HP-UX System Administrator's Guide: Configuration Management HP-UX 11i v3 (B3921-90017, September 2010)
Setting System and Network Parameters...........................................................................43
Customizing System-Wide and User Login Environments...............................................44
Setting Shadow Password Mode........................................................................................45
To Switch to Shadow Password Mode..........................................................................45
To Switch to Standard Password Mode........................................................................45
Enabling Long Passwords.............................................................................................45
Setting Long User, Group, Host, and File Names..............................................................46
Setting Long User and Group Names...........................................................................46
Setting Long Host Names.............................................................................................46
Setting Long File Names...............................................................................................46
Configuring /etc/hosts........................................................................................................46
Configuring New HP-UX Systems into Workgroups........................................................47
Configuring a New System into a Network.......................................................................48
3 Configuring Root......................................................................................................................49
Create the Root Home Directory........................................................................................49
4 Configuring Users and Groups...................................................................................................51
Configuring Users and Groups with HP SMH..................................................................51
Adding a User with Text-Based HP SMH.....................................................................52
Skeleton Directory.........................................................................................................56
Changing the Skeleton Directory.............................................................................56
Using a Template to Add a User with Text-Based HP SMH.........................................57
Making User Templates with Text-Based HP SMH......................................................57
Modifying a User with Text-Based HP SMH................................................................59
Deleting a User with Text-Based HP SMH....................................................................60
Adding a Group with Text-Based HP SMH..................................................................61
Managing Users and Groups with Commands..................................................................62
Automating the Process of Adding a User...................................................................62
Using the useradd, usermod, and userdel Commands..........................................62
Manually Adding a User...............................................................................................63
Configuring System and User Security..............................................................................65
Configuring System Default Security Attributes..........................................................65
Configuring User Security Attributes...........................................................................67
Controlling File Access.......................................................................................................69
Defining Group Membership........................................................................................69
Setting File Access Permissions.....................................................................................70
Setting Ownership for Files...........................................................................................70
Setting Access Control Lists..........................................................................................70
Customizing System-Wide and User Login Environments...............................................70
Accessing Multiple Systems...............................................................................................71
Sharing Remote Work Directories......................................................................................71
Local versus Remote Home Directories.............................................................................72
4 Table of Contents