<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Sharing root in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898627#M104458</link>
    <description>try doing a search on sudo</description>
    <pubDate>Thu, 06 Feb 2003 17:00:35 GMT</pubDate>
    <dc:creator>Ken Hubnik_2</dc:creator>
    <dc:date>2003-02-06T17:00:35Z</dc:date>
    <item>
      <title>Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898626#M104457</link>
      <description>I have been reading some of the posts recently having to do with the root and other accounts on a system and I am beginning to get the impression that it is possible to create a separate account on a Unix box that would have the same permissions as root that could be used either in emergencies or in lieu of root for daily admin type tasks (saving root for the emergencies).&lt;BR /&gt;&lt;BR /&gt;Either my search know-how for this forum is completely inadequate, or this particular question hasn???t been asked yet.  Personally, I???m expecting the former, not the latter???&lt;BR /&gt;&lt;BR /&gt;Is it truly possible and if so, how is it done?&lt;BR /&gt;&lt;BR /&gt;Easy points for a seasoned admin???&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Feb 2003 16:54:05 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898626#M104457</guid>
      <dc:creator>John Collier</dc:creator>
      <dc:date>2003-02-06T16:54:05Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898627#M104458</link>
      <description>try doing a search on sudo</description>
      <pubDate>Thu, 06 Feb 2003 17:00:35 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898627#M104458</guid>
      <dc:creator>Ken Hubnik_2</dc:creator>
      <dc:date>2003-02-06T17:00:35Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898628#M104459</link>
      <description>Hi:&lt;BR /&gt;&lt;BR /&gt;Yes, you can do this.  I would not.  A superuser is merely an account with a uid=0.  One way to do this is to create an account with any uid and 'vi' the '/etc/passwd' file to replace the 'uid' with zero.&lt;BR /&gt;&lt;BR /&gt;What matters is the 'uid' of a file or a process.  The name associated with it is simply mapped (derived) from a file such a user database such as '/etc/passwd'.&lt;BR /&gt;&lt;BR /&gt;The problem with multiple "root" (uid=0) accounts is that someday, someone will forget that, for instance, a user named "jrf" is really a root alias; and delete all files owned by "jrf" -- rather, all files owned by uid=0 ...&lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Thu, 06 Feb 2003 17:00:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898628#M104459</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2003-02-06T17:00:39Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898629#M104460</link>
      <description>any user created with the UID of 0 has root privliges, about all you gain from this is a little better tracking of login, commnd history and acountability&lt;BR /&gt;&lt;BR /&gt;its handy to give to HP to check you system if they can dial and simply enable/disable the account for when ever needed&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Feb 2003 17:01:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898629#M104460</guid>
      <dc:creator>James Odak</dc:creator>
      <dc:date>2003-02-06T17:01:14Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898630#M104461</link>
      <description>Create another user with a UID of Zero (You may have to create them with a unique UID first then alter it to Zero in /etc/passwd).&lt;BR /&gt;&lt;BR /&gt;Alternatively, use 'sudo' from the HP Porting Centre.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu./hppd/hpux/Sysadmin/sudo-1.6.6/" target="_blank"&gt;http://hpux.cs.utah.edu./hppd/hpux/Sysadmin/sudo-1.6.6/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Share and Enjoy! Ian</description>
      <pubDate>Thu, 06 Feb 2003 17:01:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898630#M104461</guid>
      <dc:creator>Ian Dennison_1</dc:creator>
      <dc:date>2003-02-06T17:01:23Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898631#M104462</link>
      <description>Any user ID (UID) of 0 is going to be the equivalent of root.  This is rarely a good idea though.  &lt;BR /&gt;If you want to do routine systems administration without using the root account, then you'll need to install sudo, and restricted SAM. There is a lot of information here in the ITRC forums about sudo and restricted SAM, and you can get a lot of stuff out of Google.  &lt;BR /&gt;For example, we cannot let our Oracle DBA's access the root account, yet they occasionally have need of root level operations.  Those particular operations we have enabled using sudo.  That lets them do their thing without bothering the Sysadmins.  &lt;BR /&gt;Best of all is to "harden" your Unix system.  This is too detailed a task to write here, so I'm attaching our hardening document. This is an abbreviation of the information in _Practical Unix &amp;amp; Internet Security_, by Garfinkel &amp;amp; Spafford, by O'Reilly.  This is widely available on the web, local bookstores, and on the O'Reilly website at &lt;A href="http://www.oreilly.com," target="_blank"&gt;www.oreilly.com,&lt;/A&gt; and highly reccommended. &lt;BR /&gt;&lt;BR /&gt;Chris</description>
