Installation process
Endpoint Privilege Management for Unix and Linux supports interactive installation methods and package installation methods. Before you choose which installation method to use, we recommend that you review the indicated section.
- Use pbinstall: pbinstall is a command-line script that can be used to install (or upgrade) Endpoint Privilege Management for Unix and Linux. It enables the user to review each setting during the installation process and customize the Endpoint Privilege Management for Unix and Linux installation on that host.
A wrapper script, run_pbinstall, is available to simplify installation of all Endpoint Privilege Management for Unix and Linux components.
- Use pbmakeremotetar:pbmakeremotetar enables you to clone an Endpoint Privilege Management for Unix and Linux installation on a host across other hosts. pbmakeremotetar is effective when you have multiple systems that are running the same Endpoint Privilege Management for Unix and Linux flavor and are to be configured identically.
- Use pbpatchinstall: pbpatchinstall enables you to install Endpoint Privilege Management for Unix and Linux patches on installations of Endpoint Privilege Management for Unix and Linux v4.0 and higher.
- Use package installers: For Solaris, Linux, HP-UX, and AIX, you can install Endpoint Privilege Management for Unix and Linux using package installers.
For more information, see the following:
Basic pbinstall information
The following list provides basic information about the pbinstall script:
- The pbinstall script is located in the Endpoint Privilege Management for Unix and Linux distribution in the powerbroker///install directory.
- pbinstall can be run from an Endpoint Privilege Management for Unix and Linux distribution CD or from an unpacked tar file. The pbinstall install script guides you through the installation and enables you to specify which Endpoint Privilege Management for Unix and Linux components to install.
- Run pbinstall on each machine that needs Endpoint Privilege Management for Unix and Linux components installed.
- Superuser authority is required to run pbinstall. Before running pbinstall, either log on as root or use the su command to acquire root privileges.
- pbinstall can be run with various options.
Note
For more information, see Installation Programs.
Navigate the pbinstall menu and choose option values
The pbinstall script presents options in a numbered menu. Because of the large number of options, the menu is divided into pages. You use the navigation characters listed below to navigate the pages. To use a navigation character, type the character and press Enter.
The navigation characters are as follows:
- C: Continue installation
- N: Next menu page
- P: Previous menu page
- R: Redraw menu (not shown due to space limitations)
- X: Exit script without performing any configuration
To set the value of a menu option, type the number for that option and press Enter. Specify the value for the option and press Enter. For Yes and No options, you can specify N, n, Y, or y.
You might also see the following prompts, which are synonymous:
- Press return to continue
- Hit return to continue
Review the messages preceding these prompts on the screen. Press Return, Enter, , or for the installation process to continue.
pbinstall installation menu conventions
Conventions for the pbinstall installation menu include the following:
- Some options are displayed only if other options or the system configuration allow them.
- The item numbers vary with the configuration of the installation target system.
- The step numbers for the basic Endpoint Privilege Management for Unix and Linux installation instructions do not necessarily match the option numbers in the pbinstall installation script.
- If the current value of an option forces the line to be longer than 80 characters, the value within the square brackets is truncated and appended with ellipsis (…).
- Menu pages are limited to a maximum of 18 items. To view additional options, use the navigation characters: N (for next page) or P (for previous page).
- The values that are shown in the installation menu are examples and not necessarily the defaults or recommended values for your system. Your defaults and existing values (on a re-installation) will appear in the appropriate places when pbinstall executes.
- Yes and No answers are not case-sensitive and may be abbreviated as y and n.
- pbinstall is designed for 24 line by 80 column displays. Using a larger display is also supported.
- pbinstall does not support smaller displays.
- Although white space, line terminators, and shell (sh) meta characters are usually allowed in file and directory names, Endpoint Privilege Management for Unix and Linux does not support them. Do not use them in Endpoint Privilege Management for Unix and Linux file or directory names.
Note
For more information, see the following:
- On a basic installation, Step-by-Step Instructions for a Basic Installation Using pbinstall
Installation events using pbinstall
When pbinstall runs, the following actions occur:
- If client registration is used:
- The /etc/pb.settings file is downloaded from the primary license server.
- The /etc/pb.key (or equivalent) is downloaded from the primary license server.
- If SSL is enabled the SSL server certificates are downloaded from the primary license server.
- The REST services daemon (pbconfigd) is installed and configuration made to the operating system to enable service management through the native operating system service manager.
- The /etc/pb.settings file is created. It contains various parameters and settings that Endpoint Privilege Management for Unix and Linux uses at run time. Endpoint Privilege Management for Unix and Linux cannot run without this file.
- The installation process also creates a work file, /etc/pb.cfg. The pb.cfg file is used to locate the Endpoint Privilege Management for Unix and Linux components during upgrades and uninstalls.
- The /etc/pb.key file is created. It stores the encryption key. This step is completed only if the Endpoint Privilege Management for Unix and Linux encryption option is selected.
- If you choose to add entries to /etc/services, then the following two steps are performed:
- The /etc/services file is backed up to /etc/services.sybak.####. The installation script backs up files using the name format {original_name}.sybak.####, where #### is a number between 0000 and 9999. By default, up to 10 of these files are kept in the directory. This backup method is especially advantageous when performing multiple installations and uninstalls.
- Entries are added to the /etc/services file for pbmasterd, pblocald, and pblogd.
- If the system uses inetd.conf for superdaemon configuration, then the following three steps are performed. If the system uses xinetd.conf, then similar steps are performed.
- The /etc/inetd.conf file is backed up to a file called: /etc/inetd.sybak.####.
- Entries are added to the inetd.conf file. These entries enable inetd to start instances including:
- pbmasterd: Validate a monitored task request.
- pblocald: Execute a monitored task request that has been accepted by pbmasterd.
- pblogd: Perform logging.
- pblighttpd: Run Endpoint Privilege Management REST services.
- The inetd superdaemon restarts.
- The appropriate Endpoint Privilege Management for Unix and Linux programs and online man pages are copied to the specified installation directories.
- During the installation, you have the option to view the generated install script. This option is only for troubleshooting by BeyondTrust Technical Support; the generated install scri
EPM-UL pbinstall installation menu
The pbinstall script is a comprehensive list of the installation menu options and default prompts. The items displayed vary depending on your system, options selected, and any settings that are found from a current or removed Endpoint Privilege Management for Unix and Linux installation. The values used here are for demonstration purposes and are not necessarily the defaults or recommended values for a given installation.
The following list shows all the menu options. However, the menu option numbers that you see might differ from this list, depending on your Endpoint Privilege Management for Unix and Linux flavor.
Opt | Description | [Value] |
---|---|---|
1 | Install Everything Here (Demo Mode)? | [yes] |
2 | Install License Server? | [yes] |
3 | Install Registry Name Services Server? | [no] |
4 | Install Client Registration Server? | [yes] |
5 | Install Policy Server Host? | [yes] |
6 | Allow Policy & Log Caching? | [yes] |
7 | Enable Role-Based Policy? | [yes] |
8 | Install Run Host? | [yes] |
9 | Install Submit Host? | [yes] |
10 | Enable Policy & Logs Caching for client? | [yes] |
11 | Install PBSSH? | [yes] |
12 | Install sudo Policy Server? | [yes] |
13 | Install Log Host? | [yes] |
14 | Enable Logfile Tracking and Archiving? | [yes] |
15 | Is this a Log Archiver Storage Server? | [yes] |
16 | Is this a Log Archiver Database Server? | [yes] |
17 | Install File Integrity Monitoring Policy Server? | [yes] |
18 | Install REST Services? | [yes] |
19 | List of License Servers? | [kandor] |
20 | Central License | [] |
21 | Enable License History? | [no] |
22 | Installation base directory? | [/opt/pbul] |
23 | Database directory? | [/opt/pbul/dbs] |
24 | Path to Password Safe 'pkrun binary' | [] |
25 | Password Safe certificate file | [] |
26 | Primary failover Password Safe appliances | [] |
27 | Support short names in Password Safe certificate? | [no] |
28 | Install Synchronization program? | [yes] |
29 | Install Utilities: pbvi, pbnvi, pbmg, pbumacs, pbless | [yes] |
30 | Install pbksh? | [yes] |
31 | Install pbsh? | [yes] |
32 | Install man pages? | [yes] |
33 | Will this host use a Log Host? | [yes] |
34 | AD Bridge Integration? | [yes] |
35 | Install AD Bridge? | [no] |
36 | Enable failover event logging to AD Bridge? | [yes] |
37 | Enable successful connection event logging to AD Bridge? | [yes] |
38 | Enable event logging to AD Bridge? | [no] |
39 | AD Bridge shared libraries | [/opt/pbis/lib64/libeventlo...] |
40 | Integration with BeyondInsight? | [yes] |
41 | Send event log records to BeyondInsight? | [yes] |
42 | BeyondInsight hostname | [none] |
43 | BeyondInsight Workgroup ID | [BeyondTrust Workgroup] |
44 | BeyondInsight SSL port number | [443] |
45 | BeyondInsight SSL Client Certificate | [none] |
46 | BeyondInsight SSL CA file | [none] |
47 | Index IO Logs using Solr? | [yes] |
48 | Solr hostname | [none] |
49 | Solr SSL port number | [8443] |
50 | Solr SSL CA file | [none] |
51 | Solr SSL Client key file | [none] |
52 | Solr SSL Client Certificate file | [none] |
53 | Registry Name Service database path? | [/opt/pbul/dbs/pbsvc.db] |
54 | Client Registry database path? | [/opt/pbul/dbs/pbregclnt.db] |
55 | sudo policy database file path and filename? | [/opt/pbul/dbs/pbsudo.db] |
56 | Directory location for sudo policy files? | [/opt/pbul/sudoersdir] |
57 | Synchronization program can be initiated from this host? | [yes] |
58 | Daemons location | [/usr/sbin] |
59 | Number of reserved spaces for submit process information of pbmasterd, pblogd, and pblocald | [80] |
60 | Administration programs location | [usr/bin] |
61 | User programs location | [usr/local/bin] |
62 | Policy include (sub) file directory | [/opt/pbul/policies] |
63 | Policy file name | [/opt/pbul/policies/pb.conf] |
64 | User man page location | [/usr/local/man/man1] |
65 | Admin man page location | [/usr/local/man/man8] |
66 | Log Archive Storage Server name | [] |
67 | Log Archive destination directory? | [/var/log/pblogarchive] |
68 | Log Archiver Database Server name | [] |
69 | Log Tracking Database file path and filename? | [/opt/pbul/dbs/pblogarchive.db] |
70 | Enable Caching of Log Locations? | [yes] |
71 | Event Logfile Name Cache Database file path? | [/opt/pbul/dbs/pblogcache.db] |
72 | I/O Logfile Name Cache Database file path? | [/opt/pbul/dbs/pbiologcache.db] |
73 | REST Service installation directory? | [/usr/lib/beyontrust/pb/rest] |
74 | Install REST API sample code? | [no] |
75 | REST API sample code directory? | [/usr/local/lib/pbrest] |
76 | Pblighttpd user | [pblight] |
77 | Create Pblighttpd user? | [yes] |
78 | Pblighttpd user UID | [] |
79 | Pblighttpd user GID | [] |
80 | Pblighttpd user group name | [pblight] |
81 | File Integrity Monitor db path? | [/opt/pbul/dbs/pbfim.db] |
82 | Configure systemd? | [yes] |
83 | Command line options for pbmasterd | [-ar] |
84 | Policy Server Delay | [500] |
85 | Policy Server Protocol Timeout | [-1] |
86 | pbmasterd diagnostic log | [/var/log/pbmasterd.log] |
87 | Eventlog filename | [/var/log/pb.eventlog] |
88 | Configure eventlog rotation via size? | [] |
89 | Configure eventlog rotation path? | [] |
90 | Configure eventlog rotation via cron? | [no] |
