Oracle® Label Security Administrator's Guide 10g Release 1 (10.1) Part Number B10774-01 |
|
|
View PDF |
When Oracle Label Security is used with Oracle Internet Directory, security administrators must use certain commands to create and alter label security attributes stored in the directory.
This Appendix describes these commands and the parameters they require. They perform updates, inserts and deletes of entries in the directory and are implemented through a script named "olsadmintool", which you invoke from $ORACLE_HOME/bin/olsadmintool. This Appendix contains the sections and tables listed below.
Command Category | Purpose of Command | Command | Replaces PL/SQL Statement |
---|---|---|---|
Policies |
olsadmintool createpolicy |
SA_SYSDBA.CREATE_POLICY | |
olsadmintool alterpolicy |
SA_SYSDBA.ALTER_POLICY | ||
olsadmintool droppolicy |
SA_SYSDBA.DROP_POLICY | ||
olsadmintool addpolcreator |
None; new | ||
olsadmintool droppolcreator |
None; new | ||
Levels in a Policy |
olsadmintool createlevel |
SA_COMPONENTS.CREATE_LEVEL | |
olsadmintool alterlevel |
SA_COMPONENTS.ALTER_LEVEL | ||
olsadmintool droplevel |
SA_COMPONENTS.DROP_LEVEL | ||
Groups in a Policy |
olsadmintool creategroup |
SA_COMPONENTS.CREATE_GROUP | |
olsadmintool altergroup |
SA_COMPONENTS.ALTER_GROUP | ||
(also a group parent) |
SA_COMPONENTS.ALTER_GROUP_PARENT | ||
olsadmintool dropgroup |
SA_COMPONENTS.DROP_GROUP | ||
Compartments in a Policy |
olsadmintool createcompartment |
SA_COMPONENTS.CREATE_COMPARTMENT | |
olsadmintool altercompartment |
SA_COMPONENTS.ALTER_COMPARTMENT | ||
olsadmintool dropcompartment |
SA_COMPONENTS.DROP_COMPARTMENT | ||
Data Labels |
olsadmintool createlabel |
SA_LABEL_ADMIN.CREATE_LABEL | |
olsadmintool alterlabel |
SA_LABEL_ADMIN.ALTER_LABEL | ||
olsadmintool droplabel |
SA_LABEL_ADMIN.DROP_LABEL | ||
Users |
olsadmintool adduser |
None; new | |
olsadmintool dropuser |
SA_USER_ADMIN.DROP_USER_ACCESS | ||
Profiles |
olsadmintool createprofile |
Replaces the use of several methods. Foot 1 | |
olsadmintool listprofile |
None; new | ||
olsadmintool describeprofile |
None; new | ||
olsadmintool dropprofile |
None; new | ||
Policy Administrators |
olsadmintool addadmin |
None; new. | |
olsadmintool dropadmin |
None; new. | ||
Policy Access |
olsadmintool addpolaccess |
None; new. | |
olsadmintool droppolaccess |
None; new. | ||
Auditing |
olsadmintool audit |
SA_AUDIT_ADMIN.AUDIT | |
olsadmintool noaudit |
SA_AUDIT_ADMIN.NOAUDIT | ||
Help |
Get Help for olsadmintool |
olsadmintool command --help |
None; new |
1 Replaces several methods in SA_USER_ADMIN: SET_LEVELS, SET_USER_PRIVILEGES, and SET_DEFAULT_LABEL |
In the command explanations that follow, some parameters are optional, which is indicated by enclosing such a parameter within square brackets. The two most common examples are [ -b <admin context> ] and [-p <port>], indicating that it is optional to specify either the administrative context for the command or the port through which to connect to Oracle Internet Directory. (Default port is 389.)
The use of two dashes (--, no space) is required for all parameters other than b, h, p, D, and w, which are preceded by a single dash. The double dash indicates the need to specify the full or long version of the name or parameter being used.
