastructure.
Problem
Possible causes
Solution
• Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
• Check Q3 mediation log from /var/opt/oss/log/q3user/ on the NetAct VM where q3user
service runs. To locate the VM where a specific service is running, see Locating the right virtual
machine for a service in Administering NetAct Virtual Infrastructure.
6.2.1.6.3 Unable to log in to NE using NetAct user credentials after CNUM is activatedProblem
Problem
Possible causes
Solution
• Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
• Check Q3 mediation log from /var/opt/oss/log/q3user/ on the NetAct VM where q3user
service runs. To locate the VM where a specific service is running, see Locating the right virtual
machine for a service in Administering NetAct Virtual Infrastructure.
Problem
Possible causes
Solution
If the password update is unsuccessful, the CNUM status shows Failed update. Click the Failed up-
date link to view the causes of failure.
Problem
Possible causes
Solution
ZDDS:;
3. Check the authentication logs on Flexi NS by entering:
ZGSC:,622
This section provides the CNUM information checklist for Open BGW.
Firewall Ensure the port 389 is open from Open BGW to LB WAS virtual IP during
integration.
Open BGW is integrated with Net- To integrate Open BGW to NetAct, refer to Overview of Open BGW inte-
Act. gration in Integrating Open BGW to NetAct.
Service types used to activate Create a Network Element Access Control admin user with
CNUM fsuiNe3sAllowClientSession, fsumManageAll, FSHASVIEW and
fsCertManage permission in Open BGW, and configure the same user
with NEUM Admin Access service type in NetAct through Network Element
Access Control application so that the users are mapped in Open BGW
and NetAct.
For how to create the Network Element Access Control admin user with
the required permission, see Creating Network Element Access Control
admin user in Integrating Open BGW to NetAct.
6.2.2.2 Limitations
The naming convention of Open BGW user name and password for CNUM must follow the NetAct
and Open BGW naming rule. When a user from NetAct side logs in to Open BGW for the first time
after CNUM activation, it may take 0 - 10 minutes for the user's permissions to take effect. Some
NetAct user IDs are reserved for NetAct internal services and are ignored by Open BGW in CNUM
scenario. To check the NetAct user ID details, refer to the Administration Guide of Open BGW in
Support portal in https://customer.nokia.com. Accessing the documentation and software in the portal
requires authentication.
1. Log in as the omc user to the VM where the dirsrv service runs and swtich to the root user.
Example output:
In this example, the CA certificates which sign LDAP certificate are /opt/oss/NSN-
sm_conf_cert/generated/certificationAuthority/NetAct_L0_CACert.pem
and /opt/oss/NSN-sm_conf_cert/generated/certificationAuthority/
NetAct_L1_CACert.pem on the node where dmgr service runs. If the output does not display
any CA certificates, install the LDAP certificate in NetAct as Ensure that LDAP certificate is
installed.
Example:
Note:
• Open BGW only supports certificate in PEM file. If the certificate is not in PEM
file, convert it to PEM file.
• The firewall for scp or sftp between Open BGW and NetAct VM where the
dirsrv service runs is not open by default. If you use scp or sftp to copy the cer-
tificate, ensure the port for example 22 is open in advance. After copying the cer-
tificate, disable the port.
• To transfer file using scp or sftp, assign the NEUM Admin Access user to the
group _nokfsuifiletransfer in advance by entering:
Example:
Example:
Example:
Expected outcome
Example:
Expected outcome
After the uploading, in NetAct Monitor, the instance of Open BGW object is updated with the Open
BGW system name. In the properties of the Open BGW object, the system name of Open BGW
displays in Name of Connectivity Information.
Note: To check the system name of Open BGW, log in to Open BGW.
The system name displays in the square brackets "[]", for example, Tiger.
Permission
Operation Description Default Roles
Name
SM_Prevention
SM_SecurityAdministration
NetAct_Administrator
CM_Installation
FM_FaultLocalization
FM_FaultManagementAdmin
Permission
Operation Description Default Roles
Name
PM_PerformanceAnalysis
CM_Provisioning
SM_Detection
SM_ContainmentAndRecov-
ery
SM_Prevention
SM_SecurityAdministration
CM_ServicePlanningAndNe-
gotiat
FM_AlarmSurveillance
PM_PerformanceAnalysis
CM_ConfigurationManage-
mentAdm
CM_StatusAndControl
Permission
Operation Description Default Roles
Name
CM_ServicePlanningAndNe-
gotiat
CM_Provisioning
CM_NetworkPlanningAn-
dEngineer
CM_Installation
SM_Detection
SM_ContainmentAndRecov-
ery
SM_Prevention
SM_SecurityAdministration
Permission
Operation Description Default Roles
Name
SM_Detection
SM_ContainmentAndRecov-
ery
SM_Prevention
SM_SecurityAdministration
Permission
Operation Description Default Roles
Name
fsuicli ownhomedir For RUIM only: own home dir in CLI FM_FaultManagementAdmin
FM_FaultManagementAdmin
FM_AlarmSurveillance
CM_ConfigurationManage-
mentAdm
CM_NetworkPlanningAn-
dEngineer
CM_Installation
CM_Provisioning
CM_StatusAndControl
CM_ServicePlanningAndNe-
gotiat
SM_Detection
SM_ContainmentAndRecov-
ery
SM_Prevention
Permission
Operation Description Default Roles
Name
SM_SecurityAdministration
CM_Provisioning
NetAct_Administrator
Permission
Operation Description Default Roles
Name
NetAct_Administrator
CM_NetworkPlanningAn-
dEngineer
CM_Installation
CM_Provisioning
SM_Detection
SM_ContainmentAndRecov-
ery
SM_Prevention
SM_SecurityAdministration
Table 20: Mapping between Open BGW permissions and default NetAct roles
To activate CNUM on Open BGW, see Activating Centralized Network Element User Management in
Centralized Network Element User Management Help.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
Expected outcome
Example output:
Ensure the IP address is the NetAct LB WAS Virtual IP address, the value of the Port parameter is
389, and the value of the Connection mode parameter is tls.
Expected outcome
An example output:
For more information, see Verifying Element Management launch in Integrating Open BGW to
NetAct.
Note: With CNUM, you can launch the Element Management as the user you log in to
NetAct Start Page. If CNUM is not activated, the Element Management is launched as
the user configured in Network Element Access Control application.
For more information, see Verifying Fault Management connectivity in Integrating Open BGW to
NetAct.
For more information, see Verifying Performance Management connectivity in Integrating Open
BGW to NetAct.
For more information, see Verifying Configuration Management connectivity in Integrating Open
BGW to NetAct.
To deactivate CNUM on Open BGW, see Deactivating Centralized Network Element User
Management in Centralized Network Element User Management Help.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
Expected outcome
The following chapter provides information on how to configure CNUM-oBGW for Audit Trail.
Log in to OBGW as the root user, and check if the system image is in read only state, by executing:
mount |grep /mnt/sysimg
Expected output:
/dev/mapper/VG_CLA--0-sysimg--R_OB_15.9.1.3--x86_64--std_acpi5 on /mnt/
sysimg type ext2 (ro,relatime,errors=continue)
cp /opt/Nokia/SS_RUIM/etc/replicator_properties.cfg /root/patch.cfg
ruim.replicator.uid_range=387,401,412,501,592,950-9999999
Procedure
fsswcli -p -l comment:'Audit_Trail_cnum'
Procedure
fsswcli -p -r comment:'Audit_Trail_cnum'
Procedure
fsswcli -p -l comment:'Audit_Trail_cnum'
Expected outcome
“0 patches found”
6.2.2.8 Troubleshooting
Problem
Possible causes
Solution
Expected outcome
Ensure that the status of ADMINISTRATIVE is UNLOCKED, the status of OPERATIONAL is EN-
ABLED, and the status of USAGE is ACTIVE. If not, contact Nokia Technical Support.
3. Upload Configuration Management data. After the uploading, in Monitor, the instance of Open
BGW object is updated with the Open BGW system name. In the properties of the Open BGW ob-
ject, the system name of Open BGW displays in Name of Connectivity Information.
To upload the Configuration Management data flow, see Verifying Configuration Management data
flow in Integrating Open BGW to NetAct.
Problem
Permission changes of NetAct user are not immediately replicated in Open BGW.
Possible causes
The Open BGW fetches user's authorization data when the user logs in to the Open BGW for the first
time. The data is fetched again only if the replicated data is removed from the Open BGW.
Solution
Refresh the permissions on Open BGW for all the users by entering:
This section describes the information you must know and the basic requirements which must be met
before configuring CNUM for SBTS.
The NetAct user needed for The NetAct user is used to log in to NetAct Start Page to perform CNUM
CNUM configuration related operations in NetAct. In Network Element Access Control, grant the
credentials listed in Service types needed to activate CNUM and Service
types needed to verify CNUM activation or deactivation status to the group
where the CNUM user belongs. The following default NetAct roles must be
assigned to the CNUM user:
Firewall Ensure the port 389 is open from SBTS to LB WAS virtual IP during inte-
gration.
6.2.3.2 Limitations
SBTS only supports CNUM for Element Manager Launch operation. For other O&M operation (for ex-
ample, fault management, configuration management, and so on), Network Element Access Control
(NEAC) service users are used. But if NE3S operation logging feature is enabled, SBTS with CNUM li-
cense supports end-to-end traceability with NetAct username in the BTS logs.
For SBTS20B and later versions on how to install and activate SBTS certificates, follow instructions
described in Single RAN, Rel. <network element release>, Operating Documentation on Support
portal in https://customer.nokia.com. Accessing the documentation and software in the portal requires
authentication. Where the <network element release> means the SRAN release. For example,
when you are integrating SBTS20B, you should refer to Single RAN, Rel. SRAN 20B, Operating
Documentation.
Note:
• If you only use default roles, assign the default roles to the group to which the NetAct
user belongs.
• If you need to create a new role, grant the NetAct permissions and SBTS permissions
to the new role, and then assign the new role to the group to which the NetAct user
belongs. The root context of SBTS in Permission Management is SBTS.
Read Only User Ac- Read_Only This permission en- N/A Yes
cess Mode ables read only ac-
cess to BTS Admin.
The supported LDAP access type in SBTS are StartTLS and PREFER TLS.
Note: To activate CNUM using StartTLS, it is mandatory to ensure the following activities
are done before activating CNUM. To activate CNUM using PREFER TLS, Nokia highly rec-
ommended to ensure the following activities are done before activating CNUM to prevent se-
curity risk.
To check whether the certificates are installed, see Get issuer name in Administering
NetAct System Security. If the certifications are not installed, see Managing certificates
in Administering NetAct System Security to install them.
Note:
– When you log in to the NetAct Start Page to do the activation, use the login
name and password of the integrating user. For more information about the
integrating user, see Managing NetAct user for SBTS integration engineer
in Integrating SBTS to NetAct.
– If you need to change the LDAP access type for SBTS after CNUM activa-
tion, deactivate CNUM firstly, and then activate CNUM again with the new
LDAP access type.
Note: With the feature, SR000858: Login restriction with CNUM, the operator
can disable the local SBTS operator user account if the Centralized Network
Element User Management (CNUM) is in use. For more information, see Sin-
Expected outcome
Expected outcome
d) Right-click the MRBTS and select Element Manager in the Element Management sub-menu.
Expected outcome
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
To change the password of a network element account, see Updating the password for the network
element account (NE bind user account) in Centralized Network Element User Management Help.
6.2.3.6 Troubleshooting
Problem
Possible causes
• The certificates of LDAP are not installed on NetAct properly for StartTLS mode.
• LDAP service is not working properly.
• NE3S/WS mediation is not working properly.
Solution
1. Check whether the LDAP certificates are installed successfully on NetAct. For more information,
see Get issuer name in Administering NetAct System Security. If the certificate is not as expected
or not trusted, reinstall the certificates for LDAP. For information, see Installing certificates for se-
lected usecase in Administering NetAct System Security.
Note: When you follow the instructions in Managing certificates in Administering NetAct
System Security, use dirsrv_access as the usecase name.
2. Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
Note: To get the support of network element versions supported through NetAct fast pass
Service Packages (SPs), you need to install or activate the compatible NetAct fast pass
SPs through fast pass installation toolkit (FIT). For more information about network element
support through NetAct fast pass SPs, see Compatibility of NetAct and NetAct fast pass
Service Packages in NetAct Release Changes.
This section describes the information you must know and the basic requirements which must be met
before configuring CNUM for Nokia AirScale BTS 5G.
Supported Nokia AirScale BTS AirScale BTS-5G, gNB-DU 5G21ADU, and later gNB-DU
5G releases
The NetAct user needed for The CNUM user is used to log in to NetAct Start Page to perform CNUM
CNUM configuration (CNUM user) related operations in NetAct. In Network Element Access Control, grant the
credentials listed in Service types needed to activate CNUM and Service
types needed to verify CNUM activation or deactivation status to the group
where the CNUM user belongs. The following default NetAct roles must be
assigned to the group to which the CNUM user belongs:
For more permissions which must be granted to the CNUM user for CNUM
operations, see Checking Nokia AirScale BTS 5G permissions.
For detailed instructions on how to manage users, see About user man-
agement in User Management Help.
Firewall Ensure the port 389 is open from Nokia AirScale BTS 5G to LB WAS virtu-
al IP during integration.
Nokia AirScale BTS 5G integra- Ensure that Nokia AirScale BTS 5G is integrated to NetAct with TLS mode
tion with TLS mode successfully. For detailed instructions, see Overview of Nokia Airscale BTS
5G integration section in Integrating Nokia Airscale BTS 5G to NetAct doc-
ument. However, the Integrating Nokia Airscale BTS 5G to NetAct docu-
ment is available once the respective NetAct fast pass Service Package is
installed.
Note:
• If you only use default roles, assign the default roles to the group to which the CNUM
user belongs.
• If you need to create a new role, grant the NetAct permissions and Nokia AirScale BTS
5G permissions to the new role, and then assign the new role to the group to which
the CNUM user belongs. The root context of Nokia AirScale BTS 5G in Permission
Management is NRBTS.
• CNUM only supports System User Access Mode in 5G19B and earlier classical versions.
Used by Nokia
Permission Name Operation Description Default Role
AirScale BTS 5G
System User Access Read_Write This permission en- • FM-Fault Man- Yes
Mode ables read and write agement Admin
access to BTS Ad- • CM-Configura-
min as BTS system tion Manage-
administrator. ment Adminis-
tration
Used by Nokia
Permission Name Operation Description Default Role
AirScale BTS 5G
Security User Ac- Read_Write This permission en- • FM-Fault Man- Yes
cess Mode ables read and write agement Admin
access to BTS Ad- • CM-Configura-
min as BTS security tion Manage-
administrator. ment Adminis-
tration
Read Only User Ac- Read_Only This permission en- N/A Yes
cess Mode ables read only ac-
cess to BTS Admin.
