<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: restricting access in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899469#M104643</link>
    <description>Just a little note.  Any user id below 100 is for the system.  Don't mess with those.  If you delete them your system could have a major malfuncion.  Don't change their entries in /etc/profile because they need the priviledges they have.&lt;BR /&gt;&lt;BR /&gt;You can set up a file called /var/adm/inetd.sec&lt;BR /&gt;&lt;BR /&gt;This can let you fine tune who can access the system by what protocol and where.&lt;BR /&gt;&lt;BR /&gt;If this is a security issue, you might find the Bastille security hardeninig utility of use.  I've included a link.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://payment.ecommerce.hp.com/cgi-bin/swdepot_parser.cgi/cgi/try.pl?productNumber=B6849AA&amp;amp;date=" target="_blank"&gt;https://payment.ecommerce.hp.com/cgi-bin/swdepot_parser.cgi/cgi/try.pl?productNumber=B6849AA&amp;amp;date=&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;P</description>
    <pubDate>Fri, 07 Feb 2003 14:11:22 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2003-02-07T14:11:22Z</dc:date>
    <item>
      <title>restricting access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899465#M104639</link>
      <description>Hi,&lt;BR /&gt;Does anyone now how to quickly restrict login access to root and informix users without deleting other accounts on the system.&lt;BR /&gt;Thanks,&lt;BR /&gt;Trystan.</description>
      <pubDate>Fri, 07 Feb 2003 12:14:58 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899465#M104639</guid>
      <dc:creator>trystan macdonald</dc:creator>
      <dc:date>2003-02-07T12:14:58Z</dc:date>
    </item>
    <item>
      <title>Re: restricting access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899466#M104640</link>
      <description>Trystan,&lt;BR /&gt;&lt;BR /&gt;Well, there's the nologin feature of /etc/default/security, but that keeps everyone but root out.  For more granularity, you would need to have a global login script (like /etc/profile) and do some sort of checking in there, like for the presence of a file called /etc/justrootandinformix, and do an exit for everyone else.&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Fri, 07 Feb 2003 12:21:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899466#M104640</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2003-02-07T12:21:50Z</dc:date>
    </item>
    <item>
      <title>Re: restricting access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899467#M104641</link>
      <description>Hi Trystan,&lt;BR /&gt;&lt;BR /&gt;root login only on console and su -&lt;BR /&gt;&lt;BR /&gt;#echo console &amp;gt;&amp;gt; /etc/securetty&lt;BR /&gt;&lt;BR /&gt;informix,&lt;BR /&gt;take a look at next link,&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x59d7cdec06f1d61190050090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x59d7cdec06f1d61190050090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Robert-Jan.</description>
      <pubDate>Fri, 07 Feb 2003 12:23:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899467#M104641</guid>
      <dc:creator>Robert-Jan Goossens</dc:creator>
      <dc:date>2003-02-07T12:23:30Z</dc:date>
    </item>
    <item>
      <title>Re: restricting access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899468#M104642</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;- vipw and add comment sign (or anything else) to username or password for non-administrative users.  Remove this later to allow access again.&lt;BR /&gt;&lt;BR /&gt;- edit /etc/profile: check on loginname and exit if different from root,informix,...&lt;BR /&gt;&lt;BR /&gt;- ...&lt;BR /&gt;&lt;BR /&gt;Stay logged in on one terminal, and test login.  Don't lock yourself out.&lt;BR /&gt;&lt;BR /&gt;good luck,&lt;BR /&gt;Thierry.</description>
      <pubDate>Fri, 07 Feb 2003 12:25:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899468#M104642</guid>
      <dc:creator>Thierry Poels_1</dc:creator>
      <dc:date>2003-02-07T12:25:56Z</dc:date>
    </item>
    <item>
      <title>Re: restricting access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899469#M104643</link>
      <description>Just a little note.  Any user id below 100 is for the system.  Don't mess with those.  If you delete them your system could have a major malfuncion.  Don't change their entries in /etc/profile because they need the priviledges they have.&lt;BR /&gt;&lt;BR /&gt;You can set up a file called /var/adm/inetd.sec&lt;BR /&gt;&lt;BR /&gt;This can let you fine tune who can access the system by what protocol and where.&lt;BR /&gt;&lt;BR /&gt;If this is a security issue, you might find the Bastille security hardeninig utility of use.  I've included a link.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="https://payment.ecommerce.hp.com/cgi-bin/swdepot_parser.cgi/cgi/try.pl?productNumber=B6849AA&amp;amp;date=" target="_blank"&gt;https://payment.ecommerce.hp.com/cgi-bin/swdepot_parser.cgi/cgi/try.pl?productNumber=B6849AA&amp;amp;date=&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;P</description>
      <pubDate>Fri, 07 Feb 2003 14:11:22 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-access/m-p/2899469#M104643</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-02-07T14:11:22Z</dc:date>
    </item>
  </channel>
</rss>

