Jump to content United States-English
HP.com Home Products and Services Support and Drivers Solutions How to Buy
» Contact HP
More options
HP.com home
HP-UX System Administrator's Guide: Security Management: HP-UX 11i Version 3

Index

» 

Technical documentation

Complete book in PDF
» Feedback
Content starts here

 » Table of Contents

 » Glossary

 » Index

Symbols

/dev special device file
security considerations for, Security Considerations for /dev Device Special Files
/etc/d_passwd file
controlling access using, Controlling Access Using /etc/dialups and /etc/d_passwd
/etc/default/security, Using Boot Authentication to Prevent Unauthorized Access
/etc/dialups file
controlling access using, Controlling Access Using /etc/dialups and /etc/d_passwd
/etc/ftpd/ftpusers file
changing access with, Denying Access Using /etc/ftpd/ftpusers
/etc/group file, The /etc/passwd File
/etc/inetd.sec file, Protection Against Spoofing with TCP Wrappers
/etc/pam.conf file, Overview
configuring systemwide with, Systemwide Configuration Using /etc/pam.conf
/etc/pam_user.conf file, Overview
/etc/passwd file, Setting Up a Trusted System, Managing Trusted Passwords and System Access, Password Files, The /etc/passwd File
application user accounts, Creating Application User Accounts
changing, Changing the /etc/passwd Password File
example of pseudo-account in, Eliminating Pseudo-Accounts and Protecting Key Subsystems in /etc/passwd
format of, The /etc/passwd File Format
recovering, Postinstallation Security Tips for Backup and Recovery
restricted account, Creating Application User Accounts
/etc/rbac/aud_filter, Auditing Based on HP-UX RBAC Criteria and the /etc/rbac/aud_filter File
/etc/rbac/cmd_priv, Configuring Additional Command Authorizations and Privileges
entries, Configuring HP-UX RBAC with Fine-Grained Privileges
/etc/security.dsc file, Defining System Security Attributes
/etc/shadow shadow password file, The /etc/shadow Shadow Password File
/sbin/rc2.d/S760auditing, Setting Up a Trusted System
/tcb/files/auth/ protected password database, Managing Trusted Passwords and System Access, Password Files
/tcb/files/auth/*/*, Setting Up a Trusted System, The /tcb/files/auth/ Database, Device-Based Access Control, Manipulating the Trusted System Databases
/tcb/files/ttys, Device-Based Access Control
/tmp, Guidelines for Trusted Backup and Recovery
/var.adm/userdb file, Configuring Per-User Attributes, User Database Components
/var/adm/inetd.sec file
configuring, Denying or Allowing Access Using /var/adm/inetd.sec

A

access
device-based access, Device-Based Access Control
password, The /tcb/files/auth/ Database
terminal control, The /tcb/files/auth/ Database
time-based access, The /tcb/files/auth/ Database, Time-Based Access Control
access control list
See ACL, Setting Access Control Lists
Access Control Policy Switch, HP-UX RBAC Access Control Policy Switch
customizing, Customizing privrun and privedit Using the ACPS
interfaces, HP-UX RBAC Access Control Policy Switch
ACL
and NFS, ACLs and NFS
comparison of JFS and HFS, Comparison of JFS and HFS ACLs
default JFS entries, Default JFS ACLs
example of changing a minimal JFS, Example of Changing a Minimal JFS ACL
setting, Setting Access Control Lists
setting HFS, Using HFS ACLs
setting JFS, Using JFS ACLs
trusted system backup/recovery, Guidelines for Trusted Backup and Recovery
administrative domain
managing, Controlling an Administrative Domain
AES (Advanced Encryption Standard), Glossary
AH (Authentication Header)
definition, Glossary
anonymous FTP
securing, Securing Anonymous ftp
at command, Setting Up a Trusted System
audisp command
viewing audit log output with, Viewing Audit Logs
audit event, Auditing Events
type, Auditing Events
audit flag, The /tcb/files/auth/ Database
audit ID (aid), Setting Up a Trusted System, The /etc/passwd File, The /tcb/files/auth/ Database
audit log file, Audit Trails
overwriting existing, Monitoring and Managing Audit Trails
streamlining data in, Self-Auditing
viewing, Viewing Audit Logs
auditing
basic profile, Auditing Events
commands, Commands
enabling, Commands
turning on after recovery, Postinstallation Security Tips for Backup and Recovery
users, Audit Administration
authadm, Configuring Authorizations
examples, Configuring Authorizations
syntax, Configuring Authorizations
authentication, Managing Trusted Passwords and System Access
during login, Authenticating Users During Login
PAM login example, Examples: How PAM Works for Login
used by SSH, HP-UX Secure Shell Authentication
using boot, Using Boot Authentication to Prevent Unauthorized Access
using PAM, Authenticating Users with PAM
Authorization Number, Managing Trusted Passwords and System Access
authorizations, Access Control Basics
configuring, Configuring Authorizations
object, Access Control Basics
operation, Access Control Basics
auxiliary audit log file, Audit Trails