For detailed instructions on how to manage permissions, see About permission management in Per-
mission Management Help.
The supported LDAP access type in Nokia AirScale BTS 5G is StartTLS and PREFER TLS. To
activate CNUM, it is mandatory to ensure the instructions in Prerequisites for Nokia AirScale BTS 5G
are completed before activating CNUM.
Note: When you log in to the NetAct Start Page to do the activation, use the login name and
password of the CNUM user.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
The CNUM status on the activated Nokia AirScale BTS 5G displays Activated.
Expected outcome
d) Right-click the MRBTS-<instance ID> object, and select Element Manager in the Element
Management sub-menu.
Expected outcome
Note: CNUM user is valid only for Element Manager Launch, but not for other integration
operations including PM or CM related operations. Other integration operations have to
take credentials from NEAC.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
The CNUM status on the deactivated Nokia AirScale BTS 5G displays Deactivated.
Expected outcome
d) Right-click the MRBTS-<instance ID> object, and select Element Manager in the Element
Management sub-menu.
Expected outcome
If the login user is the BTS Account Access user configured in NEAC, CNUM deactivation is
successful.
To change the password of a network element account, see Updating the password for the network
element account (NE bind user account) in Centralized Network Element User Management Help.
6.2.4.4 Limitation
Nokia AirScale BTS 5G only supports CNUM for Element Manager Launch operation. For other O&M
operation (for example, fault management, configuration management, and so on), Network Element
Access Control (NEAC) service users are used.
6.2.4.5 Troubleshooting
Problem
Possible causes
1. The certificates of LDAP are not installed on NetAct properly for StartTLS mode.
2. LDAP service is not working properly.
3. NE3S/WS mediation is not working properly.
4. The certificates are not installed successfully on Nokia AirScale BTS 5G.
Solution
1. Check whether the LDAP certificates are installed successfully on NetAct. For more information,
see Get issuer name in Administering NetAct System Security. If the certificate is not as expected
or not trusted, re-install the certificates for LDAP. For information, see Installing certificates in Inte-
grating Nokia AirScale BTS 5G to NetAct.
Note: When you follow the instructions in Get issuer name in Administering NetAct Sys-
tem Security, use dirsrv_access as the usecase name.
2. Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
3. Check NE3S/WS mediation log from the /var/opt/oss/log/common_mediations directo-
ry on the NetAct VM where the common_mediation is running, and then contact Nokia Techni-
cal Support. To locate the VM where a specific service is running, see Locating the right virtual ma-
chine for a service in Administering NetAct Virtual Infrastructure.
4. Check whether the certificates are installed successfully on Nokia AirScale BTS 5G. For more in-
formation, see Verifying Nokia AirScale BTS 5G connectivity to NetAct in TLS mode section in In-
tegrating Nokia Airscale BTS 5G to NetAct document. If the certificate is not as expected or not
trusted, re-install the certificates for Nokia AirScale BTS 5G. For information, see Configuring cer-
tificates on Nokia AirScale BTS 5G for TLS mode section in Integrating Nokia Airscale BTS 5G to
NetAct document. However, the Integrating Nokia Airscale BTS 5G to NetAct document is avail-
able once the respective NetAct fast pass Service Package is installed.
Problem
Possible causes
Solution
1. Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
2. Check NE3S/WS mediation log from the /var/opt/oss/log/common_mediations directory
on the NetAct VM where the common_mediation is running, and then contact Nokia Technical
Support. To locate the VM where a specific service is running, see Locating the right virtual
machine for a service in Administering NetAct Virtual Infrastructure.
The prerequisites for configuring CNUM are listed in the following table.
Requirements Instructions
Make sure DCAP DCAP Windows (DCAP18 FP1 and later releases) support CNUM.
supports CNUM.
DCAP is integrated See Overview of DCAP integration in Integrating Data Collection and Analytics Platforms to NetAct.
to NetAct success-
fully. Note: Ensure port 389 is open from DCAP to LB WAS virtual IP during integration.
Requirements Instructions
The credential on The following credential on DCAP Windows must be obtained: Windows OS user account
DCAP Windows
You can either use local NetAct Smart Certificate (SmCert) CA or the 3rd party CA. Here we take
local NetAct SmCert CA to sign certificates as an example. To use the 3rd party CA, contact Nokia
Technical Support for help to get the required certificates.
Note: If NetAct LDAP certificate is signed by the root CA, use the root CA to sign DCAP
certificate. If NetAct LDAP certificate is signed by an intermediate CA, use the intermediate
CA's root CA to sign DCAP certificate.
1. Log in to the NetAct VM where the dirsrv service runs as the omc user, and switch to the root
user.
certutil -L -d /etc/dirsrv/slapd-oss
Expected outcome
An example output:
3. If the LDAP certificates are not installed, perform the following steps:
a) Configure and generate SmCert CA.
For more information, see Selecting certification authority in Administering NetAct System
Security.
b) Install the LDAP certificates. During the installation, if the LDAP certificates are not created,
create and re-install the certificates.
To create the LDAP certificates, see Creating certificates in Administering NetAct System Se-
curity.
To install the LDAP certificates, see Installing certificates for selected usecase in Administering
NetAct System Security.
To install and activate certificates on DCAP Windows, see Managing certificates section and
Configuring JOMA/Esymac settings section in Nokia DCAP NetAct O&M Agent Installation
and Configuration Instructions on Support portal in https://customer.nokia.com. Accessing the
documentation and software in the portal requires authentication.
The mapping between DCAP permissions and default NetAct roles are listed in the following table.
Table 26: Mapping between DCAP permissions and default NetAct roles
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to activate CNUM.
Tip: You can filter or sort the list, and select the desired network element.
6. If the IP address of the network element is IPv4, select IPv4 from the IP version list; if the IP
address of the network element is IPv6, select IPv6 from the IP version list.
7. Click Activate.
If the activation is unsuccessful, the CNUM status shows Failed activation. Click Failed activa-
tion link to view the causes of failure.
For more information about activating CNUM, see Activating Centralized Network Element User
Management in Centralized Network Element User Management Help.
Note: To log in using remote desktop, for example in Windows Operation System, click
Start → All Programs → Accessories → Remote Desktop Connection. The following
procedures should be done on the Remote Desktop.
10. Restart JomaManager on DCAP. For more information, see section Starting and stopping JOMA
of Nokia DCAP NetAct O&M Agent Installation and Configuration Instructions on Support portal
in https://customer.nokia.com. Accessing the documentation and software in the portal requires
authentication.
12. Enter the NetAct Username and Password in the DCAP Login dialog, and click Log In.
Expected outcome
Login succeeds.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
Expected outcome
The elementmanager progress bar appears displaying the status of the operation. After the
operation is complete, the Remote Desktop Connection window opens.
Note: If there is a security warning from Citrix Receiver, click Permit use.
Note: If there is a security warning that the remote computer could not be
authenticated, click Yes to continue.
Expected outcome
The target server based on Windows can be access and the connectivity is successful.
f) Go to the directory where a DCAP application was installed. For example, C:\Program
Files\MegaMon.
g) Open the application.
Expected outcome
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to update the password.
6. Click Refresh.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to deactivate CNUM.
5. Click Deactivate.
6. Click Refresh.
If the deactivation is unsuccessful, the CNUM status shows Failed deactivation. Click Failed de-
activation link to view the causes of failure.
Note: To log in using remote desktop, for example in Windows Operation System, click
Start → All Programs → Accessories → Remote Desktop Connection. The following
procedures should be done on the Remote Desktop.
8. Restart JomaManager on DCAP. For more information, see section Starting and stopping JOMA
of Nokia DCAP NetAct O&M Agent Installation and Configuration Instructions on Support portal
in https://customer.nokia.com. Accessing the documentation and software in the portal requires
authentication.
9. Right-click the JomaManager notification icon and check the Login item.
Expected outcome
The Login item is disabled and appears gray. Then CNUM is deactivated.
This section describes how to troubleshoot problems when you configure CNUM for DCAP.
For possible causes and solutions, see Centralized Network Element User Management Activation
Failure in Troubleshooting Security Management.
Problem
Solution
If the password update is unsuccessful, the CNUM status shows Failed update. Click the Failed
update link to view the causes of failure.
The requirements for configuring CNUM are listed in the following table.
Requirements Instructions
Supported BSC re- • BSCFP20A, BSCFP20B, and BSCFP21B are supported for both mcBSC and FlexiBSC plat-
leases for CNUM forms.
• ASBSC20FP1, ASBSC20FP2, ASBSCFP20A, ASBSCFP20B, and ASBSCFP21B are supported
for AirScale BSC.
• SR50 (since RGR50 SP4) is supported for GSMR BSC.
Note: SR50 (since RGR50 SP4) only supports Hashing algorithm SHA1. For CNUM
functionality to work as expected, you need to enable TLS 1.0. For more information
Requirements Instructions
on how to enable TLS 1.0, see Managing TLS protocol configuration in Administering
NetAct System Security
BSC username • The length of BSC username must be in the range listed below after CNUM is activated.
and password pol-
– For SR50 (since RGR50 SP4), the range is from 3 to 6.
icy
– For BSCFP20A, ASBSC20FP1 and their later versions, the range is from 3 to 16.
Note: If the length of NetAct username is not in the range listed above, the user is
not allowed to log in to BSC, and NetAct falls back to Network Element Access Con-
trol (NEAC) automatically.
• The password of BSC must contain 6 to 15 characters, and consist of alphanumeric characters,
and ASCII characters from HEX 21 to HEX 7E.
Note: The password of the NetAct user which is used for CNUM should be complied
with the BSC password policy.
Check FTP-1 and If interfaces are not created, you can create them. For more information, see Creating FTP interface
FTP-PM inter- object in Integrating BSC to NetAct.
Requirements Instructions
You can either use local NetAct Smart Certificate (SmCert) CA, SmCert CA on a separate machine or
the 3rd party CA. Here we take local NetAct SmCert CA to sign certificates as an example.
Note: If NetAct LDAP certificate is signed by the root CA, use the root CA to sign BSC
certificate. If NetAct LDAP certificate is signed by an intermediate CA, use this intermediate
CA's root CA to sign BSC certificate.
1. Log in to the NetAct VM where the dmgr service runs as the omc user, and switch to the root user.
Example output:
NetAct_L0_CACert.pem
Note: Skip step 3 to step 10 if the NetAct CA is already installed and it works normally.
cp /opt/oss/NSN-sm_conf_cert/templates/smcert.properties.template /opt/
oss/NSN-sm_conf_cert/templates/smcert.properties
4. Change the permission for the smcert.properties file by entering the command:
property.<systemName>.crlURI.<caLevel> = URI:http://<server>/ca/
{crlFileName}
For example, if you set <systemname> as NetAct, <caLevel> as 0 and <server> from the
result by entering the command /opt/cpf/bin/cpf_list_lb_address.sh --lb was, then
you can enter the command:
property.NetAct.crlURI.0 = URI:http://clab1525lbwas.myDomain.com/ca/
{crlFileName}
For more information, see Signing using NetAct CA in Administering NetAct System Security.
cd /opt/oss/NSN-sm_conf_cert/bin
For example, if you set <systemname> as NetAct and <hashingAlgorithm> as SHA1, then
you can enter the command:
For more information, see Generating CA certificates and CRLs in Administering NetAct System
Security.
Expected outcome
/opt/oss/NSN-sm_conf_cert/generated/certificationAuthority/
<systemName>_L0_CACert.pem
8. Generate certificate signing request and key for NetAct by entering the command:
For example, if you set <systemname> as NetAct and <hashingAlgorithm> as SHA1, then
you can enter the command:
For more information, see step 1 to step 3 in Generating certificate signing requests and keys in
Administering NetAct System Security.
For example, if you set <systemname> as NetAct and <hashingAlgorithm> as SHA1, then
you can enter the command:
For more information, see step 1 to step 6.a in Signing using NetAct CA in Administering NetAct
System Security.
For example, if you set <systemname> as NetAct, then you can enter the command:
Note: The dirsrv and sssd services are restarted automatically if you install the
certificates.
For more information, see Installing certificates for selected usecase in Administering NetAct Sys-
tem Security.
11. Generate certificate signing request and key for BSC by entering the command:
For IPv6 integrated BSC, the <BSC IP> is IPv6 address. For IPv4 integrated BSC, the <BSC IP>
is IPv4 address. For example:
• For IPv4 integrated BSC, if you set <systemname> as NetAct and <hashingAlgorithm>
as SHA1, then you can enter the command:
For more information, see step 1, step 2 and step 4 in Generating certificate signing requests and
keys in Administering NetAct System Security.
Expected outcome
/opt/oss/NSN-sm_conf_cert/generated/server/<systemName>_dirsrvKey.pem
For example, if you set <systemname> as NetAct and <hashingAlgorithm> as SHA1, then
you can enter the command:
For more information, see step 1, step 2, step 3, step 4, step 5 and step 6.b in Signing using Net-
Act CA in Administering NetAct System Security.
Expected outcome
/opt/oss/NSN-sm_conf_cert/generated/server/<systemName>_dirsrvCert.pem
6.2.6.2.1.2 Converting BSC certificate, private key and signer certificate from PEM format to DER binary
1. Log in to the NetAct VM where the dmgr service runs as the omc user, and switch to the root user.
mkdir /tmp/BSC_CERT/
cd /tmp/BSC_CERT/
4. Get the password for the private key when you generate the certificate by entering:
cat /opt/oss/NSN-sm_conf_cert/templates/serverKey.pwd
5. Convert BSC certificate from PEM format to DER binary OWNCERT.BIN by entering:
For example:
6. Convert BSC private key from PEM format to DER binary OWNPRIV.BIN by entering:
For example:
Note: If the password is required, enter the password you got in step 4.
7. Convert the signer CA certificate for BSC from PEM format to DER binary CACERT.BIN by
entering:
For example:
Expected outcome
• OWNCERT.BIN
• OWNPRIV.BIN
• CACERT.BIN
rm /opt/oss/NSN-sm_conf_cert/generated/server/
<systemName>_dirsrvCert.pem
rm /opt/oss/NSN-sm_conf_cert/generated/server/<systemName>_dirsrvKey.pem
6.2.6.2.1.3 Installing BSC certificate, private key and the signer certificate
ZI3I;
Expected outcome
An example output:
Note: If the OMU unit exists as below and TLS is not used by other functions, remove it
by entering ZI3D:OMU;. The example output is as the following:
If TLS is used by other functions, contact Nokia Technical Support for further
investigation.