Each command appears in this listing on multiple lines for readability, but in reality would be issued as a single long string on the command line.
olsadmintool adduser --polname <policy name> --profname <profilename> --userdn <enterprise user DN> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
adduser
commandUse the adduser command to add an enterprise user to a profile within a policy. Provide the profile and policy names and the user DN.Foot 1
olsadmintool adduser --polname tradesecret --profname topsales --userdn 'cn=perot' -b 'cn=EDS' -h ford -p 1890 -D cn=lbacsys -w lbacsyspwrd
See Also:
Please refer to the Oracle Advanced Security Administrator's Guide, Chapter 13, Administering Enterprise User Security, for further concepts, tools, steps, and procedures. |
olsadmintool addadmin --polname <policy name> --admindn <admin DN> [ -b <admin context>] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the addadmin command to add an enterprise user to the administrative group for a policy, so that s/he is able to create, modify or delete the specified policy's metadata. Provide the policy name and the new administrator's DN. Command Footnote
olsadmintool addadmin --polname defense --admindn 'cn=scott,c=us' -h yippee -D cn=lbacsys -w lbacsys
olsadmintool addpolcreator --userdn <user DN> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the addpolcreator command to enable the specified user to create policies. Provide the DN for the user. Command Footnote
olsadmintool addpolcreator --userdn 'cn=scott' -h yippee -D cn=lbacsys -w lbacsys
olsadmintool altercompartment --polname <policy name> --shortname <short compartment name> --longname <new long compartment name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the altercompartment command to change the long name of a compartment. Provide the name of the policy, the short name of the compartment, and the new long name of the compartment. Command Footnote
olsadmintool altercompartment --polname defense --shortname A --longname 'Allied Forces' -h yippee -D cn=defense_admin -w welcome1
olsadmintool altergroup --polname <policy name> --shortname <short group name> --longname <new long group name> [--parentname <new short group name> ] [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the altergroup command to change the long name for a group component or parent group. Provide the name of the policy, the short name of the group, the long name of the group, and optionally the short name for the parent group. Command Footnote
olsadmintool altergroup --polname defense --shortname US --longname 'United States of America' --parentname 'Earth' -h yippee -D cn=defense_admin -w welcome1
olsadmintool alterlabel --polname <policy name> --tag <tag number> --value <new label value> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the alterlabel command to change the character string defining the label associated with a label tag. Provide the policy name, the numeric tag of the label, and the new character string representing the label. Command Footnote
olsadmintool alterlabel --polname defense --tag 100 --value 'TS:A:US' -h yippee -D cn=defense_admin -w welcome1
olsadmintool alterlevel --polname <policy name> --shortname <short level name> --longname <new long level name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the alterlevel command to change the long name of a level. Provide the name of the policy, the short name of the level, and the new long name of the level. Command Footnote
olsadmintool alterlevel --polname defense --shortname TS --longname 'VERY TOP SECRET' -h yippee -D cn=defense_admin -w welcome1
olsadmintool alterpolicy --name <policy name> --options <new options> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the alterpolicy
command to alter the options of a policy. Provide the name of the policy and the new options. Command Footnote
olsadmintool alterpolicy --name defense --options 'READ_CONTROL,INSERT_CONTROL' -h yippee -D cn=defense_admin -w welcome1
olsadmintool noaudit --polname <policy name> --options <audit option name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the noaudit command to cancel the audit options for a policy. Provide the policy name and the options that are no longer to be audited. Command Footnote
olsadmintool noaudit --polname defense --options 'APPLY,PRIVILEGES' -h yippee -D cn=defense_admin -w welcome1
olsadmintool createcompartment --polname <policy name> --tag <tag number> --shortname <short compartment name> --longname <long compartment name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the createcompartment command to create a new compartment component. Provide the name of the policy, the tag numeric value of the compartment, the short name of the compartment, and the long name of the compartment. Command Footnote
olsadmintool createcompartment --polname defense --tag 100 --shortname A --longname Alpha -h yippee -D cn=defense_admin -w welcome1
olsadmintool creategroup --polname <policy name> --tag <tag number> --shortname <short group name> --longname <long group name> [--parentname <parent group name>] [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the creategroup command to create a new group component. Provide the name of the policy, the tag numeric value of the group, the short name of the group, the long name of the group, and the parent group name (optional). Command Footnote
