ctsidmck Command
Purpose
Verifies the cluster security library identity mapping.
Syntax
ctsidmck -h │ -i │ { [ -dl │ -dm │ -dh ] -m security_mechanism network_ID }
Description
A system administrator can use the ctsidmck command to verify the mapping that would be obtained by the cluster security library (libct_sec) for a specific security network identifier.
- /opt/rsct/cfg/ctsec_map.global
- /var/ct/cfg/ctsec_map.local
- /var/ct/cfg/ctsec_map.global
The location of definitions within these files is important; entries at the head of the file are processed before entries positioned towards the end of the file. The definition rules also allow for wildcarding of entry information and for expansion of certain reserved words. If a definition is incorrectly specified within one of these files, the mapping result may not be as intended. Also, if a definition is positioned after another definition that can successfully map a security network identifier, the mapping result may not be as intended.
This command allows an administrator to verify that the correct identity mapping definition is used by the cluster security library to map a security network identity. This command is to be executed on the system that would act as the server. By specifying a security network identifier to this command on the server, the administrator can determine what the mapped identity for that security network identity would be on that system, and what entry was used from the identity mapping definition files to obtain this mapping.
Flags
- -h
- Writes the command's usage statement to standard output.
- -i
- Displays a list of the supported security mechanisms on this system. The command examines the cluster security library configuration on this node, obtains a list of supported security mechanisms, and displays this list. The mechanisms are listed by the mnemonic used by the cluster security library to refer to these mechanisms.
- -d
- Specifies the level of detail in the command output. One of three
levels of detail is permitted:
- low (l): the command will only display the mapped identity for network_ID. This is the default detail level.
- medium (m): the command will display the mapped identity for network_ID, as well as the entry from the identity mapping definition files that yielded the map.
- high (h): the command will display every entry from the identity mapping definition files that is processed until a mapped identity for network_ID is found, or until all entries are processed.
- -m security_mechanism
- Specifies the security mechanism that was used to create the security
network identifier provided by network_ID. security_mechanism is a mnemonic that
would be used by the cluster security library to refer to this security
mechanism. This flag must be specified when the -h and the -i flags are not provided.
Use the -i flag to display a list of the security mechanisms that this system supports.
Parameters
- network_ID
- Specifies the security network identifier to be mapped. This should be an identity that can be assumed by a client application of a trusted service.
Security
This command is executable only by the root system user and members of the system user group. It is intended for administrator use only, to verify the security configuration of the system. Because the output of the command could be used as a means for determining how to sabotage or circumvent system security, the permissions on this command should not be altered.
Exit Status
- 0
- This command successfully found a mapped identity for network_ID.
- 3
- This command detected a failure in the operation of the cluster security library mechanism pluggable module (MPM) corresponding to the security mechanism that was requested. ctsidmck was unable to search for a possible mapped identity for network_ID in this case. This failure may be accompanied by descriptive output indicating the nature of the MPM failure. Consult this output and perform any recommended actions.
- 4
- The caller invoked this command incorrectly, omitting required flags and parameters, or using mutually-exclusive flags. ctsidmck terminated without trying to find a mapped identity for network_ID.
- 6
- A memory allocation request failed during the operation of this command. ctsidmck was unable to search for a possible mapped identity for network_ID in this case.
- 21
- This command was unable to locate any of the identity mapping definition files on the local system. ctsidmck was unable to search for a possible mapped identity for network_ID in this case. Verify that at least one identity mapping definition file exists on the system.
- 22
- This command was unable to dynamically load the cluster security library mechanism pluggable module (MPM) corresponding to the security mechanism what was requested. The module may be missing, corrupted, or one of the shared libraries used by this module may be missing or corrupted. ctsidmck was unable to search for a possible mapped identity for network_ID in this case. This failure may be accompanied by descriptive output indicating the nature of the MPM failure. Consult this output and perform any recommended actions.
- 37
- At least one of the identity mapping definition files on the system appears to be corrupted. The command was unable to search for a possible mapped identity for network_ID in this case. Verify that none of the identity mapping files are corrupted, truncated, or contain syntax errors.
- 38
- The ctsidmck command cannott locate a mapped identity for network_ID. No entry within any of the identity mapping definition files yielded a mapped identity for the specified security network identifier.
Restrictions
This command works only on MSS-formatted key files.
Standard Output
The ctsidmck command writes any mapped identity found for the security network identifier to standard output. If a medium or high level of detail is requested, any definitions displayed by this command are also written to standard output.
When the -h flag is specified, this command's usage statement is written to standard output.
Standard Error
Descriptive information for any detected failure condition is written to standard error.
Examples
- To get a list of the security mechanisms that the local system
supports, before verifying an identity map, enter:
ctsidmck -i
- To get only the mapped identity for the RSCT host-based authentication
(HBA) mechanism security network identity zathras@greatmachine.epsilon3.org, enter:
ctsidmck -m unix zathras@greatmachine.epsilon3.org
- To see every identity mapping definition that the command checks while searching for a mapped identity for the HBA mechanism's security network identity glorfindel@rivendell.elvin.net@endor, enter:
ctsidmck -d h -m unix glorfindel@rivendell.elvin.net@endor
Location
- /opt/rsct/bin/ctsidmck
- Contains the ctsidmck command
Files
- /opt/rsct/cfg/ctsec_map.global
- The default identity mapping definition file. This file contains definitions required by the RSCT cluster trusted services in order for these systems to execute properly immediately after software installation. This file is ignored if the cluster-wide identity mapping definition file /var/ct/cfg/ctsec_map.global exists on the system. Therefore, any definitions within this file should also be included in the cluster-wide identity mapping definition file, if that file exists.
- /var/ct/cfg/ctsec_map.local
- Local override to the cluster-wide identity mapping definitions. Definitions within this file are not expected to be shared between nodes within the cluster.
- /var/ct/cfg/ctsec_map.global
- Cluster-wide identity mapping definitions. This file is expected to contain identity mapping definitions that are common throughout the cluster. If this file exists on the system, the default identity mapping definition file is ignored. Therefore, if this file exists, it should also contain any entries that would also be found in the default identity mapping definition file.