HOST Class

Each record in the HOST class defines the access that a host has to the local computer connected by IPv4.
capamsc141
Each record in the HOST class defines the access that a host has to the local computer connected by IPv4.
Note:
 
Privileged Access Manager
access rules for IP communication apply only to IPv4. They not control access by IPv6.
Privileged Access Manager
 resolves the addresses of host names that you add to the HOST class. This means that the names mustmust appear in the operating system hosts file, or must be defined to NIS or DNS.
For each HOST record, the INETACL property defines the services the local host can provide to that host.
Privileged Access Manager
 permits aliases for a host name, but records that represent aliases are not used for authorization checks. You must know the canonical name of a host for 
Privileged Access Manager
to protect the connection with that host.
Privileged Access Manager
 resolves a hostname by one IP address. If multiple IP addresses are configured for one hostname, then use one of the following classes:
  • GHOST
  • HOSTNET
  • HOSTNP
The key of the HOST class record is the name of the host.
The following definitions describe the properties contained in this class record. Most properties are modifiable and can be manipulated using selang or the administration interfaces. Nonmodifiable properties are marked
informational
.
  • COMMENT
    Defines additional information that you want to include in the record.
    Privileged Access Manager
    does not use this information for authorization.
    Limit:
    255 characters.
  • CREATE_TIME
    (Informational) Displays the date and time when the record was created.
  • DAYTIME
    Defines the day and time restrictions that govern when an accessor can access a resource.
    Use the restrictions parameter with the chres, ch[x]usr, or ch[x]grp commands to modify this property.
    The resolution of daytime restrictions is one minute.
  • GROUPS
    The list of GHOST or CONTAINER records a resource record belongs to.
    To modify this property in a HOST class record, change the MEMBERS property in the appropriate CONTAINER or GHOST record.
    Use the mem+ or mem- parameter with the chres, editres or newres command to modify this property.
  • INETACL
    Defines the services the local host is allowed to provide to the group of client hosts and what their access types are. Each element in the access control list contains the following information:
    • Services reference
      A reference to a service (a port number or name). To specify all the services, enter an asterisk (*) as the services reference.
      Privileged Access Manager
       supports dynamic port names as specified in the /etc/rpc file (for UNIX) or \etc\rpc file (for Windows).
    • Access
      Defines the access authority that the accessor has to the resource.
    Use the access(
    type
    -
    of
    -
    access
    ), service, and stationName parameters with the authorize[-] commandto modify accessors and their access types in the INETACL property.
  • INSERVRNGE
    Specifies the range of services that the local host provides to the group of client hosts.
    Performs a similar function to the INETACL property.
    Use the service(
    serviceRange
    ) parameter with the authorize[-] commandto modify accessors and their access types in the INSERVRANGE property.
  • OWNER
    Defines the user or group that owns the record.
  • RAUDIT
    Defines the types of access events that 
    Privileged Access Manager
    records in the audit log. RAUDIT derives its name from
    R
    esource
    AUDIT
    . Valid values are:
    • all
      All access requests.
    • success
      Granted access requests.
    • failure
      Denied access requests (default).
    • none
      No access requests.
    Privileged Access Manager
     records events on each attempted access to a resource, and does not record whether the access rules were applied directly to the resource, or were applied to a group or class that had the resource as a member.
    Use the audit parameter of the chres and chfile commands to modify the audit mode.
  • UPDATE_TIME
    (Informational) Displays the date and time when the record was last modified.
  • UPDATE_WHO
    (Informational) Displays the administrator who performed the update.
  • WARNING
    Specifies whether Warning mode is enabled. When Warning mode is enabled on a resource, all access requests to the resource are granted, and if an access request violates an access rule, a record is written to the audit log.
Example: 
Prevent incoming connections to 
Privileged Access Manager
 endpoint from a restricted remote host using Telnet.
Step 1: 
Add a remote host (My_Remote_Host.example.com) in /etc/hosts. Run the following command at the command prompt.
vi /etc/hosts
Step 2:
For network interception, the lookahead database "ladb" must be properly entered with the remote host address. To ensure this works, run the following command at the command prompt.
./sebuildla -h
Step 3:
Run the following command at the command prompt to verify that the remote host (My_Remote_Host.example.com) is added to /etc/hosts.
./sebuildla -H
Step 4:
Define a remote host (My_Remote_Host.example.com) from which we prevent incoming Telnet connections.
Step 5:
Set a rule that prevents incoming connections from the remote host (My_Remote_Host.example.com) using Telnet.
PAMSC> authorize HOST My_Remote_Host.example.com service(telnet) access(none)
Step 6:
Try connecting from the remote host to the
Privileged Access Manager
endpoint using Telnet. The connection fails but other connections are not affected.
To deny any type of connection from a remote host ((My_Remote_Host.example.com), set the following rule.
PAMSC> authorize HOST My_Remote_Host.example.com service(*) access(none)