| United States-English |
|
|
|
![]() |
HP-UX System Administrator's Guide: Overview: HP-UX 11i Version 3 > Chapter 3 Major Components of HP-UXSecurity and Access Control |
|
HP-UX has many tools for securing your servers and data. Threats to your servers and data can be either malicious or accidental, as well as physical (fires, earthquakes, failing hardware, and so on). Or, they can be logical (misbehaving software, hacking, and so on). For information about the tools available to protect your servers and data against loss from the threats mentioned previous, see “Data Protection Tools”. HP-UX has the ability to control access to directories and files using a combination of:
Using these, a file or directory is assigned an owner, a group, and an access mask called a mode, which collectively determine: There is a lot more to the topic of legacy Unix file ownership and privileges and there are other, more powerful, mechanisms that allow you to carefully control and monitor who is accessing the files and directories on your system. An entire volume of the HP-UX System Administrator’s Guide is devoted to the topic of security. For extensive coverage of the topic of controlling access to the files and directories of your system and other security related topics, see HP-UX System Administrator’s Guide: Security Management. Traditional UNIX file access mechanisms are adequate for many basic installations, but today’s security and privacy conscious world requires a lot more control over who has access to which data. With traditional security methods, a typical weak link in the mechanism is the superuser (or root user). The term superuser refers to any account with a User ID (or any program or process with an effective User ID) of “0” (zero). These special accounts allow anyone who has access to them complete access to every local file on the entire server. Should the password for a superuser account fall into the wrong hands, the security of the entire server becomes compromised. In many installations, it is not desirable to give any one person access to every file on a server. In particular, the role of system administrator might be sub-divided into more specific roles that are assigned to different people. Others may need to administer specific applications, or a database or other entity. Perhaps, for security reasons, it is desirable to give a person access to certain files or capabilities only during certain hours of the day. HP-UX 11i version 3 has security technologies that, when used together, provide significantly greater access control of the data files and user privileges on your servers when HP-UX is running in Standard Mode:[6]
For more information on the enhanced security containment features introduced above, see the following resources:
[6] These security technologies are also available in HP-UX 11i version 2. For more information on Standard Mode vs. Trusted Mode, see “Protecting Against Unauthorized Access to Your Servers and Data”. |
||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||