14.1 Security Features

The following table contains the security features of Novell Remote Manager on OES Linux.

Table 14-1 Security Features of Novell Remote Manager on OES Linux




Users are authenticated


Users must log in to Novell Remote Manager.

Log in as user root, a local Linux user, or as a Novell eDirectory user that is Linux User Management enabled.

The root user is authenticated locally, not through eDirectory. This allows the root user to manage server resources even if the eDirectory services are not available.

For more information, see Accessing Novell Remote Manager and Changing the Configuration.

Limited root user privileges for the Admin user


User root can restrict all users from logging in, so the Admin user or Admin-equivalent user is not granted unlimited root privileges for security reasons. If the server is LUM enabled, the Admin user and users with rights equivalent to the Admin user have the limited root user privileges that are needed to modify only the configuration files necessary for configuring NRM or any other files that NRM has been assigned rights to allow modifying . The user Admin or equivalent user has access according to the Linux and LUM file rights to all other files.

The Admin user or equivalent user needs root privileges to modify the following files in order to configure and manage NRM. The privileges are temporary and only for the task to be performed.

  • /etc/opt/novell/httpstkd.conf
  • /etc/pam.d/httpstkd

The following file names are the names that are used as the description for a specified task:

/etc/cron.d/[task file name]

The following files may be the actual file or a symbolic link to the YAST or eDirectory certificates:

  • /etc/opt/novell/httpstkd/server.pem
  • /etc/opt/novell/httpstkd/server.key

The following files are already modifiable by the Admin user:

  • The first category has names that are whatever the user names the group that they create.
  • /opt/novell/nrm/NRMGroups/[nrm group names]
  • /etc/opt/novell/nrmhconfig.conf
  • /etc/opt/novell/nrmsvchlthcfg.conf

Servers, devices, and services are authenticated


When gathering information with group operations, Novell Remote Manager authenticates to other servers.

Access to information is controlled


Access to information is restricted to valid users who have rights to access the server through eDirectory or access rights to the local file system.

The port for accessing the login dialog box must be open through a firewall if you want the server to be accessible outside the firewall. You can restrict access to specific workstations or a range of IP addresses.

For more information, see Accessing Novell Remote Manager and Changing the Configuration.

Roles are used to control access


Novell Remote Manager does not have role-based management.

Logging and security auditing is done



Data on the wire are encrypted by default


The following data are encrypted on the wire:

  • Administration via browser UI

  • When logging in the administration is switching to the HTTPS protocol.

Data is stored encrypted


Passwords, keys, and any other authentication materials are stored encrypted


Security is on by default