|
» |
|
|
|
Symbols- /dev special device file
- security considerations
for, Security Considerations for /dev Device Special Files
- /etc/d_passwd file
- controlling access using, Controlling Access Using /etc/dialups and /etc/d_passwd
- /etc/default/security, Using Boot Authentication to Prevent Unauthorized Access
- /etc/dialups
file
- controlling access using, Controlling Access Using /etc/dialups and /etc/d_passwd
- /etc/ftpd/ftpusers
file
- changing access with, Denying Access Using /etc/ftpd/ftpusers
- /etc/group
file, The /etc/passwd File
- /etc/inetd.sec file, Protection Against Spoofing with TCP Wrappers
- /etc/pam.conf
file, Overview
- configuring systemwide with, Systemwide Configuration Using /etc/pam.conf
- /etc/pam_user.conf file, Overview
- /etc/passwd file, Setting Up a Trusted System, Managing Trusted Passwords and System Access, Password Files, The /etc/passwd File
- application user accounts, Creating Application User Accounts
- changing, Changing the /etc/passwd Password File
- example of pseudo-account in, Eliminating Pseudo-Accounts and Protecting Key Subsystems in /etc/passwd
- format of, The /etc/passwd File Format
- recovering, Postinstallation Security Tips for Backup and Recovery
- restricted account, Creating Application User Accounts
- /etc/rbac/aud_filter, Auditing Based on HP-UX RBAC Criteria and the /etc/rbac/aud_filter File
- /etc/rbac/cmd_priv, Configuring Additional Command Authorizations and Privileges
- entries, Configuring HP-UX RBAC with Fine-Grained Privileges
- /etc/security.dsc
file, Defining System Security Attributes
- /etc/shadow
shadow password file, The /etc/shadow Shadow Password File
- /sbin/rc2.d/S760auditing, Setting Up a Trusted System
- /tcb/files/auth/ protected password
database, Managing Trusted Passwords and System Access, Password Files
- /tcb/files/auth/*/*, Setting Up a Trusted System, The /tcb/files/auth/ Database, Device-Based Access Control, Manipulating the Trusted System Databases
- /tcb/files/ttys, Device-Based Access Control
- /tmp, Guidelines for Trusted Backup and Recovery
- /var.adm/userdb
file, Configuring Per-User Attributes, User Database Components
- /var/adm/inetd.sec
file
- configuring, Denying or Allowing Access Using /var/adm/inetd.sec
A- access
- device-based access, Device-Based Access Control
- password, The /tcb/files/auth/ Database
- terminal
control, The /tcb/files/auth/ Database
- time-based
access, The /tcb/files/auth/ Database, Time-Based Access Control
- access control
list
- See ACL, Setting Access Control Lists
- Access Control
Policy Switch, HP-UX RBAC Access Control Policy Switch
- customizing, Customizing privrun and privedit Using the ACPS
- interfaces, HP-UX RBAC Access Control Policy Switch
- ACL
- and NFS, ACLs and NFS
- comparison of JFS and HFS, Comparison of JFS and HFS ACLs
- default JFS entries, Default JFS ACLs
- example of changing a minimal JFS, Example of Changing a Minimal JFS ACL
- setting, Setting Access Control Lists
- setting HFS, Using HFS ACLs
- setting JFS, Using JFS ACLs
- trusted system
backup/recovery, Guidelines for Trusted Backup and Recovery
- administrative
domain
- managing, Controlling an Administrative Domain
- AES (Advanced
Encryption Standard), Glossary
- AH (Authentication Header)
- definition, Glossary
- anonymous FTP
- securing, Securing Anonymous ftp
- at command, Setting Up a Trusted System
- audisp command
- viewing audit log output with, Viewing Audit Logs
- audit event, Auditing Events
- type, Auditing Events
- audit flag, The /tcb/files/auth/ Database
- audit ID (aid), Setting Up a Trusted System, The /etc/passwd File, The /tcb/files/auth/ Database
- audit log file, Audit Trails
- overwriting existing, Monitoring and Managing Audit Trails
- streamlining data in, Self-Auditing
- viewing, Viewing Audit Logs
- auditing
- basic profile, Auditing Events
- commands, Commands
- enabling, Commands
- turning
on after recovery, Postinstallation Security Tips for Backup and Recovery
- users, Audit Administration
- authadm, Configuring Authorizations
- examples, Configuring Authorizations
- syntax, Configuring Authorizations
- authentication, Managing Trusted Passwords and System Access
- during login, Authenticating Users During Login
- PAM login example, Examples: How PAM Works for Login
- used by SSH, HP-UX Secure Shell Authentication
- using boot, Using Boot Authentication to Prevent Unauthorized Access
- using PAM, Authenticating Users with PAM
- Authorization Number, Managing Trusted Passwords and System Access
- authorizations, Access Control Basics
- configuring, Configuring Authorizations
