Access to UNIX and Linux computers in System Center 2012 – Operations Manager uses three Run as profiles. One profile is associated with an unprivileged account while the other two accounts are associated with a privileged account or an unprivileged account that is elevated by using sudo or su.
In the simplest case, a privileged account has capabilities equivalent to a UNIX and Linux root account, while an unprivileged account has capabilities equivalent to a normal user account. However, with some computer versions of UNIX and Linux, and when you use sudo for privilege elevation, you can assign more specific capabilities to accounts. In support of such specific assignments, the following table lists the specific capabilities required by accounts that are assigned to each of the three Run as profiles. These descriptions are somewhat generic because information, such as exact file system paths, can vary among different UNIX and Linux computer versions.
The following table describes the required capabilities for accounts to communicate with the Operations Manager agent on a managed UNIX or Linux computer, but the agent itself must always run under the root account on the UNIX or Linux computer.
UNIX and Linux profile
To log the UNIX or Linux computer on to the network, authenticated by the Pluggable Authentication Modules (PAM). Must have the ability to run a background shell (not connected to a TTY). Interactive logons are not required.
To read any log file that was specified as unprivileged when a custom log file monitor was created, plus the ability to run /opt/microsoft/scx/bin/scxlogfilereader.
To fully run any command shell command that was specified as unprivileged when a command-line monitor, rule, or task was created.
To run /usr/bin/vmstat for the Run VMStat task.
To log the UNIX or Linux computer on to the network, authenticated by the PAM. Must have the ability to run a background shell (not connected to a TTY). Interactive logons are not required. In the case of an account that is elevated by using sudo, this requirement applies to the account before it is elevated.
To fully run any shell command line that was specified as privileged when a command-line monitor, rule, or discovery was created.
To have the following log file monitoring capabilities:
To read the log file to be monitored.
By default, log files such as Syslog are usually set to be readable only by root, and accounts assigned to this profile must be able to read these files. Instead of giving accounts full root privileges, the log file permissions could be changed to grant read access to a secure group, and accounts made a member of that group. Note that if the log file is periodically rotated, you must ensure that the rotation procedure maintains the group permissions.
To read any log file that was specified as privileged when a custom log file monitor was created.
To run /opt/microsoft/scx/bin/scxlogfilereader.
To run tasks, recoveries, and diagnostics. These requirements must be met only if the Operations Manager operator explicitly decides to run them.
Many recoveries include stopping and restarting a daemon process. These recoveries require the ability to run the service control interfaces (such as /etc/init.d for Linux, and svcadm for Solaris) in order to stop and restart it. Such service control interfaces typically require the ability to run the kill command against the daemon process and to run other basic UNIX and Linux commands.
The requirements for other tasks, recoveries, and diagnostics depend on the details of that particular action.
Agent maintenance profile, and for accounts used to install agents for initial monitoring.
To log the UNIX or Linux computer on to the network by using Secure Shell (SSH), authenticated by the PAM. Must have the ability to run a background shell (not connected to a TTY). Interactive logons are not required. In the case of an account that is elevated by using sudo, this requirement applies to the account before it is elevated.
To run the system package installation program, such as rpm on Linux, to install the Operations Manager agent.
To read and write the following directories, and to create them and any subdirectories under them if they do not exist:
To run the kill command against the running Operations Manager agent processes.
To start the Operations Manager agent.
To add and remove a system daemon, including the Operations Manager agent, by using platform tools to do so.
To run basic UNIX and Linux commands, such as cat, ls, pwd, cp, mv, rm, gzip (or equivalent).