D

DES (Data Encryption Standard), Glossary
device assignment database
trusted system, Manipulating the Trusted System Databases
device-based access control, Device-Based Access Control
Diffie-Hellman, Glossary
group, Glossary
directory access
securing, Protecting Directories
disk partition
security considerations for, Protecting Disk Partitions and Logical Volumes
domain
managing an administrative, Controlling an Administrative Domain

E

encrypted password field, The /etc/passwd File, The /tcb/files/auth/ Database
encryption
definition, Glossary
ESP (Encapsulating Security Payload)
definition, Glossary
/etc/ftpd/ftpusers, Denying Access Using /etc/ftpd/ftpusers
/etc/inetd.sec, Protection Against Spoofing with TCP Wrappers
/etc/passwd, Postinstallation Security Tips for Backup and Recovery
expiration time
password aging, Password Aging

F

fbackup command, Postinstallation Security Tips for Backup and Recovery
trusted backup, Guidelines for Trusted Backup and Recovery
file
/etc/group, The /etc/passwd File
/etc/passwd, Setting Up a Trusted System, Managing Trusted Passwords and System Access, Password Files, The /etc/passwd File
file corruption
locating and correcting using fsck command, Locating and Correcting File Corruption Using fsck
file ownership
setting, Setting File Ownership
file security
considerations for /dev special files, Security Considerations for /dev Device Special Files
controlling file access, Controlling File Access
controlling on a network, Controlling File Security on a Network
protecting disk partitions and logical volumes, Protecting Disk Partitions and Logical Volumes
protecting files related to user accounts, Protecting Files Related to User Accounts
protecting NFS-mounted files, How to Safeguard NFS-Mounted Files
file set
SecurityMon, Setting Up a Trusted System
file system
security guidelines for mounting and unmounting, Security Guidelines for Mounting and Unmounting File Systems
fileaccess
setting access permissions, Setting File Access Permissions
filter
definition, Glossary
fine-grained privileges, Overview
configuring, Configuring HP-UX RBAC with Fine-Grained Privileges
frecover command, Postinstallation Security Tips for Backup and Recovery
trusted recovery, Guidelines for Trusted Backup and Recovery
fsck command
correcting file corruption with, Locating and Correcting File Corruption Using fsck
FTP
securing, Securing ftp
securing anonymous, Securing Anonymous ftp
ftpd server, Denying Access Using /etc/ftpd/ftpusers
function
getdvagent, Manipulating the Trusted System Databases
getprdfent, Manipulating the Trusted System Databases
getprpwent, Manipulating the Trusted System Databases
getprtcent, Manipulating the Trusted System Databases
getpwent, Manipulating the Trusted System Databases
getspwent, Manipulating the Trusted System Databases
putprpwnam, Manipulating the Trusted System Databases
putpwent, Manipulating the Trusted System Databases
putspwent, Manipulating the Trusted System Databases

H

HFS, Setting Access Control Lists
HFS ACL
and NFS, ACLs and NFS
commands and calls that work with, HFS ACLs and HP-UX Commands and Calls
compared with JFS ACL, Comparison of JFS and HFS ACLs
setting, Using HFS ACLs
High Performance File System
See HFS, Setting Access Control Lists
history
password, Password History and Password Reuse
host-based authentication
and public key based authentication, Host-Based and Public Key Authentication
used by SSH, Host-Based and Public Key Authentication
HP-UX Bastille, HP-UX Bastille
configuration file
creating, Using HP-UX Bastille, Configuring a System
duplicating, Using HP-UX Bastille
downloading, Installing HP-UX Bastille
drift
accessing configuration drift file, File Location
comparing states, Using HP-UX Bastille
using bastille_drift, Using HP-UX Bastille
files
location and description, File Location
viewing log files, Configuring a System
installing, Installing HP-UX Bastille
interactive use, Using HP-UX Bastille Interactively
noninteractive use, Using HP-UX Bastille NonInteractively
removing, Removing HP-UX Bastille
reports
accessing files, File Location
generating, Using HP-UX Bastille
reverting the changes, Using HP-UX Bastille to Revert Changes
tips and troubleshooting, Tips and Troubleshooting
to-do list
performing, Using HP-UX Bastille Interactively
using, Configuring a System
using
interactively, Using HP-UX Bastille Interactively
noninteractively, Using HP-UX Bastille NonInteractively
HP-UX installation
installing security patches, Installing Security Patches
postinstallation security tips, Postinstallation Security Tips for Backup and Recovery
preventing security breaches during booting, Preventing Security Breaches During the Boot Process
security considerations, Installation Security Considerations
setting install-time security options, Setting Install-Time Security Options
HP-UX RBAC
architecture, HP-UX RBAC Architecture
auditing, HP-UX RBAC Auditing
commands, HP-UX RBAC Commands
wrapping, Configuring HP-UX RBAC
components, HP-UX RBAC Components
configuration files, HP-UX RBAC Configuration Files
configuring Compartments, Configuring HP-UX RBAC with Compartments
default user, Assigning Roles to Users
manpages, HP-UX RBAC Manpages
operation, HP-UX RBAC Example Usage and Operation
troubleshooting, Troubleshooting HP-UX RBAC

