<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Restricted SAM in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909516#M106951</link>
    <description>Hello, I'm on 'D' class servers running HPUX 10.20. Are there safeguards in Restricted SAM that would not allow changes to key system accounts like ROOT, specified System Administration accounts,&lt;BR /&gt;etc. even though they can be viewed? It appears that changes could be made to these key accounts through restricted SAM? I'm familiar with the /etc/sam/rmuser.excl file which disables deletion of&lt;BR /&gt;specified accounts. My concern is someone making changes to ROOT and other key System Administration accounts (without authorization)?&lt;BR /&gt;Thanks</description>
    <pubDate>Thu, 20 Feb 2003 17:05:18 GMT</pubDate>
    <dc:creator>Charles Legge</dc:creator>
    <dc:date>2003-02-20T17:05:18Z</dc:date>
    <item>
      <title>Restricted SAM</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909516#M106951</link>
      <description>Hello, I'm on 'D' class servers running HPUX 10.20. Are there safeguards in Restricted SAM that would not allow changes to key system accounts like ROOT, specified System Administration accounts,&lt;BR /&gt;etc. even though they can be viewed? It appears that changes could be made to these key accounts through restricted SAM? I'm familiar with the /etc/sam/rmuser.excl file which disables deletion of&lt;BR /&gt;specified accounts. My concern is someone making changes to ROOT and other key System Administration accounts (without authorization)?&lt;BR /&gt;Thanks</description>
      <pubDate>Thu, 20 Feb 2003 17:05:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909516#M106951</guid>
      <dc:creator>Charles Legge</dc:creator>
      <dc:date>2003-02-20T17:05:18Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted SAM</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909517#M106952</link>
      <description>Even through restricted SAM, you cannot restrict the actual functionality of SAM. The only control you have is to allow or deny users access to areas within SAM. If you are concerned about the admin area security, then deny access to those areas.</description>
      <pubDate>Thu, 20 Feb 2003 17:28:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909517#M106952</guid>
      <dc:creator>Helen French</dc:creator>
      <dc:date>2003-02-20T17:28:59Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted SAM</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909518#M106953</link>
      <description>Again, you don't need to worry about somebody changing the root password through restricted SAM. Becuase in restricted SAM, it will not allow to change the root password or the passwd of any user with a UID of 0.</description>
      <pubDate>Thu, 20 Feb 2003 17:34:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909518#M106953</guid>
      <dc:creator>Helen French</dc:creator>
      <dc:date>2003-02-20T17:34:19Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted SAM</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909519#M106954</link>
      <description>When you got a restricted SAM setup for say a normal user, you're basically allowing him to to use SAM as if he/she is root. To control what this user can do in restricted SAM, you got to configure which screen to allow or disallow. I think this is done in the restricted SAM builder. You can even configure say, you do not want the user to be able to change root's password (but he can change passwords of other users). It really depends on how you want to set it up and what funtionality you want to allow in the restricted SAM.</description>
      <pubDate>Thu, 20 Feb 2003 17:43:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909519#M106954</guid>
      <dc:creator>S.K. Chan</dc:creator>
      <dc:date>2003-02-20T17:43:46Z</dc:date>
    </item>
    <item>
      <title>Re: Restricted SAM</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909520#M106955</link>
      <description>Hello, Thanks for the answers. I believe you've answered my question and concerns. Charles.</description>
      <pubDate>Thu, 20 Feb 2003 17:51:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricted-sam/m-p/2909520#M106955</guid>
      <dc:creator>Charles Legge</dc:creator>
      <dc:date>2003-02-20T17:51:09Z</dc:date>
    </item>
  </channel>
</rss>