91 | Validate Submit Host Connections? | [no] |
92 | List of Policy Servers to submit to | [kandor] |
93 | pbrun diagnostic log? | [none] |
94 | pbssh diagnostic log? | [none] |
95 | Allow Local Mode? | [yes] |
96 | Additional secured task checks? | [no] |
97 | Suppress Policy Server host failover error messages? | [yes] |
98 | List of Policy Servers to accept from | [kandor] |
99 | pblocald diagnostic log | [/var/log/pbocald.log] |
100 | Command line options for pblocald | [] |
101 | Syslog pblocald sessions? | [no] |
102 | Record PTY sessions in utmp/utmpx? | [yes] |
103 | Validate Policy Server Host Connections? | [no] |
104 | List of Log Hosts | [kandor] |
105 | Command line options for pblogd | [] |
106 | Log Host Delay | [500] |
107 | Log Host Protocol Timeout | [-1] |
108 | pblogd diagnostic log | [/var/log/pblogd.log] |
109 | List of log reserved filesystems | [none] |
110 | Number of free blocks per log system filesystem | [0] |
111 | Command line options for pbsyncd | [] |
112 | Sync Protocol Timeout | [-1] |
113 | pbsyncd diagnostic log | [/var/log/pbsyncd.log] |
114 | pbsync diagnostic log | [/var/log/pbsync.log] |
115 | pbsync sychronization time interval (in minutes) | [15] |
116 | Add installed shells to /etc/shells | [no] |
117 | pbksh diagnostic file | [/var/log/pbksh.log] |
118 | pbsh diagnostic file | [/var/log/pbsh.log] |
119 | Stand-alone pblocald command | [none] |
120 | Stand-alone root shell default iolog | [/pbshell.iolog] |
121 | Use syslog? | [yes] |
122 | Syslog facility to use? | [LOG_AUTHORITY] |
123 | Base Daemon port number | [24345] |
124 | pbmasterd port number | [24345] |
125 | pblocald port number | [24346] |
126 | pblogd port number | [24347] |
127 | pbguid port number | [24348] |
128 | REST Service port number | [24351] |
129 | Add entries to '/etc/services' | [yes] |
130 | Allow non-reserved port connections | [yes] |
131 | Inbound Port range | [1024-65535] |
132 | Outbound Port range | [1025-65535] |
133 | Network encryption options | [aes-256:keyfile=/etc/pb.key] |
134 | Event log encryption options | [none] |
135 | I/O log encryption options | [none] |
136 | Policy file encryption options | [none] |
137 | Settings file encryption type | [none] |
138 | REST API encryption options | [aes-256:keyfile=/etc/pb.re...] |
139 | Configure with Kerberos v5? | [yes] |
140 | Policy Server Daemon Kerberos Principal | [pbmasterd] |
141 | Local Daemon Kerberos Principal | [pblocald] |
142 | Log Daemon Kerberos Principal | [pblogd] |
143 | Sync Daemon Kerberos Principal | [pbsyncd] |
144 | Kerberos Keytab File | [/etc/krb5.keytab] |
145 | Enforce High Security Encryption? | [yes] |
146 | SSL Configuration? | [requiressl sslfirst] |
147 | SSL pbrun Certificate Authority Directory? | [none] |
148 | SSL pbrun Certificate Authority File? | [none] |
149 | SSL pbrun Cipher List? | [cipherlist=TLSv1.2:!SSLv2:...] |
150 | SSL pbrun Certificate Directory? | [none] |
151 | SSL pbrun Certificate File? | [none] |
152 | SSL pbrun Private Key Directory? | [none] |
153 | SSL pbrun Private Key File? | [none] |
154 | SSL pbrun Certificate Subject Checks? | [none] |
155 | SSL Server Certificate Authority Directory | [none] |
156 | SSL Server Certificate Authority File? | [none] |
157 | SSL Server Cipher List? | [cipherlist=TLSv1.2:!SSLv2:...] |
158 | SSL Server Certificate Directory? | [none] |
159 | SSL Server Certificate File? | [/etc/pbssl.pem] |
160 | SSL Server Private Key Directory? | [none] |
161 | SSL Server Private Key File? | [/etc/pbssl.pem] |
162 | SSL Server Certificate Subject Checks? | [none] |
163 | SSL Certificate Country Code | [US] |
164 | SSL Certificate State/Province | [AZ] |
165 | SSL Certificate Location (Town/City) | [Phoenix] |
166 | SSL Certificate Organizational Unit/Department | [Security] |
167 | SSL Certificate Organization | [BeyondTrust] |
168 | Configure Privilege Management for Unix & Linux with LDAP? | [yes] |
169 | Install BeyondTrust built-in third-party libraries? | [no] |
170 | BeyondTrust built-in third-party library directory | [/usr/lib/beyondtrust/pb] |
171 | Kerberos shared library default directory | [none] |
172 | Kerberos libkrb5 shared library filename | [none] |
173 | Kerberos libgssapi_krb5 shared library filename | [none] |
174 | Kerberos libcom_err shared library filename | [none] |
175 | Kerberos libk5crypto shared library filename | [none] |
176 | SSL shared library default directory | [none] |
177 | SSL libssl shared library filename | [none] |
178 | SSL libcrypto shared library filename | [none] |
179 | LDAP shared library default directory | [none] |
180 | LDAP libldap shared library filename | [none] |
181 | LDAP liblber shared library filename | [none] |
182 | Use PAM? | [no] |
183 | PAM service for password verification | [none] |
184 | PAM session service | [none] |
185 | PAM suppress password prompting? | [yes] |
186 | PAM library file name | [none] |
187 | Call pam_setcred? | [no] |
188 | Enable non-PAM Solaris Projects? | [no] |
189 | Solaris Projects library file name | [none] |
190 | Allow Remote Jobs? | [yes] |
191 | UNIX Domain Socket directory | [none] |
192 | Reject Null Passwords? | [no] |
193 | Enable TCP keepalives? | [no] |
194 | Name Resolution Timeout | [0] |
Step-by-step instructions for a basic installation using pbinstall
The basic pbinstall procedure assumes that you have successfully downloaded and unarchived the Endpoint Privilege Management for Unix and Linux distribution or have an Endpoint Privilege Management for Unix and Linux CD.
Note
For additional information about Endpoint Privilege Management for Unix and Linux components and more options for pbinstall, see the following:
Run a basic installation using pbinstall
To perform a basic Endpoint Privilege Management for Unix and Linux installation using the pbinstall script, use the following procedure:
- If you downloaded Endpoint Privilege Management for Unix and Linux using the Web or FTP, then do the following. To install Endpoint Privilege Management for Unix and Linux from a CD, skip to step 2.
- Create the /opt/beyondtrust directory if it does not already exist.
- Extract the Endpoint Privilege Management for Unix and Linux installation files by executing the following command:
gunzip -c pmul<flavor_version>.tar.Z | tar xvf -
- To install from a CD, insert it into the CD-ROM drive on your machine. Mount the CD by entering:
mount /cdrom <device_name>
Note
Your system may require additional command options or have a different mount point. For more information, see the mount main page for your system.
-
Navigate to the appropriate install directory on the file system or CD.
-
Start the pbinstall script with the following command:
./pbinstall
-
Press Enter after you read the initial messages.
-
A prompt will ask if this is the first installation in the enterprise:
Endpoint Privilege Management for Unix and Linux must have a designated Primary Server to provide control and consistency for all its components/entities. The Primary Server must be installed and configured first before all other hosts. Is this the first installation in the enterprise (designated Primary Server) [yes]?
-
If you install a new client you may wish to use the client registration facility. When first invoking pbinstall, the following is displayed:
Client registration provides a method of automatic configuration based upon a profile provided by your Primary License Server. To use this functionality you will need to know specific parameters from your Primary License Server setup. See the installation guide for details. Do you wish to utilize client registration? [no]? yes Enter the Application ID generated on the Primary License Server: appid Enter the Application Key generated on the Primary License Server: 0b5e954e- be38-424d-b7e7-3e0ec91d9301 Enter the Primary License Server address/domain name for registering clients: master.organization.com Enter the Primary License Server REST TCP/IP port [24351]: Enter the Registration Client Profile name[default]:
If you wish to enable automatic configuration using client registration, you need the following:
- REST Application ID
- REST Application Key
- Network name or IP address of the primary license server that has been configured to enable client registration
- REST services port
- Name of the client registration profile configured by the administrator
Once you have the data and have entered them into the pbinstall prompts, the configuration of the client is downloaded and the installation continues. All defaults used during the rest of the installation process are from the information retrieved.
-
A prompt asks if you want to install the Registry Name Services.
The Registry Name Service of Endpoint Privilege Management for Unix and Linux facilitates location of other services within the pmul enterprise with the aid of a centralized data repository. IMPORTANT: It is highly recommended to utilize client registration if you are using Registry Name Services. Do you wish to utilize Registry Name Service? [yes]?
If you answer no to the previous question, Is this the first installation?, you are asked to register the host as a Registry Name Service client.
To enable the use of Registry Name Services each client needs to be registered with the primary server.
Please complete the questions below to enable this registration. Enter the Application ID generated on the Primary Registry Name Server: appid Enter the Application Key generated on the Primary Registry Name Server: appkey Enter the address/domain name for the Primary Registry Name Server: host Enter the Primary Registry Name Server REST TCP/IP port [24351]:
If RNS is specified, the defaults for submitmasters, acceptmasters, logservers, etc, are changed to asterisk (*), and registrynameserver yes is added to the prospective pb.settings.
-
The pbinstall menu displays a set of options similar to the following:
Opt | Description | [Value] |
---|---|---|
1 | Install Everything Here (Demo Mode)? | [yes] |
2 | Install License Server? | [yes] |
3 | Install Registry Name Services Server? | [no] |
4 | Install Client Registration Server? | [yes] |
5 | Install Policy Server Host? | [yes] |
6 | Allow Policy & Log Caching? | [yes] |
7 | Enable Role-Based Policy? | [yes] |
8 | Install Run Host? | [yes] |
9 | Install Submit Host? | [yes] |
10 | Enable Policy & Logs Caching for client? | [yes] |
11 | Install PBSSH? | [yes] |
12 | Install sudo Policy Server? | [yes] |
13 | Install Log Host? | [yes] |
14 | Enable Logfile Tracking and Archiving? | [yes] |
15 | Is this a Log Archiver Storage Server? | [yes] |
Note
The following instructions select the required options to do a basic installation only.
- Choose your options.
- Use the c navigation command to continue the installation.
- A prompt asks if you want to view the install script. Specify n.
Important
This option is intended for troubleshooting by BeyondTrust Technical Support. The generated install script contains thousands of lines of code.
- A prompt asks if you want to install the product now. Specify y.
The Endpoint Privilege Management for Unix and Linux install script executes and installs Endpoint Privilege Management for Unix and Linux components on this machine.
- If an Endpoint Privilege Management for Unix and Linux policy file exists, it is not modified. Starting with version 8.0, if you do not have a policy file, a default policy is installed by default. The files {prefix}pbul_policy.conf{suffix} and {prefix}pbul_functions.conf{suffix} are created in the default directory /opt/pbul/policies from v9.4.3+ and /etc prior to v9.4.3. {prefix}pbul_policy.conf{suffix} is then included in the main policy (by default /opt/pbul/policies/{prefix}pb.conf {suffix} from v9.4.3+ and /etc/{prefix}pb.conf {suffix} prior to v9.4.3).
Important
An empty policy file rejects all Endpoint Privilege Management for Unix and Linux commands. For information about writing policy files, see the Endpoint Privilege Management for Unix and Linux Policy Language Guide.
- Change the permissions on the policy file so that it can be read by root only:
chmod 600 /opt/pbul/policies/pb.conf
The installation is now complete.
Advanced installation instructions using pbinstall
This section provides step-by-step instructions for using all the installation options that are available using the pbinstall script. These options are discussed in the order that they are used in the Endpoint Privilege Management for Unix and Linux installation menu.
Note
These steps are optional and should be selected after reviewing Installation considerations and Installation preparation.
In addition, some options do not appear unless certain combinations of options are selected.
Note
For more information, see Complete the Installation.
Start pbinstall
If you downloaded Endpoint Privilege Management for Unix and Linux using the Web or FTP, do the following.
