Session Manager 6.2: accounts now ASG secured, root access request procedures


Doc ID    SOLN230521
Version:    6.0
Status:    Published
Published date:    25 Feb 2019
Created Date:    10 Jun 2013
Author:   
gtefft
 

Details

Avaya Aura® Session Manager: Releases 6.2 (GA, SP1, SP2, and SP3), 6.3 (6.2FP1) and later

Avaya Aura® Session Manager Virtualization Enablement: Release 6.2 (SP4)

Problem Clarification

Session Manager Release 6.2 implemented the Access Security Gateway (ASG) Challenge/Response mechanism for Avaya Services based logins. The craft and sroot logins are Avaya Services secure logins only, and in some cases customer may have had access to the sroot or craft accounts due to default passwords. These accounts were never intended to be used by non-Avaya services personnel.

Cause

Design intent

Solution

Session Manager 6.2SP3 has made numerous helpful commands accessible from the customer login. Additional enhancements continue to be put into the product to ensure the customer login account has adequate diagnostic level command access for both customer and business partner diagnostic purposes.

If by use of the various aliased commands for the customer login account, there are commands that require super user privileges but are not possible with the customer account, a GRIP Enhancement request should be opened up by the Avaya account team against Session Manager to get the additional capabilities added to the product. In a few exceptional cases, where root access by the customer/business partner is required, root access can be requested by the Avaya account team.

A list of aliased commands can be found by running the “alias” command from the Linux command line shell, while logged in as the customer user account.

 

 

Attachment Description

Avaya PSN 003925u

Attachment File

100169866.pdf
0Bytes • < 1 minute @ 56k, < 1 minute @ broadband


Additional Relevant Phrases

Additional Relevant Phrasesw

Avaya -- Proprietary. Use pursuant to the terms of your signed agreement or Avaya policy