3. Transfer BSC certificate, private key and the signer certificate from NetAct to BSC through FTP or
SFTP.
a) Log in to the NetAct VM where the dmgr service runs as the omc user.
b) Navigate to the /tmp/BSC_CERT directory where you store the CA and private key.
c) Enter the following command:
sftp <user>@<IP_address_of_BSC>
Expected outcome
An example output:
You can find the directory of BIN files on BSC by entering ZWQO:CR;. The example output as
the following:
In the output, find the line where the value of DEF is Y, and the value of DIRECTORY in the line
is the directory of BIN files on BSC. In the example from step d, SG071700 is the directory of
BIN files on BSC.
e) Transfer the OWNCERT.BIN. OWNPRIV.BIN and CACERT.BIN files into the default directory by
entering:
put OWNCERT.BIN
put OWNPRIV.BIN
put CACERT.BIN
f) Remove the OWNCERT.BIN, OWNPRIV.BIN and CACERT.BIN files in the /tmp/BSC_CERT
directory.
rm /tmp/BSC_CERT/OWNCERT.BIN
rm /tmp/BSC_CERT/OWNPRIV.BIN
rm /tmp/BSC_CERT/CACERT.BIN
5. Add BSC certificate, private key and the signer certificate by entering:
For example:
ZQ4A:TLSPRIVATE,P:F,"DW0-/SG071700/OWNPRIV.BIN":;
ZQ4A:TLSCECERT,C:F,"DW0-/SG071700/OWNCERT.BIN":;
ZQ4A:TLSCACERT,C:F,"DW0-/SG071700/CACERT.BIN":;
Note: Check the existing key name in OMU key database by entering ZQ4L;, and make
sure the key names are not the same as the existing ones.
6. Configure BSC for the installed certificates and private key by entering:
For example:
ZI3C:OMU:TLSCECERT,TLSPRIVATE:TLSCACERT:;
Note: You can check whether the certificate and private key are configured by entering
ZI3I;.
ZDDS:;
ZE;
Note:
• Skip this section if you only use default roles, see Default roles and permissions in
Permission Management Help.
• When creating a role, assign the NetAct permissions and BSC permissions to the new
role. To create a role, see Creating a new role in Permission Management Help. To
configure BSC permissions, see Network element permissions in Administering Users
and Permissions, the table Supported BSC permissions and table NetAct management
functions and corresponding BSC permissions as below.
• The context root of BSC in Permission Management is BSC.
Used in
Permission Name Operation/Value Description
BSC
Used in
Permission Name Operation/Value Description
BSC
FM: FM CMISE
PM: PM CMISE
CM: CM CMISE
The supported NetAct management functions and their corresponding BSC minimum permissions are
listed in the following table:
command-
timeLimit: applField:
Management Class: A-Z dirPath:
SessionTime- FS/CM/FM/ logAccess:MMLLOG
function and default DW0-/
Limit PM
permission
command-
timeLimit: applField:
Management Class: A-Z dirPath:
SessionTime- FS/CM/FM/ logAccess:MMLLOG
function and default DW0-/
Limit PM
permission
FM: X
D:50
E:250
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to activate CNUM.
Tip: You can filter or sort the list, and select the desired network element.
7. Click Activate.
If the activation is unsuccessful, the CNUM status shows Failed activation. Click Failed activa-
tion link to view the causes of failure.
For more information about activating CNUM, see Activating Centralized Network Element User
Management in Centralized Network Element User Management Help.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password of the integration user, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
3. Log in to BSC.
ZIAV:TYPE=ALL:LIM;
Expected outcome
Ensure the IP address is the NetAct LB WAS Virtual IP address and the CENTRALIZED USER
AUTHENTICATION STATUS is ACTIVE.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to deactivate CNUM.
5. Click Deactivate.
6. Click Refresh.
If the deactivation is unsuccessful, the CNUM status shows Failed deactivation. Click Failed de-
activation link to view the causes of failure.
1. Log in to BSC.
ZIAV:TYPE=ALL:LIM;
Expected outcome
EXECUTION STARTED
CONFIGURATION LDAP DIRECTORY
============================
IP ADDRESS: <LB WAS Virtual IP>
PORT NUMBER: 389
SSL STATE: FORCED
PRIMARY LDAP DIRECTORY
======================
IP ADDRESS: <LB WAS Virtual IP>
PORT NUMBER: 389
SSL STATE: FORCED
FEATURE ACTIVATION STATUS
=========================
DIRECTORY CLIENT ACTIVATION STATUS: ACTIVE
CENTRALIZED USER AUTHENTICATION STATUS: INACTIVE
COMMAND EXECUTED
MMI SYSTEM AUTHORITY HANDLING COMMAND <IA_>
6.2.6.5 Limitation
Limitations for BSC are listed as below:
Super BTS Switch Function, Audit Trail Logging Collection, Fault Management File Transfer Function,
Hardware Management Change Notification, and Performance Management Event Function use de-
fault user.
6.2.6.6 Troubleshooting
Problem
Possible causes
Solution
1. Log in to BSC.
2. Check whether the certificates are installed to the key storage of BSC by entering:
ZQ4L;
Expected outcome
Note: CA certificate and the end-entity certificate of BSC must be in PKI PUB type.
The private key of BSC must be in PKI PRI type.
3. Check whether the SSL/TLS server and client interfaces of a functional unit can be assigned to
apply the certificates to their SSL/TLS protocol-based connections by entering:
ZI3I;
Expected outcome
The highlighted values in the above output are examples only. TLSCERT stands for the end-entity
certificate of BSC; TLSPRIVATE stands for the private key of BSC and TLSCACERT stands for the CA
certificate.
• Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
• Check Q3 mediation log from /var/opt/oss/log/q3user/ on the NetAct VM where the
q3user service is running. To locate the VM where a specific service is running, see Locating the
right virtual machine for a service in Administering NetAct Virtual Infrastructure.
Problem
Possible causes
Solution
• Check the LDAP related problems. For more information, see Unable to login - LDAP problems in
Troubleshooting Security Management.
• Check Q3 mediation log from /var/opt/oss/log/q3user/ on the NetAct VM where q3user
service runs. To locate the VM where a specific service is running, see Locating the right virtual
machine for a service in Administering NetAct Virtual Infrastructure.
Problem
Solution
If the password update is unsuccessful, the CNUM status shows Failed update. Click the Failed
update link to view the causes of failure.
Problem
Possible cases
Solution
1. Change operator user password without ;. For details, see Changing NetAct end users password.
a. Log in as the omc user to the VM where the q3user service is running.
To locate the right NetAct VM, see Locating the right virtual machine for a service in Administering
NetAct Virtual Infrastructure.
Service types needed to The corresponding credential is needed for verifying the CNUM activation or deacti-
verify CNUM activation or vation status though element management launch in Monitor:
deactivation status
• Remote MML Access: for IPA-RNC
• SCLI Access: for mcRNC and ASRNC
• EM Access: for OMS and WBTS
The NetAct user need- The CNUM user is used to log in to NetAct Start Page to perform CNUM related op-
ed for CNUM operations erations. In Network Element Access Control, grant the credentials listed in Ser-
(CNUM user) vice types needed to activate CNUM and Service types needed to verify CNUM ac-
tivation or deactivation status to the group where the CNUM user belongs. The fol-
lowing default NetAct roles must be assigned to the CNUM user:
Restricted anonymous To enable restricted anonymous access, see Restricted anonymous login to the
bind to LDAP LDAP directory in Administering NetAct System Security.
WCDMA integration Ensure that WCDMA is integrated to NetAct. For detailed instructions, see
Overview of RNC and WBTS integration in Integrating RNC and WBTS to NetAct.
CNUM configuration on See Enabling CNUM on OMS and Setting the RUIMAutomaticActivation parameter
OMS on OMS.
CNUM configuration on See Configuring SSH server on IPA-RNC and Activating centralized user authenti-
IPA-RNC cation and authorization on IPA-RNC.
CNUM configuration on See Managing centralized network element user management on mcRNC.
mcRNC
CNUM configuration on See Managing centralized network element user management on ASRNC.
ASRNC
WCDMA documentation • For WCDMA network elements, see WCDMA RAN, Rel.<network element re-
lease>, <Issue number> Operating Documentation. For example, WCDMA
RAN, Rel. WCDMA 20, Issue 02.
• For ASRNC, see WCDMA RAN, Rel.<network element release>, <Issue num-
ber> Operating Documentation. For example, WCDMA RAN, Rel. WCDMA 20,
Issue 02.
1. Log in to OMS as the Nemuadmin user, and then switch to the root user.
[root]# fscontrolRUIM -e
For more information, see Administering OMS in WCDMA RAN, Rel.<network element release>,
<Issue number> Operating Documentation. For example, WCDMA RAN, Rel. WCDMA 20, Is-
sue 02. In Administering OMS, go to User management → Centralized User Authentica-
tion and Authorization → Enabling CUAA. Get the documents from Support portal in https://
customer.nokia.com. Accessing the documentation and software in the portal requires authentica-
tion.
For more information about the settings, see Managing Security with OMS in WCDMA RAN,
Rel.<network element release>, <Issue number> Operating Documentation. For example,
WCDMA RAN, Rel. WCDMA 20, Issue 02. In Managing Security with OMS, go to User security
→ Centralized User Authentication and Authorization → Enabling and disabling CUAA
automatic activation. Get the documents from Support portal in https://customer.nokia.com.
Accessing the documentation and software in the portal requires authentication.
Note:
• If the value does not contain 501, add it. The value 501 is used for NetAct operations
which use the omc user.
• You may also need the following user IDs:
6. If the replicator_properties.cfg file is modified, make the changes take effect by entering
the following command as the root user:
For detailed instructions on how to configure SSH server on IPA-RNC, see Integrating IPA-RNC
in WCDMA RAN, Rel.<network element release>, <Issue number> Operating Documentation. For
example, WCDMA RAN, Rel. WCDMA 20, Issue 02. In Integrating IPA-RNC, go to Configuring
RNC → Configuring SSH server in OMU. Get the documents from Support portal in https://
customer.nokia.com. Accessing the documentation and software in the portal requires authentication.
This section describes how to activate centralized user authentication and authorization (CUAA) on
IPA-RNC.
For detailed instructions on how to activate centralized user authentication and authorization on IPA-
RNC, see Managing Information Security in IPA-RNC in WCDMA RAN, Rel.<network element re-
lease>, <Issue number> Operating Documentation. For example, WCDMA RAN, Rel. WCDMA 20, Is-
sue 02. In Managing Information Security in IPA-RNC, go to Managing centralized users in the MMI
system → Activating and deactivating centralized user authentication and authorization. Get
the documents from Support portal in https://customer.nokia.com. Accessing the documentation and
software in the portal requires authentication.
For detailed instructions on how to manage CNUM user on mcRNC, see Managing Users in mcRNC
in WCDMA RAN, Rel.<network element release>, <Issue number> Operating Documentation. For ex-
ample, WCDMA RAN, Rel. WCDMA 20, Issue 02. Get the documents from Support portal in https://
customer.nokia.com. Accessing the documentation and software in the portal requires authentication.
For detailed instructions on how to manage CNUM user on ASRNC, see Managing Users in AirScale
RNC in WCDMA RAN, Rel.<network element release>, <Issue number> Operating Documentation.
For example, WCDMA RAN, Rel. WCDMA 20, Issue 02.
In Managing Users in AirScale RNC, go to Centralized network element user management. Get the
documents from Support portal in https://customer.nokia.com. Accessing the documentation and soft-
ware in the portal requires authentication.
6.2.7.2 Limitations
This section lists the CNUM limitations for WCDMA network elements.
1. There is a password limitation on Q3 mediation that the password must contain 6 characters at
least. Therefore, you will fail to log in to IPA-RNC while launching the MML Session by clicking Ele-
ment Management → MML Session in Monitor if the password is less than 6 characters. To solve
the problem, change the password to contain 6 characters at least in User Management.
2. LDAP client SSLv3 is disabled in NetAct, but it is still supported in IPA-RNC RN8.0. Different con-
figurations between NetAct and IPA-RNC may cause activation failure of CNUM.
3. For ASRNC, CNUM activation will fail if PREFER TLS is used as LDAP access type and CNUM
certificates are not installed in mcRNC/ASRNC and NetAct. Because when PREFER TLS is used
as LDAP access type, mcRNC/ASRNC attempts to connect with NetAct only in secure mode. Even
though secure connection cannot be established, mcRNC/ASRNC does not try insecure connec-
tion. To solve the problem, you must install CNUM certificates on both mcRNC/ASRNC and Net-
Act.
4. The user name cannot contain '-' (hyphen) if CNUM activation of OMS is needed due to OMS limi-
tation. Otherwise, after activation, CNUM authentication fails on OMS.
5. For ASRNC20FP1, ASRNC20FP2, and ASRNC20FP3, due to RC0524 limitation, if AirScale RNC
primary and secondary VNFs switch over after activating CNUM, and not all the data is synchro-
nized between the primary and secondary VNFs, it will cause unable to verify nor deactivate the
CNUM activation. To resolve the issue, you can contact your network element administrator to syn-
chronize the data between primary and secondary VNFs.
6. For ASRNC20FP4 and later versions, CNUM is supported for AirScale RNC primary and sec-
ondary VNFs. Due to RC0524 limitation, not all the data is synchronized between the primary and
secondary VNFs, Nokia recommend that you activate/deactivate CNUM for corresponding RNC
and VNFs at the same time.
6.2.7.3 Installing and activating WCDMA certificates on WCDMA network elements and NetAct
This section provides the instructions to install and activate the WCDMA certificates on WCDMA
network elements and NetAct.
For WCDMA, the supported LDAP access types are StartTLS and PREFER TLS. StartTLS is recom-
mended because it encrypts the connection between the network elements and NetAct.
You must complete all the tasks in this section if you use StartTLS to activate CNUM. If you use PRE-
FER TLS to activate CNUM, the tasks in this section are not mandatory, but Nokia recommends that
you complete the tasks to prevent security issues.
This section describes how to install certificates on OMS, IPA-RNC, mcRNC, ASRNC and WBTS.
For detailed instructions on how to install certificates on OMS, see Managing Security with OMS
in WCDMA RAN, Rel.<network element release>, <Issue number> Operating Documentation.
