Securing Virtual Partitions with HP-UX Role-Based Access Control
Securing Virtual Partitions with
HP-UX Role-Based Access Control
Document Information .......................................................................................................................... 3
Scope............................................................................................................................................. 3
Intended Audience ........................................................................................................................... 3
Terms and Definitions ....................................................................................................................... 3
Introduction......................................................................................................................................... 4
Partitioning Security Concerns ........................................................................................................... 4
Built-in vPars Security Features ........................................................................................................... 4
Possible Approaches to Enhance Virtual Partition Security Management ................................................. 4
HP-UX RBAC Overview......................................................................................................................... 6
Access Control Basics....................................................................................................................... 6
Simplifying Access Control with Roles................................................................................................. 6
The vPars with RBAC Solution................................................................................................................ 7
Planning HP-UX RBAC Deployment ........................................................................................................ 8
Step 1: Defining Roles for Users......................................................................................................... 8
Step 2: Defining Authorizations ......................................................................................................... 8
Step 3: Planning Command Mappings ...............................................................................................8
Configuring HP-UX RBAC...................................................................................................................... 9
Step 1: Configuring Roles for Users.................................................................................................... 9
Creating Roles ............................................................................................................................. 9
Assigning Roles to Users................................................................................................................ 9
Step 2: Configuring Authorizations .................................................................................................. 10
Step 3: Configuring Additional Command Authorizations and Privileges .............................................. 10
Using HP-UX RBAC ............................................................................................................................ 12
Using the privrun Command to Run Applications with Privileges .......................................................... 12
Conclusion........................................................................................................................................ 13
For More Information ......................................................................................................................... 14
Call to Action.................................................................................................................................... 14