- Extract the tarball files into /opt/beyondtrust by executing the following command:
gunzip -c pmul<flavor_version>.tar.Z | tar xvf -
- Navigate to the installation directory:
cd /opt/beyondtrust/powerbroker/<version>/<flavor>/install
- Execute the installation script by typing:
./pbinstall
- After reading the initial messages, press Enter.
Note
For more information, see the following:
On how to install Endpoint Privilege Management for Unix and Linux from a CD, Step-by-Step Instructions for a Basic Installation Using pbinstall.
If you are using a prefix or suffix, or both, Prefix and Suffix Installation Instructions
Use the menu options
Note
Depending on your operating system and other factors, the option numbers listed in the following table may not match the menu option numbers you see on the screen, and some items might not be available. In these steps, choose this option means to type the number that corresponds to the option on the screen and press Enter.
Opt # | Menu Item | Description | ||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1 | Install Everything Here (Demo Mode)? | Choose this option and specify y to install the policy server host, run host, submit host, and log host on this computer. This option is useful for testing or demonstrating Endpoint Privilege Management for Unix and Linux on a single computer in your environment. | ||||||||||||||||||||||||||
2 | Install license server? | Specify y to install a license server which provides product license management for Endpoint Privilege Management for Unix and Linux. | ||||||||||||||||||||||||||
3 | Install Registry Name Services Server? | Specify y to install the Registry Name Service which provides the product with a method of addressing and locating other parts of Endpoint Privilege Management for Unix and Linux. Installing the Registry Name Services Server makes installing the Sudo Policy Server mandatory. | ||||||||||||||||||||||||||
4 | Install Client registration Server? | Specify y to install the client registration Server which provides a repository for customized install profiles. If you already chose to install the Registry Name Service, installing client registration Server is mandatory. | ||||||||||||||||||||||||||
5 | Install Policy Server Host? | Choose this option and specify y to install the policy server host component on this host. | ||||||||||||||||||||||||||
6 | Allow Policy & Log Caching? | This option is only available when you are installing on a policy server or a client registration server. If you choose this option and specify y on a client registration server, any policy server that registers with this host will automatically have the policy caching feature enabled. If you choose this option and specify y on a policy server, you can optionally enable the policy caching feature on any of this server's clients so they can function even in a disconnected state from the network. Enabling this feature automatically enables the required role-based policy feature. | ||||||||||||||||||||||||||
7 | Enable Role-Based Policy? | This option is only available when you are installing on a policy server. Choose this option and specify y to enable the role-based policy feature. This feature is mandatory if you enabled the Cached Policy feature. | ||||||||||||||||||||||||||
8 | Install Run Host? | Choose this option and specify y to install the run host component on this host. | ||||||||||||||||||||||||||
9 | Install Submit Host? | Choose this option and specify y to install the submit host component on this host.This option installs pbrun. | ||||||||||||||||||||||||||
10 | Enable Policy & Logs Caching for client? | Available in v23.1.0 and later, and only on Linux. This option is available when installing an EPM-UL client host which registered with a policy server that allows policy caching. Specify y if you want this client programs like pbrun to function even without network connection. | ||||||||||||||||||||||||||
11 | Install PBSSH | This item is available only when you specify y for the previous item. Using the Endpoint Privilege Management for Unix and Linuxpbssh program, you can control access to, and activities on, SSH-managed devices. The pbssh program uses the SSH protocol (or, optionally, the telnet protocol) to connect to devices that do not have Endpoint Privilege Management for Unix and Linux installed on them; such devices can include Windows computers and certain network devices. Choose this option and specify y to install the ppssh program. | ||||||||||||||||||||||||||
12 | Install sudo Policy Server? | Enter y to configure the server to be able to store and process sudo policies. Installing the Sudo Policy Server is mandatory if installing the Registry Name Services Server. | ||||||||||||||||||||||||||
13 | Install Log Host? | Choose this option and specify y to install the log host component on this host. | ||||||||||||||||||||||||||
14 | Enable Logfile Tracking and Archiving? | If the installation detects that the user is installing the policy server host or the log host on the current machine, it displays in the menu the install question Enable Logfile Tracking and Archiving? and set it to yes by default. When the answer to this question is set to yes, the installer prompts the user for the Log Archive Storage Server name and the Log Archiver Database Server name. Log Tracking and Archiving requires REST services to be installed. | ||||||||||||||||||||||||||
15 | Is this a Log Archiver Storage Server? | If the current machine is the intended Log Archive Database Server, it must have the REST service preinstalled on it. It is also required to have the logarchivedb setting in pb.settings, which specifies the SQLite database that stores the location of logfiles, as well as where the archiving information is located. If the answer to this question is set to yes, the install displays the following question: Configure this host to be a Log Archive Storage Server which receives logfiles to archive and stores them in the appropriate path: Yes This host will be configured as a Log Archiver Storage Server No This host will NOT be configured as a LogArchiver Storage Server Set as a Log Archiver Storage Server? [no]? yes The Log Archive Storage Server which will accept and place archived logfiles in a designated pathname. Ensure that it is located in filesystem with ample free space to accommodate incoming logfiles. Enter the default directory path for archived logfiles []: /pbul/logsIt also sets the Log Archive Storage Server name to the hostname of the current machine. | ||||||||||||||||||||||||||
16 | Is this a Log Archiver Database Server? | If the current machine is the intended Log Archive Database Server, it must have the REST service preinstalled on it. It is also required to have the logarchivedb setting in pb.settings, which specifies the SQLite database that stores the location of logfiles, as well as where the archiving information is located. If the answer to this question is set to yes, the install displays the following question: Configure this host to be a Log Archive Database Server which creates and maintains the log tracking database: Yes This host will be configured as a Log Archiver Database Server No This host will NOT be configured as a LogArchiver Database Server Set as a Log Archiver Database Server? [no]? yes Endpoint Privilege Management for Unix and Linux will create and maintain a SQLite database to track the location of logfiles. Specify the path and filename of the SQLite logfile tracking database file and ensure that the given database file system has ample space for growth. Enter the path and filename of Endpoint Privilege Management for Unix and Linux's SQLite log tracking database file []: /var/log/pbul90_tracking.dbIt also sets the Log Archive Database Server name to the hostname of the current machine. | ||||||||||||||||||||||||||
17 | Install File Integrity Monitoring Policy Server? | Specify y to install and configure the centralized repository for FIM policies. | ||||||||||||||||||||||||||
18 | Install REST Services? | This option is automatically enabled to install the Endpoint Privilege Management RESTful web-based API for product settings, policy configuration, and I/O log retrieval. When installing server-side components of Endpoint Privilege Management for Unix and Linux, installing the REST Services is mandatory. This option is automatically enabled to install the Endpoint Privilege Management RESTful web-based API for product settings, policy configuration, and I/O log retrieval. When installing server-side components of Endpoint Privilege Management for Unix and Linux, installing the REST Services is mandatory. | ||||||||||||||||||||||||||
19 | List of license servers | Enter a space-separated list of hostnames of license servers within the Endpoint Privilege Management for Unix and Linux installation. The primary license server is first in the list, followed by secondary license servers listed in order of failover. If Registry Name Service is configured, this value should be an asterisk (*), denoting that the value is held within the service database. | ||||||||||||||||||||||||||
20 | Central License | Enter the JSON-formatted data which represents the license you received from your BeyondTrust representative. | ||||||||||||||||||||||||||
21 | Enable License History? | Choose yes to enable the logging of license usage history | ||||||||||||||||||||||||||
22 | Installation base directory? | By default, Endpoint Privilege Management for Unix and Linuxcreates subdirectories and files it needs under '/opt/pbul' by default. This menu option allows you to change the base directory path. The base directory provided must be:
| ||||||||||||||||||||||||||
23 | Database directory? | Choose this option and select a secure directory location. This path is assigned to the databasedir setting which defines the default location of databases used in Endpoint Privilege Management for Unix and Linux, when only the relative path is provided. | ||||||||||||||||||||||||||
24 | Path to Password Safe 'pkrun' binary | This item is available only if you choose to install PBSSH. Choose this option to specify where the BeyondTrustPassword Safepkrun binary resides. The pbssh command can use BeyondTrustPassword Safe for the userid’s password acquisition. To do this, Endpoint Privilege Management for Unix and Linux needs to know where the BeyondTrustPassword Safepkrun binary resides. Choose this option and do one of the following:
| ||||||||||||||||||||||||||
25 | Password Safe certificate file | [] | ||||||||||||||||||||||||||
26 | Primary failover Password Safe appliances | [] | ||||||||||||||||||||||||||
27 | Support short names in Password Safe certificate? | [no] | ||||||||||||||||||||||||||
28 | Install Synchronization program? | Choose this option and specify y to enable this host to participate in log synchronization. | ||||||||||||||||||||||||||
29 | Install Utilities: pbvi, pbnvi, pbmg, pbumacs, pbless | Choose this option and specify y to install the Endpoint Privilege Management for Unix and Linux utilities on this host. | ||||||||||||||||||||||||||
30 | Install pbksh? | Choose this option and specify y to install the pbksh component on this host. | ||||||||||||||||||||||||||
31 | Install pbsh? | Choose this option and specify y to install the pbsh component on this host. | ||||||||||||||||||||||||||
32 | Install man pages? | Choose this option and specify y to install the man pages. | ||||||||||||||||||||||||||
33 | Will this host use a Log Host? | Choose this option and specify y to log the components on this host to a log server. | ||||||||||||||||||||||||||
34 | AD Bridge Integration? | The pbinstall program does not detect whether AD Bridge is installed. Choose this option and specify one of the following:
| ||||||||||||||||||||||||||
35 | Install AD Bridge? | [no] | ||||||||||||||||||||||||||
36 | Enable failover event logging to AD Bridge? | [yes] | ||||||||||||||||||||||||||
37 | Enable successful connection event logging to AD Bridge? | [yes] | ||||||||||||||||||||||||||
38 | Enable event logging to AD Bridge? | [no] | ||||||||||||||||||||||||||
39 | AD Bridge shared libraries | [/opt/pbis/lib64/libeventlo...] | ||||||||||||||||||||||||||
40 | Integration with BeyondInsight? | This option is available for log servers and policy server hosts. This option allows the sending of eventlog records to BeyondInsight and indexing of I/O logs. | ||||||||||||||||||||||||||
41 | Send event log records to BeyondInsight? | [yes] | ||||||||||||||||||||||||||
42 | BeyondInsight hostname | [none] | ||||||||||||||||||||||||||
43 | BeyondInsight Workgroup ID | [BeyondTrust Workgroup] | ||||||||||||||||||||||||||
44 | BeyondInsight SSL port number | [443] | ||||||||||||||||||||||||||
45 | BeyondInsight SSL Client Certificate | [none] | ||||||||||||||||||||||||||
46 | BeyondInsight SSL CA file | [none] | ||||||||||||||||||||||||||
47 | Index IO Logs using Solr? | [yes] | ||||||||||||||||||||||||||
48 | Solr hostname | [none] | ||||||||||||||||||||||||||
49 | Solr SSL port number | [8443] | ||||||||||||||||||||||||||
50 | Solr SSL CA file | [none] | ||||||||||||||||||||||||||
51 | Solr SSL Client key file | [none] | ||||||||||||||||||||||||||
52 | Solr SSL Client Certificate file | [none] | ||||||||||||||||||||||||||
53 | Registry Name Service database path? | [/opt/pbul/dbs/pbsvc.db] | ||||||||||||||||||||||||||
54 | Client Registry database path? | [/opt/pbul/dbs/pbregclnt.db] | ||||||||||||||||||||||||||
55 | sudo policy database file path and filename? | [/opt/pbul/dbs/pbsudo.db] | ||||||||||||||||||||||||||
56 | Directory location for sudo policy files? | [/opt/pbul/sudoersdir] | ||||||||||||||||||||||||||
57 | Synchronization can be initiated from this host? | Choose this option and specify y to install pbsync to enable this host to start log synchronization. | ||||||||||||||||||||||||||
58 | Daemons location | Choose this option and specify a location for it. We recommend that you use the default location, but you can choose to specify a different location. However, do not use system directories for this purpose. | ||||||||||||||||||||||||||