olsadmintool creategroup --polname defense --tag 55 --shortname US --longname 'United States' -h yippee -D cn=defense_admin -w welcome1
olsadmintool createlabel --polname <policy name> --tag <tag number> --value <label value> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the createlabel command to create a valid data label. Provide the policy name, the numeric tag of the label to be created, and the character string representation of the label.Command Footnote
olsadmintool createlabel --polname defense --tag 100 --value 'TS:A,B:US,CA' -h yippee -D cn=defense_admin -w welcome1
olsadmintool createlevel --polname <policy name> --tag <tag number> --shortname <short level name> --longname <long level name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the createlevel command to create a new level component. Provide the name of the policy, the tag numeric value, the short name of the level, and the long name of the level. Command Footnote
olsadmintool createlevel --polname defense --tag 100 --shortname TS --longname 'TOP SECRET' -h yippee -D cn=defense_admin -w welcome1
olsadmintool createprofile --polname <policy name> --profname <profile name> --maxreadlabel <max read label> --maxwritelabel <max write label> --minwritelabel <min write label> --defreadlabel <default read label> --defrowlabel <default row label> --privileges <privileges separated by comma> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the createprofile command to create a new profile. Provide the policy name, the profile name, and either privileges, labels, or both privileges and labels. (A user profile can have either null label information or null privilege information, but not both null at the same time.) For labels, specify the maximum label users in this profile can use to read data, the maximum label users in this profile can use to write data, the minimum label users in this profile can use to write data, the default label for reading, the default row label for writing. For privileges, enclose in quotes the list of privileges, separated by commas, for members of this profile. Command Footnote
olsadmintool createprofile --polname topsecret --profname topsales --maxreadlabel 'TS:A,B:US,CA' --maxwritelabel 'TS:A,B:US,CA' --minwritelabel 'C:A,B:US,CA' --defreadlabel 'TS:A,B:US,CA' --defrowlabel 'C:A,B:US,CA' --privileges 'READ,COMPACCESS,WRITEACROSS' -b EDS -h ford -p 1890 -D cn=lbacsys -w lbacsyspwrd
olsadmintool createpolicy --name <policy name> --colname <column name> --options <options separated by commas> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the createpolicy command to create a policy. Provide the name of the policy, the name of its label column, and the options. Command Footnote
olsadmintool createpolicy --name defense --colname defense_col --options 'READ_ CONTROL,UPDATE_CONTROL' -h yippee -p 389 -D cn=defense_admin -w welcome1
olsadmintool describeprofile --polname <policy name> --profname <profile name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
describeprofile
commandUse the describeprofile command to see the contents of the specified profile in the specified policy. Provide the policy name and the name of the profile. Command Footnote
describeprofile
commandolsadmintool describeprofile --polname defense --profname contractors -h yippee -D cn=defense_admin -w welcome1
olsadmintool dropcompartment --polname <policy name> --shortname <short compartment name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
dropcompartment
commandUse the dropcompartment command to remove a compartment component. Provide the name of the policy and the short name of the compartment. Command Footnote
dropcompartment
commandolsadmintool dropcompartment --polname defense --shortname A -h yippee -D cn=defense_admin -w welcome1
olsadmintool dropgroup --polname <policy name> --shortname <short group name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
dropgroup
commandUse the dropgroup command to remove a group component. Provide the policy name and the short group name. Command Footnote
dropgroup
commandolsadmintool dropgroup --polname defense --shortname US -h yippee -D cn=defense_admin -w welcome1
olsadmintool droplabel --polname <policy name> --value <label value> -h yippee [-p <port>] -D <bind DN> -w <bind password>
droplabel
commandUse the droplabel command to drop a label from the policy. Provide the policy name and the string representation of the label. Command Footnote
droplabel
commandolsadmintool droplabel --polname defense --value 'TS:A:US' h yippee -D cn=defense_admin -w welcome1
olsadmintool droplevel --polname <policy name> --shortname <short level name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
droplevel
commandUse the droplevel command to remove a level component from a specified policy. Provide the name of the policy and the short name of the level. Command Footnote
droplevel
commandolsadmintool droplevel --polname defense --shortname TS -h yippee -D cn=defense_admin -w welcome1
olsadmintool droppolicy --name <policy name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
droppolicy
commandUse the droppolicy command to drop a policy. Provide the name of the policy to be dropped.Command Footnote For directory-enabled installations of Oracle Label Security, see also Subscribing Policies in Directory-Enabled Label Security in Chapter 9, "Applying Policies to Tables and Schemas".
