HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
specified in a single entry. Only one authorization can be specified per role on each
line; however, the * wildcard is supported. The following are the supported entries
and format for the /etc/rbac/aud_filter file:
role, operation, object
The following list explains each of the /etc/rbac/aud_filter entries:
role Any valid role defined in /etc/rbac/roles. If * is specified, all roles
can be accessed by the operation.
operation
A specific operation that can be performed on an object. For example,
hpux.printer.add is the operation of adding a printer. Alternatively,
hpux.printer.* is the operation of either adding or deleting a printer.
If * is specified, all operations can be accessed by the operation.
object The object the user can access. If * is specified, all objects can be accessed
by the operation.
The following are example /etc/rbac/aud_filter entries that specify how to
generate audit records for the role of SecurityOfficer with the authorization of
(hpux.passwd, /etc/passwd), and for the Administrator role with authorization
to perform the hpux.printer.add operation on all objects.
SecurityOfficer, hpux.passwd, /etc/passwd
Administrator, hpux.printer.add, *
NOTE: Use an editor such as vi to directly edit the /etc/rbac/aud_filter file.
The HP-UX RBAC administrative commands do not provide an interface to configure
/etc/rbac/aud_filter.
For detailed information about RBAC, roles, operations, and objects, see Chapter 8
9.11.2 Procedure for Auditing HP-UX RBAC Criteria
The following steps describe how to configure an audit process to audit HP-UX RBAC
criteria on the system:
1. Configure the system to audit Passed or Failed events for the Administrator events
by using the following command:
# audevent -PFe admin
2. Configure the location and name of the audit output file and enable auditing on
the system by using the following command:
# audsys -n -c /tmp/aud.out -s 2048
3. Execute an HP-UX RBAC command, for example:
# /usr/sbin/authadm add newauth
4. Open the audit output file and search for the records on the authadm command
by using the following command:
# audisp /tmp/aud.out |fgrep authadm
9.11 HP-UX RBAC Auditing 183