UAuditHost
Product overview
The O&M audit system is also an O&M audit bastion host, which is used to control and audit the operation authority of O&M personnel. The role of bastion host is mainly reflected in the following aspects:
- Eliminate abuse of permissions
- Violations were found
- Reduce human safety risks
- Reduce work complexity Bastion host integrates O&M management and security, cuts off direct access to network and server resources, and uses protocol proxies to take over access to networks and servers. Figuratively speaking, the access of personnel to the cloud host needs to be translated by the bastion host.
Explanation of terms
Number of assets (or resources)
The sum of the number of hosts, network devices, and application publishers managed in the bastion host.
Number of users
The sum of the number of employees in the company using bastion host. The number of concurrent connections to the resource Refers to the number of resource sessions (including hosts, network devices, and application publishers) that log in at the same time.
App publisher
By deploying client software and browsers such as plsql
on a Windows Server system that supports Remote Desktop (RDP). Enable users to remotely access client applications and web applications, fill in application usernames and passwords, and record audit user operations through video. (For more information about deploying the application publisher, please refer to the application publisher manual).
Automatic login
Automatic login: If you have entered the resource account name password, you do not need to enter the resource account name password to log in. Log in manually Manual login means that you also need to enter the account name and password of the resource to log in.
Privilege Escalation Login
Privilege login means that there is a privileged account on the resource, and you can switch to the normal account to log in.
Usage scenarios
Shared accounts are difficult to control
The company has a large number of employees, many departments, and a large number of hosts, and business handover, personnel replacement departments, and personnel resignations between different departments of the company also occur from time to time, which all lead to scattered operation authority and difficult to manage. Once there is a problem with the use of shared accounts, it is difficult to hold specific individuals accountable afterwards. Account (account management) can provide employee account + host account management function, easy to divide departments, groups, permission assignment, change and cancellation is easily completed!
Device passwords are difficult to manage
According to their own habits, company employees use various protocols such as SSH, VNCC, Telnet
, etc., and it is difficult for administrators to set up unified authentication and locate problems. After security vulnerabilities occur in various O&M tools such as SecureCRT
and Xshell
, it is difficult to ensure that everyone completes the upgrade defense in a timely manner. Authentication (Authentication Management) uses the flagship version of bastion host as a secure unified authentication portal for centralized management, so that employees can still maintain their own operating habits, apply various common protocols, and use original O&M tools.
The operation behavior is difficult to restrict
The company’s outsourced personnel need to open a series of permissions for the convenience of work, but the open permissions cannot achieve restrictions and supervision. UHAS’s Authorization assigns sufficient operation and maintenance permissions to outsourced personnel, and the company assigns administrators and auditors to supervise and audit the permissions of outsourced developers and conduct audits for easy management!
The operation process is not transparent
The operation process of the company’s important business systems and the outsourcing team hired are not transparent, and high-risk operations cannot be supervised for enterprises, and once the system is deleted or a backdoor is installed, it will deal a fatal blow to the enterprise; For O&M personnel, security incidents cannot prove their innocence and cannot locate the source. Audit administrators can monitor and suspend the operations of O&M personnel in real time, and can audit all operations that have passed through the bastion host, and the audit records cannot be tampered with.
Ultimate product features
Deployment method
Physical bypass and logical serial mode do not affect normal service traffic
HA dual machine hot standby
It supports horizontally scalable cluster architecture design and deployment, and supports cross-region, cross-data center, and multi-level deployment
NAT address mapping deployment is supported to access the bastion host through the mapped IP address
Resource management
Support SSH, RDP, VNC, Telnet, FTP, SFTP and other protocols
Support FTP protocol, and can use commonly used FTP tools such as FlashFXP and FileZilla
Support SFTP protocol, and can use WinSCP, FlashFXP, xftp and other common tools
Supports batch import, export, delete, and join resource groups on hosts (including hosts, applications, application servers, and resource accounts) and accounts
Supports batch addition of cloud host resources, including Alibaba Cloud, Baidu Cloud, HUAWEI CLOUD, Tencent Cloud, and SCloud Cloud Platform
Extended support for applications/clients such as MySQL, SQL Server, Oracle, IE, Firefox, Chrome, VNC Client, SecBrowser, VSphere Client
types, etc. can be implemented through application publishing
Different resources can use the same IP address or domain name
Support for built-in common system types, including Linux, Windows, H3C, Huawei, Cisco
Each user can tag each resource and add and delete tags in batches
Support TELNET
and SSH
protocol resources to automatically switch to root (or enable) accounts using ordinary accounts
Support SSH, RDP
protocol file management and control functions
Support RDP
clipboard control function of RDP
protocol
Support resource account settings for automatic login (including elevated login) and manual login, among which manual login mode is divided into full manual (manually enter account and password) and semi-automatic mode (manual password entry)
Without installing any client, you can log in to the bastion host and access management resources with Windows, Linux, MAC OS and other operating systems Support IE, Edge, Chrome, FireFox, Safari and other mainstream browsers
Support Xshell
, putty
, MAC terminal
