HP-UX System Administrator's Guide: Security Management HP-UX 11i v3 (B3921-90020, September 2010)

Table Of Contents
A.3.1.1 The /etc/passwd File
A trusted system uses the /etc/passwd file to identify a user at login time. The file
contains an entry for every account on the HP-UX system. Each entry consists of seven
fields, separated by colons. A typical entry for /etc/passwd in a trusted system looks
like this:
robin:*:102:99:Robin Hood,Rm 3,x9876,408-555-1234:/home/robin:/usr/bin/sh
The fields contain the following information (listed in order), separated by colons:
1. User (login) name, consisting of up to 8 characters. (In the example, robin)
2. Unused password field, held by an asterisk instead of an actual password. (*)
3. User ID, an integer ranging from 0 to MAXINT-1, equal to 2,147,483,646 or 2
31
-2.
(102)
4. Group ID, from /etc/group, an integer ranging from 0 to MAXINT-1. (99)
5. Comment field, used to identify such information as the user's full name, location,
and phone numbers. For historic reasons, this is also called the gecos field.
(Robin Hood,Rm 3,x9876,408-555-1234)
6. Home directory, the user's initial login directory. (/home/robin)
7. Login program path name, executed when the user logs in. (/usr/bin/sh)
The user can change the comment field (fifth field) with the chfn command and the
login program path name (seventh field) with the chsh command. The system
administrator sets the remaining fields. The user ID should be unique. For more
information, see chfn(1), chsh(1), passwd(1), and passwd(4). The user can change the
password in the protected password database with passwd.
A.3.1.2 The /tcb/files/auth/ Database
When a system is converted to a trusted system, the encrypted password, normally
held in the second field of /etc/passwd, is moved to the protected password database,
and an asterisk holds its place in the /etc/passwd file.
Protected password database files are stored in the /tcb/files/auth/ hierarchy.
User authentication profiles are stored in these directories based on the first letter of
the user account name. For example, the authentication profile for user david is stored
in the file /tcb/files/auth/d/david.
On trusted systems, key security elements are held in the protected password database,
accessible only to superusers. Use HP SMH to set password data entries. Password
data that is not set for a user will default to the system defaults stored in the file /tcb/
files/auth/system/default.
The protected password database contains many authentication entries for the user.
See prpwd(4) for more information on these entries, which include the following:
User name and user ID
Encrypted password
Account owner
Boot authentication to allow specified users to boot the system; see security(4).
Audit ID and audit flag for the user (whether audit is on or not)
188 Trusted Systems