<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: vPar security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259841#M332791</link>
    <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Two things to do. Insure vpar security itself is as strong as a standalone system.&lt;BR /&gt;&lt;BR /&gt;Make sure the console that controls the vpar is secure. Use ssh not telnet for access. Limit who has the password.&lt;BR /&gt;&lt;BR /&gt;If you have root access there is no such thing as a safe system.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
    <pubDate>Thu, 28 Aug 2008 14:06:45 GMT</pubDate>
    <dc:creator>Steven E. Protter</dc:creator>
    <dc:date>2008-08-28T14:06:45Z</dc:date>
    <item>
      <title>vPar security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259839#M332789</link>
      <description>What's stopping me from being a nasty beligerent boy with a root shell and doing a:&lt;BR /&gt;&lt;BR /&gt;# vparreset -p whomever -t&lt;BR /&gt;&lt;BR /&gt;RBAC certainly won't, at least I can't see how. THere's some monitor level stuff that restrics which vPars can do administrative work. But I still seem to be able as root to reset other vPars from the same nPar.&lt;BR /&gt;&lt;BR /&gt;Have I missed something?</description>
      <pubDate>Thu, 28 Aug 2008 14:00:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259839#M332789</guid>
      <dc:creator>rocke robertson</dc:creator>
      <dc:date>2008-08-28T14:00:45Z</dc:date>
    </item>
    <item>
      <title>Re: vPar security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259840#M332790</link>
      <description>Yes, you missed something.&lt;BR /&gt;&lt;BR /&gt;See the manual on how to configure this security.</description>
      <pubDate>Thu, 28 Aug 2008 14:05:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259840#M332790</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2008-08-28T14:05:50Z</dc:date>
    </item>
    <item>
      <title>Re: vPar security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259841#M332791</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;Two things to do. Insure vpar security itself is as strong as a standalone system.&lt;BR /&gt;&lt;BR /&gt;Make sure the console that controls the vpar is secure. Use ssh not telnet for access. Limit who has the password.&lt;BR /&gt;&lt;BR /&gt;If you have root access there is no such thing as a safe system.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 28 Aug 2008 14:06:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259841#M332791</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2008-08-28T14:06:45Z</dc:date>
    </item>
    <item>
      <title>Re: vPar security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259842#M332792</link>
      <description>&lt;A href="http://docs.hp.com/en/T1335-90083/ch11s02.html?btnPrev=%AB%A0prev" target="_blank"&gt;http://docs.hp.com/en/T1335-90083/ch11s02.html?btnPrev=%AB%A0prev&lt;/A&gt;</description>
      <pubDate>Thu, 28 Aug 2008 14:08:01 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259842#M332792</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2008-08-28T14:08:01Z</dc:date>
    </item>
    <item>
      <title>Re: vPar security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259843#M332793</link>
      <description>Chapter 11 vPars Flexible Administrative Capability (vPars A.03.03, A.03.04, vPars A.04.02, A.04.03, A.05.01)&lt;BR /&gt;&lt;BR /&gt;...&lt;BR /&gt;This chapter discusses the concepts and tasks on using the vPars Flexible Administrative Capability feature (formerly called Primary-Admin vPars Security). With this feature, you can specify vPars administration capabilities for zero, one, or more designated virtual partitions. Only superusers within the designated virtual partitions can perform the vPars administration commands that affect other virtual partitions; a superuser within a non-designated virtual partition can perform only operations that affect itself.&lt;BR /&gt;...&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/T1335-90083/ch11.html" target="_blank"&gt;http://docs.hp.com/en/T1335-90083/ch11.html&lt;/A&gt;</description>
      <pubDate>Thu, 28 Aug 2008 14:09:28 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259843#M332793</guid>
      <dc:creator>Torsten.</dc:creator>
      <dc:date>2008-08-28T14:09:28Z</dc:date>
    </item>
    <item>
      <title>Re: vPar security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259844#M332794</link>
      <description>Gentlemen, I have enabled the flexible administrative section and as you have stated, it prevents administrators from administrating other vPars.&lt;BR /&gt;&lt;BR /&gt;Thank you very much for your quick responses.&lt;BR /&gt;&lt;BR /&gt;If I could give you 11 points I would. A little plug for "Spinal Tap".</description>
      <pubDate>Thu, 28 Aug 2008 14:39:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/vpar-security/m-p/4259844#M332794</guid>
      <dc:creator>rocke robertson</dc:creator>
      <dc:date>2008-08-28T14:39:41Z</dc:date>
    </item>
  </channel>
</rss>

