<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Working with Preferences on</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/</link><description>Recent content in Working with Preferences on</description><generator>Hugo</generator><language>en</language><atom:link href="https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/index.xml" rel="self" type="application/rss+xml"/><item><title>Viewing System Monitor on OS Console</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_show_system_monitor/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_show_system_monitor/</guid><description>&lt;p>You can choose to show a performance monitor before switching to OS Console. If you choose to show the monitor, then the dialog delays for one second before the initialization of the OS Console. The value must be set to Yes or No.&lt;/p></description></item><item><title>Setting Password Requirements for CLI System Tools</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_require_password/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_require_password/</guid><description>&lt;p>Many CLI tools and utilities require different credentials, such as root and admin user credentials. You can choose to require or not to require a password for CLI system tools. The value must be set to Yes or No.&lt;/p>
&lt;p>Specifying &lt;strong>No&lt;/strong> here will allow the user to execute these tools without having to enter the system passwords. This can be useful when the system administrator is the security manager as well. This setting is not recommended since it makes the Appliance less secure.&lt;/p></description></item><item><title>Viewing user notifications on CLI load</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_show_user_notification/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_show_user_notification/</guid><description>&lt;p>You can choose to display notifications in the CLI home screen every time a user logs in to the ESA. These notifications are specific to the user. The value must be set to Yes or No.&lt;/p></description></item><item><title>Minimizing the Timing Differences</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_minimize_timing/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_minimize_timing/</guid><description>&lt;p>Sign in to the appliance to access different features provided. If incorrect credentials are used to sign in, the request is denied and the server sends an appropriate response indicating the reason for failure to log in. The time taken to send the response varies based on the different authentication failures, such as invalid password, invalid username, expired username, and so on. This time interval is vulnerable to security attacks for obtaining valid users from the system. Thus, to mitigate such attacks, the time interval to reduce the response time between an incorrect sign-in and server response can be minimized. To enable this setting, toggle the value of the &lt;strong>Minimize the timing differences&lt;/strong> option from the ESA CLI Manager to &lt;strong>Yes&lt;/strong>.&lt;/p></description></item><item><title>Setting a Uniform Response Time</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_uniform_response_time/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_uniform_response_time/</guid><description>&lt;p>If invalid credentials are used to login to the ESA Web UI, then the time taken to respond to various authentication scenario failures, varies. The various scenarios can be invalid username, invalid password, expired username, and so on. This variable time interval may introduce a timing attack on the system.&lt;/p>
&lt;p>To reduce the risk of a timing attack, reduce the variable time interval and specify a response time to handle invalid credentials. Thus, the response time for the authentication scenarios remains the same.&lt;/p></description></item><item><title>Limiting Incorrect root Login</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_limit_incorrect_root_login/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_limit_incorrect_root_login/</guid><description>&lt;p>If an incorrect password is used to log in to a system, the permission to access the system is denied. Multiple attempts to log in with an incorrect password opens a route to brute force attacks on the system. Brute force is an exhaustive hacking method, where a hacker guesses a user password over successive incorrect attempts. Using this method, a hacker gains access to a system for malicious purposes.&lt;/p></description></item><item><title>Enabling Mandatory Access Control</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_man_access_control/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_man_access_control/</guid><description>&lt;p>For implementing Mandatory Access Control, the &lt;a href="https://docs.protegrity.com/10.2/docs/aog/mandatory_access_control/">AppArmor&lt;/a> module is introduced on Protegrity appliances. Define the profiles for protecting files that are present in the appliance.&lt;/p></description></item><item><title>FIPS Mode</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_fips_mode/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_fips_mode/</guid><description>&lt;p>The Federal Information Processing Standards (FIPS) defines guidelines for data processing. These guidelines outline the usage of the encryption algorithms and other data security measures before accessing the data. Only a user with administrative privileges can access this functionality.&lt;/p>
&lt;p>For more information about the FIPS, refer to &lt;a href="https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips">https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips&lt;/a>.&lt;/p>
&lt;h2 id="enabling-the-fips-mode">Enabling the FIPS Mode&lt;/h2>
&lt;p>To enable the FIPS mode:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Log in to the ESA CLI Manager and navigate to &lt;strong>Preferences&lt;/strong>.&lt;/p>
&lt;/li>
&lt;li>
&lt;p>Enter the &lt;em>root&lt;/em> password and click &lt;strong>OK&lt;/strong>.&lt;/p></description></item><item><title>Basic Authentication for REST APIs</title><link>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_basic_auth/</link><pubDate>Mon, 01 Jan 0001 00:00:00 +0000</pubDate><guid>https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_preferences/aog_basic_auth/</guid><description>&lt;p>The &lt;strong>Basic Authentication&lt;/strong> mechanism provides only the user credentials to access protected resources on the server. The user credentials are provided in an authorization header to the server. If the credentials are accurate, then the server provides the required response to access the APIs.&lt;/p>
&lt;blockquote>
&lt;p>For more information about the Basic Authentication, refer &lt;a href="https://docs.protegrity.com/10.2/docs/aog/command_line_interface_cli_manager/working_with_administration/accessing_rest_api_resources/aog_working_with_basic_auth/">here&lt;/a>.&lt;/p>&lt;/blockquote>
&lt;h2 id="disabling-the-basic-authentication">Disabling the Basic Authentication&lt;/h2>
&lt;p>To disable the Basic Authentication:&lt;/p>
&lt;ol>
&lt;li>
&lt;p>Log in to the ESA CLI Manager and navigate to &lt;strong>Preferences&lt;/strong>.&lt;/p></description></item></channel></rss>