- object, Access Control Basics
- operation, Access Control Basics
- auxiliary audit log file, Audit Trails
B- backup
- security guidelines for, Postinstallation Security Tips for Backup and Recovery
- trusted
system, Setting Up a Trusted System, Guidelines for Trusted Backup and Recovery
- backup media
- security
of, Guidelines for Trusted Backup and Recovery
- Bastille (see HP-UX Bastille)
- Bastion Host, HP-UX Bastille
- batch, Setting Up a Trusted System
- boot authentication
- using, Using Boot Authentication to Prevent Unauthorized Access
- boot processs
- gaining, Preventing Security Breaches During the Boot Process
- booting
- preventing
security breaches during booting, Preventing Security Breaches During the Boot Process
- btmp file
- tracking failed logins with, Checking the login Tracking Files (btmp and wtmp)
C- CA (certificate
authority)
- defined, Glossary
- CDE Lock Manager
- configuring, Configuring the CDE Lock Manager
- CDE Login Manager
- logging in with, Explanation of the Login Process
- Certificate
Revocation List (CRL), Glossary
- chfn, The /etc/passwd File
- chmod command
- changing file access permissions with, Setting File Access Permissions
- effect on class entries, Effect of chmod on class Entries
- chown, Postinstallation Security Tips for Backup and Recovery, The /etc/passwd File, Guidelines for Trusted Backup and Recovery
- chroot jail, chroot Directory Jail
- chsh, The /etc/passwd File
- cmdprivadm, Configuring Additional Command Authorizations and Privileges
- examples, Configuring Additional Command Authorizations and Privileges
- syntax, Configuring Additional Command Authorizations and Privileges
- command
- login, Password Files
- swlist, Setting Up a Trusted System
- compartments, Overview
- activating, Activating Compartments
- creating rules, Compartment Rules and Syntax
- file
system rules, File System Rules
- IPC
rules, IPC Rules
- modifying rules, Compartment Rules and Syntax
- network
interface rules, Network Interface Rules
- network rules, Network Rules
- planning a structure, Planning the Compartment Structure
- privilege
limitation rules, Privilege Limitation Rules
- troubleshooting, Troubleshooting Compartments, Troubleshooting Fine-Grained Privileges
- crontab, Setting Up a Trusted System
F- fbackup
command, Postinstallation Security Tips for Backup and Recovery
- trusted backup, Guidelines for Trusted Backup and Recovery
- file
- /etc/group, The /etc/passwd File
- /etc/passwd, Setting Up a Trusted System, Managing Trusted Passwords and System Access, Password Files, The /etc/passwd File
- file corruption
- locating and correcting using fsck command, Locating and Correcting File Corruption Using fsck
- file ownership
- setting, Setting File Ownership
- file security
- considerations for /dev special files, Security Considerations for /dev Device Special Files
- controlling file access, Controlling File Access
- controlling on a network, Controlling File Security on a Network
- protecting disk partitions and logical volumes, Protecting Disk Partitions and Logical Volumes
- protecting files related to user accounts, Protecting Files Related to User Accounts
- protecting NFS-mounted files, How to Safeguard NFS-Mounted Files
- file set
- SecurityMon, Setting Up a Trusted System
- file system
- security guidelines for mounting
and unmounting, Security Guidelines for Mounting and Unmounting File Systems
- fileaccess
- setting access permissions, Setting File Access Permissions
- filter
- definition, Glossary
- fine-grained privileges, Overview
- configuring, Configuring HP-UX RBAC with Fine-Grained Privileges
- frecover command, Postinstallation Security Tips for Backup and Recovery
- trusted recovery, Guidelines for Trusted Backup and Recovery
- fsck command
- correcting file corruption with, Locating and Correcting File Corruption Using fsck
- FTP
- securing, Securing ftp
- securing anonymous, Securing Anonymous ftp
- ftpd server, Denying Access Using /etc/ftpd/ftpusers
- function
- getdvagent, Manipulating the Trusted System Databases
- getprdfent, Manipulating the Trusted System Databases
- getprpwent, Manipulating the Trusted System Databases
- getprtcent, Manipulating the Trusted System Databases
- getpwent, Manipulating the Trusted System Databases
- getspwent, Manipulating the Trusted System Databases
- putprpwnam, Manipulating the Trusted System Databases
- putpwent, Manipulating the Trusted System Databases
- putspwent, Manipulating the Trusted System Databases
G- getacl command
- viewing ACLs with, Using the setacl and getacl Commands
- getdvagent
