Updates, corrections, and clarifications to the documentation released with Sybase Control Center 3.2.6.
The documentation for the SSL support feature in Replication Server Data Assurance (DA) Option 15.7.1 is not included in the Sybase Control Center for Data Assurance online help. The remote method invocation (RMI) communication between Sybase Control Center for Data Assurance and DA server can be encrypted using Secure Sockets Layer (SSL) / Transport Layer Security (TLS).
For detailed information on the SSL support in DA, see the Replication Server Data Assurance Option 15.7.1 > Users Guide > Security and Access Control .
This new topic is not present in the SCC for Sybase IQ online help:
About Sybase Control Center for Sybase IQ > Keyboard Shortcuts
Frequently used key sequences for the Sybase Control Center Web interface.
| Key Sequence | Action |
|---|---|
| Ctrl-Alt-F12 | Pull down the first menu in the topmost view or in the SCC menu bar. Repeat to toggle between the two first menus. |
| Ctrl-Alt-Shift-F12 | Pull down the first menu (Application) in the SCC menu bar. |
| Space | Select the highlighted option—equivalent to clicking the mouse. |
| Escape |
|
| Arrow keys |
|
| Tab |
|
| Shift-Tab |
|
| Home | Highlight the first item in the active view (or the active section of a view), for example the first row in a table. |
| End | Highlight the last item in the active view (or the active section of a view), for example the last row in a table. |
| In the SCC menu bar, | Select an open view and bring it to the front. |
| Ctrl-Alt Arrow key | Move the selected view in the indicated direction. |
| Ctrl-Alt + | Increase the size of displayed text. |
| Ctrl-Alt - | Decrease the size of displayed text. |
| F11 | Enable or disable the browser’s full-screen mode. |
| In the SCC menu bar, | Enable or disable Sybase Control Center’s full-screen mode. |
Sybase Control Center is built on Adobe Flex. For complete information about Adobe Flex keyboard shortcuts, see http://livedocs.adobe.com/flex/3/html/help.html?content=accessible_5.html.
In the first row of the table in Get Started > Launching Sybase Control Center > Configuring Memory Usage, all four occurrences of 2GB have changed to 4GB. This change is not present in the 3.2.6 version of the online help.
The following has been added to the Get Started > Logging in to Sybase Control Center topic, but is not present in the SCC for Sybase IQ online help:
Only one login session per account is permitted at a time; multiple users cannot be logged in to the same account simultaneously.
Preconfigured user login – defines a user name, password, and a list of roles. The default user name is sccadmin; its password is configured during installation and its native role is SCC Administrator, which maps to sccAdminRole. You can create additional accounts by adding preconfigured user login modules to csi_config.xml. However, Sybase does not recommend the use of preconfigured user login modules for authentication in production environments.
Windows authentication is enabled by default, but it requires some configuration after an upgrade from SCC 3.2.5 or earlier.
The Get Started > Setting Up Security > Configuring Authentication for Windows task is now optional and has been updated, but the updates are not present in the SCC for Sybase IQ online help. It reads as follows:
Authentication through the Windows operating system is enabled by default. Configuration is required only if you have upgraded from an older version of Sybase Control Center and no longer want to use the older version’s authentication settings; if you do not want to use Windows for authentication; or if you want to create login accounts manually. Sybase recommends that you allow SCC to create accounts automatically.
Next
The Get Started > Setting Up Security > Configuring a Pluggable Authentication Module (PAM) for UNIX task has been updated, but the updates are not present in the SCC for Sybase IQ online help. It now reads as follows:
| Platform | Action |
|---|---|
| Solaris | Append the contents of the <SCC-install-dir>/utility/<sunos>/pam.conf file (provided with Sybase Control Center) to the /etc/pam.conf file on your Solaris platform. |
| Linux | Copy the <SCC-install-dir>/utility/<linux>/sybase-csi file
(provided with Sybase Control Center) to the /etc/pam.d directory on
your Linux platform. Note: The sybase-csi file
provided with Sybase Control Center is not
compatible with the most recent SUSE Linux versions.
For SUSE 11 and later, see the example at the end of
this topic.
|
Example: PAM for SUSE Linux 11 and Later
# sybase-csi PAM Configuration (SUSE style) auth include common-auth account include common-account password include common-password session include common-session
Next
Updates to the Get Started > Setting Up Security > Configuring an LDAP Authentication Module task are not present in the SCC for Sybase IQ online help. The task now reads as follows:
The sample module shows the properties used for an OpenDS LDAP server. See the example at the end of this task for values that work for ActiveDirectory. Configuration properties you can use in the LDAP module are described in a subtopic.