For example, WCDMA RAN, Rel. WCDMA 20, Issue 02. In Managing Security with OMS, go to
Certificates management. Get the documents from Support portal in https://customer.nokia.com.
Accessing the documentation and software in the portal requires authentication.
For detailed instructions on how to install certificates on IPA-RNC, see Managing Information
Security in IPA-RNC in WCDMA RAN, Rel.<network element release>, <Issue number> Operating
Documentation. For example, WCDMA RAN, Rel. WCDMA 20, Issue 02. In Managing Information
Security in IPA-RNC, go to Managing secure operation and maintenance connections →
Configuring TLS authentication proxy. Get the documents from Support portal in https://
customer.nokia.com. Accessing the documentation and software in the portal requires authentication.
For detailed instructions on how to install the certificates, see Managing Security in mcRNC in
WCDMA RAN, Rel.<network element release>, <Issue number> Operating Documentation. For
example, WCDMA RAN, Rel. WCDMA 20, Issue 02. In Managing Security in mcRNC, go to
Centralized certificate management → Certificate management SCLI commands → Certificates
installation. Get the documents from Support portal in https://customer.nokia.com. Accessing the
documentation and software in the portal requires authentication.
For detailed instructions on how to install certificates on ASRNC, see Managing Security in AirScale
RNC in WCDMA RAN, Rel.<network element release>, <Issue number> Operating Documentation.
For example, WCDMA RAN, Rel. WCDMA 20, Issue 02.
In Managing Security in AirScale RNC, go to User security → Certificate management. Get the doc-
uments from Support portal in https://customer.nokia.com. Accessing the documentation and software
in the portal requires authentication.
For detailed instructions on how to install certificates on WBTS, see Integrating and Configuring Flexi
Multiradio BTS WCDMA Transmission in WCDMA RAN, Rel.<network element release>, <Issue num-
ber> Operating Documentation. For example, WCDMA RAN, Rel. WCDMA 20, Issue 02. In Integrat-
ing and Configuring Flexi Multiradio BTS WCDMA Transmission, go to Configuration of security
features → Configuring certificates manually. Get the documents from Support portal in https://
customer.nokia.com. Accessing the documentation and software in the portal requires authentication.
This section describes how to check and install the WCDMA certificates on NetAct.
Check whether the WCDMA certificates are already installed on NetAct. For detailed instructions, see
Get issuer name in Administering NetAct System Security. If the certificates are not installed, install
the certificates following the instructions in Managing certificates in Administering NetAct System
Security.
Note: When you follow the instructions in Managing certificates in Administering NetAct
System Security, use dirsrv_access as the usecase name.
6.2.7.4 Preparing the NetAct users used for managing WCDMA network elements
This section provides instructions on how to prepare the NetAct users used for managing the WCDMA
network elements.
To ensure that NetAct users have enough permissions to manage WCDMA network elements, the
default or user-defined NetAct roles which associate with the WCDMA network element permissions
must be granted to the NetAct users.
Note: Before using the NetAct users to manage WCDMA network elements for the first time,
ensure that the NetAct users do not exist in the WCDMA network elements to be managed.
1. Ensure that the NetAct users and associated groups are created.
For detailed instructions on how to manage users and groups, see About user management in
User Management Help.
2. Ensure that the NetAct roles (default or user-defined) to be assigned to the group where the
NetAct user belongs exist and contain all the required permissions.
• If the required network element permissions are associated with NetAct default roles, you
can use the NetAct default roles directly. For the mapping information between the WCDMA
network element permissions and NetAct default roles, see Supported OMS permissions,
Supported IPA-RNC permissions, and Supported mcRNC and ASRNC permissions.
• If the required network element permissions or operations are not associated with NetAct
default roles, you can create user-defined roles and grant the permissions to the user-
defined roles. For example, there is no default role mapping for the ownhomedir and
hassharedreadonlyhome operations of the fsuicli permission on OMS; you can create
a user-defined role and associate one of the two operations (the two operations cannot be
selected at the same time) to your user-defined role while needed.
For detailed instructions, see Creating a new role in Permission Management Help and Granti-
ng permissions to a role in Permission Management Help.
3. Assign the NetAct roles which contain the required network element permissions to the group
where the NetAct user belongs.
For detailed instructions, see Assigning roles to a group in Permission Management Help.
4. Add scope to the group-role combinations. Restrict the NetAct users to access certain
maintenance regions (MRs) or network elements (NEs) based on your need.
For more information, see Network element permissions in Administering Users and Permissions.
For detailed instructions on how to add scope to the group-role combinations, see Adding scope to
group-role combinations in Permission Management Help.
The following table lists the supported OMS permissions and their associated roles:
Permission Used in
Operation Description Default Role
Name OMS
Action Log Op- manage This permission enables manage NetAct-Administrator Yes
eration access to ActionLogOperation.
CM-Installation
Permission Used in
Operation Description Default Role
Name OMS
PM-Performance Analysis
FM-Alarm Surveillance
FM-Fault Localization
PM-Performance Analysis
SM-Detection
SM-Prevention
Permission Used in
Operation Description Default Role
Name OMS
CM-Network Planning and Engi-
neering
CM-Provisioning
FM-Fault Localization
PM-Performance Analysis
SM-Detection
SM-Prevention
CM-Provisioning
SM-Detection
SM-Prevention
CM-Installation
CM-Provisioning
Permission Used in
Operation Description Default Role
Name OMS
CM-Service Planning and Nego-
tiation
FM-Alarm Surveillance
FM-Fault Localization
PM-Performance Analysis
PM-Performance Monitoring
SM-Detection
SM-Prevention
CM-Provisioning
FM-Fault Localization
PM-Performance Analysis
SM-Detection
SM-Prevention
Permission Used in
Operation Description Default Role
Name OMS
man permission are also assigned
to the _nokfsuifaultview group.
CM-Provisioning
FM-Fault Localization
PM-Performance Analysis
Permission Used in
Operation Description Default Role
Name OMS
CM-Configuration Management
Administration
pmg configure This permission allows read/write CM-Network Planning and Engi- Yes
access to LDAP fragments that neering
are typically used when changing
CM-Provisioning
configuration data in LDAP.
SM-Detection
SM-Prevention
CM-Provisioning
FM-Fault Localization
PM-Performance Analysis
Permission Used in
Operation Description Default Role
Name OMS
CM-Installation
FM-Fault Localization
PM-Performance Analysis
System Status monitor This permission enables read ac- NetAct_Administrator Yes
Provider cess to OMS System Status View
Note:
For more information about the permissions of a specific application, see Administering
OMS in WCDMA RAN, Rel.<network element release>, <Issue number> Operating Doc-
umentation. For example, WCDMA RAN, Rel. WCDMA 20, Issue 02. In Administering
OMS, go to User management → Defining group permission restrictions for OMS
Element Manager operations.
• NetAct users are not allowed to launch the Parameter Tool application from Application
Launcher.
The following table lists the supported IPA-RNC permissions and their associated roles:
CM-Network
Planning and
Engineering
CM-Installation
CM-Configura-
tion Manage-
ment Adminis-
tration
CM-Provision-
ing
CM-Network
Planning and
Engineering
CM-Installation
FM-Fault Man-
agement Admin
• Fault Management: The preferred value is 250 for A and 100 for others.
• Configuration Management: The preferred value is 250 for A, C, D, E, L, I, N, O, Q, R, T, W and
100 for others.
• Security Management: The preferred value is 250 for A, I, Q and 100 for others.
• Performance Management: The preferred value is 250 for T and 100 for others.
• Element Management: Any value between 1 and 251 is fine.
The following table lists the supported mcRNC and ASRNC permissions and their associated roles.
Note:
crashlog Yes
fileshare Yes
filetransfer Yes
fullbash Yes
limitedbash Yes
CM-Provisioning
PM-Performance Analysis
CM-Installation
SM-Detection
SM-Prevention
SM-Detection
CM-Provisioning
PM-Performance Analysis
FM-Fault Localization
CM-Installation
SM-Prevention
tracelog Yes
vendoradmin Yes
CM-Installation
SM-Detection
SM-Prevention
CM-Provisioning
hassharedread- Yes
onlyhome
ownhomedir Yes
FM-Alarm Surveillance
SM-Prevention
CM-Provisioning
PM-Performance Analysis
FM-Fault Localization
CM-Installation
NetAct-Administrator
PM-Performance Monitoring
FM-Fault Localization
FM-Alarm Surveillance
FM-Fault Localization
PM-Performance Analysis
Monitor Yes
Table 33: Supported mcRNC and ASRNC permissions and associated roles
Note: Some permissions are mutually exclusive (for example, fsui fullbash and fsui
limitedbash, fsuicli hassharedreadonlyhome and fsuicli ownhomedir),
which means only one of them takes effect when both permissions are granted to the user.
Therefore, only grant the needed permissions to the user before activating CNUM.
For more information about mcRNC, see Managing Users in mcRNC in WCDMA RAN, Rel.<network
element release>, <Issue number> Operating Documentation. For example, WCDMA RAN, Rel.
WCDMA 20, Issue 02. In Managing Users in mcRNC, go to Permissions for Management interfaces.
Get the documents from Support portal in https://customer.nokia.com. Accessing the documentation
and software in the portal requires authentication.
For more information about ASRNC, see Managing Security in AirScale RNC in WCDMA RAN,
Rel.<network element release>, <Issue number> Operating Documentation. For example, WCDMA
RAN, Rel. WCDMA 20, Issue 02.
In Managing Security in AirScale RNC, go to Permissions for Management interfaces. Get the docu-
ments from Support portal in https://customer.nokia.com. Accessing the documentation and software
in the portal requires authentication.
Use the CNUM user to activate CNUM for the WCDMA network elements.
For information about the CNUM user, see CNUM prerequisites for WCDMA network elements.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the WCDMA network element for which you want to activate CNUM.
5. From the LDAP access type list, select the LDAP access type.
Note:
• The supported LDAP access types are StartTLS and PREFER TLS. StartTLS is
recommended because it encrypts the connection between the network elements
and NetAct.
• The LDAP access type for OMS and corresponding network elements is enforced to
be the same. Once the LDAP access type for one of network elements is selected,
the access types for the others are set to the same option automatically and cannot
be modified.
6. Click Activate.
Expected outcome
For information about CNUM activation status, see About Centralized Network Element User
Management in Centralized Network Element User Management Help.
Expected outcome
To verify whether CNUM activation is successful, check whether the CNUM user can launch element
management applications successfully from Monitor.
For information about the CNUM user, see CNUM prerequisites for WCDMA network elements.
Note: If CNUM is not activated for a network element, skip the corresponding verification
step.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
3. In Monitor, open Object Explorer by selecting Tools → Managed Objects → Object Explorer.
Expected outcome
Note:
• For RU50 EP1 and earlier releases, the OMS launch name is OMS Element
Manager.
• For WCDMA16 and later releases, the OMS launch name is OMS Web UI.
Expected outcome
The OMS Element Manager or OMS Web UI is launched successfully by the NetAct user.
Expected outcome
Expected outcome
Expected outcome
If the CNUM user is still available when you deactivate CNUM for the WCDMA network elements, you
can use the CNUM user to do the deactivation. You can also use any NetAct user which has enough
permissions to do the deactivation.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to deactivate CNUM.
5. Click Deactivate.
Expected outcome
Expected outcome
The status changes to Partial deactivated because WCDMA only supports partial
deactivation currently. The NetAct user is not deleted automatically during the deactivation
process.
[root]# fscontrolRUIM -d
ZIAJ:STATE=OFF;
Expected outcome
c) Enter Y.
For detailed instructions on how to deactivate CNUM on ASRNC, see Managing Users in AirS-
cale RNC in WCDMA RAN, Rel.<network element release>, <Issue number> Operating Docu-
mentation. For example, WCDMA RAN, Rel. WCDMA 20, Issue 02.
To verify whether CNUM deactivation is successful, check whether the NetAct users (CNUM user or
any NetAct user which has enough permissions) can still launch element management applications
successfully from Monitor.
Note: If CNUM is not deactivated for a network element, skip the corresponding verification
step.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
3. In Monitor, open Object Explorer by selecting Tools → Managed Objects → Object Explorer.
Expected outcome
Note:
• For RU50 EP1 and earlier releases, the OMS launch name is OMS Element
Manager.
• For WCDMA16 and later releases, the OMS launch name is OMS Web UI.
Expected outcome
The OMS Element Manager or OMS Web UI is launched successfully by the EM Access user
(for example, Nemuadmin).
Expected outcome
The MML session is launched by the Remote MML Access user (for example, SYSTEM).
Expected outcome
The SCLI session is launched successfully by the Remote SCLI Access user (for example,
NUPADM).
Expected outcome
The WBTS Site Manager is launched successfully by the EM Access user (for example,
Nemuadmin).
This section lists the causes of CNUM activation failures and provides solutions to solve the problem.
Causes
• Limitations
See Centralized Network Element User Management Activation Failure in Troubleshooting Securi-
ty Management.
This section describes how to identify and solve the problem when the NetAct user, which is used to
manage OMS, is locked in OMS after CNUM activation.
Procedure
• Log in to OMS through SSH as the NetAct user which has enough permissions to manage OMS.
Expected outcome
If any of the following error messages appears, the NetAct user account is locked.
Access denied
In OMS, locked NetAct user account is automatically unlocked after 2 hours. You can also unlock
it immediately following the instructions in Resolving the problem.
1. Log in to OMS as the Nemuadmin user, and then switch to the root user.
For example:
This section lists the cause of IPA-RNC MML Session launch failure after CNUM activation.
Causes
See Operation failure on Network Element post CNUM activation in Troubleshooting Security Man-
agement.
Problem
NetAct operations, such as Element Management, FM alarm upload, CM upload fail after CNUM acti-
vation on OMS with LDAP access type as StartTLS.
Possible Cause
Solution
In case of CNUM, OMS will raise alarm if it is unable to communicate to NetAct LDAP server.
In NetAct Monitor, check whether any alarm like 70268,70358 related to the OMS is raised. If the
alarm is found, then the problem is caused by certificate configuration for CNUM. Fix the certificate
configuration in both NetAct and OMS. For detailed list of alarms raised during OMS to NetAct LDAP
communication, see WCDMA OMS Alarms in WCDMA RAN, Rel.<network element release>, <Issue
number> Operating Documentation. For example, WCDMA RAN, Rel. WCDMA 20, Issue 02. Get the
document from Support portal in https://customer.nokia.com. Accessing the documentation and soft-
ware in the portal requires authentication..
Problem
Possible Cause
After geo-resiliency is activated on the ASRNC, the AirScale RNC primary and secondary VNFs switch
over, and the data is not synchronized between the primary and secondary VNFs.