function, Manipulating the Trusted System Databases
- getfilexsec command, Compartment Commands, Fine-Grained Privileges Commands
- getprdfent
function, Manipulating the Trusted System Databases
- getprocxsec command, Compartment Commands, Fine-Grained Privileges Commands
- getprpwent
function, Manipulating the Trusted System Databases
- getprtcent
function, Manipulating the Trusted System Databases
- getpwent
function, Manipulating the Trusted System Databases
- getspwent
function, Manipulating the Trusted System Databases
- group account
- managing, Managing Group Accounts
- group ID (gid), The /etc/passwd File
- GSS-API
- SSH, GSS-API
- guest account
- monitoring, Monitoring Guest Accounts
H- HFS, Setting Access Control Lists
- HFS ACL
- and NFS, ACLs and NFS
- commands and calls that work with, HFS ACLs and HP-UX Commands and Calls
- compared
with JFS ACL, Comparison of JFS and HFS ACLs
- setting, Using HFS ACLs
- High Performance
File System
- See HFS, Setting Access Control Lists
- history
- password, Password History and Password Reuse
- host-based authentication
- and public key based
authentication, Host-Based and Public Key Authentication
- used by SSH, Host-Based and Public Key Authentication
- HP-UX Bastille, HP-UX Bastille
- configuration file
- creating, Using HP-UX Bastille, Configuring a System
- duplicating, Using HP-UX Bastille
- downloading, Installing HP-UX Bastille
- drift
- accessing configuration drift file, File Location
- comparing states, Using HP-UX Bastille
- using bastille_drift, Using HP-UX Bastille
- files
- location and description, File Location
- viewing log files, Configuring a System
- installing, Installing HP-UX Bastille
- interactive use, Using HP-UX Bastille Interactively
- noninteractive use, Using HP-UX Bastille NonInteractively
- removing, Removing HP-UX Bastille
- reports
- accessing files, File Location
- generating, Using HP-UX Bastille
- reverting
the changes, Using HP-UX Bastille to Revert Changes
- tips and troubleshooting, Tips and Troubleshooting
- to-do
list
- performing, Using HP-UX Bastille Interactively
- using, Configuring a System
- using
- interactively, Using HP-UX Bastille Interactively
- noninteractively, Using HP-UX Bastille NonInteractively
- HP-UX installation
- installing security patches, Installing Security Patches
- postinstallation security tips, Postinstallation Security Tips for Backup and Recovery
- preventing security breaches during booting, Preventing Security Breaches During the Boot Process
- security considerations, Installation Security Considerations
- setting install-time security
options, Setting Install-Time Security Options
- HP-UX RBAC
- architecture, HP-UX RBAC Architecture
- auditing, HP-UX RBAC Auditing
- commands, HP-UX RBAC Commands
- wrapping, Configuring HP-UX RBAC
- components, HP-UX RBAC Components
- configuration files, HP-UX RBAC Configuration Files
- configuring Compartments, Configuring HP-UX RBAC with Compartments
- default user, Assigning Roles to Users
- manpages, HP-UX RBAC Manpages
- operation, HP-UX RBAC Example Usage and Operation
- troubleshooting, Troubleshooting HP-UX RBAC
I- IKE (Internet
Key Exchange)
- protocol, Glossary
- inetd daemon
- overview of, The inetd Daemon
- securing, Securing inetd
- TCP wrappers and, Protection Against Spoofing with TCP Wrappers
- installing
HP-UX
- installing security patches after, Installing Security Patches
- postinstallation security tips, Postinstallation Security Tips for Backup and Recovery
- preventing security breaches
during booting, Preventing Security Breaches During the Boot Process
- security considerations, Installation Security Considerations
- setting install-time security options, Setting Install-Time Security Options
- installing security patches
- using Software Assistant, Installing Security Patches
- Internet daemon
- See inetd daemon, The inetd Daemon
- Internet Services, Remote Access Security Administration
- overview of, Overview of Internet Services and Remote Access Services
- IPSec policy
- definition, Glossary
L- last command
- examples of using, Last Command Examples
- LDAP directory
server
- securing passwords stored in, Securing Passwords Stored in LDAP Directory Server
- lifetime
- password aging, Password Aging
- lockdown tool (see HP-UX
Bastille)
- log file
- audit, Audit Trails
- logical volume
- security considerations for, Protecting Disk Partitions and Logical Volumes
- Logical Volume
Manager
- See LVM, Protecting Disk Partitions and Logical Volumes
- login banners
- securing, Securing Login Banners
- login command, Explanation of the Login Process, Password Files
