Features
CBH enables common authentication, authorization, account, and audit (AAAA) management. Users can obtain O&M permissions by submitting tickets and can invite O&M engineers to perform collaborative O&M.
Credential Authentication
CBH uses multi-factor authentication and remote authentication technologies to enhance O&M security.
- Multi-factor authentication: CBH authenticates users by mobile one-time passwords (OTPs), SMS messages, USB keys, and/or OTP tokens. This allows you to mitigate O&M risks caused by leaked credentials.
- Remote authentication: CBH interconnects with third-party authentication services or platforms to perform remote account authentication, prevent credential leakage, and ensure secure O&M. Currently, Active Directory (AD), Remote Authentication Dial-In User Service (RADIUS), Lightweight Directory Access Protocol (LDAP), and Azure AD remote authentication are available. CBH allows you to synchronize users from the AD domain server without modifying the original user directory structure.
Account Management
With a CBH system, you can centrally manage system user accounts and managed resource accounts, and establish a visible, controllable, and manageable O&M system that covers the entire account lifecycle.
Feature | Description |
---|---|
System user accounts | CBH enables you to grant a unique account with specific permissions to each system user based on their responsibilities. This eliminates security risks resulting from the use of shared accounts, temporary accounts, or privilege escalation.
|
Managed resource accounts | With a CBH system, you can centrally manage accounts of resources managed in the CBH system through the entire account lifecycle, log in to managed resources by using SSO portal, and seamlessly switch between resource management and O&M.
|
Permissions Management
CBH supports fine-grained permission management so that you have complete control over which user can access the CBH system and which managed resources can be accessed by a specific system user, enabling you to safeguard both the CBH system and managed resources.
Function | Description |
---|---|
CBH system access permission | You can assign permissions to a system user to log in to a CBH system and use different functional modules in the CBH system according to the user's responsibilities.
|
Managed resource access permission | You can assign permissions for resources by user, user group, account, and account group.
|
Operation Audit
In a CBH system, each system user has a unique identifier. After a system user logs in to the CBH system, the CBH system logs their operations and monitors and audits their operations on managed resources based on the unique identifier so that any security events can be discovered and reported in real time.
Function | Description |
---|---|
System operation audit | All operations in a CBH system are recorded, and alarms are reported for misoperations, malicious operations, and unauthorized operations.
|
Resource O&M audit | A CBH system records user operations throughout the entire O&M process and supports multiple O&M auditing techniques. It audits user operations, identifies O&M risks, and provides the basis for tracing and analyzing security events.
|
O&M Functions
CBH supports multiple architectures, tools, and methods to manage a wide range of resources.
Function | Description |
---|---|
O&M using a web browser | By leveraging HTML5 for remote logins, O&M engineers can implement O&M operations such as real-time operation monitoring and file uploading and downloading, without installing a client.
|
Third-party client O&M | CBH enables one-click interconnection with multiple O&M tools, enabling you to perform O&M without changing client usage habits.
|
Automatic O&M | CBH enables automated O&M to simplify online complex operations, eliminating repetitive manual effort and improving efficiency.
|
O&M Ticket Application
During the O&M, if a system user does not have the required permissions for a certain resource, they can submit a ticket to apply for the permissions.
- O&M personnel can:
- Manually or automatically trigger the ticket system and submit access approval tickets, command approval tickets, and database approval tickets.
- Submit, query, cancel, and delete tickets.
- System administrators can:
- Customize approval processes, including multi-level approval processes.
- Approve one or more tickets at a time, as well as reject, cancel, query, and delete tickets.
- Credential Authentication
- Account Management
- Permissions Management
- Operation Audit
- O&M Functions
- O&M Ticket Application