Solution
See Activating CNUM on WCDMA network elements to activate the CNUM again, or contact your net-
work element administrator to synchronize the data between the ASRNC primary and secondary VN-
Fs.
6.2.8 Configuring CNUM for CMS-8200 HSS, CFX-5000, CM Repository Server, TIAMS
and NT HLR FE
The following network elements support Centralized Network Element User Management (CNUM)
in NetAct. For more information on CNUM, see Controlling network element access with Centralized
Network Element User Management.
6.2.8.1 Prerequisites for CMS-8200 HSS, CFX-5000, CM Repository Server, TIAMS and NT HLR FE
If the network element was integrated to a NetAct release earlier than NetAct 18A SP1812 and up-
graded to current release, then execute the following steps to re-deploy the adaptations:
1. Log in to any NetAct VM on which the intgwas service is running as an omc user.
/var/opt/oss/global/NSN-integrationmanager/ims_aif/deploy_adaptation.
sh
Where:
CFX-5000 (Call Session Control Function) Bare com.nsn.cscf 18.5C or later versions
Metal
Expected Output:
{"status":"OK","cause":"","result":""}
This section describes the information you must know and basic requirements which must be met
before configuring CNUM for the following network elements.
Supported network element re- The network element versions which support CNUM are as follows:
leases
• CM Repository Server Bare Metal 18.5CI and later versions
• CFX-5000 (Call Session Control Function) Bare Metal 18.5C and later
versions
• CMS-8200 (Home Subscriber Server Front End) Bare Metal 18.5C
and later versions
• CFX-5000 (Load Balancer) Bare Metal 18.5C and later versions
• NT HLR FE Bare Metal 18.5C and later versions
• TIAMS Bare Metal 18.5Cc and later versions
• TIAMS Bare Metal 18.5C and later versions
License The following licenses are required to be installed in NetAct for CNUM. For
more information on how to check the licenses, see Browsing licenses in
License Manager Help .
• NT HLR FE
Feature code: 34006
Any of licenses with the feature code 34006, 34004 or 34002 can acti-
vate CNUM for TIAMS and CM Repository Server.
The integration user needed for • The naming convention of username and password for CNUM must
CNUM configuration follow the NetAct and network element naming rules.
• The username of the integration user for CNUM cannot be the same
as the username of the network element.
Firewall Ensure that the port 389 is open from network element to LB WAS virtual
IP during integration.
Network elements integration Ensure that the needed network element releases are integrated under
Transport Layer Security (TLS) mode to NetAct successfully. Integrating
CM Repository Server Bare Metal and TIAMS to NetAct is mandatory, be-
cause CM Repository Server Bare Metal acts as the data repository for
these network elements. For more details about the related network ele-
ment integration, see the following:
Note:
SSH password based authentica- Ensure that the SSH password based authentication is enabled. For more
tion information, follow the step 1 in Configuring SSH authentication between
<network element> and NetAct chapter of the corresponding network ele-
ment integration documents.
List of service types needed to ac- Service type: NEUM Admin Access
tivate CNUM
Note: If the NEUM Admin Access credential does not exist, cre-
ate the credential with the following information. For more infor-
mation on how to check and create Network Element Access
Control user, see Network Element Access Control graphical
user interface in Network Element Access Control Help .
• Profile: Default
• NEUM Admin UserName: wsuser
• NEUM Admin Password: the password of the wsuser user
• Maintenance region: the same maintenance region which is used dur-
ing the network element integration
• Application Group:
– sysop
– the group to which the integration user belongs
Anonymous LDAP access Check anonymous access status. If anonymous LDAP access is restricted,
execute the command to enable it again. Otherwise, skip this step. For de-
tailed instructions, see Restricted anonymous login to the LDAP directory.
Certificates installation in NetAct To ensure that the certificates are installed, see Checking if LDAP certifi-
cates are installed.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password of the integration user, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
Note:
ID> object. For example, for TIAMS, check if CNUMINT-1 is created under TIAMS-
<instance ID>.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password of the integration user, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Expected outcome
4. In the Objects pane, right-click the IMSNFM-<instance ID> object and select Integration Data
Upload.
Note: If the integration data upload of the same IMSNFM-<instance ID> is ongoing,
wait for the progress to be completed and then check the status.
Expected outcome
In the Ongoing Operations area, the integration data upload is in progress. In the Operations
History area, check if Completed Successfully shows in the Operation Status.
Note:
Expected outcome
1. Copy the LDAP signer certificate from NetAct to the CM Repository Server. For the location of
the certificate on NetAct, see Ensure that LDAP certificate is installed in Administering Users and
Permissions.
2. For detailed information on how to install the certificates on network elements, see the CNUM
descriptions in corresponding network element documents based on different releases.
• For CFX-5000, CM Repository Server and TIAMS, see the CNUM Activation or Deactivation
chapter of the network element documents.
• For CMS-8200 HSS and NT HLR FE, see the CNUM Activation and Deactivation chapter of
the network element documents.
6.2.8.2 Limitations
• Parallel activation, deactivation and password update operations are not supported by CMS-8200
HSS, CFX-5000, CM Repository Server, TIAMS and NT HLR FE. Select only one Fully Qualified
Distinguished Name (FQDN) of the network element among the network elements under the same
CM Repository Server at a time for performing activation, deactivation and password update oper-
ations. Activation, deactivation and password update operations cannot be performed in parallel,
so there is about one minute from one operation to another.
• Because CNUM is not supported for SS7 administration launch of NT HLR FE, you need to use
NT HLR FE credential instead of NetAct credential to log in.
6.2.8.3 Checking CMS-8200 HSS, CFX-5000, CM Repository Server, TIAMS and NT HLR FE permissions
• Skip this section if you only use default roles during NetAct user creation.
• When creating a role, assign the NetAct permissions and the network element permissions to your
new role. To create a role, see Creating a new role in Permission Management Help. To configure
the network element permissions, see Network element permissions.
• For CM Repository Server, there is no mapping between network element permissions and default
NetAct roles, and the mapping of TIAMS is used for CM Repository Server.
The root contexts of CMS-8200 HSS, CFX-5000, CM Repository Server, TIAMS and NT HLR FE in
Permission Management are listed in the following table:
TIAMS TIAMS
NTHLRFE NTHLRFE
Table 35: Root contexts of CMS-8200 HSS, CFX-5000, CM Repository Server, TIAMS and NT HLR
FE in Permission Management
The supported permissions of CMS-8200 HSS, CFX-5000, CM Repository Server, TIAMS and NT
HLR FE are same, which are listed in the following table:
FM_FaultCorrection
FM_Testing
CM_NetworkPlanningAndEngi-
neer
CM_Provisioning
1. Activate TIAMS.
Note: If you see the failure for CSCF, HSSFE, NTHLRFE, or BNGLB, you need to de-
activate REPOSERVER or IMSNFM, and then activate CSCF, HSSFE, NTHLRFE, or
BNGLB.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to activate CNUM.
Tip: You can filter or sort the list, and select the desired network element.
7. Click Activate.
Expected outcome
8. Click Refresh.
Expected outcome
If the activation is unsuccessful, the CNUM status shows Failed activation. Click Failed
activation link to view the causes of failure.
For more information on how to activate CNUM, see Activating Centralized Network Element User
Management in Centralized Network Element User Management Help.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password of the integration user, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Note: Because CNUM activation internally takes some time in network elements, wait
about one minute to verify Shell Access launch.
b) In NetAct Monitor, open Object Explorer by selecting Tools → Managed Objects → Object
Explorer.
Expected outcome
who am i
Expected outcome
Note:
Note: If you see the failure for CSCF, HSSFE, NTHLRFE, or BNGLB, you need to de-
activate REPOSERVER or IMSNFM, and then deactivate CSCF, HSSFE, NTHLRFE, or
BNGLB.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Select the network element for which you want to deactivate CNUM.
5. Click Deactivate.
Expected outcome
6. Click Refresh.
Expected outcome
If the deactivation is unsuccessful, the CNUM status shows Failed deactivation. Click
Failed deactivation link to view the causes of failure.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password of the integration user, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
Note: CNUM activation internally takes some time in network element, so wait about one
minute and verify Shell Access launch.
Expected outcome
who am i
Expected outcome
6.2.8.4.5 Changing password of network element account (network element bind user account)
To change the password of a network element account, see Updating the password for the network
element account (NE bind user account) in Centralized Network Element User Management Help.
Note:
• For BNGLB, CSCF, HSSFE, NTHLRFE or TIAMS, select FQDN of the expected network
element managed object in CNUM GUI.
For possible causes and solutions, see Centralized Network Element User Management Activation
Failure in Troubleshooting Security Management.
Problem
Solution
If the password update is unsuccessful, the CNUM status shows Failed update. Click the Failed up-
date link to view the causes of failure.
Note:
• NetAct prerequisites and Network element specific prerequisites and procedures should
be followed before activating CNUM.
• If CNUM is activated for a large number of network elements at once, a queuing mecha-
nism is applied to avoid overloading NetAct and the network.
Rollback
In case problems are encountered after the activation of CNUM and a rollback to service users is re-
quired, see the instructions in Deactivating CNUM.
Cleanup
Once CNUM is activated, you can access the network element using the NetAct user account in the
centralized user management repository. The service users (other than the users used to configure
CNUM) in the local user management of the network element are no longer used for access.
Depending on the network element implementation, it is possible to access the network element us-
ing these users and if they are not maintained (with regular password changes), this can be a secu-
rity risk. It should be considered, if these service users can be removed. It is recommended to do the
cleanup only after CNUM is proven in use.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
To verify the CNUM activation from the network element, see Verification section in Network ele-
ment specific prerequisites and procedures.
1. Perform upload operation. For more information, see Verifying CM Repository Server Configuration
Management connectivity in Integrating CM Repository Server Bare Metal to NetAct.
2. Log in as omc user to any NetAct VM where the WAS service is running.
To locate the correct virtual machine, see Locating the right virtual machine for a service in Admin-
istering NetAct Virtual Infrastructure.
5. CNUM is activated if the value of User identity and Target user identity is same as the logged-in
user.
If the service users meant for CNUM operations are decommissioned after CNUM activation, those
service users have to be set up in the network elements and stored in the NEAC application before de-
activating CNUM.
If the service users are still in the network and in NEAC, a rollback includes deactivating CNUM using
the NEAC application and possibly some actions in the network element as described in Network ele-
ment specific prerequisites and procedures.
For instructions on deactivating CNUM using the NEAC application, see Deactivating Centralized Net-
work Element User Management in Centralized Network Element User Management Help.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
To verify the CNUM deactivation from the network element, see Verification section in Network ele-
ment specific prerequisites and procedures.
1. Perform upload operation. For more information, see Verifying CM Repository Server Configuration
Management connectivity in Integrating CM Repository Server Bare Metal to NetAct.
2. Log in as omc user to any NetAct VM where the was service is running. To locate the correct
virtual machine, see Locating the right virtual machine for a service in Administering NetAct Virtual
Infrastructure.
5. CNUM is deactivated if the value of User identity is same as the logged-in user and Target user
identity is same as the user provided in NEAC credentials.
Note: Only manual triggered update from NEAC application is supported. For more
information, see Updating the password for the network element account (NE bind user
account) in Centralized Network Element User Management Help.
element access with Centralized Network Element User Management to activate CNUM for the new
network element.
Table 37: Token parameters and definition describes the configuration parameters associated to
CNUM tokens.
Default
Token parameter Definition Allowed range
value
1. Log in to any VM where syswas service is running through SSH as omc user.
To locate the right NetAct VM, see Locating the right virtual machine for a service in Administering
NetAct Virtual Infrastructure.
4. Change the value of token parameter as defined in Table 37: Token parameters and definition
within the allowed limit.
Note: Default values will be taken if invalid values are provided in the configuration file.
Minimum and maximum supported values will be taken for values provided beyond the
allowed range.
5. Change other custom set values from backup file if taken in step 2 to /etc/opt/oss/global/
custom/conf/javaprefs/um/Pref_ExternalUserTokenExpiryConfig.xml. Remove the
backup file after changing the custom set value.
Note:
• Token mode in use for operations on CNUM enabled NE continues to work despite the
actual user getting expired or locked or deactivated in the external authentication and
authorization server. Users are expected to re-login in such case or administrator can
terminate session to have proper token validation. For information about termination of
session, see Terminating active user sessions in User Management Help.
• This section involves restart of Network Credential Access application (neac-nca-ear)
which is used for providing credentials for operation performed on NE from NetAct.
Token mode can be changed if there are any issues with the NE being operated upon. This configura-
tion can be done at the NE class level.
1. Log in to any VM where syswas service is running through SSH as omc user.
To locate the right NetAct VM, see Locating the right virtual machine for a service in Administering
NetAct Virtual Infrastructure.
4. Obtain the NE type for which the token mode support must be changed.
Note: The NE type with the token mode support can be obtained by viewing the Object
Class property value for the NE fully qualified distinguished name in the Object Explorer
of the NetAct Monitor tool. For more information, see Displaying object attributes in
Object Explorer Help.
5. Add the following entry key in the class level if it is missing or update the existing key to set the
token mode.
Setting value to disabled will disable the token mode access and enabled will set the token mode
access for external user.
6. Change other custom set values from backup file if taken in step 2
to /etc/opt/oss/global/custom/conf/javaprefs/neac/
Pref_system_cnum_feature_class_release_licence-mapping.xml. Remove the
backup file after changing the custom set value.
7. Restart the nca credential access application for the changes to be effective by entering the
following commands:
8. The started state of the application can be checked by entering the following command:
Prerequisites
• Integration of NetAct with the external authentication server must be successful. For information
about how to integrate NetAct with the external authentication and authorization server, see
Integrating external authentication and authorization server to NetAct in Administering NetAct
System Security.
• The required licenses must be available. For more information about the license and their
availability, see Checking NetAct licenses needed for external authentication and authorization
server integration in Administering NetAct System Security.
To locate the right virtual machine, see Locating the right virtual machine for a service in
Administering NetAct Virtual Infrastructure.
2. On the command line, enter the following to import the external account.
Or
4. At the prompt, press Y or N after checking the number of user entries to be created or modified
along with the number of invalid user entries.
Expected outcome
Note:
Or
• Tool will be terminated, if the options except y or yes (case-insensitive) is provided after
three attempts.
• For any issues during the creation or modification of external accounts, see
Troubleshooting external user management operations in Troubleshooting Security
Management.
In such a case, it is expected that user and their group association in external authenti-
cation and authorization server is kept same with mapped external user and associated
group in NetAct.
