HP-UX System Administrator's Guide: Configuration Management

Setting System and Network Parameters...........................................................................41
Customizing System-Wide and User Login Environments...............................................42
Setting Shadow Password Mode........................................................................................43
To Switch to Shadow Password Mode..........................................................................43
To Switch to Standard Password Mode........................................................................43
Setting Long User, Group, Host, and File Names..............................................................43
Setting Long User and Group Names...........................................................................43
Setting Long Host Names.............................................................................................44
Setting Long File Names...............................................................................................44
Configuring /etc/hosts........................................................................................................44
Configuring New HP-UX Systems into Workgroups........................................................45
Configuring a New System into a Network.......................................................................45
3 Configuring Root......................................................................................................................47
Create the Root Home Directory........................................................................................47
4 Configuring Users and Groups...................................................................................................49
Configuring Users and Groups with HP SMH..................................................................49
Adding a User with Text-Based HP SMH.....................................................................50
Skeleton Directory.........................................................................................................54
Changing the Skeleton Directory.............................................................................54
Using a Template to Add a User with Text-Based HP SMH.........................................55
Making User Templates with Text-Based HP SMH......................................................55
Modifying a User with Text-Based HP SMH................................................................57
Deleting a User with Text-Based HP SMH....................................................................58
Adding a Group with Text-Based HP SMH..................................................................59
Managing Users and Groups with Commands..................................................................60
Automating the Process of Adding a User...................................................................60
Using the useradd, usermod, and userdel Commands..........................................60
Manually Adding a User...............................................................................................61
Configuring System and User Security..............................................................................63
Configuring System Default Security Attributes..........................................................63
Configuring User Security Attributes...........................................................................65
Controlling File Access.......................................................................................................67
Defining Group Membership........................................................................................67
Setting File Access Permissions.....................................................................................68
Setting Ownership for Files...........................................................................................68
Setting Access Control Lists..........................................................................................68
Customizing System-Wide and User Login Environments...............................................68
Accessing Multiple Systems...............................................................................................69
Sharing Remote Work Directories......................................................................................69
Local versus Remote Home Directories.............................................................................70
Adding a User to Several Systems: A Case Study..............................................................70
4 Table of Contents