<authenticationProvider controlFlag="sufficient" name="com.sybase.security.ldap.LDAPLoginModule">
<options name="BindDN" value="cn=Directory Manager"/>
<options name="BindPassword" value="secret"/>
<options name="DefaultSearchBase" value="dc=example,dc=com"/>
<options name="ProviderURL" value="ldap://localhost:10389"/>
<options name="ServerType" value="openldap"/>
</authenticationProvider>
<provider name="com.sybase.security.ldap.LDAPAttributer" type="attributer"/>
<options name="BindPassword" encrypted="true" value="1snjikfwregfqr43hu5io..."/>
Windows:
keytool -import -keystore %SYBASE_JRE7%\lib\security\cacerts -file <your cert file and path> -alias ldapcert -storepass changeit
UNIX:
keytool -import -keystore $SYBASE_JRE7/lib/security/cacerts -file <your cert file and path> -alias ldapcert -storepass changeit
LDAP Configuration Values for ActiveDirectory
ServerType: msad2K
DefaultSearchBase: dc=<domainname>,dc=<tld> or o=<company name>,c=<country code>
E.g. dc=sybase,dc=com or o=Sybase,c=us
ProviderUrl: ldaps://<hostname>:<port>
E.g.: ldaps://myserver:636
AuthenticationFilter: (&(userPrincipalName={uid}) (objectclass=user))
BindDN: <User with read capability for all users>
BindPassword: <Password for BindDN user>
RoleFilter: (|(objectclass=groupofnames) (objectclass=group))
controlFlag: sufficient
Next
Map Sybase Control Center roles to LDAP groups.
Use these properties in your csi_config.xml file to control your LDAP service.
| Property | Default Value | Description |
|---|---|---|
| AuthenticationFilter | For most LDAP
servers: (&(uid={uid})(objectclass=person))
or For Active Directory email lookups: (&(userPrincipalName={uid}) (objectclass=user)) [ActiveDirectory] For Active Directory Windows username lookups: (&(sAMAccountName={uid})(objectclass=user)) |
The filter to use
when looking up the user. When performing a username based lookup, this filter is used to determine the LDAP entry that matches the supplied username. The string "{uid}" in the filter is replaced with the supplied username. |
| Property | Default Value | Description |
|---|---|---|
| BindPassword | none |
BindPassword is the password for BindDN, which is used to authenticate any user. BindDN and BindPassword are used to separate the LDAP connection into units. The AuthenticationMethod property determines the bind method used for this initial connection. Sybase recommends encrypting
passwords and provides a password encryption utility
for the purpose. If you encrypt BindPassword,
include encrypted=true in the line that sets the
option. For example:
<options name="BindPassword" encrypted="true" value="1snjikfwregfqr43hu5io..."/> If you do not encrypt BindPassword,
the option might look like this:
<options name="BindPassword" value="s3cr3T"/> |
| Property | Default Value | Description |
|---|---|---|
| RoleFilter | For SunONE/iPlanet:
(&(objectclass=ldapsubentry)
(objectclass=nsroledefinition))
For Netscape Directory Server: (objectclass=groupofnames) (objectclass=groupofuniquenames)) For ActiveDirectory: (objectclass=groupofnames) (objectclass=group)) |
The role search filter. This filter should, when combined with the role search base and role scope, return a complete list of roles within the LDAP server. There are several default values depending on the chosen server type. If the server type is not chosen or this property is not initialized, no roles are available. |
The topic Get Started > Setting Up Security > Configuring an LDAP Authentication Module > Setting Up Roles and Passwords has been removed, but is still present in the SCC for Sybase IQ online help. Disregard it.
Updates to the Get Started > Setting Up Security > Mapping Sybase Control Center Roles to LDAP or OS Groups task are not present in the SCC for Sybase IQ online help. The task now reads as follows:
To grant Sybase Control Center privileges to users who are authenticated through LDAP or the operating system, associate roles used in Sybase Control Center with groups in LDAP or the operating system.
Task
You can configure Sybase Control Center to enable users to authenticate through their local operating system or through an LDAP server. To make this type of authentication work, SCC roles must be mapped to groups that exist in the system providing authentication (LDAP or the operating system).
The sybase and SCC Administrator groups are convenient because they are predefined in role-mapping.xml. If you add sybase and SCC Administrator groups to your LDAP system and populate them with SCC users and administrators, you can skip to the next task—you do not need to complete the steps below.
The table lists default mappings of LDAP and OS groups to SCC roles. Login modules are defined in csi_config.xml.
| Login Module | OS Group | Sybase Control Center Roles |
|---|---|---|
| UNIX Proxy | root | uaAnonymous, uaAgentAdmin, uaOSAdmin |
| sybase | uaAnonymous, uaPluginAdmin, sccUserRole | |
| user | uaAnonymous | |
| guest | uaAnonymous | |
| NT Proxy | Administrators | uaAnonymous, uaAgentAdmin, uaOSAdmin |
| sybase | uaAnonymous, uaPluginAdmin, sccUserRole | |
| Users | uaAnonymous | |
| Guests | uaAnonymous | |
| LDAP | sybase | uaAnonymous, uaPluginAdmin, sccUserRole |
| SCC Administrator | uaAnonymous, sccAdminRole |
<SCC-install-directory>/conf/role-mapping.xml
<Mapping>
<LogicalName>sccUserRole</LogicalName>
<MappedName>SCC Administrator</MappedName>
<MappedName>SCC Agent Administrator</MappedName>
<MappedName>sybase</MappedName>
</Mapping>
<Mapping>
<LogicalName>sccUserRole</LogicalName>
<MappedName>SCC Administrator</MappedName>
<MappedName>SCC Agent Administrator</MappedName>
<MappedName>sybase</MappedName>
<MappedName>my_SCC_group</MappedName>
</Mapping>
<Mapping>
<LogicalName>sccAdminRole</LogicalName>
<MappedName>SCC Administrator</MappedName>
</Mapping>
<Mapping>
<LogicalName>sccAdminRole</LogicalName>
<MappedName>SCC Administrator</MappedName>
<MappedName>my_SCC_admin_group</MappedName>
</Mapping>
In the <SCC-install-dir>\conf\csi_config.xml file, set the BindPassword and ProviderURL properties with values used in your deployment.