For checking and updating the group mapping in NetAct, see Managing external groups
mapping and for updating groups associated with external user in external authentication
and authorization server, see Adding external user to universal group of external authen-
tication and authorization server in Administering NetAct System Security.
Note:
If the value listed in Values and description contains special characters such
as double quotes (“), ampersand (&), left angle bracket (<), right angle bracket
(>), apostrophe (‘), consecutive spaces, escape these characters in the
ImportExternalUsersTemplate.xml file by referring xml specification. For example, if a
domain name of the external server is na”lab2903, then escape double quote with "
and update the value in xml as na"lab2093.
Values and description table describes the values present in the external account's configuration file.
Values Description
Note:
Values Description
• plus (+)
• comma (,)
• double quote (”)
• forward slash (/)
• backward slash (\)
• left angle bracket (<)
• right angle bracket (>)
• semicolon (;)
• equals (=)
• consecutive spaces
Values Description
Note:
1. Login to the Node Manager domain controller as a local NetAct user which belongs to
NetAct_Administrators group.
2. Press WINDOWS+R on the keyboard and type cmd.exe to launch the command prompt in Run
dialogue.
3. On the command prompt, type PowerShell to launch the PowerShell in the console.
4. On the PowerShell prompt, enter the following to obtain the distinguished name.
where:
Expected outcome:
<UserIdentifier>=<commonName>,<branchRDN>,<baseDN>
Example:
Output:
where:
• domain: domain1
• userIdentifier: CN
• branchRDN: OU=unit1,OU=location1
• commonName: Test User 1
• baseDN: CN=Users,DC=domain1,DC=corporate,DC=net
To locate the right virtual machine, see Locating the right virtual machine for a service in
Administering NetAct Virtual Infrastructure.
Or
Note:
• To export data for all external users, enter one of the following commands:
manageExternalUsers.sh -e -a [-n]
Or
• To export data for all external users present in the input file, enter one of the following
commands:
Or
where <text file path> is the absolute path of the input text file, which must contain the
external user names for which the data needs to be exported.
Note:
• External user names in <text file path> needs to be separated by a new line.
• <text file path> must have read permission for the sysop group.
• The exported XML file will be available at /var/tmp/Nokia-
sm_external_authentication/export_externalusers/
ExportExternalUsers-<ddmmyyyyhhmmss>.xml location.
• For any issues during the export of external user accounts, see Troubleshooting
external user management operations in Troubleshooting Security Management.
• If the external authentication and authorization server is integrated to multiple NetAct
systems, then the external users can be exported from one NetAct installation
and the same can be imported to another NetAct installation. In case the group
association is different for an external user in different NetAct installations, the
exported file can be modified to the required group association and then imported in
the corresponding NetAct system.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
2. List of the external user accounts with the related information can be generated by doing one of
the following:
• To list all the external user names, enter one of the following commands:
[omc] manageExternalUsers.sh -l -u
Or
• To list all the external user names with group information, enter one of the following
commands:
[omc] manageExternalUsers.sh -l -g
Or
• To list all the external user names with domain name information, enter one of the following
commands:
[omc] manageExternalUsers.sh -l -d
Or
• To list all the external user names with group, domain name, and common name, enter one of
the following commands:
[omc] manageExternalUsers.sh -l -a
Or
Or
Note: User name containing special characters must be provided correctly, either by
enclosing the user name with single quotes or by escaping each special character
using appropriate escape character, for example, backslash character.
• To list all the external user information present in the input file, enter one of the following
commands:
Or
where <text file path> is the absolute path of the input text file, which must contain the
user names of which information needs to be listed.
Note:
3. Tool execution must be terminated if any problem occurs during the list operation. To resolve the
issue, see Failed to list users in Troubleshooting Security Management.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
Or
Note: User name containing special characters must be provided correctly, either by
enclosing the user name with single quotes or by escaping each special character
using appropriate escape character, for example, backslash character.
manageExternalUsers.sh -D -a [-n]
Or
• For deleting all external accounts present in the input file, enter:
Or
where <text file path> is the absolute path of the input text file, which must contain the
external user names which needs to be deleted.
Note:
• Deletion of an external user does not terminate the current active sessions of that
user. To terminate such active user sessions manually, see Management of active
user sessions in User Management Help.
External user who is not associated to any NetAct specific group in the external authentication server
or who is part of NetAct specific group, but that group is not mapped to any of the groups in NetAct will
not be modified by default upon start page login. Nokia recommends to modify such external user to
avoid other ways of login such as SSH login. To modify such external user upon start page login, up-
date the DeleteUserOnNoGroupAssociation field in the preference file by doing the following:
To locate the right virtual machine, see Locating the right virtual machine for a service in
Administering NetAct Virtual Infrastructure.
5. Update the preference file. To update, see Table 39: Parameters and their description.
6. Change custom values that are set previously from backup file if taken in step 2 to /etc/opt/
oss/global/custom/conf/javaprefs/um/Pref_ExternalGroupMappingConfig.xml
file.
Note:
• If backup was taken in step 2, remove the backup file after changing the custom set
value.
• By default, the external user’s start page login fails, if NetAct specific groups are not
mapped. But SSH login for such user is possible and that user needs to be cleaned
up manually (If not auto removed) by following the instructions provided in Deleting
external accounts using CLI.
• Home directory of user is not removed as part of the user removal and it needs to be
removed separately.
Prerequisites
• External authorization server must be configured and enabled. To enable external authorization
server, see Enabling NetAct directory server authorization with external authentication and
authorization server in Administering NetAct System Security.
• User account must have at least one group mapped to a NetAct group. For more information, see
Managing external groups mapping.
• A local NetAct user with the same account name must not be already existing. If the account
needs to be migrated, see Migrating NetAct users to external users in Administering NetAct
System Security.
Procedure
• Login to NetAct start page as an external user by using the following syntax:
<extUser>[@<extDomainName>]
By performing a direct login to NetAct start page, NetAct validates the account name against the
NetAct login name policy. In User Management application, the supported characters in the login
name and Maximum length of login name fields must be modified accordingly with the account
name. For more information, see Login name policy.
Once the account name validation is done, NetAct checks if the external authentication server
accepts the passed credentials. If the external authentication server accepts the credentials and
valid groups are found mapped to the account in the external authentication server, an external
user account is automatically created in the NetAct user management. By default, the account’s
associated groups and thus the access rights are also automatically updated in subsequent logins.
Note:
– The domain name is optional and if provided, must match the domain name
configured as part of Updating External Authentication Server Integration
configuration file in Administering NetAct System Security.
– If the domain name configured is incorrect, login validation from NetAct would
not fail, but login to external server might fail. To correct the configured domain
name, see Login failure for external user in NetAct in Troubleshooting Security
Management.
– External user logging in through SSH, Citrix, or other means will not update the
group mapping and access rights.
– Reauthentication to an existing active session does not update the group
associations.
– Ensure that commonName, which is an account name does not contain special
characters such as +,”\/<>;= and consecutive spaces as these are not supported
in NetAct.
1. Log in as omc user to any NetAct VM hosting the dmgr service running through SSH.
To locate the right virtual machine, see Locating the right virtual machine for a service in Adminis-
tering NetAct Virtual Infrastructure.
If the preference file is listed, go to step 4. Else, continue with the next step.
4. Enable the automatic shell access feature by changing the value of entry
key="autoConfigSSHAccess" in the copied file from "false" to "true".
Note:
• Successful login to NetAct through NetAct Start Page is required after the
configuration of the automatic shell access for changes to be effective.
• External user meant for the non-interactive usecases (machine to machine access),
which are managed in the external server can be created through Command Line
Interface (CLI) tool to auto grant the shell access and avoid NetAct Start Page login.
For creating such accounts, see Importing external accounts using CLI.
• To revoke the shell access right for the user, the user must be disassociated from the
group mapped to sshaccess group in the external authentication and authorization
server. Disabling the automatic shell access feature alone will not revoke the shell
access rights for user.
• Due to the security feature of Unix PAM modules, the SSH logins are case-sensitive
although the NetAct Start Page allows users to login with both upper and lower
cases.
• The NetAct Start Page login is case-insensitive. For example, user JohnPaul
can log in to the Start Page with JohnPaul or johnpaul username.
• The SSH login is case-sensitive. For example, the user JohnPaul can do SSH
login with JohnPaul but not with the johnpaul username.
1. Log in as omc user to any NetAct VM hosting the dmgr service running through SSH.
To locate the right virtual machine, see Locating the right virtual machine for a service in
Administering NetAct Virtual Infrastructure.
If the preference file is listed, go to step 4. Else, continue with the next step.
Note:
For example:
– Scenario1:
Consider the scenario of local user JohnPaul in NetAct and its corresponding user
in the external authentication and authorization server is johnpaul. If the migration
operation is triggered for JohnPaul irrespective of the preference value (if it is set
to true or false), the shadow user in NetAct is created with JohnPaul (not with
johnpaul) as it will be considered as the same name migration. The SSH operation
only works with the JohnPaul username and will not succeed with the johnpaul
username.
– Scenario 2:
Consider the scenario of the local user johnpaul in NetAct and its corresponding
user in the external authentication and authorization server is JohnPaul. If the
migration operation is triggered for johnpaul irrespective of the preference value
(if it is set to true or false), the shadow user in NetAct is created with johnpaul
(not with JohnPaul) as it will be considered as the same name migration. The SSH
operation only works with the johnpaul username and will not succeed with the
JohnPaul username.
The export operation performed using external group mapping tool (extGroupsMappingtool.sh) exports
all NetAct groups along with the corresponding external groups. Exported .csv file will be available at
/var/opt/oss/Nokia-sm_external_authentication/netact_groups/export/ location
and it can be used for subsequent mapping operations. To perform the export operation, do the
following:
1. Log in as omc user to the NetAct VM where the dmgr service is running.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
2. By default, the exported external group name will have similar name to NetAct group name, if
they are not mapped. To export with default behaviour, go to step 5 or to export unmapped NetAct
groups with the operator-defined prefix name, do the following:
• Go to /etc/opt/oss/global/custom/conf/javaprefs/um location
and check if the Pref_ExternalGroupMappingConfig.xml file exists. If
Pref_ExternalGroupMappingConfig.xml file exists, take backup of the file by entering:
4. Copy the group preference file to the location used for providing non-default configuration by
entering:
Note: Nokia recommends to define the group prefix value in the group preference file.
If the external authentication server uses multiple clusters and the group prefix value is
empty, there is a possibility that two NetAct clusters can have the same group name and
the user from one cluster can access the other cluster. To update the group preference
file, see Table 40: Parameters and their description.
Note:
If ExternalGroupPrefix
contains the following special
characters and consecutive
spaces, escape these
characters by referring xml
specification.
For example, if
ExternalGroupPrefix is
ca”d, escape double quote with
" and update the value in
xml as ca"d.
Note: Change non-default values that are set previously from backup file if
taken in step 2 to /etc/opt/oss/global/custom/conf/javaprefs/um/
Pref_ExternalGroupMappingConfig.xml file. Remove the backup file after
changing the non-default set value.
• extGroupsMappingTool.sh -e
Or
• extGroupsMappingTool.sh --export
Expected outcome
Sample Output:
For more information about the column name and their description in the exported file, see NetAct
group to external group mapping data.
Note:
• After the .csv file is exported, the corresponding mapped groups, if already present in
the external authentication and authorization server, must be used for NetAct operations
only.
• The external user management is done in the external authentication and authorization
server. But, the roles and permissions for the users are handled in NetAct.
Table 41: Column name and description describes the column name and their description in the ex-
ported file.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
2. View the list of external groups mapped with NetAct groups by entering one of the following
commands:
• extGroupsMappingTool.sh -l
Or
• extGroupsMappingTool.sh --list
Expected outcome
Sample output:
localG1 CorporateG1
localG2 CorporateG2
Prerequisites
• Ensure that NetAct groups to be mapped to external groups exist in NetAct. For more information,
see User group management in User Management Help.
• Ensure that the external groups to be mapped to NetAct groups exist in external authentication
and authorization server.
There must be a one-to-one association of External groups to be mapped to NetAct groups. One-to-
many or many-to-one group mapping association is not supported and the mapping tool will fail to pro-
vide appropriate messages on the console.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
2. Mapping of the NetAct specific external groups to the NetAct groups can be performed by entering
one of the following commands:
Or
where <filename> is the absolute path of the NetAct groups mapping data file, which
contains NetAct groups to be mapped to the specific external groups.
Expected outcome
Note:
• For any issues during the Groups Mapping operation, see Troubleshooting for external
groups mapping in NetAct in Troubleshooting Security Management.
• In case multiple NetAct clusters are integrated to same external authentication and
authorization server, deciding upon group mapping in each NetAct cluster can affect the
access right of user. For more information, see Considerations of NetAct group mapping
for integration with multiple NetAct clusters.
7.9.3.1 Considerations of NetAct group mapping for integration with multiple NetAct clusters
Note: This section requires that the creation of universal groups in external authentication
and authorization server as described in Considerations in universal groups creation for inte-
gration with multiple NetAct clusters in Administering NetAct System Security is followed.
Mapping of NetAct group in specific cluster to universal groups in external authentication and autho-
rization server is carried out by NetAct administrator. This is done after getting necessary information
regarding NetAct specific universal groups from external server administrator. This eventually deter-
mines the access rights of the user who is being associated with universal group in external authen-
tication and authorization server during login to NetAct start page. If multiple NetAct clusters are inte-
grated with the same external authentication and authorization server, proper decision of group map-
ping results in same or different level of access rights for user.
Mapping for same access rights for user across NetAct cluster: This requires the NetAct group
across NetAct clusters having same permissions to be mapped with the same universal group. NetAct
default groups, for example, sysop comes under this category as the permission under this group re-
mains same across NetAct. Operator created groups with same access right across NetAct cluster al-
so comes under this mapping category.
Mapping for different access rights for user across NetAct cluster: This requires the NetAct group
across NetAct clusters having different permissions to be mapped with the corresponding cluster spe-
cific universal group created in the external authentication and authorization server. Only operator cre-
ated group comes under this category.
Prerequisites
• Ensure that the external groups are mapped to the corresponding NetAct groups. To view the
external groups mapped to the NetAct groups, see Listing external groups mapped with NetAct
groups.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
2. Detach external groups from NetAct groups by entering one of the following commands:
Or
where <filename> is the absolute path of the file, which contains external groups to be
detached from NetAct groups. Each entry in the file is line separated and the omc user must
have the read permission to this file.
