United States-English |
|
|
HP-UX System Administrator's Guide: Security Management: HP-UX 11i Version 3 > Chapter 2 Administering User and System SecurityProtecting the root Account |
|
Following are suggestions for protecting the root account:
The following sections discuss how to protect the root account in more detail. If you have two or more system administrators that need root access, following are some suggestions for how to track them:
If you need to give limited superuser access to a nonsuperuser, you can activate the Restricted SMH Builder. Using the Restricted SMH Builder, you can enable or disable selected SMH areas for the user. To activate the Restricted SMH Builder, enter: When users with restricted access execute SMH, they will have superuser status in the defined areas and will only see those SMH areas in the menu. All other areas of SMH will be hidden from the user. When users without access permissions execute SMH, they will receive an error message stating they must be superuser. You can also add more applications to SMH and set them up for restricted access. The /var/adm/sulog file logs all attempts of the su root command including failures. Successful attempts are flagged with a plus (+) and failures are flagged with a minus (-). Only root can view the /var/adm/sulog file. For example: -rw------- 1 root root 690 Aug 17 19:37 /var/adm/sulog In the following example, userone has successfully used the su command to access root. A second user, usertwo, has not been successful. In addition, usertwo has not been successful in using su to access gooduser1 either. SU 08/17 19:10 + 0 userone-root SU 08/17 19:36 - 0 usertwo-root SU 08/17 19:36 - 0 usertwo-root |
Printable version | ||
|