      <pubDate>Thu, 06 Feb 2003 17:07:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898631#M104462</guid>
      <dc:creator>Chris Vail</dc:creator>
      <dc:date>2003-02-06T17:07:11Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898632#M104463</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;sudo is the way to go.&lt;BR /&gt;&lt;BR /&gt;It is possible to create a pseudo root account uid 0 but don't do this.&lt;BR /&gt;&lt;BR /&gt;Robert-Jan.</description>
      <pubDate>Thu, 06 Feb 2003 17:07:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898632#M104463</guid>
      <dc:creator>Robert-Jan Goossens</dc:creator>
      <dc:date>2003-02-06T17:07:41Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898633#M104464</link>
      <description>Just DO NOT create another account with 0. There are few other ways to get your issues fixed.&lt;BR /&gt;&lt;BR /&gt;1. SUDO - the first choice. Define only few items in SUDO like modprpw -k for only SA group. Redirect your syslog to another system where only your manager has root access to have access for auditing.&lt;BR /&gt;&lt;BR /&gt;2. You can always get the root password changed in the single user mode. So, restrict your console access and to the datacenter.&lt;BR /&gt;&lt;BR /&gt;3. Go to point 1.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Thu, 06 Feb 2003 17:33:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898633#M104464</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2003-02-06T17:33:37Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898634#M104465</link>
      <description>This is like asking "do you like blue".  You're going to get responses leaning towards "never set up another uid 0 account", you'll get responses saying "use sudo", you'll get responses that say "sure, set up as many root users as you want".&lt;BR /&gt;&lt;BR /&gt;My own opinion is to have one and only one root account.  If you need to share root responsibilities, look into restricted SAM or sudo.  If you need to have some sort of emergency access (like forgetting the root password), you need to look into more training for your sys admins and possibly new sys admins.&lt;BR /&gt;&lt;BR /&gt;Like I said - just my opinion.&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Thu, 06 Feb 2003 18:13:08 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898634#M104465</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-02-06T18:13:08Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898635#M104466</link>
      <description>It never ceases to amaze me at how easy it is to get things stirred up sometimes.  I know I???m still relatively new to the concept of in depth system administration and there is still much I need to learn, but it seems like the learning process can be rather hard on the head when you can???t manage to get official training along those lines.&lt;BR /&gt;&lt;BR /&gt;Sorry to stir things up so much over what I thought would be a simple question.&lt;BR /&gt;&lt;BR /&gt;On a different note, I do appreciate all of the information that all of you have provided on this.  There is truly much more to consider than I realized when I put this question out.  Actually, this is one of the reasons that I wanted to put it here on this forum before trying something on the systems here.  One thing that I have learned is that there is much more knowledge available here than I could ever hope to possess on my own. Due to the fact that each of you have had different experiences in your career which have taught you different things than some of your colleagues (and much more than I at this stage of my life), this forum is one of the most valuable resources I have found in my search for knowledge.  The fact that you are all so willing to share it is sometimes mind boggling on it???s own.&lt;BR /&gt;&lt;BR /&gt;I will take this information to heart and think hard about the options given and the ramifications of each one before I make any moves.  While Sudo seems to be the most popular option here, I don???t know if the others involved in this will be willing to go that direction.  It hasn???t been discussed yet.  This whole thing was my brainchild and I was simply looking for a possible way to create a ???backdoor??? JIC.  Trying to be somewhat proactive and save potential heartache down the road ;-)???