Safe and Powerful: Security in HP-UX System Management Homepage (SMH)

2
Table of Contents
Introduction ......................................................................................................................................... 3
SMH key benefits................................................................................................................................. 3
SMH creating a secure product .......................................................................................................... 4
SMH security features ........................................................................................................................... 4
Managing SMH security ....................................................................................................................... 5
The Security menu ............................................................................................................................ 5
Kerberos authentication .................................................................................................................... 7
Timeout Values ................................................................................................................................ 7
Startup Modes ................................................................................................................................. 8
Key and certificate information .......................................................................................................... 9
Secure custom menus........................................................................................................................ 9
Logging .......................................................................................................................................... 9
Bastille (IPFilter) and its affect on SMH Partition Manager ................................................................... 10
Securely maintaining SMH Tips ........................................................................................................ 11
SMH documentation .......................................................................................................................... 11
For more information .......................................................................................................................... 13
HP SIM Security Resources .............................................................................................................. 13
Apache Security Resources .............................................................................................................. 13
Call to action .................................................................................................................................... 13