Expected outcome
After executing the command for detaching external group mapping, list operation is executed to
check if the selected external groups are detached.
Note:
Or
where <groupname> is the name of the external group which must be detached from
the NetAct group.
• For any issues during groups detach operation, see Troubleshooting for detaching
external groups from NetAct groups in Troubleshooting Security Management.
To allow external users to access Node Manager server (NMS), ensure that the external users are as-
sociated to appropriate groups in the external authentication and authorization server. For more infor-
mation, see Adding external user to universal group of external authentication and authorization server
in Administering NetAct System Security.
To enable Single-Sign-On (SSO) for external users to perform EM launch operation, shadow accounts
(EM launch accounts) are created in NMS with the same name as that of external accounts. A short-
lived random token with maximum allowed length in password policy is generated for EM launch ac-
counts. NetAct resets the token on expiration.
Note: EM Launch operation continues to work despite the actual user getting expired or
locked or deactivated in the external authentication and authorization server. Administrator
can terminate such user sessions. For more information, see Terminating active user ses-
sions in User Management Help.
9 Security alarms
Security alarms correspond to events that are a potential security threat to NetAct. Such events can be
due to authentication failures, deactivation of unused user accounts and brute force attempt. Security
alarms help you to:
Prerequisites
Selfmonitor must be integrated to NetAct so that security related alarms are visible in NetAct Monitor
application.
Security administrator can filter the security alarms by creating a filter in NetAct Monitor. Export the fil-
ter to the desired location so that the filter can be used for future NetAct Monitor sessions.
Note: Log in to NetAct Start page as a user who has permissions to view alarms in Monitor.
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. Right-click Alarm List menu bar, select Alarm Type from the Available Columns list and add it to
the Selected Columns List.
7. In the right pane, right-click the Alarm Pattern, and select Alarm Type as a pattern.
8. Enter Security Violation as the value for the Alarm Type pattern.
Note: Enter 30005 as value for the Alarm Number pattern to see brute force alarms.
9. Right-click the created filter in Alarm Filter Explorer and select Set as Alarm Tool Default Filter
check box.
For information on importing and exporting the filters, see Importing Alarm Filter in Alarm Filter
Explorer Help and Exporting alarm filter in Alarm Filter Explorer Help.
• To enable the security alarms, navigate to Fault Management → Fault Management Helps →
Alarm List Help → Displaying/hiding columns in Alarm List by selecting Alarm Update Time
field, so that it is visible in Alarm List.
Note: To monitor the security alarms, such as Login failure alarms, the Alarm Update
Time field must be visible.
• This view can be set as default to enable the alarm list filtering in Alarm Update Time field and
see the updates in security alarms.
Note: The login failure due to invalid domain name is applicable only, if an external au-
thentication or authorization server is integrated to NetAct.
For more information about alarms, see Viewing and monitoring security alarms.
Login failures can be unintentional, for example, username, password, or domain name is forgotten
or incorrectly entered. They can also be intentional, for example, a deliberate brute force attack on
the system. Login failure alarms can be from NetAct Start Page, shell access, and from other Net-
Act components which require authentication to perform operations from Network Elements (NEs) for
which the Centralized Network Element User Management (CNUM) is activated or from any compo-
nent which tries to connect to the NetAct directory server.
Login failure alarms depend on the login failure of the user type. The user type is classified as:
For the same Distinguished Name (DN), the initial alarm for a failed login is raised as a new alarm and
the subsequent login failures are sent as alarm change notification for the existing alarm.
Each login failure alarm raised contains the following alarm text:
where, <login name> corresponds to the login name of the user for which the authentication has
failed.
Unsuccessful login count is reset when the next successful login happens for the login name.
Note:
Configuration files for changing the parameters associated with login failure attempts are
located at /opt/oss/conf/login_alarms_configuration.properties in the nodes
where dirsrv or was service is running. For information on how to locate these nodes, see
Locating the right virtual machine for a service in Administering NetAct Virtual Infrastructure.
These users are created using User Management application. Login failure alarms raised for these
users depend on the Lock user account and Maximum login attempts during ‘Failed login count-
ing period’ configuration.
You can view these configurations by selecting User Management Operations → Administration →
Policy configuration.
Severity of alarm is MAJOR when the account is not locked and the number of successive login
failure attempts is more than the USER_FAILED_ATTEMPTS_LOWER_LIMIT and less than the
Maximum login attempts during ‘Failed login counting period’ configured for this user.
Severity of alarm is CRITICAL when the account is locked and successive login failure attempts
are less than or equal to USER_FAILED_ATTEMPTS_UPPER_LIMIT.
Severity of alarm is MAJOR when the number of successive login failure attempts is
more than the USER_FAILED_ATTEMPTS_LOWER_LIMIT or less than or equal to the
USER_FAILED_ATTEMPTS_UPPER_LIMIT.
Note:
The security alarm number for consecutive failed login attempts by local NetAct end-user
is 30000.
Supplementary information of the alarm includes the unsuccessful login count and
locked status of the user along with time stamp of the last failed login.
System users correspond to users other than NetAct end-users. These users are critical for the oper-
ation of NetAct. Therefore, login failure alarms raised depend on the number of failed login attempts
and the time of the last password change.
System users are used by components within NetAct. These users require time to update the old
cached password upon successful password change. Therefore, the threshold is set after successful
password change so that:
Severity of alarm is CRITICAL when successive login failure attempts are more
than the USER_FAILED_ATTEMPTS_LOWER_LIMIT and less than or equal to the
USER_FAILED_ATTEMPTS_UPPER_LIMIT. Alarm is not raised if the user changes the password and
login failure occurs within the password change threshold value. Severity of alarm remains CRITICAL
for login failures after the password change threshold limit.
Note:
Non-existing users are login names for which the account does not exist in NetAct. Successive login
failures can be considered as an attempt of brute force attack on the system. Alarm severity is MAJOR
for login failures of non existing user from NetAct Login page.
Login to NetAct start page as an external user with invalid credentials (username, password, or do-
main name) are processed as non-existing user. For more information, see External user accounts.
Note:
• The login failure due to invalid domain name is applicable only, if an external
authentication or authorization server is integrated to NetAct.
• Alarm number of non-existing user login failure is 30002.
• Supplementary information of the alarm contains the time stamp of last failed login
attempt.
Network element bind users are automatically created in NetAct when CNUM is activated. Network el-
ements for which CNUM is activated use these users to bind to the directory server for retrieving au-
thorization related data. In case of unsuccessful bind to the directory server, login failure alarms are
raised for these users depending on the number of failed bind attempts and the time of the last pass-
word change.
An alarm of severity CRITICAL is raised when successive failed bind attempts are more
than the USER_FAILED_ATTEMPTS_LOWER_LIMIT and less than or equal to the
USER_FAILED_ATTEMPTS_UPPER_LIMIT. Alarm is not raised if the password for the network ele-
ment bind user was changed and bind failure occurs within the password change threshold value.
Note:
• Alarm number of network element bind user login failure alarms is 30007.
• Supplementary information of the alarm contains the unsuccessful login count of the user
and time stamp of last failed login.
These users are critical for the operation of NetAct. Therefore, login failure alarms for each
of these users are raised every 5 minutes when failed bind attempts are more than the
USER_FAILED_ATTEMPTS_LOWER_LIMIT within the previous 5 minutes. The severity of the alarm
is CRITICAL.
Note:
• Alarm number of directory server admin user login failure alarms is 30008.
• Supplementary information of the alarm contains the total number of unsuccessful login
attempts of the user and the time interval during which the unsuccessful login attempts
occurred.
External user accounts are accounts for which the actual authentication happens in an external au-
thentication server integrated to NetAct. External users are managed centrally in an authentication and
authorization server usually managed by corporate IT administrators. NetAct user management poli-
cies do not affect external users, and only corporate policies defined in external authentication and au-
thorization server applies for external users. Alarms raised for failed login attempts of external user de-
pends on the failure count in NetAct and not based on the failure count in the external authentication
server.
The security alarm number for NetAct external user account is 30000 or 30002. The security alarm
30002 is raised when:
When authentication is performed from other components or network elements for which the CNUM is
activated:
• security alarm 30000 is raised, if an incorrect password is entered for already imported or added
external accounts.
Note:
– severity of the alarm is MAJOR, when the successive login failure attempts are
more than USER_FAILED_ATTEMPTS_LOWER_LIMIT and less than or equal to
USER_FAILED_ATTEMPTS_UPPER_LIMIT.
– The supplementary information about the alarm includes the unsuccessful login
count and time stamp of the last failed login.
– Alarms for external users are based on the failed login count in the NetAct cluster.
Consequently, severity remains as MAJOR and it does not change to CRITICAL due
to locking of user on the external authentication server.
– Failed logins for external accounts existing in NetAct but not in the external authenti-
cation server will still have an alarm number as 30000.
• security alarm 30002 is raised irrespective of the correctness of credentials for external accounts,
which are not added or imported.
Note:
The security alarm number for consecutive failed login attempts by local NetAct end-user is
30000.
Supplementary information of the alarm includes the unsuccessful login count and locked
status of the user along with time stamp of the last failed login.
Where, <IP Address> corresponds to the work station IP address, from where the brute force
attempt is detected.
Additional information of the alarm includes the summary of user names along with the total number of
unsuccessful attempts.
For example:
• Alarm text:
– Brute force attempt from IP <IP Address>, corresponds to the work station IP address, from
where the brute force attempt is detected.
– Brute force attempt for USER <User name>, corresponds to the username that is blocked
when the same username is used for the brute force attack from multiple work stations.
• Alarm number: 30006
Additional information of the alarm includes, The last brute force attempt was made
at <time stamp>
Alarm text:
• Brute force attempt from IP <IP_Address>, corresponds to the IP address, from where the brute
force attempt is triggered.
Supplementary Information of the alarm includes the summary of user names along with the total
number of unsuccessful attempts.
For example:
Brute force attempt has been detected at oracle database for users, User1:15, User2: 10.
If the brute force attempt is made from Enterprise Manager then the user name is always
displayed as System in oracle db_audit.log.
• is raised
– when there is an active session existing already for a user and login attempt is made to obtain
new session for user. For more information about viewing of this alarm, see Viewing and moni-
toring security alarms.
– for both Nokia end users and system users (excluding omc, pm2sol, and nbi3gcpm).
For the same distinguished name, initial alarm for a simultaneous session access is raised as
a new alarm and the subsequent attempt for getting new session are sent as alarm change
notification for the existing alarm.
• can be unintentional, when user tries to open multiple session by mistake or can be intentionally
done by malicious user trying to get access when it has been configured to have only one active
session per user account at any time.
• will be raised, if the below attributes have value in Configuring user session page.
Each simultaneous session failure alarm raised contains the following alarm text:
where <login name> corresponds to the login name of the account for which the alarm has been
raised.
Note: Number of simultaneous user session failure alarm is 30010. Supplementary text of
alarm indicates the timestamp of last simultaneous session access attempted.
10 Session management
Prerequisites
• License NetAct Enhanced Session Management must be available for accessing session
management configuration. To know the license availability, see Checking session management
license.
• You must have UMGUI - Administer NetAct Sessions permission to configure session
management attributes.
This section provides information about configuration options available for the management of user
session. To configure user session configuration fields, do the following:
https://<system_FQDN>/startpage
where <system_FQDN> is the fully qualified domain name of the NetAct cluster load balancer
for WebSphere. For more information, see Launching the NetAct Start Page.
b) Type the Username and Password, and click Log In.
Note: If the terms and conditions appear, select the I have read and agree to
the above terms and conditions check box, and then click Log In. For more
information, see Modifying terms and conditions page.
4. In Session Management Configuration page, modify the required configuration and click Apply.
Note: Changes applied to user session configuration are applicable from the next login.
Existing sessions will not be impacted by the change in user session configuration.
Field Description
Field Description
Field Description
Idle session timeout period Time interval used for determining idle or inac-
tive session. User need to re-authenticate post
this interval to continue existing session.
Note:
• Users such as omc, pm2sol, nbi3gcpm, and restda are excluded from simultaneous
session configuration and can have any number of sessions. Idle session timeout is
still applicable for these users.
• User logged in through Citrix will have their own idle session timeout and this
timeout can differ from idle session timeout configured in Nokia. This can result
in authentication in NetAct and Citrix separately if idle session timeout period
is configured with lower value in Nokia compared to Citrix. To avoid multiple re-
authentication, keep the session timeout value to maximum permitted limit (1500
min) in Nokia. To configure Citrix idle session timeout, see Configuring the idle timer
interval to disconnect Citrix sessions in Administering Node Manager Server.
NetAct login page displays common error message for any kind of login failure. This is also applicable
during the login failure which happens when simultaneous sessions attempted is more than the config-
ured limit. To assist user to know about the failure due to simultaneous session access, the administra-
tor can enable custom login failure message. For more information about the configured limit for simul-
taneous session access, see Configuring user session.
To enable custom login failure message for simultaneous session access, do the following:
1. Log in to any VM where syswas service is running through SSH as the omc user.
To locate the right NetAct VM, see Locating the right virtual machine for a service in Administering
NetAct Virtual Infrastructure.
4. Change the value of entry key=showOnLoginPage in the file to ENABLE. Default value is
DISABLE.
5. Change other custom set values from backup file if taken in step 2 in /etc/opt/oss/global/
custom/conf/javaprefs/Authentication/Pref_system_login_settings.xml.
Remove the backup file after changing the custom set value.
Note: Time interval for auto invalidation of disconnected session must be selected judicious-
ly. Setting very low value can result in session to invalidate, if network latency is very high. It
is also recommended not to set to high value so that sessions are not invalidated even when
network gets disconnected for longer interval of time.
To change the time interval for auto invalidation of disconnected session, do the following:
1. Log in to any of VM where syswas service is running through SSH as the omc user.
To locate the right NetAct VM, see Locating the right virtual machine for a service in Administering
NetAct Virtual Infrastructure.
5. Change other custom set values from backup file if taken in step 2 to /etc/
opt/oss/global/custom/conf/javaprefs/sessionmanagement/
Pref_system_UM_sessionmanagement.xml. Remove the backup file after changing the
custom set value.
Note: For active sessions, the configured time interval for auto invalidation of
disconnected session is immediately applicable.
1. Log in to NetAct Start Page as user who has the Roles and permissions definition of
the License Manager application permission.
3. If the License Browser view is not opened, click Licenses → License Browser to open it.
5. Check if the license code or license name of the required license is displayed. For more
information on license operations, see About License Manager in License Manager Help.