- login process
- explanation of, Explanation of the Login Process
- login tracking
file, Checking the login Tracking Files (btmp and wtmp)
- lost+found directory, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
- LVM, Protecting Disk Partitions and Logical Volumes
N- network administration, Verifying Permission Settings on Network Control Files
- controlling file security, Controlling File Security on a Network
- managing an administrative domain, Controlling an Administrative Domain
- network control
file
- checking permissions on, Check Permission Settings on Network Control Files
- verifying permissions on, Verifying Permission Settings on Network Control Files
- NFS, Files Mounted in an NFS Environment
- and ACLs, ACLs and NFS
- protecting NFS-mounted files, How to Safeguard NFS-Mounted Files
- securing the client, Client Vulnerability
- securing the server, Server Vulnerability
- NIS
- securing passwords stored in, Securing Passwords Stored in NIS
P- PAM
- authenticating users with, Overview
- configuring systemwide, Systemwide Configuration Using /etc/pam.conf
- overview of, Overview
- PAM authentication
- login example, Examples: How PAM Works for Login
- PAM library, PAM Libraries
- PAM service
module, Overview
- parameter
- PASSWORD_HISTORY_DEPTH, Password History and Password Reuse
- passwd command, The /etc/passwd File
- examples of, Examples of passwd Commands
- password, Password Selection and Generation
- aging, Managing Trusted Passwords and System Access, The /etc/passwd File, The /tcb/files/auth/ Database, Password Aging
- expiration time, Password Aging
- lifetime, Password Aging
- minimum
time, Password Aging
- authentication
- used by SSH, Password Authentication
- criteria of a good, Criteria of a Good Password
- database, Setting Up a Trusted System, Managing Trusted Passwords and System Access, The /tcb/files/auth/ Database
- /tcb/files/auth/, Managing Trusted Passwords and System Access, Password Files
- encrypted field, The /etc/passwd File, The /tcb/files/auth/ Database
- encryption, Password Files
- entry
- manipulating, Manipulating the Trusted System Databases
- file
- fields, Password Files
- protected password database, Setting Up a Trusted System, Managing Trusted Passwords and System Access, The /tcb/files/auth/ Database
- generation, The /tcb/files/auth/ Database
- history, Password History and Password Reuse
- integrity, Managing Trusted Passwords and System Access
- management, Managing Passwords
- reuse, Password History and Password Reuse
- security, Managing Trusted Passwords and System Access
- shadow, The /etc/shadow Shadow Password File
- types of, The /tcb/files/auth/ Database
- PASSWORD_HISTORY_DEPTH parameter, Password History and Password Reuse
- patch installation
- using Software Assistant, Installing Security Patches
- Perfect Forward Secrecy (PFS)
- defined, Glossary
- permissions
- checking network control file, Check Permission Settings on Network Control Files
- verifying for network control
files, Verifying Permission Settings on Network Control Files
- power failure, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
- file loss, Postinstallation Security Tips for Backup and Recovery
- preshared keys
- definition, Glossary
- primary audit
log file, Audit Trails
- privedit, Using the privedit Command to Edit Files Under Access Control
- options, Using the privedit Command to Edit Files Under Access Control
- syntax, Using the privedit Command to Edit Files Under Access Control
- privrun, Using the privrun Command to Run Applications with Privileges
- -p, Configuring HP-UX RBAC with Fine-Grained Privileges
- examples, Using the privrun Command to Run Applications with Privileges
- operation, HP-UX RBAC Example Usage and Operation
- options, Using the privrun Command to Run Applications with Privileges
- syntax, Using the privrun Command to Run Applications with Privileges
- protected password database
- /tcb/files/auth/, Managing Trusted Passwords and System Access, Password Files
- prpwd, The /tcb/files/auth/ Database
- pseudo-account
- example of, Eliminating Pseudo-Accounts and Protecting Key Subsystems in /etc/passwd
- public key
based authentication
- and host-based authentication, Host-Based and Public Key Authentication
- used by SSH, Public Key Authentication
- putprpwnam
function, Manipulating the Trusted System Databases
- putpwent
function, Manipulating the Trusted System Databases
- putspwent
function, Manipulating the Trusted System Databases
R- random number generator, Strong Random Number Generator Requirement
- recovery