59 | Number of reserved spaces for submit process information of pbmasterd, pblogd, and pblocald [80] | Available in v8.0 and later, and only on Linux and AIX platforms, this feature modifies the pbmasterd, pblocald and pblogd command line arguments (viewable via ps) to include information about the originating pbrun request. This allows administrators to determine which pbrun/pbmasterd/pblocald/pblogd processes are related to a given request. Choose this option and specify the number of space to reserve in the process list of pbmasterd, pblocald and pblogd processes by adding a -i to the daemon startup files. This new command line option is used to reserve space in the process list so that the command line argument space can be updated with information about the originating request (submituser, submithost, runcommand, and the pbrun pid). | ||||||||||||||||||||||||||
60 | Administration programs location | Choose this option and specify a location for administration programs. We recommend that you use the default location, but you can choose to specify a different location. However, do not use system directories for this purpose. | ||||||||||||||||||||||||||
61 | User programs location | Choose this option and specify a location for user programs. We recommend that you use the default location, but you may choose to specify a different location. However, do not use system directories for this purpose. | ||||||||||||||||||||||||||
62 | Policy include (sub) file directory | Choose this option and specify a directory for the policy files. We recommend that you use the default location, but you can specify a different location. However, do not use system directories for this purpose. | ||||||||||||||||||||||||||
63 | Policy file name | Enter the Endpoint Privilege Management for Unix and Linux policy file name. | ||||||||||||||||||||||||||
64 | User man page location | [/usr/local/man/man1] | ||||||||||||||||||||||||||
65 | Admin man page location | [/usr/local/man/man8] | ||||||||||||||||||||||||||
66 | Log Archive Storage Server name | The Log Archive Storage Server is the destination host where the logfiles are archived. The PBUL REST service must be pre-installed on that machine. There is no default value for this field, but the user is not allowed to proceed without specifying the appropriate server name. The value is saved in the logarchivehost setting. | ||||||||||||||||||||||||||
67 | Log Archive destination directory? | [/var/log/pblogarchive] | ||||||||||||||||||||||||||
68 | Log Archiver Database Server name | The Log Archive Database Server is the destination host where the logfile tracking database resides. The REST service must be preinstalled on that machine. There is no default value for this field, but the user is not allowed to proceed without specifying the appropriate server name. The value is saved in the logarchivedbhost setting. | ||||||||||||||||||||||||||
69 | Log Tracking Database file path and filename? | [/opt/pbul/dbs/pblogarchive.db] | ||||||||||||||||||||||||||
70 | Enable Caching of Log Locations? | [yes] | ||||||||||||||||||||||||||
71 | Event Logfile Name Cache Database file path? | [/opt/pbul/dbs/pblogcache.db] | ||||||||||||||||||||||||||
72 | I/O Logfile Name Cache Database file path? | Enter the path of the database file to cache the location of event and I/O logfiles. It is used when integrating BeyondInsight for Unix and Linux with Endpoint Privilege Management for Unix and Linux. Enter none to disable the feature. | ||||||||||||||||||||||||||
73 | REST Service installation directory? | This menu item is enabled only if REST services are to be installed. | ||||||||||||||||||||||||||
74 | Install REST API sample code? | This menu item is enabled only if REST services are to be installed. | ||||||||||||||||||||||||||
75 | REST API sample code directory? | [/usr/local/lib/pbrest] | ||||||||||||||||||||||||||
76 | Pblighttpd user | The user name used to run the REST services as. The default value is pblight. This user is created if you answer yes to the menu option Create Pblighttpd User?. This menu item is enabled only if installing REST Services. | ||||||||||||||||||||||||||
77 | Create Pblighttpd user? | [yes] | ||||||||||||||||||||||||||
78 | Pblighttpd user UID | [] | ||||||||||||||||||||||||||
79 | Pblighttpd user GID | [] | ||||||||||||||||||||||||||
80 | Pblighttpd user group name | Enter a user group name or use the default value. The pblighttpd user specified in step 73 is assigned to the group name provided.
| ||||||||||||||||||||||||||
81 | File Integrity Monitor db path? | [/opt/pbul/dbs/pbfim.db] | ||||||||||||||||||||||||||
82 | Configure systemd? | Choose this option and specify y to configure the file. Endpoint Privilege Management for Unix and Linux can be configured into the systemd, inetd, xinetd, launchd, or SMF superdaemons, which are OS-dependent. These superdaemons are used to listen on a TCP/IP port for inbound connections requesting EPM-UL daemon services. When the superdaemon detects a connection request, it forks a copy of the EPM-UL daemon to serve the request. If you specify no, any EPM-UL installation that is configured with the specified prefix and/or suffix is removed from the superdaemon configuration. This menu option is platform dependent. On older RHEL or other operating systems using inetd or xinetd, it may display Configure inetd or xinetd, while on Solaris, it displays Configure Solaris Services. | ||||||||||||||||||||||||||
83 | Command line options for pbmasterd | Choose this option and specify the command line options that you want. Available syntax and command line options for pbmasterd are: Syntax: [-arsV] [-e logfile] [--disable_optimized_runmode] -a: Send the job acceptance messages to syslog. -e: Use the log file as the pbmasterd diagnostic log file. The -e command line option overrides the syslog setting in the pb.settings file. You must specify the file name if you use the -e option. -r: Send the job rejection messages to syslog. -s: Send the error messages to syslog. The -s command line option overrides the syslog setting in the pb.settings file, if you want to change it in the future. -V: Print the version number mismatch messages. none: Erase all options. --disable_optimized_runmode: Suppresses optimized run mode for any tasks that are authorized by this policy server host. The installation is currently set to use the syslog in the Endpoint Privilege Management for Unix and Linuxpb.settings file. This setting is the default. | ||||||||||||||||||||||||||
84 | Policy Server Delay | Choose this option and specify the length of time (in milliseconds) that a pbrun command should wait for an initial connection to a policy server host. If a connection does not occur within a specified number of milliseconds, then the command uses another host that is specified in the pb.settings file for submitmasters. | ||||||||||||||||||||||||||
85 | Policy Server Protocol Timeout | Choose this option and specify the length of time the daemon should wait for a response from a policy server host or the time a policy server host should wait for a response from another Endpoint Privilege Management for Unix and Linux program. | ||||||||||||||||||||||||||
86 | pbmasterd diagnostic log | Choose this option and specify a location. This option enables you to specify where the pbmasterd diagnostic log is located. | ||||||||||||||||||||||||||
87 | Eventlog filename | Choose this option and specify a location. This option enables you to specify where the event log file is located. | ||||||||||||||||||||||||||
88 | Configure eventlog rotation via size | Choose this option and specify a size for event log rotation. | ||||||||||||||||||||||||||
89 | Configure eventlog rotation path | Choose this option and specify a path where the event log is moved to. | ||||||||||||||||||||||||||
90 | Configure eventlog rotation via cron | Choose this option to add a cron job to rotate the eventlog, and specify the cron minute, hour, days-of-the-month, month, and days-of-the-week fields. | ||||||||||||||||||||||||||
91 | Validate Submit Host Connections? | Choose this option and specify one of the following settings. The Endpoint Privilege Management for Unix and Linux policy server daemon (pbmasterd) can use name resolution to validate the host name and IP address of the submit host connection to a policy server host.
| ||||||||||||||||||||||||||
92 | List of Policy Servers to submit to | Choose this option and do the following:
| ||||||||||||||||||||||||||
93 | pbrun diagnostic log? | Choose this option and specify a location for the diagnostic log. This option is typically used only when requested by BeyondTrust Technical Support. | ||||||||||||||||||||||||||
94 | pbssh diagnostic log? | The BeyondTrustEndpoint Privilege Management for Unix and Linuxpbssh program can maintain a separate, individual host diagnostic log file. This log file is typically only used when requested by BeyondTrust Technical Support. Specify a full path specification for the pbssh diagnostic log file or none for none. | ||||||||||||||||||||||||||
95 | Allow Local Mode? | Choose this option and specify y to allow Local Mode. This option allows the requested secured task to replace the executing copy of pbrun. Local Mode executes secured tasks on the submit host only. | ||||||||||||||||||||||||||
96 | Additional secured task checks? | Choose this option and specify whether to enable additional secured task checks. This option determines whether the run host or submit host performs an additional check on the security of the requested command. This check helps to ensure that the command cannot be compromised by a user other than root or the user running the Endpoint Privilege Management for Unix and Linux command (for example, sys, oracle). This setting is used on run hosts or submit hosts using Local Mode. The policy language variable runsecurecommand can be set by the configuration policy on the policy server host for the same effect.
| ||||||||||||||||||||||||||
97 | Suppress Policy Server host failover error messages? | When a connection to policy server host fails, Endpoint Privilege Management for Unix and Linux fails over to another available policy server host (if configured), and generate an error message regarding the event. Choose this option and do one of the following:
| ||||||||||||||||||||||||||
98 | List of Policy Servers to accept from | Choose this option and then do the following:
| ||||||||||||||||||||||||||
99 | pblocald diagnostic log | Choose this option and specify a directory and file name for it. | ||||||||||||||||||||||||||
100 | Command line options for pblocald | Choose this option and specify the command line options that you want. Available syntax and command line options for pblocald are:[-sV] [-e logfile] [-m master_host]
| ||||||||||||||||||||||||||
101 | Syslog pblocald sessions? | Choose this option and specify y to log pblocald accepted and rejected requests to syslog. | ||||||||||||||||||||||||||
102 | Record PTY sessions in utmp/utmpx? | Choose this option and specify y to record Endpoint Privilege Management for Unix and Linux terminal sessions in the utmp (or utmpx) file. | ||||||||||||||||||||||||||
103 | Validate Policy Server Host Connections? | Choose this option and specify one of the following settings. The Endpoint Privilege Management for Unix and Linux local daemon (pblocald) can use name resolution to validate the host name and IP address of the policy server host connection to a run host.
| ||||||||||||||||||||||||||
104 | List of Log Hosts | Choose this option and specify which machines are to be log hosts. Endpoint Privilege Management for Unix and Linux needs to know which machines you have selected as log hosts. Log hosts are the hosts that policy server hosts select to perform event and I/O logging. To accomplish this task, policy server looks at the setting for logservers in the pb.settings file. This logservers setting contains the names of the log host machines or a netgroup. You can add, modify, or remove machine names by doing the following:
| ||||||||||||||||||||||||||
105 | Command line options for pblogd | Choose this option and specify the command line options that you want. The available syntax and command line options for pblogd are: [-ars] [-e logfile] -a: Record accept events on syslog. -e: Use logfile as the pblogd diagnostic log file. If you previously specified the pblogd log file as /var/log/pblogd.log, the -e command line option overrides the pblogd setting in the pb.settings file. -r: Record reject events on syslog. -s: Send error messages to syslog. If you have previously specified to use the syslog setting in the pb.settings file, the -s command line option overrides the settings file if you decide to change it in the future. none: Erase all options. | ||||||||||||||||||||||||||
106 | Log Host Delay | Choose this option and specify the length of time (in milliseconds) that a daemon should wait for an initial connection to a log host. If a connection does not occur within a specified number of milliseconds, then it tries another server that is specified in the logservers setting in the pb.settings file. | ||||||||||||||||||||||||||
107 | Log Host Protocol Timeout | Choose this option and specify the length of time a daemon should wait for a response from a log host or the time a log host should wait for a response from another Endpoint Privilege Management for Unix and Linux program. Enter the value of the log host protocol timeout (-1 to 1200000). 0 or -1 disables this timeout. -1 is the default. | ||||||||||||||||||||||||||
108 | pblogd diagnostic log | Choose this option and specify a location for it. This option enables you to specify the directory and file name for the pblogd diagnostic log. Enter none for no error reporting. | ||||||||||||||||||||||||||
109 | List of log reserved file systems | Choose this option to specify reserved file systems. Endpoint Privilege Management for Unix and Linux allows the log host to control the file system space and enables the immediate failover to the next log host.