&lt;BR /&gt;&lt;BR /&gt;Chris,&lt;BR /&gt;&lt;BR /&gt;Your suggestion on hardening the system is most likely the smartest thing that we could do, but it looks just a bit too restrictive for the way we have to do things.  I appreciate the information none the less and will file it for future reference.  Hopefully it will be useful to someone else as well.&lt;BR /&gt;&lt;BR /&gt;Pete,&lt;BR /&gt;&lt;BR /&gt;I think you wrapped this whole thing up in a nutshell.  I can see now that this is greatly a matter of opinion more than a matter of mechanics.  The mechanics are easy; the rest is far from it.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks again for all the input from everybody.  It appears I have much thinking to do???&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Feb 2003 21:15:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898635#M104466</guid>
      <dc:creator>John Collier</dc:creator>
      <dc:date>2003-02-06T21:15:12Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898636#M104467</link>
      <description>Hi John:&lt;BR /&gt;&lt;BR /&gt;I don't think you "stirred things up" so much as you asked a good question.  Don't be offended by the tone of the responses either.&lt;BR /&gt;Very little is black-and-white; rather infinitely gray.  &lt;BR /&gt;&lt;BR /&gt;Regards!&lt;BR /&gt;&lt;BR /&gt;...JRF...</description>
      <pubDate>Thu, 06 Feb 2003 21:24:02 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898636#M104467</guid>
      <dc:creator>James R. Ferguson</dc:creator>
      <dc:date>2003-02-06T21:24:02Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898637#M104468</link>
      <description>Hi John,&lt;BR /&gt;&lt;BR /&gt;Correlating your message and JRF's response, I looked at all the messages and the most offending (?) message is probably mine.&lt;BR /&gt;&lt;BR /&gt;I do not necessarily agree that it is a matter of opinion. An opinion is certainly come into picture when you ask "do you like blue"?. However, when you ask "do you like to drink pepsi or poison?" then my answer would not be an opinion.&lt;BR /&gt;&lt;BR /&gt;If a person is attempting to drink poison, then the suggestions may look offending. But they are for good.. Creating another account with uid 0 is the same for me in terms of security.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Thu, 06 Feb 2003 21:54:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898637#M104468</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2003-02-06T21:54:56Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898638#M104469</link>
      <description>Another opinion.... Lets just say you have an audit team walk in the door... Some of them are serious ...&lt;BR /&gt;&lt;BR /&gt;The first things they will review are entries from your password file, how you manage root password and an overall view of security of your systems. If you are serious about security, then installing 'sudo' in one of the most effective methods. If your not, then you can open up whatever little nasties you like.&lt;BR /&gt;&lt;BR /&gt;My aussie 3 cents&lt;BR /&gt;Michael</description>
      <pubDate>Thu, 06 Feb 2003 22:00:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898638#M104469</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2003-02-06T22:00:13Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898639#M104470</link>
      <description>Now I see that I have worded my last reply the wrong way.  Please allow me to clarify.&lt;BR /&gt;&lt;BR /&gt;I was in no manner, shape, or form offended or insulted by any of the answers that I received nor did I find any of them to be off key in any way.  On the contrary, I found them all to be rather enlightening.&lt;BR /&gt;&lt;BR /&gt;One of the things that I have come to appreciate about this forum is that you will get a wide variety of  responses to a question due to the fact that you have such a wide variety of people, personalities, and experiences in this knowledge pool.  That is one of the things that makes this such a valuable source of information.&lt;BR /&gt;&lt;BR /&gt;At the same time, due to the variety of people and personalities, you also get a wide variety of answers each with their own personal tone to them.  If a person dwells on the words only, then they will miss the true meaning behind what is truly being conveyed.  You have to be able to look beyond the obvious and see the real reasons for the responses.&lt;BR /&gt;&lt;BR /&gt;At the risk of sounding like I???m writing a book, let me explain further;&lt;BR /&gt;&lt;BR /&gt;When I first entered this forum, I found it to be intimidating on many levels.  Most of the people that you see responding to the questions posted here have a much larger personal knowledge base than I do and I felt (and still do to a point) inadequate.  I didn???t think that I belonged here and that I would be blown out of the water with the first stupid question I asked.  