- security
guidelines for, Postinstallation Security Tips for Backup and Recovery
- remote access
- security guidelines for managing, Protecting Against System Access by Remote Devices
- Remote Access
Services, Overview of Internet Services and Remote Access Services
- overview of, Overview of Internet Services and Remote Access Services
- remote procedure
call
- See RPC, TCP Wrappers Do Not Work with RPC Services
- remote sessions
- securing using SSH, Securing Remote Sessions Using HP-UX Secure Shell (SSH)
- reuse
- password, Password History and Password Reuse
- roleadm, Creating Roles
- examples, Creating Roles, Assigning Roles to Users
- syntax, Creating Roles
- roles
- configuring, Configuring Roles
- default, Creating Roles
- groups, Assigning Roles to Groups
- guidelines for creating, Planning the Roles
- root
- drawbacks of, Overview
- root access
- gaining, Preventing Security Breaches During the Boot Process
- monitoring, Monitoring root Account Access
- reviewing, Reviewing Superuser Access
- using Restricted SMH Builder for
limited, Using the Restricted SMH Builder for Limited Superuser Access
- root account
- protecting, Protecting the root Account
- RPC
- and TCP wrappers, TCP Wrappers Do Not Work with RPC Services
- RSA cryptosystem, Glossary
- rsh command
- limiting system access with, Monitoring Guest Accounts
- run level
- changing, Controlling Access Using /etc/inittab and Run Levels
- controlling access with, Controlling Access Using /etc/inittab and Run Levels
S- screen lock
- configuring, Configuring the Screen Lock
- Sec00Tools security level, Setting Install-Time Security Options
- Sec20MngDMZ security
level, Setting Install-Time Security Options
- Sec30DMZ security level, Setting Install-Time Security Options
- Secure Shell
- see SSH, Securing Remote Sessions Using HP-UX Secure Shell (SSH)
- securing remote sessions, Securing Remote Sessions Using HP-UX Secure Shell (SSH)
- security attribute
- defining, Defining System Security Attributes, System Security Attributes
- security hardening (see HP-UX Bastille)
- security level
- choosing during installation, Setting Install-Time Security Options
- security patch
- installing, Installing Security Patches
- SecurityMon file set, Setting Up a Trusted System
- selection and generation, Password Selection and Generation
- self-auditing
program, Self-Auditing
- set group ID program
- See setgid programs, Handling setuid and setgid Programs
- set user ID program
- See setuid programs, Handling setuid and setgid Programs
- setacl command
- changing ACLs with, Using the setacl and getacl Commands
- changing JFS ACLs with, Changing JFS ACL with the setacl Command
- setfilexsec command, Compartment Commands, Fine-Grained Privileges Commands
- setgid programs, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
- managing, Handling setuid and setgid Programs
- setuid programs, Postinstallation Security Tips for Backup and Recovery, Guidelines for Trusted Backup and Recovery
- managing, Handling setuid and setgid Programs
- shadow password, The /etc/shadow Shadow Password File
- single-user mode
- booting into, Preventing Security Breaches During the Boot Process
- SIS, Secure Internet Services
- Software Assistant
- using, Installing Security Patches
- spoofing
- defined, Other Security Solutions for Spoofing
- protecting against using TCP wrappers, Protection Against Spoofing with TCP Wrappers
- SSH, Secure Login with HP-UX Secure Shell
- associated technologies, Associated Technologies
- authentication, Key Security Features of HP-UX Secure Shell, HP-UX Secure Shell Authentication
- encryption, Key Security Features of HP-UX Secure Shell
- features, Key Security Features of HP-UX Secure Shell
- GSS-API, GSS-API
- HP-UX system, HP-UX Secure Shell and the HP-UX System
- password authentication, Password Authentication
- port forwarding, Key Security Features of HP-UX Secure Shell
- privileged mode execution, HP-UX Secure Shell Privilege Separation
- public key based authentication, Public Key Authentication
- running, Running HP-UX Secure Shell
- running scp client, Running the scp Client
- running sftp client, Running the sftp Client
- running ssh client, Running the ssh Client
- securing remote
sessions, Securing Remote Sessions Using HP-UX Secure Shell (SSH)
- software components, Software Components of HP-UX Secure Shell
- strong random
number generator, Strong Random Number Generator Requirement
- support for
TCP wrappers, TCP Wrappers Support
- SSH-1 protocol, Communication Protocols
- SSH-2 protocol, Communication Protocols
- stack buffer
