MANAGING NETWORK ACCOUNTS

 

Before you have your network up and running, you need to decide how to manage access. You want to establish a consistent approach to managing the users' network access. Access includes not only logging on to a particular workstation but also accessing resources. Before making this decision, you must define the method you're going to use to assign usernames and your password requirements. The two main types of network accounts that allow you to manage your users are user accounts and group accounts.

 

USER ACCOUNTS

 

Several global elements may be used to manage user accounts and make administrative tasks easier, such as how you name your users and groups. These names should enable you to easily identify the location or job function of the user as well as the purpose of each group. An additional tactic that makes your job easier involves the rules you apply to passwords. One of these rules sets forth whether you want accounts to be locked out after unsuccessful log on attempts and, if so, how long they should remain disabled.

 

If you suspect your network has become the object of break-in attempt, you can verify this by requiring manual reactivation of accounts that are disabled after three unsuccessful log on attempts. In this way, a user must notify you if he is unable to log on. If the user is not the one responsible for the lockout, you know that an unauthorised individual has been trying to gain access to your network.

 

One of the most important aspects of network security is passwords. If the passwords are unique and hard to guess, your system is more secure. When planning how to manage passwords, you might want to consider doing some or all of the following:

 

 

Users often look to the system administrator for assistance in choosing an adequate password. One easy method is for the user to pick two short words, such as dog and walk, and separate them by a non-alphanumeric character such as a percent sign (%). This results in the password "dog%walk", one that cannot be cracked by a dictionary-based password-cracking program but is still easy to remember.

 

CREATING USER ACCOUNTS

 

In a peer-to-peer network, anyone who sits down at a computer can access that machine and all its resources. Access to shared resources from other computers might not require that you know a password. This model works well in the small network (usually fewer than 10 users), where security is not an issue.

 

In a larger server-based network, access is given to each user through an individual account. It's through the creation of user accounts and the attributes applied to these accounts that you manage access to resources.

 

Before you create the first user account (and even before you install the network operating system), a naming convention must be established.

 

The most workable system for creating usernames is one that enables easy identification of users yet is flexible enough to allow unique naming. A naming system that consists of either the first initial and last name or the first name and last initial are two that are workable and limit user confusion.

 

After a naming convention has been determined, you can begin creating the necessary user accounts. This is usually done through a utility provided by the network operating system. In Windows NT or Windows 2000, User Manager or User Manager for Domains is used. The equivalent utility for NetWare is Syscon for NetWare, version 3.x, or NWAdmin for versions 4.x and 5.x. Although some UNIX operating systems also provide such a utility, the user accounts are usually created at the user prompt.

 

USING TEMPLATES TO CREATE USER ACCOUNTS

 

Most network operating systems create both an administrator account and a guest account during installation. However, the administrator must then create accounts for all the network's users. Adding a large number of users at one sitting can be a time-consuming process. Not only does each user account need to be created, but each user's group memberships and access rights need to be assigned.

 

One way around this is to use a template for the creation of users. First, create a dummy user account with the necessary access rights and group memberships, making sure that the account is disabled. When a new user's account needs to be created, simply copy the template and make necessary changes, such as username and password. This method significantly speeds up the process of adding several users at a time.

 

In Windows NT, you may add users from the command line by using the cacls. exe utility. This can be used along with a text file containing all the users' information if you must add a large number of users at one time.

 

DISABLING/DELETING USER ACCOUNTS

 

As users come and go, as well as change jobs internally, more work is created for the system administrator. It's important that users who have left the company do not continue to have access to confidential information. It's your responsibility to ensure that a system is in place to notify you as soon as a user not longer needs an account or when a user's access needs have changed.

 

Tip: When an employee leaves you company, disable her account rather than delete it. Not only does this make your life easier if she returns, but when a new employee is hired to do the same job, you can just rename the account and change the password for the new employee. This way, all the necessary permissions and group memberships are already assigned for that individual to accomplish her job. Just be sure to create a reminder to delete that account after an appropriate amount of time has passed.

