HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
security considerations for, 104
Logical Volume Manager
See LVM, 104
login banners
securing, 56
login command, 32, 187
login process
explanation of, 32
login tracking file, 33
lost+found directory, 27, 192
LVM, 104
M
MAC, 202
managing file access, 87
managing passwords, 41
minimum time
password aging, 189
mobile connection
securing, 55
modem access
security guidelines for managing, 55
mounting a file system securely, 105
N
network administration, 75
controlling file security, 106
managing an administrative domain, 74
network control file
checking permissions on, 106
verifying permissions on, 75
NFS, 107
and ACLs, 103
protecting NFS-mounted files, 108
securing the client, 107
securing the server, 107
NIS
securing passwords stored in, 46
O
operations
guidelines for creating, 147
P
PAM
authenticating users with, 34
configuring systemwide, 37
overview of, 35
PAM authentication
login example, 39
PAM library, 36
PAM service module, 35
parameter
PASSWORD_HISTORY_DEPTH, 190
passwd command, 188
examples of, 42
password, 189
aging, 186, 188, 189
expiration time, 189
lifetime, 189
minimum time, 189
authentication
used by SSH, 82
criteria of a good, 42
database, 185, 186, 188
/tcb/files/auth/, 186, 187
encrypted field, 188
encryption, 187
entry
manipulating, 191
file
fields, 187
protected password database, 185, 186, 188
generation, 189
history, 190
integrity, 187
management, 41
reuse, 190
security, 186
shadow, 43
types of, 189
PASSWORD_HISTORY_DEPTH parameter, 190
patch installation
using Software Assistant, 26
Perfect Forward Secrecy (PFS)
defined, 203
permissions
checking network control file, 106
verifying for network control files, 75
power failure, 27, 192
file loss, 27
preshared keys
definition, 203
primary audit log file, 174
privedit, 159
options, 160
syntax, 160
privrun, 157
-p, 155
examples, 158
operation, 144
options, 157
syntax, 157
protected password database
/tcb/files/auth/, 186, 187
prpwd, 188
pseudo-account
example of, 45
public key based authentication
and host-based authentication, 81
used by SSH, 81
putprpwnam function, 191
210 Index