and other clients and Remote Broswer (HTML5
) to access target resources, support two-person authorization and multi-factor authentication, O&M resources can be displayed in pages, and can be searched according to name, IP, tags and other conditions
Supports simultaneous access to multiple devices through bastion host
Bastion host supports executing the same command on multiple VMs/servers at the same time
Provides file storage in the form of cloud disks, supports file upload and download of RDP, SSH, and VNC protocol hosts, and conducts audits
Resource O&M
Supports batch login of SSH, RDP, TELNET, AND VNC protocol resources
SSH clients, FTP clients, and SFTP clients can access target resources
Support for accessing target support through web pages, including SSH, RDP, TELNET, VNC, and application publishing resources
SSH key login is supported
Multiple SSH and TELNET protocol resources can be used to execute operation instructions in batches
Supports exporting O&M resource lists to configurations in xshell
and SecureCRT formats
Supports filtering resources by tags
During O&M, session collaboration is supported, and other users can be invited to participate and assist in operations
In the process of session collaboration, participants control the session and creators are supported to forcibly obtain control
Multiple participants can enter a session using the same session invitation link
Support character protocol preset command function, can add 15 frequently used commands in the system
User management
Authentication types such as local, RADIUS, and AD domains are supported
Support multi-factor authentication such as SMS and dynamic tokens
You can restrict user access to bastion host by setting source IP address control and access period control
Support user IP address (blacklist or whitelist) and MAC address restriction (blacklist or whitelist) restrictions, illegal addresses cannot be logged in
Supports batch modification of users, including resetting passwords, moving departments, changing roles, modifying multi-factor configurations, modifying validity periods, modifying IP restrictions, and modifying MAC restrictions
When creating a new user, randomly generating strong passwords is supported
You can filter users by their status, role, and department
Custom roles are supported to meet the needs of customers in complex and diverse business scenarios
Supports effective and expiration time settings for master accounts
Support department decentralization of user accounts and target devices, and different users and devices can belong to different departments (subdepartments)
Access control policies are supported by department, and configuration administrators of different departments can only set access permissions for devices in their own departments and their direct subordinate departments
Support the decentralization of password change planning departments, so that password keepers in different departments can only modify/store account passwords on devices in their own departments
Support the decentralization of audit functions by department, so that audit administrators of different departments can only audit the operation logs on devices in their own departments and their direct sub-departments
Supports batch import, export, deletion, password reset, and department movement of the master account
Department management
Administrators belonging to different business units can only manage users, resources, policies, and audit management within their permissions
Support for setting scopes of users and resources that administrators can manage
Support unlimited group management of departments
Support quickly create and modify departments
Support batch creation of new departments
Support to quickly locate users and hosts in the department, and display the number of users and hosts
Access policies and dynamic authorization
Without installing any client, you can log on to remote resources published by protocols and applications such as RDP, VNC, Telnet, and SSH
You can set many-to-many resource access authorization with users, user groups, resources, resource groups, accounts, and account groups as core elements
Detailed command permission control policies can be set based on the core elements of users, user groups, departments, roles, resources, IP addresses, command sets, and effective times
Command permission control actions include deny execution, allow execution, alarm, dynamic authorization, and disconnect
Bastion host itself prefabricates basic commands for hosts and network devices, and users can customize commands according to specific scenarios
You can set access policies such as alarm, disconnection, denial of execution, and secondary authorization for the operation behavior of devices with character protocols
Fine-grained restriction of user access time
Users can actively apply for O&M permissions for resources from administrators
In the mode based on user groups and account groups, new members of user groups and account groups automatically inherit access control and command control relationships
Supports dragging to change the priority order of policies
Supports enabling and disabling policies in bulk
Access control policies are set based on users, user groups, resource accounts, account groups, validity periods, file management controls, file transfer controls (uploads and downloads), RDP clipboard controls, time limits, and IP restrictions
Access control policies support the configuration of two-person authorization candidates, which require on-site approval by administrators for core devices
Support for setting matching rules for action commands in command control policies
User and group management features
Support department decentralization of user accounts and target devices, and different users and devices can belong to different departments (subdepartments)
Access control policies are supported by department, and configuration administrators of different departments can only set access permissions for devices in their own departments and their direct subordinate departments
Support the decentralization of password change planning departments, so that password keepers in different departments can only modify/store account passwords on devices in their own departments
Support the decentralization of audit functions by department, so that audit administrators of different departments can only audit the operation logs on devices in their own departments and their direct sub-departments