droppolicy
commandolsadmintool droppolicy --name defense -h yippee -D cn=defense_admin -w welcome1
olsadmintool dropprofile --polname <policy name> --profname <profile name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
dropprofile
commandUse the dropprofile command to remove the specified profile. Provide the policy name and the name of the profile to be dropped.Command Footnote
Note: Dropping a profile removes the authorization on that policy for all the users in the dropped profile. They will be unable to see data protected by that policy. |
dropprofile
commandolsadmintool dropprofile --name defense --profname employees -h yippee -D cn=defense_admin -w welcome1
olsadmintool dropuser --polname <policy name> --profname <profilename> --userdn <enterprise user DN> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the dropuser command to drop a user from the specified profile in the specified policy. Provide the policy name, the name of the profile, and the DN of the user. Command Footnote
dropuser
commandolsadmintool dropuser --polname defense --profname contractors --userdn 'cn=hanssen,c=us' -h yippee -D cn=defense_admin -w welcome1
olsadmintool dropadmin --polname <policy name> --admindn <admin DN> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
dropadmin
commandUse the dropadmin command to remove an enterprise user from the administrative group of a policy, so that s/he is no longer able to create, modify or delete the specified policy's metadata. Provide the policy name and the DN of the administrator to be removed from the administrative group. Command Footnote
dropadmin
commandolsadmintool dropadmin --polname defense --admindn 'cn=scott,c=us' -h yippee -D cn=lbacsys -w lbacsys
olsadmintool droppolcreator --userdn <user DN> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
droppolcreator
commandUse the droppolcreator command to cancel the ability of the specified user to create policies. Provide the user's DN. Command Footnote
droppolcreator
commandolsadmintool droppolcreator --userdn 'cn-scott,c=us' -b UA -h yippee -p 1890 -D <bind DN> -w <bind password>
olsadmintool <command name> --help
olsadmintool listprofile --polname <policy name> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the listprofile command to see a list of all profiles in a given policy. Provide the policy name. Command Footnote
olsadmintool listprofile --polname defense -b CIA -h yippee -D cn=defense_admin -w welcome1
olsadmintool audit --polname <policy name> --options <audit option name> --type <audit option type> --success <audit success type> [ -b <admin context> ] -h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Use the audit command to set the audit options for a policy. Provide the policy name, the options to be audited, the type of audit and the type of success to be audited. Command Footnote
olsadmintool audit --polname defense --options 'APPLY,PRIVILEGE' --type session --success success -h yippee -D cn=defense_admin -w welcome1
All olsadmintool commands must specify connection parameters: the OID host, the bind DN, the bind password and optionally the port through which the connection to Oracle Internet Directory is to be made. (The default port is 389.)
All olsadmintool commands may specify, as needed, the subscriber/administrative-context using the -b flag.
The fact that specifying a parameter is optional, such as a port or an administrative context, is shown by enclosing the parameter within square brackets. The two most common examples are [ -b <admin context> ] and [-p <port>].
Since every command must specify a host, bind DN, and password, and may if needed also specify an administrative context, Table B-3 uses the abbreviation CON to represent all of these connection parameters as a group:
[ -b <admin context> ] h <OID host> [-p <port>] -D <bind DN> -w <bind password>
Table B-3 summarizes the commands in the following categories:
In Table B-3 and Table B-4, the column headings show only the parameters, not the keywords that must precede them. For example, Table B-3 shows "policyname" and "column-name" as parameters for the createpolicy
command, without showing the keywords that must precede them (--name and --colname). These keywords are shown as required in each of the command descriptions, such as at Create Policy.
Table B-5 explains the individual parameters that are used as column headings in the summaries of Table B-3 and Table B-4.
In all these tables, X means required, and O means unused or omitted.
1 In createprofile, specifying both privileges and labels is not required: a profile can specify labels, privileges, or both. |
The 12 subsections that follow illustrate using the olsadmintool commands in typical tasks needed to set up Oracle Label Security in an Oracle Internet Directory environment. Each command appears in this listing on multiple lines for readability, but in reality would be issued as a single long string on the command line. The summarized results of executing all these commands appear in Results of These Examples, which follows the last example.