overflow protection, Preventing Stack Buffer Overflow Attacks
- sticky bit
- setting, Protecting Directories
- strong random
number generator, Strong Random Number Generator Requirement
- superuser access
- monitoring, Monitoring root Account Access
- protecting, Protecting the root Account
- reviewing, Reviewing Superuser Access
- using Restricted SMH Builder for limited, Using the Restricted SMH Builder for Limited Superuser Access
- swlist command, Setting Up a Trusted System
- system access
- security guidelines for remote, Protecting Against System Access by Remote Devices
- system administration
- auditing guidelines, Guidelines for Administering the Auditing System
- auditing users, Audit Administration
- authenticating users during login, Authenticating Users During Login
- authenticating users using PAM, Authenticating Users with PAM
- backup guidelines, Postinstallation Security Tips for Backup and Recovery
- controlling file security on a network, Controlling File Security on a Network
- defining security attributes, Defining System Security Attributes, System Security Attributes
- installing HP-UX securely, Installation Security Considerations
- installing security patches, Installing Security Patches
- managing an administrative domain, Controlling an Administrative Domain
- managing passwords, Managing Passwords
- managing remote access, Protecting Against System Access by Remote Devices
- managing setuid and setgid programs, Handling setuid and setgid Programs
- managing user access, Managing User Access
- mounting and unmounting a file system securely, Security Guidelines for Mounting and Unmounting File Systems
- preventing stack buffer overflow attacks, Preventing Stack Buffer Overflow Attacks
- protecting root acess, Protecting the root Account
- protecting unattended workstations and terminals, Protecting Unattended Terminals and Workstations
- securing FTP, Securing ftp
- securing inetd, Securing inetd
- securing Internet Services, Remote Access Security Administration
- securing login banners, Securing Login Banners
- securing the HP-UX file system, File System Security
- security breaches , Preventing Security Breaches During the Boot Process
- setting install-time security options, Setting Install-Time Security Options
- using boot authentication to prevent unauthorized access, Using Boot Authentication to Prevent Unauthorized Access
- system run level
- changing, Controlling Access Using /etc/inittab and Run Levels
- controlling access with, Controlling Access Using /etc/inittab and Run Levels
- system security
- defining security attributes, Defining System Security Attributes, System Security Attributes
T- TCP wrappers
- and SSH, TCP Wrappers Support
- protecting against spoofing with, Protection Against Spoofing with TCP Wrappers
- telephone
- securing, Protecting Against System Access by Remote Devices
- temporary account
- disabling, Monitoring Guest Accounts
- terminal
- configuring
screen lock for, Configuring the Screen Lock
- protecting unattended, Protecting Unattended Terminals and Workstations
- terminal access, The /tcb/files/auth/ Database
- terminal control database
- trusted system, Manipulating the Trusted System Databases
- terminal device
file
- protecting, Protecting Terminal Device Files
- time-based access control, Time-Based Access Control
- TMOUT variable
- configuring, Configuring the TMOUT Variable
- trusted, Password Selection and Generation
- trusted password, Password Selection and Generation
- trusted password database, Manipulating the Trusted System Databases
- trusted system
- converting from, Setting Up a Trusted System
- converting to, Setting Up a Trusted System
- databases, Manipulating the Trusted System Databases
U- umask command
- changing
default file permissions with, Setting File Access Permissions
- unique user name
- importance of, Explanation of the Login Process
- unmounting a file system securely, Security Guidelines for Mounting and Unmounting File Systems
- user access
- managing, Managing User Access
- user account
- restricted, Creating Application User Accounts
- user authentication
- during login, Authenticating Users During Login
- PAM login example, Examples: How PAM Works for Login
- using PAM, Authenticating Users with PAM
- user ID (uid), The /etc/passwd File, The /tcb/files/auth/ Database
- user name
- creating unique, Explanation of the Login Process
- user security
- managing, Administering User and System Security
- userdbset command
- examples of defining user attributes with, Examples of Defining User-Specific Attributes with userdbset
|