This is a checklist of default settings that should be changed to secure your Opmantek Applications.
If you are using the Opmantek VM, refer to this wiki:
Some additional information not on the page. Skip steps 1-2 if you don’t want to use a self-signed cert. Just place your trust authority signed certs in the /etc/ssl/certs directory
openssl req -x509 -newkey rsa:4096 -keyout <identifier>.key.pem -out <identifier>.cert.pem -days 365 -nodes # for example, if the server is named "batman", run the following openssl req -x509 -newkey rsa:4096 -keyout batman.key.pem -out batman.cert.pem -days 365 -nodes |
On debian|ubuntu:
/etc/apache2/conf-available/ssl.conf
On centos|redhat:
/etc/httpd/conf/ssl.conf
SSLCertificateFile /etc/ssl/certs/batman.cert.pem SSLCertificateKeyFile /etc/ssl/certs/batman.key.pem |
#depending on the linux flavour used, the apache restart command with be one of the following: systemctl restart apache2 service httpd restart |
For web users, nmis and admin, needs to be done in NMIS and Open-AudIT
Details on how to change to NMIS default passwords can be found here:
Details on how to change the default Open-AudIT passwords can be found here:
https://docs.community.firstwave.com/wiki/display/OA/Information+about+default+users+and+passwords
There are a few user accounts created by default in NMIS. You should review these accounts and remove if necessary.
To view these accounts go to: NMIS → System → System Configuration → Users
Accounts that you should consider reviewing are: dc_ops, wan_ops.
# If you are logged in a superuser passwd omkadmin # If you are logged in as omkadmin: passwd |
SSH keys are more secure that using password so should be considered for access to the Opmantek VM. Some details on setting up SSH keys can be found here.
SUDO is the preferred method of providing superuser privileges to users. By default, when you invoke the sudo command, you will be prompted for your own password. This function can be turned off if required (see this link). For example, you may want to temporarily to run some scripts as a superuser.