How SnapManager maintains security
You can perform SnapManager operations only if you have the appropriate credentials. Security in SnapManager is governed by user authentication.
SnapManager maintains security by requesting user authentication through password prompts or by setting user credentials. An effective user is authenticated and authorized with the SnapManager server.
SnapManager credentials and user authentication differ significantly from SnapManager 3.0:
-
In SnapManager versions earlier than 3.0, you would set an arbitrary server password when you install SnapManager. Anyone who wants to use the SnapManager server would need the SnapManager server password. The SnapManager server password would need to be added to the user credentials by using the
smsap credential set -host
command. -
In SnapManager (3.0 and later), the SnapManager server password has been replaced by individual user operating system (OS) authentication. If you are not running the client from the same server as the host, the SnapManager server performs the authentication by using your OS user names and passwords. If you do not want to be prompted for your OS passwords, you can save the data to your SnapManager user credentials cache by using the
smsap credential set -host
command.The smsap credential set -host
command remembers your credentials when thehost.credentials.persist
property in thesmsap.config
file is set to true.
Example
User1 and User2 share a profile called Prof2. User2 cannot perform a backup of Database1 in Host1 without permission to access Host1. User1 cannot clone a database to Host3 without permission to access Host3.
The following table describes different permissions assigned to the users:
Permission type | User1 | User2 |
---|---|---|
Host Password |
Host1, Host2 |
Host2, Host3 |
Repository Password |
Repo1 |
Repo1 |
Profile Password |
Prof1, Prof2 |
Prof2 |
In the case where User1 and User2 do not have any shared profiles, assume User1 has permissions for the hosts named Host1 and Host2, and User2 has permissions for the host named Host2. User2 cannot run even the nonprofile commands such as dump
and system verify
on Host1.