Resource and resource group management functions
You can manage resources in batches by grouping
Work order management
Users can actively apply for O&M permissions for resources from administrators
Supports file management permissions, RDP clipboard permissions, and upload and download permissions
Record of operations
Accurate identification of operation commands with 100% accuracy
Support the audit of character protocol SSH, TELNET, file transfer protocol FTP, SFTP, and record the execution results of operation instructions and operation instructions in detail
Support web page anti-jump function of secure browser
Supports exporting historical sessions and system logs
Supports end-of-session state auditing
Supports the recording of clipboard copying file behavior and text information content, and supports locating audit playback by searching for text content keywords
Support two-person authorization audit and collaborative user audit
Support a variety of system reports and operation and maintenance report templates built-in in the system, and automatically generate reports on a daily, weekly, and monthly cycle
The report format supports Word, Excel, PDF and HTML formats
Support resource logon sessions associated with system logon sessions
Supports text download commands to the local PC
Text audit is carried out on four categories of information: keyboard and mouse operation, clipboard operation, title bar operation, and text fuzzy recognition of the graphical interface
The FTP protocol can be audited, and the execution of the file upload and download functions of the bastion host itself can be audited
Session replay
Supports the playback process from a command to the user, and pauses and accelerates the playback process
The input and output of user command operations are displayed on the same interface
Support online playback process, support playback speed adjustment, drag, pause, stop, replay and other playback control operations
Supports web online video playback to reproduce all operations performed by O&M personnel on resources
Supports offline playback to reproduce all operations of O&M personnel on resources, and supports downloading playback files to local playback
Graphical search can be carried out according to the content of the text audit for keywords, and the search results can be directly located to the relevant graphic screen for playback
Supports arbitrary switching of audits of the same virtual machine
Secret change plan
You can generate a detailed password change plan based on the account, time, change cycle, and password change method, and automatically execute it when it expires
The password change method can support randomly generating different passwords, randomly generating the same password, and manually specifying the same password
You can send automatic password change results to the administrator mailbox of the specified password change plan
You can set the password change policy based on the resource account, account group, password change method, and execution mode
You can view the password change log to understand the total number of password change accounts, the number of successful password changes, the number of failed password changes, and the number of unmodified accounts
You can download the password change log to view password changes before and after the password change
The password change policy supports whether to use privileged accounts to change passwords and whether to modify privileged account passwords
Real-time monitoring
Supports real-time monitoring and real-time cut-off of any type of active session without delay
System maintenance
Supports full or incremental system backup
You can restore the system by uploading and restoring files
You can upgrade by importing an upgrade package with one click
Supports desktop display based on different roles and permissions
Supports statistics on the number of users, hosts, applications, application servers, and alarms
Supports host and application type statistics
Supports statistics on current active sessions and new sessions added today
Supports weekly and monthly trend charts of system logons and resource O&M
Support the Top5 display of O&M users and O&M resources
Support the display of recently logged in hosts and applications, and provide the ability to log in resources from the desktop
Support system status and system information display
Support for modifying personal information
Users can automatically lock their accounts or IPs if they fail to log in multiple times, and can configure the unlock duration, automatic unlocking upon expiration, or manual unlocking
Support built-in OpenVPN client
Supports external authentication methods such as RADIUS and AD domain, and supports configuring multiple AD domains
Supports automatic or manual deletion of stored data
Supports factory reset in the web interface
Supports system configuration backup and restore
Supports hot standby of dual machines
Supports spatial self-management to automatically clean historical data and automatically overwrite data when space is low
Supports automatic backup of log data to remote syslog servers
Supports outgoing notifications, including email and custom SMS gateways
Support for customizing the system language (Chinese and English) and system icons
Supports asynchronous operation tasks, real-time view of task progress, and termination of tasks
You can set whether and how to alarm based on message level and message type
Support WeChat mini program mobile token
Supports binding SSH public keys to achieve password-free login
You can view the permissions of the user’s own role and understand the scope of permissions
You can view your own system logon logs, system operation logs, and resource logon logs
Supports web certificate replacement
Supports web and SSH login timeout settings
SNMP is supported, and versions include v2c and v3
Supports network multi-interface, static routing, and DNS settings
Supports custom alert methods and levels for system events
Support custom ticket application scope
You can modify the default port of the system to provide external services
Supports automatic backup of configuration and data to remote FTP and SFTP server storage
Support network diagnostics such as ping, traceroute, and telnet
Supports the collection of operating status information such as system load, kernel information, memory information, network card information, disk usage information, routing table information, and ARP table information
Supports downloading backups to local storage