Users require granular control over ECLI (Embedded Command Line Interface) options within WCC, specifically to prevent access to general commands while still enabling functionality like exporting jobs and machines. The challenge lies in configuring EEM policies to achieve this fine-grained access without completely disabling the ECLI, and understanding the limitations of such configurations.
To limit the ECLI options available to users in WCC, configure the CommandExecute EEM policy for the WCC00004 application. Instead of using a broad resource definition like server/*, make the resource more specific to allow only desired commands.
Understand the CommandExecute Policy:
CommandExecute policy in EEM controls which ECLI commands users are permitted to execute on specific AutoSys instances.Configure Specific Resource Paths:
To allow only autorep commands (e.g., for exporting jobs):
Set the CommandExecute resource to:server/DEV_INS/autorep*
Note: DEV_INS should be replaced with the actual name of your AutoSys server instance as defined in WCC (visible in the ECLI "Servers" section).
This configuration restricts users to only being able to issue autorep commands via the ECLI, which is the command used for job export functionality.
To allow export/import of jobs, machines, connection profiles, resources, and calendars:
You will need to define multiple specific resources within the CommandExecute policy. For example:server/DEV_INS/jil*server/DEV_INS/autorep*server/DEV_INS/autocal_asc*
Note: Again, replace DEV_INS with your specific AutoSys server instance name.
Important Considerations and Limitations:
Verifying Policy Effectiveness:
$EIAM_HOME/logs/audit.log.
Rejected Command
<Event><Taxonomy>IAM.Runtime.authorizeWithSession.F.I</Taxonomy><Src>WCC0004</Src><Identity>ejmoperator</Identity><Method>authorizeWithSession</Method><Resource>Execute/CommandExecute/server/DEV_INS/autofakecommand -x</Resource><Error>18</Error><ErrorCode>EE_NOTALLOWED</ErrorCode><Attr>component</Attr><AttrVal>CommandLine</AttrVal><Attr>serverName</Attr><AttrVal>DEV_INS</AttrVal><Attr>command</Attr><AttrVal>autofakecommand -x</AttrVal>
The ejmoperator user attempted to run autofakecommand -x, which was rejected (Error 18, EE_NOTALLOWED).
Allowed Command:
<Event><Taxonomy>IAM.Runtime.authorizeWithSession.S.I</Taxonomy><Src>WCC0004</Src><Identity>ejmcommander</Identity><Method>authorizeWithSession</Method><Resource>Execute/CommandExecute/server/DEV_INS/autorep -M myhost</Resource><Error>0</Error><ErrorCode>EE_SUCCESS</ErrorCode><PolicyName>CommandExecuteDefault</PolicyName><Attr>component</Attr><AttrVal>CommandLine</AttrVal><Attr>serverName</Attr><AttrVal>DEV_INS</AttrVal><Attr>command</Attr><AttrVal>autorep -M myhost</AttrVal>
The ejmcommander user successfully ran autorep -M myhost (Error 0, EE_SUCCESS).