Planning and Configuring HP DCE 1.8
Chapter 1 45
About HP DCE/9000 Version 1.8
HP Password Management Server
omitted, but stubs are supplied that allow the resulting server to build.
Note that certain values of the pwd_SecureWare_chk ERA
(specifically, values 1 and 2) are unsupported, and will result in failures
to pass strength checking if you attempt to use the example server as
described in the documentation. The logfile entry will report that the
pwd_SecureWare_chk level is not supported.
Build Process
The source code directory for pwd_mgmt and the files in it are installed
write protected. To build this application, copy the files into a private,
writable directory you create. This way the original files will continue to
be available for you or others to consult.
cd to the private, writable directory where you copied the source files
and type:
make -f Makefile.example
Your system's /bin/make command should successfully build the client
and server programs using the Makefile provided, if modified as above.
Unlike the other sample applications, where you are encouraged to
generate a new UUID when you make modifications, you must not make
changes to rsec_pwd_mgmt.idl. secd is linked with the client stub for
the rsec_pwd_mgmt interface so changing the interface UUID will
cause communication problems between secd and your Password
Management Server.
Administrative Setup
The dce_config and pwd_config files supplied with this DCE release
are set up to configure and start up a Password Management Server that
conforms to the guidelines listed above.
In order to have the policies implemented by any Password Management
Server apply to a given principal, the administrator must attach
instances of the following two Extended Registry Attributes to the
principal's node in the DCE Registry:
pwd_val_type
The pwd_val_type attribute controls the type of password management
that applies to a given principal. The values are:
0 — Check passwords entered by this principal using the DCE Registry