| ||||||||||||||||||||||||||
110 | Number of free blocks per log system file | Choose this option and specify the minimum number of free blocks or enter 0 to have no minimum number of free blocks allowed for the file systems specified in the previous option. The valid values for the minimum number of free blocks are 0 to 2048000. | ||||||||||||||||||||||||||
111 | Command line options for pbsyncd | Choose this option and specify the command line options that you want. The available command line options for pbsyncd are: [-s] [-e logfile]
| ||||||||||||||||||||||||||
112 | Sync Protocol Timeout | Choose this option and specify the length of time a synchronization client or server should wait for protocol checks to be completed. Enter the value of the synchronization protocol timeout (-1 to 1200000). 0 or -1 disables this timeout. -1 is the default. | ||||||||||||||||||||||||||
113 | pbsyncd diagnostic log | Choose this option and specify the directory and file name for the pbsyncd diagnostic log. | ||||||||||||||||||||||||||
114 | pbsync diagnostic log | This option enables you to specify the directory and file name for the pbsync diagnostic log. | ||||||||||||||||||||||||||
115 | pbsync synchronization time interval (in minutes) | Choose this option to specify the time interval in minutes between synchronizations. | ||||||||||||||||||||||||||
116 | Add installed shells to /etc/shells | Choose this option and specify whether to add installed shells. The operating system can validate your Endpoint Privilege Management for Unix and Linux shells and then add them to /etc/shells.
| ||||||||||||||||||||||||||
117 | pbksh diagnostic file | Choose this option to specify the directory and file name for the pbksh diagnostic log. | ||||||||||||||||||||||||||
118 | pbsh diagnostic file | Choose this option to specify the directory and file name for the pbsh diagnostic log. | ||||||||||||||||||||||||||
119 | Stand-alone pblocald command | shell executes with the system in Single-User Mode, it is necessary to know which command to execute for some secured task requests that are handled by pblocald. This setting provides the Endpoint Privilege Management for Unix and Linux shell, running in Single-User Mode, with the pblocald command to execute. Specify the full command for the local daemon. Choose this option and indicate whether to specify a stand-alone pblocald command. When an Endpoint Privilege Management for Unix and Linux /usr/sbin/[prefix]pblocald[suffix] -s When you specify the command, any installation prefix or suffix must be included. Specify none to specify no command for the local daemon in Single-User Mode. | ||||||||||||||||||||||||||
120 | Stand-alone root shell default iolog | [/pbshell.iolog] | ||||||||||||||||||||||||||
121 | Use syslog? | Choose this option to specify whether to use the system syslog facility. The Endpoint Privilege Management for Unix and Linux programs can send errors reported by the policy server and local daemons to the syslog. If you decide to use the system’s syslog facility, then you must ensure that the facility selected for use by Endpoint Privilege Management for Unix and Linux is enabled according to your system’s documentation.
| ||||||||||||||||||||||||||
122 | Syslog facility to use? | Choose this option to specify the syslog facility to use. For Endpoint Privilege Management for Unix and Linux to use the syslog facility, it must be specified. The facilities that can be specified are:
| ||||||||||||||||||||||||||
123 | Base daemon port number | Unlike individual daemon ports, the base port may not be a Unix or Linux domain socket or a program name. Any daemon port that is already set to either a Unix or Linux domain socket or program name will not be changed. However, the used port number will be skipped. See assigning ports. Choose this option and do one of the following:
| ||||||||||||||||||||||||||
124 | pbmasterd port number | Choose this option to specify the port number for pbmasterd. The Endpoint Privilege Management for Unix and Linux policy server host daemon (pbmasterd) requires a dedicated port number or a Unix or Linux domain socket name to receive inbound secured task requests from submit hosts. See Important! in step 126. | ||||||||||||||||||||||||||
125 | pblocald port number | Choose this option to specify the port number for pblocald. The Endpoint Privilege Management for Unix and Linux run host daemon (pblocald) requires a dedicated port number or a Unix or Linux domain socket name to receive inbound secured task requests from policy server hosts. See Important! in menu item Base daemon port number. | ||||||||||||||||||||||||||
126 | pblogd port number | Choose this option to specify the port number for pblogd. The Endpoint Privilege Management for Unix and Linux log host daemon (pblogd) requires a dedicated port number or a Unix or Linux domain socket name to receive inbound secured task requests from policy server and local daemons. See Important! in menu item Base daemon port number. | ||||||||||||||||||||||||||
127 | pbsyncd port number | Choose this option to specify the port number for pbsyncd. The Endpoint Privilege Management for Unix and Linux log synchronization daemon (pbsyncd) requires a dedicated port number or a Unix or Linux domain socket name to receive inbound requests. See Important! in menu item Base daemon port number. | ||||||||||||||||||||||||||
128 | REST Service port number | Choose the TCP/IP port number on which the REST service is listening, on the primary policy manager. | ||||||||||||||||||||||||||
129 | Add entries to '/etc/services' | Choose this option and specify y to have the services entries added to /etc/services. Endpoint Privilege Management for Unix and Linux must be able to look up the port numbers to be used by the various Endpoint Privilege Management for Unix and Linux services. The port number lookup can be done from NIS after you manually create the appropriate NIS entries. Otherwise, these services should be listed in /etc/services. Only ports that are specified by number for the Endpoint Privilege Management for Unix and Linux daemons can have services added to /etc/services. Unix and Linux domain sockets and ports that are specified by name are not added to /etc/services by this installation procedure. On some systems you must put entries into your NIS services map (or reboot) because inetd ignores /etc/services after boot time. | ||||||||||||||||||||||||||
130 | Allow non-reserved port connections | Choose this option and choose one of the following:
| ||||||||||||||||||||||||||
131 | Inbound port range | The MinListeningPort setting in the pb.settings file determines the lower bound on the originating port range that may be used to make Endpoint Privilege Management for Unix and Linux connections on the listening side. The MaxListeningPort setting determines the upper bound on the originating port range that may be used to make Endpoint Privilege Management for Unix and Linux connections on the listening side. Choose this option and do the following:
| ||||||||||||||||||||||||||
132 | Outbound port range | The MinOutgoingPort setting in the pb.settings file determines the lower bound on the originating port range that may be used to make Endpoint Privilege Management for Unix and Linux connections on the originating side. The MaxOutgoingPort setting determines the upper bound on the originating port range that may be used to make Endpoint Privilege Management for Unix and Linux connections on the originating side. Choose this option and do the following:
| ||||||||||||||||||||||||||
133 | Network encryption options | Before specifying any file types are to be encrypted, see Network Traffic and File Encryption. Choose this option and do one of the following:
Administrators must ensure that all hosts are using the same encryption pair; otherwise, the hosts cannot communicate with each other.
| ||||||||||||||||||||||||||
134 | Event log encryption options | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
135 | I/O log encryption options | Choose this option and do one of the following:
Administrators must ensure that all hosts are using the same encryption pair; otherwise, the hosts cannot communicate with each other.
| ||||||||||||||||||||||||||
136 | Policy file encryption options | Choose this option and do the following:
| ||||||||||||||||||||||||||
137 | Settings file encryption type | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
138 | REST API encryption options | Configure encryption for the REST service Application Key database. Choose this option and do one of the following:
| ||||||||||||||||||||||||||
139 | Configure with Kerberos v5? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
140 | Policy Server Daemon Kerberos Principal | [pbmasterd] | ||||||||||||||||||||||||||
141 | Local Daemon Kerberos Principal | [pblocald] | ||||||||||||||||||||||||||
142 | Log Daemon Kerberos Principal | [pblogd] | ||||||||||||||||||||||||||
143 | Sync Daemon Kerberos Principal | [pbsyncd] | ||||||||||||||||||||||||||
144 | Kerberos Keytab File | [/etc/krb5.keytab] | ||||||||||||||||||||||||||
145 | Enforce High Security Encryption | Enabling High Security enforces configuration to adhere to FIPS 140-2 security. Non-FIPS compatible encryption and hashing algorithms will be disabled. SSL running in strict FIPS mode will be enabled, enhancing the security of the installation. | ||||||||||||||||||||||||||
146 | SSL Configuration? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
147 | SSL pbrun Certificate Authority Directory? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
148 | SSL pbrun Certificate Authority File? | Choose this option and do one of the following:
Failure to specify this file name results in failed communication negotiation. | ||||||||||||||||||||||||||
149 | SSL pbrun Cipher List? | SSL provides a variety of algorithms that can be used for encryption. This option enables you to restrict the set of encryption algorithms that are used by pbrun for server communication to a subset of those ciphers that are available to SSL. Choose this option and do one of the following:
| ||||||||||||||||||||||||||
150 | SSL pbrun Certificate Directory? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
151 | SSL pbrun Certificate File? | Choose this option and do one of the following:
Failure to specify this file name results in failed communication negotiation. | ||||||||||||||||||||||||||
152 | SSL pbrun Private Key Directory? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
153 | SSL pbrun Private Key File? | Choose this option and do one of the following:
Failure to specify this file name results in failed communication negotiation. | ||||||||||||||||||||||||||
154 | SSL pbrun Certificate Subject Checks? | The sslpbrunverifysubject setting enables strings or substrings of the subjects of SSL certificates to be checked and accepted by pbrun from pbmasterd. Choose this option and do one of the following:
| ||||||||||||||||||||||||||
155 | SSL Server Certificate Authority Directory? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
156 | SSL Server Certificate Authority File? | Choose this option and do one of the following:
Failure to specify this file name results in failed communication negotiation. | ||||||||||||||||||||||||||
157 | SSL Server Cipher List? | OpenSSL provides a variety of algorithms which can be used for encryption. This option enables you to restrict the set of encryption algorithms that are used by the SSL server for communication to a subset of those ciphers that are available to OpenSSL. Choose this option and do one of the following:
| ||||||||||||||||||||||||||
158 | SSL Server Certificate Directory? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
159 | SSL Server Certificate File? | Choose this option and do one of the following:
Failure to specify this file name results in failed communication negotiation. | ||||||||||||||||||||||||||
160 | SSL Server Private Key Directory? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
161 | SSL Server Private Key File? | Choose this option and do one of the following:
Failure to specify this file name results in failed communication negotiation. | ||||||||||||||||||||||||||
162 | SSL Server Certificate Subject Checks? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
163 | SSL Certificate Country Code | The Country Code used when creating client x509 certificates. | ||||||||||||||||||||||||||
164 | SSL Certificate State/Province | The State/Province used when creating client x509 certificates. | ||||||||||||||||||||||||||
165 | SSL Certificate Location/Town | The general location or town used when creating client x509 certificates. | ||||||||||||||||||||||||||
166 | SSL Certificate Organizational Unit | The organizational unit used when creating client x509 certificates. | ||||||||||||||||||||||||||
167 | SSL Certificate Organization | The organization used when creating client x509 certificates. | ||||||||||||||||||||||||||
168 | Configure Privilege Management for Unix & Linux with LDAP? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
169 | Install BeyondTrust built-in third-party libraries? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
170 | BeyondTrust built-in third-party library directory | Choose this option and specify the directory for the BeyondTrust built-in third-party libraries. You also need to specify a directory for your own built-in libraries in step 188 . | ||||||||||||||||||||||||||
171 | Kerberos shared library default directory | [none] | ||||||||||||||||||||||||||
172 | Kerberos libkrb5 shared library filename | [none] | ||||||||||||||||||||||||||
173 | Kerberos libgssapi_krb5 shared library filename | [none] | ||||||||||||||||||||||||||
174 | Kerberos libcom_err shared library filename | [none] | ||||||||||||||||||||||||||
175 | Kerberos libk5crypto shared library filename | [none] | ||||||||||||||||||||||||||
176 | SSL shared library default directory | [none] | ||||||||||||||||||||||||||
177 | SSL libssl shared library filename | [none] | ||||||||||||||||||||||||||
178 | SSL libcrypto shared library filename | [none] | ||||||||||||||||||||||||||
179 | LDAP shared library default directory | [none] | ||||||||||||||||||||||||||
180 | LDAP libldap shared library filename | [none] | ||||||||||||||||||||||||||
181 | LDAP liblber shared library filename | [none] | ||||||||||||||||||||||||||
182 | Use PAM? | Endpoint Privilege Management for Unix and Linux enables the use of Pluggable Authentication Modules (PAM) when Endpoint Privilege Management for Unix and Linux asks for password confirmation. The authentication and account management portions of this service are invoked whenever Endpoint Privilege Management for Unix and Linux verifies a password.