I

IKE (Internet Key Exchange)
protocol, Glossary
inetd daemon
overview of, The inetd Daemon
securing, Securing inetd
TCP wrappers and, Protection Against Spoofing with TCP Wrappers
installing HP-UX
installing security patches after, Installing Security Patches
postinstallation security tips, Postinstallation Security Tips for Backup and Recovery
preventing security breaches during booting, Preventing Security Breaches During the Boot Process
security considerations, Installation Security Considerations
setting install-time security options, Setting Install-Time Security Options
installing security patches
using Software Assistant, Installing Security Patches
Internet daemon
See inetd daemon, The inetd Daemon
Internet Services, Remote Access Security Administration
overview of, Overview of Internet Services and Remote Access Services
IPSec policy
definition, Glossary

J

JFS, Setting Access Control Lists
JFS ACL
and NFS, ACLs and NFS
changing with setacl command, Changing JFS ACL with the setacl Command
compared with HFS ACL, Comparison of JFS and HFS ACLs
example of changing a minimal, Example of Changing a Minimal JFS ACL
setting, Using JFS ACLs
using default entries, Default JFS ACLs
Journaled File System
See JFS, Setting Access Control Lists

L

last command
examples of using, Last Command Examples
LDAP directory server
securing passwords stored in, Securing Passwords Stored in LDAP Directory Server
lifetime
password aging, Password Aging
lockdown tool (see HP-UX Bastille)
log file
audit, Audit Trails
logical volume
security considerations for, Protecting Disk Partitions and Logical Volumes
Logical Volume Manager
See LVM, Protecting Disk Partitions and Logical Volumes
login banners
securing, Securing Login Banners
login command, Explanation of the Login Process, Password Files
login process
explanation of, Explanation of the Login Process
login tracking file, Checking the login Tracking Files (btmp and wtmp)
lost+found directory, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
LVM, Protecting Disk Partitions and Logical Volumes

M

MAC, Glossary
managing file access, Controlling File Access
managing passwords, Managing Passwords
minimum time
password aging, Password Aging
mobile connection
securing, Protecting Against System Access by Remote Devices
modem access
security guidelines for managing, Protecting Against System Access by Remote Devices
mounting a file system securely, Security Guidelines for Mounting and Unmounting File Systems

N

network administration, Verifying Permission Settings on Network Control Files
controlling file security, Controlling File Security on a Network
managing an administrative domain, Controlling an Administrative Domain
network control file
checking permissions on, Check Permission Settings on Network Control Files
verifying permissions on, Verifying Permission Settings on Network Control Files
NFS, Files Mounted in an NFS Environment
and ACLs, ACLs and NFS
protecting NFS-mounted files, How to Safeguard NFS-Mounted Files
securing the client, Client Vulnerability
securing the server, Server Vulnerability
NIS
securing passwords stored in, Securing Passwords Stored in NIS

