Application Scenarios
CBH Specifications
Functions
-
Identity Authentication CBH authenticates users using mobile one-time passwords (OTPs), SMS messages, USB keys, and/or OTP tokens. This allows you to mitigate O&M risks caused by leaked credentials. CBH authenticates users using mobile one-time passwords (OTPs), SMS messages, USB keys, and/or OTP tokens. This allows you to mitigate O&M risks caused by leaked credentials. -
Account Management CBH establishes a visible, controllable, and manageable O&M system to centrally manage system user accounts and resource accounts for their entire lifecycle. With CBH, you can stop worrying many O&M risks such as shared accounts, temporary accounts, and uncontrollable permissions. CBH establishes a visible, controllable, and manageable O&M system to centrally manage system user accounts and resource accounts for their entire lifecycle. With CBH, you can stop worrying many O&M risks such as shared accounts, temporary accounts, and uncontrollable permissions. -
Permissions Control CBH supports fine-grained permission management so that you have complete control over which user can access the CBH system and which managed resources can be accessed by a specific system user, enabling protection for both the CBH system and managed resources. CBH supports fine-grained permission management so that you have complete control over which user can access the CBH system and which managed resources can be accessed by a specific system user, enabling protection for both the CBH system and managed resources.
-
O&M Audits You can audit behavior in the CBH system and O&M activities for managed resources, including Linux servers, Windows servers, and databases, as well as file transfer activities. The entire O&M process on a Linux or Windows server is recorded. You can audit behavior in the CBH system and O&M activities for managed resources, including Linux servers, Windows servers, and databases, as well as file transfer activities. The entire O&M process on a Linux or Windows server is recorded. -
Efficient O&M You can access CBH through a browser or third-party client, such as SecureCRT, Xshell, Xftp, WinSCP, Navicat, and Toad for Oracle. If you use a professional CBH instance, you can automate part of O&M work. You can access CBH through a browser or third-party client, such as SecureCRT, Xshell, Xftp, WinSCP, Navicat, and Toad for Oracle. If you use a professional CBH instance, you can automate part of O&M work. -
O&M Ticket Application During the O&M, if you do not have the required permissions for a certain resource, you can submit a ticket to apply for the permissions needed. During the O&M, if you do not have the required permissions for a certain resource, you can submit a ticket to apply for the permissions needed.
Documentation
Recommended for You
-
Database Security Service Audit database audits and prevent SQL injection. Audit database audits and prevent SQL injection. -
Data Security Center Identify, mask, and protect your sensitive data. Identify, mask, and protect your sensitive data. -
Cloud Certificate Manager