| ||||||||||||||||||||||||||
183 | PAM service for password verification | [none] | ||||||||||||||||||||||||||
184 | PAM session service | [none] | ||||||||||||||||||||||||||
185 | PAM suppress password prompting? | [yes] | ||||||||||||||||||||||||||
186 | PAM library file name | [none] | ||||||||||||||||||||||||||
187 | Call pam_setcred? | [no] | ||||||||||||||||||||||||||
188 | Enable non-PAM Solaris Projects? | [no] | ||||||||||||||||||||||||||
189 | Solaris Projects library file name | [none] | ||||||||||||||||||||||||||
190 | Allow Remote Jobs? | When this option is set to n, Endpoint Privilege Management for Unix and Linux prohibits the control of remotely executed jobs as follows:
| ||||||||||||||||||||||||||
191 | UNIX Domain Socket directory | When Endpoint Privilege Management for Unix and Linux determines that communication may occur using Unix or Linux domain sockets, there must be a protected directory that contains the sockets used for reconnects and backconnects. Using Unix and Linux domain sockets for communication between daemons on the same machine should be more efficient than TCP socket communications. The directory that is specified for Endpoint Privilege Management for Unix and Linux Unix and Linux domain sockets must be protected from non-root read and write access, and each of the parent directories must be protected from non-root write access. Choose this option and specify the directory for the Endpoint Privilege Management for Unix and Linux Unix or Linux domain socket. | ||||||||||||||||||||||||||
192 | Reject Null Passwords? | Choose this option and do one of the following:
| ||||||||||||||||||||||||||
193 | Enable TCP keepalives? | Endpoint Privilege Management for Unix and Linux enables the communication TCP connections to use the TCP stack’s keepalive feature. TCP keepalives can be useful in cases where a firewall keeps track of idle TCP connections and terminates the sessions prematurely.Choose this option and do one of the following:
| ||||||||||||||||||||||||||
194 | Name Resolution Timeout | Endpoint Privilege Management for Unix and Linux attempts to obtain fully qualified domain names when a pblogd, pblocald, pbmasterd, or pbrun session is started. This setting defines the timeout period (in seconds) to be used for the request to expire.Choose this option and do one of the following:
|
Custom installations
The preferred methods for installing Endpoint Privilege Management for Unix and Linux are to use the command line pbinstall or pbmakeremotetar. In some instances, however, customer requirements may dictate some custom installation methods. This section covers several topics you should be aware of when planning a custom installation.
Before performing a custom installation of Endpoint Privilege Management for Unix and Linux, several issues need to be taken into consideration:
- Third-party libraries
- Executable files
- pb.settings file
- pb.key file
- Superdaemon configuration update
- Policy files for policy server hosts
There are some concerns about file system accessibility when using remotely mounted file systems. If an installation initially references files on a system with a different name (due to network and/or NIC configurations), the target system may have problems referencing the files correctly on the original host.
Third-party libraries
The appropriate third-party libraries are required when Endpoint Privilege Management for Unix and Linux is configured with SSL, Kerberos, or LDAP.
Executable files
Regardless of how Endpoint Privilege Management for Unix and Linux is placed on multiple systems, the proper executable and supporting files for the flavor and functions of the system must be visible and executable on that system.
It is possible to place the target of the administration, user, daemon, and/or utility programs on a remotely mounted file system. If this is done, the following issues must be addressed:
- The correct flavor for a system must be visible in the path for the given system.
- The superuser owner and suid setting of pbrun must be handled properly.
- The remotely mounted file system must be very reliable.
- Endpoint Privilege Management for Unix and Linux event, I/O, and daemon error logs are not supported when written to remotely mounted file systems.
Settings file
The /etc/pb.settings file must be properly configured for the functions that the new host is to perform, and the install scripts do this. When performing a custom install, each machine needs a correctly configured /etc/pb.settings file.
Key file
If encryption is used, then the pb.key file must be the same across all cooperating Endpoint Privilege Management for Unix and Linux installations. This is typically a manual distribution (because the pb.key file can be compromised if it is not handled properly) except when performing a remote installation using the archive from pbmakeremotetar.
superdaemon configuration
The superdaemons on the system must be configured for the Endpoint Privilege Management for Unix and Linux daemon configuration. The Endpoint Privilege Management for Unix and Linux installation performs this configuration automatically.
Note
For more information about superdaemons, see the documentation for your operating system.
Policy files for policy server hosts
Policy files and their subfiles must be copied between policy server hosts so that all of the policy servers use the same policies.
Endpoint Privilege Management for Unix and Linux, being an authentication tool and not a software distribution tool, does not automatically propagate policy files between policy server hosts. It is possible, and left as an exercise, to write procedures and policies that allow a central policy server host to propagate policy files to other policy server hosts.
Policy subfiles are copied if their name is specified as a constant. If the name is specified as a variable or string concatenation in the parent policy, then that policy is not copied by pbmakeremotetar and must be manually propagated to the target machines.
The policy subfile directory tree and directories referenced by the policies should be created to insure the multiple policy server hosts have the same directory tree.
Complete the installation
After you finish making menu choices, do the following to complete the installation:
- Use the c command to continue the installation.
- A prompt asks if all of the installation settings are correct. If they are correct, then specify y. If they are not correct, then specify n, make the necessary changes, and continue the previous step.
- A prompt asks if you want to view the installation script. Choose n.
Important
This option is intended for troubleshooting by BeyondTrust Technical Support; the generated installation script contains thousands of lines of code.
- A prompt asks if you want to install the product now. Press Enter to accept the default of y.
- The installation script now executes and installs Endpoint Privilege Management for Unix and Linux components on this machine.
- If an Endpoint Privilege Management for Unix and Linux policy file exists, it is not modified. If you do not have a policy file, then create a policy file using the following command:
touch /opt/pbul/policies/pb.conf
Important
An empty policy file rejects all Endpoint Privilege Management for Unix and Linux commands. For information about writing policy files, see the Endpoint Privilege Management for Unix and Linux Policy Language Guide.
- Change the permissions on the policy file so that it can be read by root only:
chmod 600 /opt/pbul/policies/pb.conf
The installation is now complete.
Example of a pbinstall execution
The following is an example of a pbinstall execution:
Example
/usr/local/lib/pbbuilder will be created as part of the installation /etc/pb.key exists.. taking a copy... Checking disk space... ... mountpoints are / /dev /net/build/build /net/nethome/nethome/tmp /net/nethome/nethome/user /pbis ... local mount points are / /dev Mount Point Needed Available Flag / 27117 359448716 works Disk Free space on selected mountpoints appears to be okay. Are all the installation settings correct [yes]? Creating the installation script: '/opt/beyondtrust/powerbroker/v8.0/pbx86_64_linuxA-8.0.0-06/install/PowerBroker_ Install' An install script has been made that will install BeyondTrust Endpoint Privilege Management according to your settings. View the install script [no]? Install BeyondTrust Endpoint Privilege Management for Unix and Linux now [yes]? Executing '/opt/beyondtrust/powerbroker/v8.0/pbx86_64_linuxA-8.0.0- 06/install/PowerBroker_Install' Creating settings file /etc/pb.settings Removing PowerBroker service definitions (if any) from /etc/services. Adding PowerBroker service definitions to /etc/services. Removing any PowerBroker definitions from SuperDaemon xinetd file /etc/xinetd.conf Adding PowerBroker definitions to SuperDaemon configurations /etc/xinetd.conf. Installed /usr/lib/beyondtrust/pb/libcom_err.so.3.0 Installed /usr/lib/beyondtrust/pb/libgssapi_krb5.so.2.2 Installed /usr/lib/beyondtrust/pb/libk5crypto.so.3.0 Installed /usr/lib/beyondtrust/pb/libkrb5.so.3.2 Installed /usr/lib/beyondtrust/pb/libcrypto.so.0.9.8 Installed /usr/lib/beyondtrust/pb/libssl.so.0.9.8 Installed /usr/lib/beyondtrust/pb/liblber-2.3.so.0.2.12 Installed /usr/lib/beyondtrust/pb/libLDAP-2.3.so.0.2.12 Installed /usr/lib/beyondtrust/pb/libcurl.so.4.3.0 Created symbolic link /usr/lib/beyondtrust/pb/libcom_err.so.3 Created symbolic link /usr/lib/beyondtrust/pb/libcom_err.so Created symbolic link /usr/lib/beyondtrust/pb/libgssapi_krb5.so.2 Created symbolic link /usr/lib/beyondtrust/pb/libgssapi_krb5.so Created symbolic link /usr/lib/beyondtrust/pb/libk5crypto.so.3 Created symbolic link /usr/lib/beyondtrust/pb/libk5crypto.so Created symbolic link /usr/lib/beyondtrust/pb/libkrb5.so.3 Created symbolic link /usr/lib/beyondtrust/pb/libkrb5.so Created symbolic link /usr/lib/beyondtrust/pb/libcrypto.so.0 Created symbolic link /usr/lib/beyondtrust/pb/libcrypto.so Created symbolic link /usr/lib/beyondtrust/pb/libssl.so.0 Created symbolic link /usr/lib/beyondtrust/pb/libssl.so Created symbolic link /usr/lib/beyondtrust/pb/liblber-2.3.so.0 Created symbolic link /usr/lib/beyondtrust/pb/liblber-2.3.so Created symbolic link /usr/lib/beyondtrust/pb/libLDAP-2.3.so.0 Created symbolic link /usr/lib/beyondtrust/pb/libLDAP-2.3.so Created symbolic link /usr/lib/beyondtrust/pb/libcurl.so.4 Created symbolic link /usr/lib/beyondtrust/pb/libcurl.so Installed pbrun as /usr/local/bin/pbrun Installed /usr/local/man/man1/pbrun.1 Installed pbssh as /usr/local/bin/pbssh Installed /usr/local/man/man1/pbssh.1 Installed pbrunssh as /usr/local/bin/pbrunssh Installed pbmasterd as /usr/sbin/pbmasterd Installed /usr/local/man/man8/pbmasterd.8 Installed pbfwdevents as /usr/sbin/pbfwdevents Installed /usr/local/man/man8/pbfwdevents.8 Installed pblocald as /usr/sbin/pblocald Installed /usr/local/man/man8/pblocald.8 Installed pblogd as /usr/sbin/pblogd Installed /usr/local/man/man8/pblogd.8 Installed pbguid as /usr/sbin/pbguid Installed /usr/local/man/man8/pbguid.8 Installed pbsyncd as /usr/sbin/pbsyncd Installed /usr/local/man/man8/pbsyncd.8 Installed pbencode as /usr/sbin/pbencode Installed /usr/local/man/man8/pbencode.8 Installed pbhostid as /usr/sbin/pbhostid Installed /usr/local/man/man8/pbhostid.8 Installed pblicense as /usr/sbin/pblicense Installed /usr/local/man/man8/pblicense.8 Installed pbpasswd as /usr/sbin/pbpasswd Installed /usr/local/man/man8/pbpasswd.8 Installed pbsum as /usr/sbin/pbsum Installed /usr/local/man/man8/pbsum.8 Installed pbbench as /usr/local/bin/pbbench Installed /usr/local/man/man1/pbbench.1 Installed pbcheck as /usr/sbin/pbcheck Installed /usr/local/man/man8/pbcheck.8 Installed pbcall as /usr/local/bin/pbcall Installed pbless as /usr/local/bin/pbless Installed /usr/local/man/man1/pbless.1 Installed pbmg as /usr/local/bin/pbmg Installed /usr/local/man/man1/pbmg.1 Installed pbnvi as /usr/local/bin/pbnvi Installed /usr/local/man/man1/pbnvi.1 Installed pbumacs as /usr/local/bin/pbumacs Installed /usr/local/man/man1/pbumacs.1 Installed pbvi as /usr/local/bin/pbvi Installed /usr/local/man/man1/pbvi.1 Installed pbkey as /usr/sbin/pbkey Installed /usr/local/man/man8/pbkey.8 Installed pblog as /usr/sbin/pblog Installed /usr/local/man/man8/pblog.8 Installed pbreplay as /usr/sbin/pbreplay Installed /usr/local/man/man8/pbreplay.8 Installed pbmerge as /usr/sbin/pbmerge Installed /usr/local/man/man8/pbmerge.8 Installed pbsync as /usr/sbin/pbsync Installed /usr/local/man/man8/pbsync.8 Installed pbping as /usr/sbin/pbping Installed /usr/local/man/man8/pbping.8 Installed pbprint as /usr/sbin/pbprint Installed /usr/local/man/man8/pbprint.8 Installed pbksh as /usr/local/bin/pbksh Installed pbsh as /usr/local/bin/pbsh Installed pbreport as /usr/sbin/pbreport Installed /usr/local/man/man8/pbreport.8 Installed pbuvqrpg as /usr/sbin/pbuvqrpg Installed /usr/local/man/man8/pbuvqrpg.8 Installed pbversion as /usr/sbin/pbversion Installed /usr/local/man/man8/pbversion.8 Installed /usr/local/man/man8/pbinstall.8 Installed /usr/local/man/man8/pbuninstall.8 Installed /usr/local/man/man8/pbmakeremotetar.8 Installed /usr/local/man/man8/pbpatchinstall.8 Placing policy examples in '/usr/local/lib/pbbuilder' Placing pbguid html help files in '/usr/local/lib/pbbuilder' Installing /etc/pb.key Reloading SuperDaemon Configurations... Done Reloading SuperDaemon Configurations... ------------------------------------------------------------------------------------ Installing default role-based policy pbul_policy.conf and pbul_functions.conf in /opt/pbul/policies The main policy pbul_policy.conf will be included in /opt/pbul/policies/pb.conf Installed pbul_policy.conf as /opt/pbul/policies/pbul_policy.conf ------------------------------------------------------------------------------------ You will have to edit the /opt/pbul/policies/pb.conf file now. Installed pblighttpd as /usr/lib/beyondtrust/pb/rest/sbin/pblighttpd Installed pblighttpd-svc as /usr/lib/beyondtrust/pb/rest/sbin/pblighttpd-svc Installed /usr/lib/beyondtrust/pb/rest/lib/mod_access.so Installed /usr/lib/beyondtrust/pb/rest/lib/mod_dirlisting.so Installed /usr/lib/beyondtrust/pb/rest/lib/mod_fastcgi.so Installed /usr/lib/beyondtrust/pb/rest/lib/mod_indexfile.so Installed /usr/lib/beyondtrust/pb/rest/lib/mod_staticfile.so Installed /usr/lib/beyondtrust/pb/rest/..//pbsudoers_server.so Installed pbconfigd as /usr/lib/beyondtrust/pb/rest/sbin/pb900pbconfigd Installed pbrestcall as /usr/sbin/pbrestcall Starting pblighttpd-svc service.BeyondTrust Endpoint Privilege Management for Unix and Linux Installation terminated successfully.