11 Appendix
Note: In a Disaster Recovery (DR) environment, file system synchronization between two
sites can indicate as non-functional during or after the password change. This is due to si-
multaneous execution of commands in standby site involving enable or disable of root lo-
gin and file system synchronization cron job running every 15 minutes. This synchroniza-
tion will be recovered during subsequent invocation of the cron job. The execution of the
password-tool before the subsequent invocation of the cron job will fail during the DR status
check. If the file system synchronization is not functional post subsequent invocation of cron
job after a password change, contact Nokia Technical Support.
To locate the correct virtual machine, see Locating the right virtual machine for a service in Admin-
istering NetAct Virtual Infrastructure.
2. To change the password individually, execute the following command:
where:
<username> is mandatory and indicates the login name of system user whose password needs
to be changed. Login name argument is case sensitive, so enter the login name as obtained when
password-tool --list or password-tool -l is executed. Tool will be terminated if invalid
username is specified which is not supported by password-tool.
<type> is mandatory when there are users with similar user name of different type.
For example:
There is a dirsrv user and a db user with name omc. Otherwise, it is optional.
Output of command lists all users supported by the password tool in the format:
--------------------------------------------------
USER NAME TYPE RANDOM PASSWORD ALLOWED
--------------------------------------------------
<user> <type> true/false
Random password allowed (true/false) indicates whether random password is generated by tool au-
tomatically during the type way of operation. Refer, Changing password of system users of particular
type for more information.
--skip old_password or -s op is an optional argument used for skipping prompt of old password
of user. Old password is used to restore password of user upon password change failure. For
providing old password of user, see Retrieving password of system users.
Upon execution of above command, following are prompted before password change is attempted for
user:
• Type of user: This will be prompted when there are users with same username but of different
types and will not be prompted if password-tool was already invoked with --type or -t argument.
password-tool will be terminated if invalid type is provided for the user.
• Root login password: Password of root user is needed for restarting services after performing
password change if applicable. root user password will be prompted if password change is done
for any user of type os. If invalid or incorrect password is provided, tool will be terminated.
• Confirmation for service restarts: It will be prompted and asked for confirmation only when ser-
vice restarts are needed after password change of user. Tool will be terminated if options apart
from Y (case insensitive) is provided upon prompt.
• Old password: Old password is current password of user and is optional. It will be prompted on-
ly if tool was invoked without --skip old_password or -s op option. It will not be prompted for
root user irrespective of the --skip old_password option as the password will be already pro-
vided during Root login password. Tool will be terminated if old password provided is not match-
ing with password in repository.
• New password: It is mandatory and provided password will be validated against the configured
policy of relevant type. For OS users, it is recommended to check the score of the new password
prior to password change. For more information on password score, see Checking password
score for OS users.
• Confirm New password: It is mandatory and should match the password provided during prompt
of New password.
Note: New password and Confirm New password will be prompted for each user attempt-
ed. It will be re-prompted twice upon providing invalid password.
Password change is attempted for user. Progress of password change and overall summary status of
the performed operation is shown in the console.
Failure in change of password for user will result in reverting to user password. Service restart will be
done only for associated services if password was changed successfully for user. Password revert is
also attempted when service restart fails.
Note:
This section describes instructions for changing password of users of particular type. Classification
of type is done based on the type of repositories users are associated with and can have any of
dirsrv, db and os as value.
Some users under particular type are not being considered when executed under this mode. Refer,
Users unsupported in type mode of operation for list of users falling under this category.
Follow below steps for changing password of users under particular type:
To locate the correct virtual machine, refer to Locating the right virtual machine for a service in Ad-
ministering NetAct Virtual Infrastructure.
2. To change the password, execute the following command:
where:
Note:
type can also have value of all which changes the password of users across supported
types.
Upon execution of above command, following are prompted before password change is attempted for
all users under particular type:
• Root login password: Password of root user is needed for restarting services post password
change if applicable. password-tool will terminate if incorrect password is provided.
• Confirmation for service restarts: It will be prompted and asked for confirmation only if service
restarts are needed after password change of user. Tool will be terminated if options apart from Y
(case insensitive) is provided upon prompt.
• Below inputs are prompted only when tool is invoked with admin mode:
– Old password: Old password is current password of user, which is applicable only in
admin mode and is optional. It will be prompted only if tool was invoked without --skip
old_password or -s op option.
– New password: It is mandatory and provided password will be validated against the config-
ured policy of relevant type. For OS users, it is recommended to check the score of the new
password prior to password change. For more information on password score, see Checking
password score for OS users.
– Confirm New password: It is mandatory and should match the password provided during
prompt of New password.
– New password and Confirm New password will be prompted for each user at-
tempt. It will be re-prompted twice upon providing invalid password.
– Old password will be prompted if tool was invoked without --skip
old_password or -s op option. It will be re-prompted twice upon providing incor-
rect password.
• In nonAdmin mode, the password change will then be performed for all non-administrative users
within the type by generating random password meeting the configured policy of the relevant
type. In admin mode, the password change will be performed for all administrative users with the
provided new password. For all successfully changed user’s password, post password change
action are performed and service restarts are combined and done only once minimizing the
restarts that had to be done if changed individually.
• Password change of users within type will be performed and will proceed even if any of the user
password change fails. Password change for failed users will be reverted only if old password
is retrievable. Service restart will be done only for associated services of successfully changed
users.
For example: If execution involves two users (U1 & U2) and password change of U1 fails, then it’s
password will be rolled back and password change will be done for U2. If password change was
successful for U2, only service restarts applicable for U2 will be performed.
• Progress of password change and overall summary status of the performed operation is shown in
the console.
2. The current password of the user can be obtained by executing the following command in any VM
where was service is running.
where
<user_type> is mandatory field and is the type of the user found in step 1.
To locate the correct virtual machine, see Locating the right virtual machine for a service in Admin-
istering NetAct Virtual Infrastructure.
Note:
• Same login name with multiple types exists, for example, system with database and
application server type. Therefore, provide suitable type for which password needs to
be retrieved and changed.
3. If password needs to be changed for first time after installation and intended user password cannot
be obtained from previous step, contact the Nokia Support for obtaining the default password
which comes after installation.
Note: It is recommended to store the changed password in a safe and secure place after
successful password change for users whose password cannot be obtained by the above
mentioned methods.
Sample output:
[omc@vm ~] $ /opt/nokia/oss/bin/syscredacc.sh -list omc
--------------------------------------------------------
USER NAME TYPE INSTANCE
--------------------------------------------------------
omc DB OSS
omc APPSERV APPSERV
Total number of users 2
[omc@vm ~] $
Sample output:
[omc@vm ~] $ /opt/nokia/oss/bin/syscredacc.sh -list
--------------------------------------------------------------------
----
USER NAME TYPE INSTANCE
--------------------------------------------------------------------
----
admusr DS SYSAUTH
atuser APPSERV APPSERV
ejbtimerfm DB OSS
racftp RAC MEDIATION
Note: Service restarts are handled internally when password is changed through pass-
word-tool and there is no need of restarting services separately.
System users needing restart of services after password change are as given below:
DB SQM ~!%^&()-_+={}[]|:;,.<>?
SQM_CORE ~!%^&()-_+={}[]|:;,.<>?
OS Root ~!%^&()-_+={}[]|;,.<>?
cn=Manager ~!%&()-_+=]:;,.?
pm2sol ~!%^&()-_+=|:;,.<>?
vmanager ~!%^()-+={}[]|:;,.>@#%*/?
[email protected] ~!%^()-+={}[]|:;,.>@#%*/?
Character restriction for system users in data center (DC) and Virtualization infrastructure:
For information about the users, see NetAct default system users.
Password of the below listed users’ needs to be changed individually. Refer to Changing password of
system user individually for more information.
User
User Manual actions needed after password change
type
nwi3system dirsrv Needs configuration changes or re-integration of specific family of NE's. For
more information, see Changes in NE configuration post password change
in Administering Users and Permissions.
nx2suser dirsrv Needs configuration changes or re-integration of specific family of NE's. For
more information, see Changes in NE configuration post password change
in Administering Users and Permissions.
racftp dirsrv Needs configuration changes or re-integration of specific family of NE's. For
more information, see Changes in NE configuration post password change
in Administering Users and Permissions.
racftam dirsrv Needs configuration changes or re-integration of specific family of NE's. For
more information, see Changes in NE configuration post password change
in Administering Users and Permissions.
root os None
rdsftp os Password must be updated in external systems. For more information, see
Downloading result file through SFTP in RESTful Web Service Data Access
API.
cn=replication dirsrv Needs replication reinitialization. For more information, see Resolving the
manager problem in Troubleshooting NetAct Administration.
ftirpuser os None
ftirpuser2 os None
ftirpuser3 os None
• If password is changed successfully for nwi3system user, reintegrate all the NWI3 NE's by
executing the command below on nwi3 node as omc user.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
• If password is changed successfully for racftam (for FTAM protocol), racftp (for FTP protocol)
and racsftp (for SFTP protocol) user, CM XML events from BSC to NetAct for all the BSC NEs
integrated to NetAct should be configured.
To configure CM XML events, refer to Configuring CM XML events from BSC to NetAct in Integrat-
ing BSC to NetAct.
• If password is changed successfully for isdkuser, connectivity towards NetAct from network
elements that are integrated through ISDK ftpput model must be reconfigured. These network
elements use SFTP protocol to communicate with NetAct using isdkuser. Therefore after
changing the password of this user, refer to the respective network element integration document
to reconfigure the connectivity from network element towards NetAct.
2. Execute the following command and provide the new password to be checked. If the password
meets password quality settings, the password score will be displayed as output.
[omc] pwscore
<New Password>
If the score is greater than 50, OS user password is considered as strong. In case the score is less
than 50, password change might fail. To avoid password change failure, choose a strong pass-
word.
Note:
It is recommended to know the relevant nodes in advance where shell access rights need to
be effective.
Below instructions need to be executed in all VMs where immediate change in shell access is needed:
1. Log in to VM through SSH as omc where shell access need to be changed and switch to root user.
To locate the correct virtual machine, see Locating the right virtual machine for a service in Admin-
istering NetAct Virtual Infrastructure.
2. Invalidate the sssd cache by executing the below command:
[root] # /opt/cpf/bin/cpfrhds_connectivity_ldapauth_action.sh --
invalidate_cache all
3. Successful execution of the above command will invalidate the cache and will make change in
shell access to be effective immediately.
• automates all the steps required for successful synchronization of the system users password
including necessary configuration changes and restarts.
• performs a health check of the services in the standby site before the password synchronization is
attempted to avoid failures.
• checks the status of the Disaster Recovery (DR) before initiating any operation.
• must be executed explicitly to synchronize passwords when both sites are installed separately
(in OpenStack environment) or in case of troubleshooting, where passwords are out of
synchronization across sites.
During the password change, the password tool internally detects the DR environment and
synchronizes the password. If passwords are changed in the DR intact system, then do not execute
the performDRSync tool independently.
Password synchronization can be done for a specific set of users or for all users together that is
determined by the performDRSync tool internally.
Note: File system synchronization between two sites can indicate as non-functional during
or after password synchronization. This is due to simultaneous execution of commands in
standby site involving enable or disable of root login and file system synchronization cron job
running every 15 minutes. File system synchronization will be recovered during subsequent
invocation of the cron job. performing password synchronization before the subsequent
invocation of cron job will fail during DR status check. If the file system synchronization is not
functional post subsequent invocation of cron job after password synchronization, contact
Nokia Technical Support.
11.10.1 Synchronizing all system users password from active site to standby site
Perform this procedure to synchronize all system users password supported by performDRSync tool
from active site to standby site.
1. Log in as omc user to the VM hosting the dmgr service running in active site.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
• [omc@dmgrvm ~] $ performDRSync -a
Or
• Root login password of standby site: The root user password is required for performing
certain actions in the standby site. For example, restarting services after performing
password synchronization, if applicable.
• Root login password of active site: The root user password is required for executing the
command as root user in the active site and for file synchronization operations, and so on.
• Confirmation of skip password sync for password not retrievable users: A confirmation
prompt appears only if there are users for whom the password cannot be retrieved for
synchronization. At prompt, if:
• N (case insensitive) is provided, the performDRSync tool skips the DR actions for those
users.
• Y (case insensitive) is provided, the performDRSync tool prompts for the password to
execute the DR actions for those users.
• Current password of users in standby site: The current password of a system user in the
standby site is required to update configurations. To retrieve the password in the standby site,
see Retrieving password of system users. Confirmation of password is also prompted.
• Current password of user in active site: If the operator does not skip the DR actions for
users whose password is not retrievable, then the current password of that user in the active
site is required to synchronize the password. Confirmation of the password is also prompted.
Note:
• If the user provides invalid password, the user can try providing current and confirm
passwords twice. If all retries exceed, then the DR action is skipped for that user.
• Password synchronization of users will continue for other users even if password
synchronization or DR action failed for the attempted user.
• Password synchronization for OS users will fail if the password to be synchronized is
already in effect in the standby site and such failures can be ignored.
Expected outcome
The password synchronization progress and the overall performed operation summary status appears
on the console.
11.10.2 Synchronizing specific system users password from active site to standby site
Perform this procedure to synchronize specific system users password supported by
performDRSync tool from active site to standby site.
1. Log in as omc user to the VM hosting the dmgr service running in active site.
To locate the right VM, see Locating the right virtual machine for a service in Administering NetAct
Virtual Infrastructure.
Or
where:
For example:
Note: The performDRSync tool can be executed for different type of users together.
• Root login password of standby site: The root user password is required for performing
certain action in the standby site. For example, restarting services after performing
password synchronization, if applicable.
• Root login password of active site: The root user password is required for executing the
command as root user in the active site and file synchronization operations, and so on.
• Confirmation of skip password sync for password not retrievable users: A confirmation
prompt appears only if there are users for whom the password cannot be retrieved for
synchronization. At prompt, if:
• N (case insensitive) is provided, the performDRSync tool skips the DR actions for those
users.
• Y (case insensitive) is provided, the performDRSync tool prompts for the password to
execute the DR actions for those users.
• Current password of users in standby site: The current password of the system user in the
standby site is required to update configurations. To retrieve password in the standby site, see
Retrieving password of system users. Confirmation of password is also prompted.
• Current password of user in active site: If the operator does not skip DR actions for users
whose password is not retrievable, then the current password of that user in the active site is
required to synchronize the password. Confirmation of password is also prompted.
Note:
• If the user provides invalid password, the user can try providing current and confirm
passwords twice. If all retries exceed, then the DR action is skipped for that user.
Expected outcome
The password synchronization progress and the overall performed operation summary status appears
on the console.