ORACLE_HOME/bin/olsadmintool addpolcreator --userdn 'cn=snamudur,c=us' -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=lbacsys,c=us' -w lbacsys
ORACLE_HOME/bin/olsadmintool createpolicy --name Policy1 --colname pol1 --options READ_CONTROL,WRITE_CONTROL -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=snamudur,c=us' -w snamudur ORACLE_HOME/bin/olsadmintool createpolicy --name Policy2 --colname pol2 --options READ_CONTROL -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=lbacsys,c=us' -w lbacsys
ORACLE_HOME/bin/olsadmintool addadmin --polname Policy1 --admindn 'cn=shwong,c=us' -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=snamudur,c=us' -w snamudur ORACLE_HOME/bin/olsadmintool addadmin --polname Policy2 --admindn 'cn=shwong,c=us' -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=lbacsys,c=us' -w lbacsys
ORACLE_HOME/bin/olsadmintool createlevel --polname Policy1 --tag 100 --shortname TS --longname "TOP SECRET" -b 'ou=Americas,o=Oracle, c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong ORACLE_HOME/bin/olsadmintool createlevel --polname Policy1 --tag 99 --shortname S --longname SECRET -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong ORACLE_HOME/bin/olsadmintool createlevel --polname Policy1 --tag 98 --shortname U --longname UNCLASSIFIED -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
ORACLE_HOME/bin/olsadmintool createcompartment --polname Policy1 --tag 100 --shortname A --longname ALPHA -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 D 'cn=shwong,c=us' -w shwong ORACLE_HOME/bin/olsadmintool createcompartment --polname Policy1 --tag 99 --shortname B --longname BETA -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
ORACLE_HOME/bin/olsadmintool creategroup --polname Policy1 --tag 100 --shortname G1 --longname GROUP1 -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong ORACLE_HOME/bin/olsadmintool creategroup --polname Policy1 --tag 99 --shortname G2 --longname GROUP2 -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong ORACLE_HOME/bin/olsadmintool creategroup --polname Policy1 --tag 98 --shortname G3 --longname GROUP3 -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
ORACLE_HOME/bin/olsadmintool createlabel --polname Policy1 --tag 100 --value TS:A:G1 -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong ORACLE_HOME/bin/olsadmintool createlabel --polname Policy1 --tag 101 --value TS:A,B:G2 -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
ORACLE_HOME/bin/olsadmintool createprofile --polname Policy1 --profname Profile1 --maxreadlabel TS:A:G1 --maxwritelabel TS:A:G1 --minwritelabel U:: --defreadlabel U:A:G1 --defrowlabel U:A:G1 --privileges WRITEUP,READ -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
ORACLE_HOME/bin/olsadmintool adduser --polname Policy1 --profname Profile1 --userdn cn=nina,ou=Asia,o=microsoft,l=seattle,st=WA,c=US -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
ORACLE_HOME/bin/olsadmintool adduser --polname Policy1 --profname Profile1 --userdn cn=daniel,ou=France,o=oracle,l=madison,st=WI,c=US -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
ORACLE_HOME/bin/olsadmintool audit --polname Policy1 --option 'SET,APPLY' --type SESSION --success BOTH -b 'ou=Americas,o=Oracle,c=US' -h yippee -p 389 -D 'cn=shwong,c=us' -w shwong
As a result of running the 12 sets of olsadmintool commands above, this sample Oracle Label Security site has the following structure:
Label Component | Tag | Short Name | Long Name |
---|---|---|---|
Level |
100 |
TS |
TOP SECRET |
99 |
S |
SECRET | |
98 |
U |
UNCLASSIFIED | |
Compartment |
100 |
A |
ALPHA |
99 |
B |
BETA | |
Group |
100 |
G1 |
GROUP1 |
99 |
G2 |
GROUP2 | |
98 |
G3 |
GROUP3 |
1 Command Footnote
Every command must include the directory hostname, the bind DN, and the bind password. Any command may, as needed, also supply the subscriber admin- istrative context (optional), the directory port number (also optional), or both. See also Table B-3, "Summary: olsadmintool Command Parameters" for additional details on these parameters.