I hadn???t learned to read beyond the words yet.&lt;BR /&gt;&lt;BR /&gt;Then I found some of the less official threads in this arena and started reading on them as well.  This allowed me to get to know the people behind the words to an extent, but I still didn???t want to post because then it seemed so much like a family and I didn???t feel like I fit in there either.  Nobody knew me.  How could I fit?&lt;BR /&gt;&lt;BR /&gt;Many months later, I finally came back to the forum and decided that I would try to post some and see how it went.  I had seen enough that I felt I could risk it, so I started with something simple like the congratulation posts.  Even then, I went in cautiously and apologetically.  What I got from the community was a warm welcome and encouragement to not be shy, but just jump right in.  Perhaps if they would have known the monster they were about to unleash, they wouldn???t have done that (but it???s too late now!!).&lt;BR /&gt;&lt;BR /&gt;Please rest assured that if I ever get offended, you will know about it and I???m not likely to be very subtle when it happens.  But don???t worry about that too much either.  I have thicker skin than most and I have learned something about how to read the information from some of the different people here.&lt;BR /&gt;&lt;BR /&gt;Most of the people seem to be good folks.  They also seem to be rather passionate about their work and when they give an answer, they tend to feel strongly about it.  To the newbie, that can come across wrong if they haven???t taken the time to pay attention.  Check my profile and see how long I have been watching vs. how long I have been responding/posting.  I paid my dues in that area.&lt;BR /&gt;&lt;BR /&gt;Best way for me to put this is simply ???Hit me with everything you???ve got??? or ???Don???t pull punches???.  If I???m to the point of asking in this forum, I???m ready for pretty much anything I get.  If someone steps on a toe or bruises a feeling, I???ll let you know.  Otherwise, don???t be concerned for a minute.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;James,&lt;BR /&gt;&lt;BR /&gt;Thanks to you for the kind words.  It???s nice to see an Olympian give me credit for a good question.  I consider that a compliment.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Sri,&lt;BR /&gt;&lt;BR /&gt;You have always struck me as one of the more passionate in your answers.  For that reason, I see why you would have the response you gave.  No opinion, just facts.  When my personal knowledge base is as large as yours, I expect I will be the same way.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Michael,&lt;BR /&gt;&lt;BR /&gt;That is one of the things that I have to think about.  Remember the closing to my last post?&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Thanks again to you all,&lt;BR /&gt;JWC&lt;BR /&gt;</description>
      <pubDate>Thu, 06 Feb 2003 23:25:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898639#M104470</guid>
      <dc:creator>John Collier</dc:creator>
      <dc:date>2003-02-06T23:25:24Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898640#M104471</link>
      <description>Just to add my 2 cents.  Restricting root to console logins only DOES not prevent people with the password from using su to become root to accomplish their jobs.  It DOES make sure they have to use su so that you will have a log of who became root at the time something dreadful happened.  I have been VERY happy to have done this and it's very, very simple.&lt;BR /&gt;I'm also glad I installed sudo.  It's rather a pain to get configured, but once you figure it out, it can be very handy.  For instance, I was changing user passwords 2-3 times EVERY day.  Now a select group of IT people can sudo passwd and save me the hassle, which does add up.&lt;BR /&gt;Kim</description>
      <pubDate>Thu, 06 Feb 2003 23:38:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898640#M104471</guid>
      <dc:creator>Kim Doty</dc:creator>
      <dc:date>2003-02-06T23:38:16Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898641#M104472</link>
      <description>&lt;BR /&gt;&lt;BR /&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;create a user say admin and use this account daily and when you need to do root tasks just su to root. So in this way you don't have to log in as root every day and it's safer this way. Also look at sudo.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Feb 2003 10:48:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898641#M104472</guid>
      <dc:creator>Khalid A. Al-Tayaran</dc:creator>
      <dc:date>2003-02-07T10:48:53Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898642#M104473</link>
