HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
groups (role-based membership), command-line and GUI-based (through HP SMH)
user and group management, host and ssh key management, off-line mode, and more.
For more information, see the HP-UX LDAP-UX Integration Software documentation:
http://www.hp.com/go/hpux-security-docs
Click HP-UX LDAP-UX Integration Software.
B.9 HP-UX Secure Resource Partitions (SRP)
HP-UX Secure Resource Partitions (SRP) provides an environment for securely
consolidating multiple applications within a single image of the HP-UX 11i operating
system. SRP is a component of the Partitioning Continuum for HP-UX and offers high
efficiency in resource utilization along with maximum flexibility and performance for
customers seeking the benefits of application consolidation.
For more information, see the HP-UX SRP documentation:
http://www.hp.com/go/hpux-security-docs
Click HP-UX Secure Resource Partitions (SRP) Software.
B.10 HP-UX Secure Shell
HP-UX Secure Shell uses hashing to ensure data integrity and provides secure tunneling
features, port forwarding, and an SSH agent to maintain private keys on the client.
HP-UX Secure Shell enables you to securely log into another system over a network,
to execute commands on a remote system, and to move files from one system to another.
HP-UX Secure Shell provides a set of commands that replace insecure commands such
as rlogin, rsh, rcp, ftp, and telnet. HP-UX Secure Shell also protects a network
from the following security hazards:
IP Spoofing A technique used to gain unauthorized access to computers. An
intruder sends messages to a computer with an IP address
indicating that the message is coming from a trusted host.
Eavesdropping Searching a system for passwords, credit card numbers, or
business secrets.
Hijacking A technique used to take over network communication in such
a way that the attacker can inspect and modify data transmitted
between the communicating parties.
For more information, see the HP-UX Secure Shell documentation:
http://www.hp.com/go/hpux-security-docs
Click HP-UX 11i Secure Shell Software.
B.11 HP-UX Trusted Computing Services
HP-UX Trusted Computing Services (TCS) provides software support for the Trusted
Platform Module (TPM) option currently available on certain HP blade servers, the
BL860C and BL870C being two examples. Each TPM chip contains a unique, hidden
RSA private key and algorithms for applying the key to standard cryptographic
196 Other Security Products