

Prevent vRealize Orchestrator lockouts
source link: https://rnelson0.com/2017/08/24/prevent-vrealize-orchestrator-lockouts/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.

Standard
Prevent vRealize Orchestrator lockouts
If you have played around with vRealize Orchestrator (and vCenter Orchestrator before it) for long enough, you have undoubtedly locked yourself out at least once, either at the console or in VAMI or both. KB 2069041 details the process to reset the password and it’s simple enough, for the most part. You still have to deal with a lockout period in both the console and VAMI, and since the only user that likely exists is root, it appears to me to be just a way to DoS yourself when you most desperately need access to your vRO. The lockout can be disabled, though.
While looking for the KB to reset the password, I found this article (if anyone knows who fdo is, please let me know, their profile page is blank) which describes how to disable the lockout at the console/ssh. Just edit /etc/pam.d/common-auth and comment out the line containing pam_tally2.so and you can get back in, whether you have changed root’s password or not. However, you cannot get into the VAMI still. Let’s see what else uses pam_tally2.so in the PAM configuration directory:
vro01:/var/log # grep tally /etc/pam.d/* /etc/pam.d/common-account:account required pam_tally2.so /etc/pam.d/common-account-vmware.local:account required pam_tally2.so /etc/pam.d/common-auth:#auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300 /etc/pam.d/common-auth-vmware.local:#auth required pam_tally2.so deny=3 onerr=fail even_deny_root unlock_time=86400 root_unlock_time=300 /etc/pam.d/vami-sfcb:auth required /lib64/security/pam_tally2.so deny=4 even_deny_root unlock_time=1200 root_unlock_time=1200 /etc/pam.d/vami-sfcb:account required /lib64/security/pam_tally2.so
Winner! There’s 3 different files (two are symlinks) containing that pattern and one has the word vami in it, bingo! Just get in and put a # in front of the auth line (the bolded one) to comment it out and suddenly you’ll be able to log in to the VAMI again. I do not know if this persists across updates, so you may want to revisit this after your next upgrade to be sure – I’ll come back and add a note whenever I do my next update.
You can now no longer DoS yourself, or be DoSed by accidental or malicious coworkers. However, keep in mind that this may violate your corporate standards for security, and that’s a political problem, not a technical one – perhaps in that situation, you can adjust the timers instead of disabling it entirely. I think it’s safe to say that this is perfect for everyone’s lab, though!
Recommend
-
141
Vanquish – Get to Shell
-
47
VMware and Google Cloud: building the hybrid cloud together with vRealize Orchestrator 2018-07-20admin
-
26
vRealize Orchestrator (8.2+ Feature Set) Integration in vRealize Automation Cloud. Francisco Hernand...
-
10
What’s New with vRealize Orchestrator 8.3 – Technical OverviewIn version 8.3 vRealize Orchestrator has introduced a new set of capabilities around usability and security...
-
13
Announcing VMware vRealize Orchestrator 8.4Announcing the latest capabilities in VMware vRealize Orchestrator 8.4. Today we are announcing VMware vRealize Orchestrator 8.4, the latest release of our IT workflow orchestrati...
-
5
New vRealize Orchestrator Plug-In for vRealize AutomationA very waited functionality, the VMware vRealize Orchestrator Plug-in for
-
37
Understanding vRealize Orchestrator REST API One topic that doesn’t seem to be explored in detailed is the use of vRealize Orc...
-
4
avi-vrealize-orchestrator-plugin Avi vRealize Orchestrator Plugin This project contains AVI vRO Plugin. To install plugin on the VRO, follow the steps ##Clone the repo to your local ...
-
7
Rest (in peace) API — Reports: Twitter’s sudden third-party client lockouts were intentional Internal chats suggest company has only "started to work on comms."...
-
3
EU right-to-repair regulations seek to punish third-party lockouts Manufacturers would be liable for 12 months after repairs By
About Joyk
Aggregate valuable and interesting links.
Joyk means Joy of geeK