      <description>One of the things that worries me as an admin is people scanning the network traffic for the root password.  I was just thinking if I use su I wouldn't have to worry about this any more.&lt;BR /&gt;&lt;BR /&gt;I like your hardening document, I will be giving that some attention SOON.&lt;BR /&gt;&lt;BR /&gt;I was told on a course that security and convenience are inversely related.&lt;BR /&gt;&lt;BR /&gt;I guess if you have hundreds of users all keeping files that are highly sensitive you would probably spend alot of time worrying about file permissions.&lt;BR /&gt;&lt;BR /&gt;There's a utility called cops that does some security checking, it's a help, don't rely on it though.</description>
      <pubDate>Fri, 07 Feb 2003 12:36:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898642#M104473</guid>
      <dc:creator>Gavin Clarke</dc:creator>
      <dc:date>2003-02-07T12:36:54Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898643#M104474</link>
      <description>My turn now ;-)&lt;BR /&gt;&lt;BR /&gt;1. multiple uid=0's : i do not share the idea that it is worse than 1 uid=0 account.  If you give it good names, you wont remove them by mistake.  When you enable accounting, you even see which user executed commands with a uid=0 user (every user has a different audit id on a system - it's in the tcb-files).&lt;BR /&gt;What my experience is, is that it is not easy to maintain a lot of users in a site with hundreds of unix-boxes.  So, for that reason, you'll try to limit the number of accounts.&lt;BR /&gt;What's the result ?  Let all your sysadmin's work under 1 root user ?  Dangerous (if you do esc -).&lt;BR /&gt;We concluded it was best to let all the sysadmins work under 1 user, but they do not have permanent access.  The can change the password of the root user by demand.  Also, only 1 user can lock the root account at one time.&lt;BR /&gt;&lt;BR /&gt;2. restricted sam : difficult to work in a distributed environment.&lt;BR /&gt;&lt;BR /&gt;3. SCM : the way to go for the future (imho) : every sysadmin works under his own account on a central mgt-server, but has control over several delegated root-tasks accross his domain.&lt;BR /&gt;&lt;BR /&gt;who's next ?</description>
      <pubDate>Fri, 07 Feb 2003 14:47:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898643#M104474</guid>
      <dc:creator>Systeemingenieurs Infoc</dc:creator>
      <dc:date>2003-02-07T14:47:18Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898644#M104475</link>
      <description>I'm always tickled when I see folks insisting that their opinions aren't....&lt;BR /&gt;&lt;BR /&gt;There was a related thread a few weeks ago:&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x2eae4a988422d711abdc0090277a778c,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x2eae4a988422d711abdc0090277a778c,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I said then:&lt;BR /&gt;All of our actual "root" passwords are escrowed with me (Chief Systems Engineer) by the server's primary SA, in sealed envelopes and vaulted. Each Unix sysadmin has an individual uid 0 account on each box (s)he's responsible for, so when someone leaves, we just disable the account unless their signature is on a root envelope, in which case we also change root for that box. Our security standards call for password changes every sixty days, and do contain some guidance on construction of passwords. Each sysadmin is responsible for managing passwords on the personal uid 0 accounts, and the primary also manages the real root account.</description>
      <pubDate>Fri, 07 Feb 2003 18:54:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898644#M104475</guid>
      <dc:creator>W.C. Epperson</dc:creator>
      <dc:date>2003-02-07T18:54:04Z</dc:date>
    </item>
    <item>
      <title>Re: Sharing root</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898645#M104476</link>
      <description>Use either or a combination of:&lt;BR /&gt;Restricted SAM&lt;BR /&gt;sudo&lt;BR /&gt;SCM&lt;BR /&gt;3rd Party Products&lt;BR /&gt;&lt;BR /&gt;When talking about using "su", make sure you set the SU_ROOT_GROUP in the /etc/default/security file so only members of a specific group can "su" to root.&lt;BR /&gt;&lt;BR /&gt;I personally don't like having multiple UID 0's. But, I also won't set trusted system settings on the root account (such as aging, locking, etc..).&lt;BR /&gt;&lt;BR /&gt;And finally... if using root or using su to get to root, don't use telnet at any point in your connection unless you are on a private LAN and have high confidence in the security of the HP-UX system you are connecting to.&lt;BR /&gt;&lt;BR /&gt;- Chris&lt;BR /&gt;</description>
      <pubDate>Fri, 07 Feb 2003 19:13:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/sharing-root/m-p/2898645#M104476</guid>
      <dc:creator>Chris Wong</dc:creator>
      <dc:date>2003-02-07T19:13:13Z</dc:date>
    </item>
  </channel>
</rss>

