<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SAS Studio security setup in Administration and Deployment</title>
    <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483549#M13804</link>
    <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently running SAS 9.4 M5 (For Linux) and SAS Studio 3.71. We also have users who use batch sas and SAS interactive. We&amp;nbsp;use grid with x nodes and the integration of SAS infra with grid is through LSF 9. Assuming a user logs into SAS Studio , he/she would be routed to one of the x grid nodes and the root directory (along with sub-dirs) are made available in the left palette of SAS Studio. Our current security setup is such that any user who would like to access SAS Studio application, has to -&lt;/P&gt;&lt;P&gt;1) His/ her unix ID needs to have access to SAS servers as well as the x Grid nodes&lt;/P&gt;&lt;P&gt;2) needs to be part of SAS Metadata (PAM auth verification)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now whenever the user logs into SAS Studio, we see 2 processes spawned under his/ her ID. Now we would like to configure te security in such a way that these jobs should not be spawned under the user's ID, rather there should be a common service account. So irrespective of whoever logs into SAS Studio (after the system authenticates him/ her), all processes should be owned by a service account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do we go about this? Any thoughts?&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 03 Aug 2018 16:15:55 GMT</pubDate>
    <dc:creator>Kamsher</dc:creator>
    <dc:date>2018-08-03T16:15:55Z</dc:date>
    <item>
      <title>SAS Studio security setup</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483549#M13804</link>
      <description>&lt;P&gt;Hi All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are currently running SAS 9.4 M5 (For Linux) and SAS Studio 3.71. We also have users who use batch sas and SAS interactive. We&amp;nbsp;use grid with x nodes and the integration of SAS infra with grid is through LSF 9. Assuming a user logs into SAS Studio , he/she would be routed to one of the x grid nodes and the root directory (along with sub-dirs) are made available in the left palette of SAS Studio. Our current security setup is such that any user who would like to access SAS Studio application, has to -&lt;/P&gt;&lt;P&gt;1) His/ her unix ID needs to have access to SAS servers as well as the x Grid nodes&lt;/P&gt;&lt;P&gt;2) needs to be part of SAS Metadata (PAM auth verification)&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Now whenever the user logs into SAS Studio, we see 2 processes spawned under his/ her ID. Now we would like to configure te security in such a way that these jobs should not be spawned under the user's ID, rather there should be a common service account. So irrespective of whoever logs into SAS Studio (after the system authenticates him/ her), all processes should be owned by a service account.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How do we go about this? Any thoughts?&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 16:15:55 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483549#M13804</guid>
      <dc:creator>Kamsher</dc:creator>
      <dc:date>2018-08-03T16:15:55Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Studio security setup</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483613#M13806</link>
      <description>&lt;P&gt;To launch SAS Workspace Servers using a service account instead of the requesting user account you can configure it for SAS Token Authentication - see &lt;A href="http://documentation.sas.com/?cdcId=bicdc&amp;amp;cdcVersion=9.4&amp;amp;docsetId=bisecag&amp;amp;docsetTarget=n0rhb6yftn8srbn1wqxpg2s0fzfd.htm&amp;amp;locale=en" target="_self"&gt;SAS Token Authentication&lt;/A&gt;&amp;nbsp;and &lt;A href="http://documentation.sas.com/?cdcId=bicdc&amp;amp;cdcVersion=9.4&amp;amp;docsetId=bisecag&amp;amp;docsetTarget=p06o3ymf2cuw16n1cmyi47t9icsn.htm&amp;amp;locale=en" target="_self"&gt;How to Configure SAS Token Authentication&lt;/A&gt;&amp;nbsp;in the&amp;nbsp;&lt;EM&gt;SAS 9.4 Intelligence Platform: Administration Security Administration Guide&lt;/EM&gt;.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Aug 2018 23:10:45 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483613#M13806</guid>
      <dc:creator>PaulHomes</dc:creator>
      <dc:date>2018-08-02T23:10:45Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Studio security setup</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483770#M13809</link>
      <description>Thanks Paul. I'll read the artifact you shared! &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;</description>
      <pubDate>Fri, 03 Aug 2018 13:38:39 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483770#M13809</guid>
      <dc:creator>Kamsher</dc:creator>
      <dc:date>2018-08-03T13:38:39Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Studio security setup</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483772#M13810</link>
      <description>&lt;P&gt;Out of experience, I advise against this. You lose all options of using operating system based user specific settings, like file system quotas etc&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 13:44:21 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483772#M13810</guid>
      <dc:creator>Kurt_Bremser</dc:creator>
      <dc:date>2018-08-03T13:44:21Z</dc:date>
    </item>
    <item>
      <title>Re: SAS Studio security setup</title>
      <link>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483834#M13811</link>
      <description>&lt;P&gt;As&amp;nbsp;&lt;a href="https://communities.sas.com/t5/user/viewprofilepage/user-id/11562"&gt;@Kurt_Bremser&lt;/a&gt;&amp;nbsp;correctly mentions in &lt;A href="I'm interested in understanding the business value / reason behind the type of configuration you are asking about. Would you be able to explain why this configuration is desired at your site?" target="_blank"&gt;his reply&lt;/A&gt;, the limitation of configuring SAS Token Authentication is that you&amp;nbsp;lose&lt;SPAN&gt;&amp;nbsp;granularity of host access on the workspace servers.&amp;nbsp;You'll need to be very aware of the privileges assigned to the&amp;nbsp;service account on the host operating system - if it's configured to have generous privileges, than any user's workspace server session will also have that generous access to the host OS (although you can apply some access restrictions via SAS metadata).&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I'm interested in understanding the business value / reason behind the type of configuration you are asking about.&amp;nbsp;Can you give us more info about&amp;nbsp;why this configuration is desired at your site?&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 03 Aug 2018 15:49:59 GMT</pubDate>
      <guid>https://communities.sas.com/t5/Administration-and-Deployment/SAS-Studio-security-setup/m-p/483834#M13811</guid>
      <dc:creator>shayne</dc:creator>
      <dc:date>2018-08-03T15:49:59Z</dc:date>
    </item>
  </channel>
</rss>