pbmakeremotetar installation script
Deployment of Endpoint Privilege Management for Unix and Linux across multiple machines of the same platform type can be simplified by cloning the installations. Installation cloning is done by making a remote tarball using pbmakeremotetar, a menu-driven, interactive installation script.
pbmakeremotetar Installation Information
The section contains information about running an example pbmakeremotetar installation.
- pbmakeremotetar is used to clone an installed copy of Endpoint Privilege Management for Unix and Linux so it can be quickly installed on other hosts that use the same Endpoint Privilege Management for Unix and Linux flavor. The directory structure on the target systems must also be the same as on the host that is running pbmakeremotetar.
- pbmakeremotetar properly configures (as appropriate) /etc/services and the superdaemon configuration files (/etc/inetd.conf, /etc/xinetd.conf, or SMF).
- For Policy Server target installations, an initial installation (not a remote installation) must be done before any target remote installation. Doing so ensures that all licensing issues are handled properly.
- Different target system installation working directories should be used for different prefix and/or suffix versions of cloned installations.
- pbmakeremotetar scans the main policy file (by default /opt/pbul/policies/pb.conf from v9.4.3+ and /etc/pb.conf prior to v9.4.3) for included policy files and includes them in the tarball. If the main policy file is encrypted, pbmakeremotetar is not able to scan it for included policy files. Therefore, if the main policy file is encrypted, you must do one of the following:
- Restore the unencrypted policy file before running the pbmakeremotetar installation script.
- Specify each encrypted policy file in the editor session after answering y to the Do you wish to make changes to this list? prompt:
- Manually move the encrypted files to the target systems.
- For pbmakeremotetar/pbremoteinstall installations where integration with AD Bridge is desired, if AD Bridge is configured on the system where the Endpoint Privilege Management for Unix and Linux instance is cloned, when the cloned instance is installed, if the AD Bridge libraries are missing, then a warning message is displayed.
Remote installations using pbmakeremotetar
Remote installations using pbmakeremotetar perform the following three basic steps:
- Execute pbmakeremotetar.
- Make the created tar file available to the target system.
- Unarchive the tar file and execute remote_unpack from that tar file.
Example of a pbmakeremotetar execution
The following is an example of a pbmakeremotetar execution:
Example
# ./pbmakeremotetar -a /opt/beyondtrust/pb.tar Starting pbmakeremotetar main() from /opt/beyondtrust/powerbroker/v6.0/pbx86_ linuxB-6.0.0-01/install/. pbmakeremotetar This command is used to duplicate the current system's installation of BeyondTrust Endpoint Privilege Management for Unix and Linux to allow this duplication to be installed on one or more identically configured systems. x86_linuxB Hit return or enter to continue... Checking tar command for needed switches... Done checking tar command for needed switches... Making file /opt/beyondtrust/pb.tar for architecture x86_linuxB Reading /etc/pb.cfg Current additional files for deployment: [displays list of files] Do you wish to make changes to this list [no]? Building encapsulated tarball /etc/pb.cfg /etc/pb.conf /etc/pb.key /etc/pb.settings /etc/pb.key /opt/beyondtrust/powerbroker/v6.0/pbx86_linuxB-6.0.0-01/install/./pb.keyfiles /opt/beyondtrust/powerbroker/v6.0/pbx86_linuxB-6.0.0- 01/install/./pbremoteinstall /opt/beyondtrust/powerbroker/v6.0/pbx86_linuxB-6.0.0-01/install/./pb_install_ support /opt/beyondtrust/powerbroker/v6.0/pbx86_linuxB-6.0.0- 01/install/./pbmakeremotetar /opt/beyondtrust/powerbroker/v6.0/pbx86_linuxB-6.0.0-01/install/./pbuninstall /opt/beyondtrust/powerbroker/v6.0/pbx86_linuxB-6.0.0-01/install/./sy_install_ support /usr/lib/beyondtrust/pb/.BeyondTrustCreated /usr/lib/beyondtrust/pb/.pbinstalls /usr/lib/beyondtrust/pb/libcom_err.so /usr/lib/beyondtrust/pb/libcom_err.so.3 /usr/lib/beyondtrust/pb/libcom_err.so.3.0 /usr/lib/beyondtrust/pb/libcrypto.so /usr/lib/beyondtrust/pb/libcrypto.so.0 /usr/lib/beyondtrust/pb/libcrypto.so.0.9.7 /usr/lib/beyondtrust/pb/libgssapi_krb5.so /usr/lib/beyondtrust/pb/libgssapi_krb5.so.2 /usr/lib/beyondtrust/pb/libgssapi_krb5.so.2.2 /usr/lib/beyondtrust/pb/libk5crypto.so /usr/lib/beyondtrust/pb/libk5crypto.so.3 /usr/lib/beyondtrust/pb/libk5crypto.so.3.0 /usr/lib/beyondtrust/pb/libkrb5.so /usr/lib/beyondtrust/pb/libkrb5.so.3 /usr/lib/beyondtrust/pb/libkrb5.so.3.2 /usr/lib/beyondtrust/pb/liblber-2.3.so /usr/lib/beyondtrust/pb/liblber-2.3.so.0 /usr/lib/beyondtrust/pb/liblber-2.3.so.0.2.12 /usr/lib/beyondtrust/pb/libLDAP-2.3.so /usr/lib/beyondtrust/pb/libLDAP-2.3.so.0 /usr/lib/beyondtrust/pb/libLDAP-2.3.so.0.2.12 /usr/lib/beyondtrust/pb/libssl.so /usr/lib/beyondtrust/pb/libssl.so.0 /usr/lib/beyondtrust/pb/libssl.so.0.9.7 /usr/local/bin/pbbench /usr/local/bin/pbcall /usr/local/bin/pbksh /usr/local/bin/pbless /usr/local/bin/pbmg /usr/local/bin/pbnvi /usr/local/bin/pbrun /usr/local/bin/pbsh /usr/local/bin/pbumacs /usr/local/bin/pbvi /usr/local/man/man1/pbbench.1 /usr/local/man/man1/pbless.1 /usr/local/man/man1/pbmg.1 /usr/local/man/man1/pbnvi.1 /usr/local/man/man1/pbrun.1 /usr/local/man/man1/pbumacs.1 /usr/local/man/man1/pbvi.1 /usr/local/man/man8/pbcheck.8 /usr/local/man/man8/pbencode.8 /usr/local/man/man8/pbguid.8 /usr/local/man/man8/pbhostid.8 /usr/local/man/man8/pbkey.8 /usr/local/man/man8/pblicense.8 /usr/local/man/man8/pblocald.8 /usr/local/man/man8/pblog.8 /usr/local/man/man8/pblogd.8 /usr/local/man/man8/pbmasterd.8 /usr/local/man/man8/pbmerge.8 /usr/local/man/man8/pbpasswd.8 /usr/local/man/man8/pbprint.8 /usr/local/man/man8/pbreplay.8 /usr/local/man/man8/pbreport.8 /usr/local/man/man8/pbsum.8 /usr/local/man/man8/pbsync.8 /usr/local/man/man8/pbsyncd.8 /usr/local/man/man8/pbuvqrpg.8 /usr/sbin/pbcheck /usr/sbin/pbencode /usr/sbin/pbhostid /usr/sbin/pbkey /usr/sbin/pblocald /usr/sbin/pblog /usr/sbin/pblogd /usr/sbin/pbmasterd/usr/sbin/pbmerge /usr/sbin/pbpasswd /usr/sbin/pbprint /usr/sbin/pbreplay /usr/sbin/pbreport /usr/sbin/pbsum /usr/sbin/pbsync /usr/sbin/pbsyncd /usr/sbin/pbuvqrpg Building encapsulating tarball remote_unpack pb.tar.tar /opt/beyondtrust/pb.tar has been built
Make the tar file available to the remote system
To make the tar file available to the remote system, you can use FTP (image mode), NFS, or any other mechanism as long as the security and integrity of the binary tar file are maintained.
If tar –x warns about a directory checksum error, then the tar file archive may be corrupt because it was copied in ASCII, not binary (or image) mode.
Untar the remote archive and execute remote_unpack
When the tar file is made available to the remote system, a temporary working directory must be selected to unarchive the remote archive. An installation work directory other than /tmp should be selected (for the same reasons as with pbinstall). Unpacking the archive makes the encapsulated tar archive and a script called remote_unpack visible.
The remote_unpack script then executes. This script unpacks the encapsulated tar file (putting the files in their required places) and reconfigures the system files (/etc/services and the superdaemon configuration) for Endpoint Privilege Management for Unix and Linux.