passencrypt, which is located in the Sybase Control Center bin directory, uses the SHA-256 hash algorithm for passwords used in the PreConfiguredLoginModule in csi_config.xml.
To encrypt a password, enter passencrypt -csi.
Updates to the Get Started > User Authorization > Logins, Roles, and Groups task are not present in the SCC for Sybase IQ online help. The task now reads as follows:
Sybase Control Center includes predefined login accounts and roles.
A login account identifies a user who can connect to Sybase Control Center. An account has roles that control the tasks the user is allowed to perform. Users can be authenticated through native SCC accounts, but a safer approach is to delegate authentication to the operating system or to an LDAP directory service.
| Login Name | Description |
|---|---|
| sccadmin | Can use all the administration features in Sybase Control Center. Use for configuration and test. |
A role is a predefined profile that can be assigned to a login account or a group. Roles control the access rights for login accounts. Sybase Control Center comes with predefined roles that are intended for use in production environments.
| Role | Description |
|---|---|
| sccUserRole | Provides nonadministrative access to Sybase Control Center. Required for all users and assigned automatically to every authenticated user. |
| sccAdminRole | Provides administrative privileges for managing Sybase Control Center. |
Monitoring privileges for SCC product modules are assigned automatically.
A group is made up of one or more login accounts; all the accounts in a group have the roles granted to the group. In Sybase Control Center you can create groups to suit your business requirements.
This new paragraph has been added after the note in step 11 of the topic Configure > Setting Up Statistics Collection, but it is not present in the SCC for Sybase IQ online help:
You cannot change the duration of a schedule (the once/repetitively/until setting) after you create it. To change the schedule duration, delete and recreate the schedule.
This new topic is not present in the SCC for Sybase IQ online help:
Manage and Monitor > Manage Sybase Control Center > Job Scheduling > Viewing or Deleting a Schedule
Display schedule details or remove a schedule from a data collection job.
This information was omitted from the online help for Sybase Control Center for Sybase IQ.
Data collection names are missing from the online help topic Configure > Creating an Alert > Sybase IQ Alerts, Collections, and KPIs. Alerts are based on key performance indicators (KPIs). For a listing of the KPIs in each data collection, consult the table in the online help at Configure > Setting Up Statistics Collection > Sybase IQ Data Collections. CR #683329-3.
This information was omitted from the online help for Sybase Control Center for Sybase IQ.
You must authenticate a multiplex resource monitored by SCC using a shared login account that has access to all nodes in the multiplex. If you try to authenticate with SCC using a login that does not have access to all nodes, you see a security error: Connection disallowed by login policy for this user. CR #653603.
This information was omitted from the online help for Sybase Control Center for Sybase IQ.
For Sybase IQ servers, you can select Edit Configuration File in the Administration Console. The Configuration File Editor opens and reads the params.cfg file, if one exists in the same directory as the database file, and populates the fields in the editor with the configuration parameters from params.cfg. The Configuration File Editor writes your changes to the params.cfg file when you click OK.
If no params.cfg file exists in the database directory, the Configuration File Editor opens with no parameters shown in fields, and writes a new params.cfg file to the database directory when you click OK.
The Configuration File Editor cannot currently open user configuration files stored in a location other than the database directory, or named something other than params.cfg. CR #647826
This information was omitted from the online help shipped with Sybase Control Center for Sybase IQ, but is included in the help on the Product Documentation Web site.
The following was added to Sybase Control Center for Sybase IQ > Configure > Setting up Statistics Collection > Sybase IQ Data Collections.
Sybase strongly recommends you always keep the default collections running: the Availability Collection in simplex, and the Multiplex Availability Collection in multiplex. CR #684685.
Certain request logging options must be specified together. For a complete explanation, see SQL Anywhere Server - SQL Reference > System procedures > Alphabetical list of system procedures > sa_server_option_system procedure. CR #653592.
The sccinstance -host option was omitted from the topic Get Started > Deploying an Instance from a Shared Disk Installation > sccinstance Command in some Sybase Control Center online help modules.
This optional flag specifies the host where the instance executes; you need it only when the instance name does not match the host name. Use -host with -create. CR #685883.