 

GROUP ACCOUNTS

 

Groups are used to organise users into logical collections based on how users need to access your network. Users are granted the necessary resource permissions based on their group rather than on an individual basis. Each user who is a member of a group has the same access permissions as the group. Not only does this make your job easier to manage when permissions need to be altered later, but this practice also decreases the possibility of forgetting to give the boss his needed access.

 

Local versus Global

 

In Netware, all groups are global in scope. That is, they exist throughout the network. Windows NT and Windows 2000 complicate this a bit. In these systems, a group is part of either the individual machine' s security database of the security database for the entire network. As such, groups are referred to as either local or global. Local groups are stored on the individual workstation or server and are used to access resources on that computer. Global groups are stored on the PDC (Primary Domain Controller) and are available throughout the domain.

 

A resource is controlled by a particular computer, which is either a server or a workstation. The resource may be a file, a folder, a printer, or any other object that might be shared. The local security database controls access to that resource. To grant access to your users, use a group that belongs to the same security database. Therefore, when you're providing access to a printer, that access should be granted to a local group on the print server.

 

Tip: One easy way to remember how to user local versus global groups is to thinks of resources as "living" on a particular computer rather than belonging to the entire network. Therefore, it becomes logical to use a local group to control access to the resource living on that computer.

 

Global groups are used to organise users at the network level, whereas local groups are used on individual computers. Each user may be a member of several different groups. Groups may be organised by function, administrative division, geographic location, or any other logical sorting you might imagine.

 

Another use for global is to provide access to resources across trusts. A trust is a special relationship created to allow users from one domain to access resources in another domain (again, this is only in Windows NT/Windows 2000 systems). Trusts are used to provide for wider access to resources. Local groups cannot cross from one domain to another. By placing users from the trusted domain in a global group, that global group may then be added to a local group on the trusting domain. This enables users from the trusted domain to access needed resources located in the trusting domain.

 

Tip: When creating a new group using the user Manager in Windows NT, select the users you want to add as members of that group while holding down the CTRL key. After selecting all the users you want to include, create the group. The users you've selected are then made members of that group.

 

Built-in Groups

 

Network operating systems provide built-in groups with the predefined fights and privileges that are necessary for accomplishing certain routine tasks. These groups are capable of performing certain administrative tasks, such as creating accounts and performing backups. This provides a relatively easy format that enables the administrator to delegate certain tasks without granting administrative privileges' to others.

 

The tables below show the groups that are built-in as global and local groups on Windows NT. NetWare only has one built-in group called ‘Everyone’. All users are members of this group.

 

 

Built-in Global Groups

 

Group

Managed by

Contains

Domain Admins

Administrators

Administrator

Domain Users

Administrators and Account
Operators

Administrator and New Users

Domain Guests

Administrators and Account
Operators

Guest

 

Built-in Local Groups

 

Group

Managed by

Auto Contents

Permissions

Administrators

Administrators

Domain Admins
and Administrator
(user)

Can do anything
except auto access
files on NTFS

Backup Operators

Administrators

None

Backup and
restore, log in
locally, and shut
down system

Server Operators

Administrators

None

Share/unshare
resources, format
server disks, back
up and restore, log
in locally, and shut
down servers

Account Operators

Administrators

None

Manager user and
group accounts.
Cannot assign user
rights or modify
local built-in
groups.

Print Operators

Administrators

None

Manage printers,
log in locally, and
shut down

Power users

Administrators

Power users

Set up users, create
and modify user
accounts, add users
to Users, Guests,
Power Users'
groups, and start
and stop sharing of
local resources.

Users

Administrators
Account Operators
and Administrator
(user)

Domain Users

Cannot log on
locally to DC.
Access resources
via the network
only

Guests

Administrators and
Account Operators

Domain Guests

Utilise domain
resources via the
network

Replicator

Administrator

None

Manage replication
of files

 

 

 

 

 

 

MULTIPLE LOGINS

 

It may be important for security reasons that users log in at only one computer at a time. If a user logs on to one machine and then walks off, the network can be accessed by anyone who walks up to that machine. If you prevent multiple simultaneous logons, a user who tries to logon to another machine is reminded that he is already logged on at another station. This feature may be implemented throughout the operating system or via a third-party product.