O

operations
guidelines for creating, Planning Command Mappings

P

PAM
authenticating users with, Overview
configuring systemwide, Systemwide Configuration Using /etc/pam.conf
overview of, Overview
PAM authentication
login example, Examples: How PAM Works for Login
PAM library, PAM Libraries
PAM service module, Overview
parameter
PASSWORD_HISTORY_DEPTH, Password History and Password Reuse
passwd command, The /etc/passwd File
examples of, Examples of passwd Commands
password, Password Selection and Generation
aging, Managing Trusted Passwords and System Access, The /etc/passwd File, The /tcb/files/auth/ Database, Password Aging
expiration time, Password Aging
lifetime, Password Aging
minimum time, Password Aging
authentication
used by SSH, Password Authentication
criteria of a good, Criteria of a Good Password
database, Setting Up a Trusted System, Managing Trusted Passwords and System Access, The /tcb/files/auth/ Database
/tcb/files/auth/, Managing Trusted Passwords and System Access, Password Files
encrypted field, The /etc/passwd File, The /tcb/files/auth/ Database
encryption, Password Files
entry
manipulating, Manipulating the Trusted System Databases
file
fields, Password Files
protected password database, Setting Up a Trusted System, Managing Trusted Passwords and System Access, The /tcb/files/auth/ Database
generation, The /tcb/files/auth/ Database
history, Password History and Password Reuse
integrity, Managing Trusted Passwords and System Access
management, Managing Passwords
reuse, Password History and Password Reuse
security, Managing Trusted Passwords and System Access
shadow, The /etc/shadow Shadow Password File
types of, The /tcb/files/auth/ Database
PASSWORD_HISTORY_DEPTH parameter, Password History and Password Reuse
patch installation
using Software Assistant, Installing Security Patches
Perfect Forward Secrecy (PFS)
defined, Glossary
permissions
checking network control file, Check Permission Settings on Network Control Files
verifying for network control files, Verifying Permission Settings on Network Control Files
power failure, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
file loss, Postinstallation Security Tips for Backup and Recovery
preshared keys
definition, Glossary
primary audit log file, Audit Trails
privedit, Using the privedit Command to Edit Files Under Access Control
options, Using the privedit Command to Edit Files Under Access Control
syntax, Using the privedit Command to Edit Files Under Access Control
privrun, Using the privrun Command to Run Applications with Privileges
-p, Configuring HP-UX RBAC with Fine-Grained Privileges
examples, Using the privrun Command to Run Applications with Privileges
operation, HP-UX RBAC Example Usage and Operation
options, Using the privrun Command to Run Applications with Privileges
syntax, Using the privrun Command to Run Applications with Privileges
protected password database
/tcb/files/auth/, Managing Trusted Passwords and System Access, Password Files
prpwd, The /tcb/files/auth/ Database
pseudo-account
example of, Eliminating Pseudo-Accounts and Protecting Key Subsystems in /etc/passwd
public key based authentication
and host-based authentication, Host-Based and Public Key Authentication
used by SSH, Public Key Authentication
putprpwnam function, Manipulating the Trusted System Databases
putpwent function, Manipulating the Trusted System Databases
putspwent function, Manipulating the Trusted System Databases