The following listing shows an example execution of the remote_unpack script:
Example
# cd {workingdirectory} # tar -xvf {tarfilename}.tar x remote_unpack, 1250 bytes, 3 tape blocks x tarfilename.tar.tar, 48152576 bytes, 94048 tape blocks # ./remote_unpack Deploying executable files... x /usr/local/bin/pbrun, 4282296 bytes, 8364 tape blocks x /usr/local/man/man1/pbrun.1, 2852 bytes, 6 tape blocks x /usr/local/bin/pbbench, 3414416 bytes, 6669 tape blocks x /usr/local/man/man1/pbbench.1, 1152 bytes, 3 tape blocks x /usr/local/bin/pbless, 178964 bytes, 350 tape blocks x /usr/local/man/man1/pbless.1, 743 bytes, 2 tape blocks x /usr/local/bin/pbmg, 52 bytes, 1 tape blocks x /usr/local/man/man1/pbmg.1, 809 bytes, 2 tape blocks x /usr/local/bin/pbumacs, 52 bytes, 1 tape blocks x /usr/local/man/man1/pbumacs.1, 832 bytes, 2 tape blocks x /usr/local/bin/pbvi, 212000 bytes, 415 tape blocks x /usr/local/man/man1/pbvi.1, 1107 bytes, 3 tape blocks x /usr/local/bin/pbcall, 3585880 bytes, 7004 tape blocks x /usr/sbin/pblocald, 4714020 bytes, 9208 tape blocks x /usr/local/man/man8/pblocald.8, 1525 bytes, 3 tape blocks x /usr/sbin/pbcheck, 4202964 bytes, 8209 tape blocks x /usr/local/man/man8/pbcheck.8, 2824 bytes, 6 tape blocks x /usr/sbin/pbhostid, 191596 bytes, 375 tape blocks x /usr/local/man/man8/pbhostid.8, 815 bytes, 2 tape blocks x /usr/sbin/pbkey, 187548 bytes, 367 tape blocks x /usr/local/man/man8/pbkey.8, 1113 bytes, 3 tape blocks x /usr/sbin/pblog, 3836692 bytes, 7494 tape blocks x /usr/local/man/man8/pblog.8, 5346 bytes, 11 tape blocks x /usr/sbin/pbpasswd, 186536 bytes, 365 tape blocks x /usr/local/man/man8/pbpasswd.8, 1413 bytes, 3 tape blocks x /usr/sbin/pbreplay, 3550320 bytes, 6935 tape blocks x /usr/local/man/man8/pbreplay.8, 3522 bytes, 7 tape blocks x /usr/sbin/pbsum, 77872 bytes, 153 tape blocks x /usr/local/man/man8/pbsum.8, 853 bytes, 2 tape blocks x /usr/sbin/pbencode, 3163940 bytes, 6180 tape blocks x /usr/local/man/man8/pbencode.8, 927 bytes, 2 tape blocks x /usr/sbin/pbmasterd, 5505740 bytes, 10754 tape blocks x /usr/local/man/man8/pbmasterd.8, 1578 bytes, 4 tape blocks x /usr/sbin/pblogd, 3956552 bytes, 7728 tape blocks x /usr/local/man/man8/pblogd.8, 1015 bytes, 2 tape blocks x /usr/sbin/pbguid, 6537648 bytes, 12769 tape blocks x /usr/local/lib/pbbuilder/.BeyondTrustCreated, 29 bytes, 1 tape blocks x /usr/local/lib/pbbuilder/fileselect.html, 1075 bytes, 3 tape blocks x /usr/local/lib/pbbuilder/iolog.html, 2346 bytes, 5 tape blocks x /usr/local/lib/pbbuilder/log.html, 1139 bytes, 3 tape blocks x /usr/local/lib/pbbuilder/settings.html, 23014 bytes, 45 tape blocks x /usr/local/lib/pbbuilder/variables.html, 34964 bytes, 69 tape blocks x /usr/local/lib/pbbuilder/.BeyondTrustCreated, 29 bytes, 1 tape blocks x /usr/local/lib/pbbuilder/fileselect.html, 1075 bytes, 3 tape blocks x /usr/local/lib/pbbuilder/iolog.html, 2346 bytes, 5 tape blocks x /usr/local/lib/pbbuilder/log.html, 1139 bytes, 3 tape blocks x /usr/local/lib/pbbuilder/settings.html, 23014 bytes, 45 tape blocks x /usr/local/lib/pbbuilder/variables.html, 34964 bytes, 69 tape blocks x /opt/beyondtrust/pb/install/pbremoteinstall, 3362 bytes, 7 tape blocks x /opt/beyondtrust/pb/install/pbmakeremotetar, 14650 bytes, 29 tape blocks x /opt/beyondtrust/pb/install/pbuninstall, 11565 bytes, 23 tape blocks x /opt/beyondtrust/pb/install/pb_install_support, 13212 bytes, 26 tape blocks x /opt/beyondtrust/pb/install/sy_install_support, 93560 bytes, 183 tape blocks x /opt/beyondtrust/pb/install/platform, 5971 bytes, 12 tape blocks x /etc/pb.key, 1026 bytes, 3 tape blocks x /opt/beyondtrust/pb/install/pb.cfg, 1161 bytes, 3 tape blocks x /opt/beyondtrust/pb/install/pb.cfg.sparc_solaris7, 2 bytes, 1 tape blocks x /opt/beyondtrust/pb/install/pb.cfg.default, 2 bytes, 1 tape blocks x /etc/pb.settings, 1915 bytes, 4 tape blocks x /usr/local/man/man8/pbinstall.8, 6047 bytes, 12 tape blocks x /usr/local/man/man8/pbuninstall.8, 2569 bytes, 6 tape blocks x /usr/local/man/man8/pbmakeremotetar.8, 4239 bytes, 9 tape blocks x /etc/pb.conf, 202 bytes, 1 tape blocks Configure System now? [yes] Starting pbremoteinstall main() from /opt/beyondtrust//pb_xyzzy/pb/install Reading /opt/beyondtrust/pb/install/pb.cfg Reading /opt/beyondtrust/pb/install/pb.cfg.sparc_solaris7 Reading /opt/beyondtrust/pb/install/pb.cfg.default Removing PowerBroker service definitions (if any) from /etc/services. Removing PowerBroker service definitions (if any) from /etc/services. Adding PowerBroker service definitions to /etc/services. Looking for SuperDaemons to configure... Finished looking for SuperDaemons to configure... Removing any PowerBroker definitions from SuperDaemon inetd file /etc/inetd.conf Adding PowerBroker definitions to SuperDaemon configurations /etc/inetd.conf. Reloading SuperDaemon Configurations... Done Reloading SuperDaemon Configurations... /opt/beyondtrust/pb/install/pbremoteinstall ... Done
pbpatchinstall installation script
BeyondTrust occasionally releases patches to the Endpoint Privilege Management for Unix and Linux product that improve performance and fix problems. You install these patches with the pbpatchinstall installation script.
pbpatchinstall installation information
This section contains information about installing an Endpoint Privilege Management for Unix and Linux patch with the pbpatchinstall script.
pbpatchinstall determines the current release of Endpoint Privilege Management for Unix and Linux that is installed on the machine and whether the release is compatible with the current patch. Multiple patches can be installed.
Based on the type of Endpoint Privilege Management for Unix and Linux host that is installed on the machine (policy server host, submit host, log host, and so forth), pbpatchinstall copies only the appropriate files to the appropriate directories to replace the existing files. pbpatchinstall makes a backup copy of all replaced files. These backup files are then available to restore the original files if the patch needs to be removed.
Note
All Endpoint Privilege Management for Unix and Linux daemons running a process during the patch installation should be stopped before using pbpatchinstall and restarted after using pbpatchinstall.
After you extract an Endpoint Privilege Management for Unix and Linux patch tarball file, the patch version becomes part of the directory path. For example, in the patch directory: /opt/beyondtrust/powerbroker/v5.1/ pbx86_linuxA-5.1.2-03-sp1/install, the patch version is pbx86_linuxA-5.1.2-03-sp1.
The pbpatchinstall installation process performs the following:
- Inventories the Endpoint Privilege Management for Unix and Linux installation, using prefixes and/or suffixes (if any). Use the -p and/or -s arguments if you want pbpatchinstall to use prefixes and/or suffixes.
- Validates the existence and version of the Endpoint Privilege Management for Unix and Linux binary files that should be present for each component.
- Lists the Endpoint Privilege Management for Unix and Linux components that are currently installed.
The Endpoint Privilege Management for Unix and Linux patch release number must match the installed Endpoint Privilege Management for Unix and Linux release number. If the release numbers do not match, a prompt is displayed, stating that the patch release does not match the existing Endpoint Privilege Management for Unix and Linux release and asks if you want to install the patch release over the existing Endpoint Privilege Management for Unix and Linux release. To complete the installation, type y.
Note
To run the patch installation without this prompt, use the -f argument.
Example of a pbpatchinstall execution
The following is an example of a pbpatchinstall execution:
Example
#pwd /opt/beyondtrust/powerbroker/v5.1/pbx86_linuxB-5.1.1-03-sp1/install # ./pbpatchinstall Starting pbpatchinstall from /opt/beyondtrust/powerbroker/v5.1/pbx86_linuxB -5.1.1-03-sp1/install/.x86_linuxB BeyondTrust PowerBroker Patch Installation Checking MANIFEST against release directory Trying /etc/pb.settings Settings are from file='/etc/pb.settings' Reading /etc/pb.cfg PowerBroker version 5.1.0-08 established from /etc/pb.cfg PowerBroker components currently installed: run_host submit_host log_synchronization secure_gui_host utilities pbksh log_sync_initiator All installed binaries match Endpoint Privilege Management for Unix and Linux version 5.1.0-08 Version is not evaluated for binaries pbuvqrpg and pbnvi. Patch release 5.1.1 does not match Endpoint Privilege Management for Unix and Linux release 5.1.0 Install PowerBroker patch release 5.1.1 over Endpoint Privilege Management for Unix and Linux release 5.1.0? [no] y Checking disk space... ... mountpoints are / /boot /data /dev /net/nethome/nethome/user ... local mount points are / /boot /data /dev Mount Point Needed Available Flag / 1024 2921852 works /data 2590 126953328 works Disk Free space on selected mountpoints appears to be okay. Patched /usr/sbin/pbencode installed. Patched /usr/local/bin/pbbench installed. Patched /usr/local/bin/pbrun installed. Patched /usr/sbin/pbreport installed. Patched /usr/local/bin/pbksh installed. 6 files patched, replaced files moved to /opt/beyondtrust/powerbroker/v5.1/pbx86_linuxB-5.1.1-03- sp1/bin_patchbkp NOTE: In order to remove patch, directory /opt/beyondtrust/powerbroker/v5.1/pbx86_linuxB-5.1.1- 03-sp1/bin_patchbkp must be left in place. /etc/pb.cfg updated with patch information. 5.1.1-03-sp1 patches installed.
Prefix and suffix installation instructions
A prefixed or suffixed installation is performed by specifying the -p or -s arguments to pbinstall and pbuninstall, respectively. Both options take one argument: the prefix or suffix to be used.
With a prefix or suffix specified, or both, the names of all of the executable programs, services and ports, and default log file names are qualified with that prefix or suffix, or both.
Prefixes are always added to the beginning of the name. Suffixes, with the exception of the daemon error logs and man page file names, are added to the end of the name. Daemon error logs are named (for example) {prefix}pbmasterd{suffix}.log.
Note
You cannot use a prefixed or suffixed installation with Endpoint Privilege Management package installations.
If Endpoint Privilege Management for Unix and Linux is installed with a prefix or suffix, execute pbuninstall using the same prefix or suffix. Failure to correctly specify the prefix or suffix to pbuninstall results in either pbuninstall failing or the uninstall of the incorrect copy of Endpoint Privilege Management for Unix and Linux.
Note
The pb.cfg file is also prefixed or suffixed when it is created.
Note
For more information, see the following:
Run prefixed and suffixed installations
To run a prefix installation, type:
./pbinstall -p prefix
prefix is the prefix you are using.
To run a suffix installation, type:
./pbinstall -s suffix
suffix is the suffix you are using.
To run a prefix and suffix installation, type:
./pbinstall -p prefix -s suffix
prefix is the prefix and suffix is the suffix you are using.
Updated 4 days ago