S

screen lock
configuring, Configuring the Screen Lock
Sec00Tools security level, Setting Install-Time Security Options
Sec20MngDMZ security level, Setting Install-Time Security Options
Sec30DMZ security level, Setting Install-Time Security Options
Secure Shell
see SSH, Securing Remote Sessions Using HP-UX Secure Shell (SSH)
securing remote sessions, Securing Remote Sessions Using HP-UX Secure Shell (SSH)
security attribute
defining, Defining System Security Attributes, System Security Attributes
security hardening (see HP-UX Bastille)
security level
choosing during installation, Setting Install-Time Security Options
security patch
installing, Installing Security Patches
SecurityMon file set, Setting Up a Trusted System
selection and generation, Password Selection and Generation
self-auditing program, Self-Auditing
set group ID program
See setgid programs, Handling setuid and setgid Programs
set user ID program
See setuid programs, Handling setuid and setgid Programs
setacl command
changing ACLs with, Using the setacl and getacl Commands
changing JFS ACLs with, Changing JFS ACL with the setacl Command
setfilexsec command, Compartment Commands, Fine-Grained Privileges Commands
setgid programs, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
managing, Handling setuid and setgid Programs
setuid programs, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
managing, Handling setuid and setgid Programs
shadow password, The /etc/shadow Shadow Password File
single-user mode
booting into, Preventing Security Breaches During the Boot Process
SIS, Secure Internet Services
Software Assistant
using, Installing Security Patches
spoofing
defined, Other Security Solutions for Spoofing
protecting against using TCP wrappers, Protection Against Spoofing with TCP Wrappers
SSH, Secure Login with HP-UX Secure Shell
associated technologies, Associated Technologies
authentication, Key Security Features of HP-UX Secure Shell, HP-UX Secure Shell Authentication
encryption, Key Security Features of HP-UX Secure Shell
features, Key Security Features of HP-UX Secure Shell
GSS-API, GSS-API
HP-UX system, HP-UX Secure Shell and the HP-UX System
password authentication, Password Authentication
port forwarding, Key Security Features of HP-UX Secure Shell
privileged mode execution, HP-UX Secure Shell Privilege Separation
public key based authentication, Public Key Authentication
running, Running HP-UX Secure Shell
running scp client, Running the scp Client
running sftp client, Running the sftp Client
running ssh client, Running the ssh Client
securing remote sessions, Securing Remote Sessions Using HP-UX Secure Shell (SSH)
software components, Software Components of HP-UX Secure Shell
strong random number generator, Strong Random Number Generator Requirement
support for TCP wrappers, TCP Wrappers Support
SSH-1 protocol, Communication Protocols
SSH-2 protocol, Communication Protocols
stack buffer overflow protection, Preventing Stack Buffer Overflow Attacks
sticky bit
setting, Protecting Directories
strong random number generator, Strong Random Number Generator Requirement
superuser access
monitoring, Monitoring root Account Access
protecting, Protecting the root Account
reviewing, Reviewing Superuser Access
using Restricted SMH Builder for limited, Using the Restricted SMH Builder for Limited Superuser Access
swlist command, Setting Up a Trusted System
system access
security guidelines for remote, Protecting Against System Access by Remote Devices
system administration
auditing guidelines, Guidelines for Administering the Auditing System
auditing users, Audit Administration
authenticating users during login, Authenticating Users During Login
authenticating users using PAM, Authenticating Users with PAM
backup guidelines, Postinstallation Security Tips for Backup and Recovery
controlling file security on a network, Controlling File Security on a Network
defining security attributes, Defining System Security Attributes, System Security Attributes
installing HP-UX securely, Installation Security Considerations
installing security patches, Installing Security Patches
managing an administrative domain, Controlling an Administrative Domain
managing passwords, Managing Passwords
managing remote access, Protecting Against System Access by Remote Devices
managing setuid and setgid programs, Handling setuid and setgid Programs
managing user access, Managing User Access
mounting and unmounting a file system securely, Security Guidelines for Mounting and Unmounting File Systems
preventing stack buffer overflow attacks, Preventing Stack Buffer Overflow Attacks
protecting root acess, Protecting the root Account
protecting unattended workstations and terminals, Protecting Unattended Terminals and Workstations
securing FTP, Securing ftp
securing inetd, Securing inetd
securing Internet Services, Remote Access Security Administration
securing login banners, Securing Login Banners
securing the HP-UX file system, File System Security
security breaches , Preventing Security Breaches During the Boot Process
setting install-time security options, Setting Install-Time Security Options
using boot authentication to prevent unauthorized access, Using Boot Authentication to Prevent Unauthorized Access
system run level
changing, Controlling Access Using /etc/inittab and Run Levels
controlling access with, Controlling Access Using /etc/inittab and Run Levels
system security
defining security attributes, Defining System Security Attributes, System Security Attributes

T

TCP wrappers
and SSH, TCP Wrappers Support
protecting against spoofing with, Protection Against Spoofing with TCP Wrappers
telephone
securing, Protecting Against System Access by Remote Devices
temporary account
disabling, Monitoring Guest Accounts
terminal
configuring screen lock for, Configuring the Screen Lock
protecting unattended, Protecting Unattended Terminals and Workstations
terminal access, The /tcb/files/auth/ Database
terminal control database
trusted system, Manipulating the Trusted System Databases
terminal device file
protecting, Protecting Terminal Device Files
time-based access control, Time-Based Access Control
TMOUT variable
configuring, Configuring the TMOUT Variable
trusted, Password Selection and Generation
trusted password, Password Selection and Generation
trusted password database, Manipulating the Trusted System Databases
trusted system
converting from, Setting Up a Trusted System
converting to, Setting Up a Trusted System
databases, Manipulating the Trusted System Databases

U

umask command
changing default file permissions with, Setting File Access Permissions
unique user name
importance of, Explanation of the Login Process
unmounting a file system securely, Security Guidelines for Mounting and Unmounting File Systems
user access
managing, Managing User Access
user account
restricted, Creating Application User Accounts
user authentication
during login, Authenticating Users During Login
PAM login example, Examples: How PAM Works for Login
using PAM, Authenticating Users with PAM
user ID (uid), The /etc/passwd File, The /tcb/files/auth/ Database
user name
creating unique, Explanation of the Login Process
user security
managing, Administering User and System Security
userdbset command
examples of defining user attributes with, Examples of Defining User-Specific Attributes with userdbset

W

who command
obtaining user login information with, Checking Who Is Logged In
workstation
protecting unattended, Protecting Unattended Terminals and Workstations
wtmp file
tracking successful logins with, Checking the login Tracking Files (btmp and wtmp)
WU-FTPD, Denying Access Using /etc/ftpd/ftpusers
Printable version
Privacy statement Using this site means you accept its terms Feedback to webmaster
© 2008 Hewlett-Packard Development Company, L.P.