<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: SU  Restriction in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765340#M73512</link>
    <description>sudo is the recommendation. To restrict admins even further, you could go one step further and lock up the root passwd as well. Have the IT manager keep it (them) in a locked safe with limited access. You don't need the root passwd if sudo is installed and *used* correctly. Each instance of it's usage can be logged and tracked, as to who does what and when. Also remove '.rhosts' and '/etc/hosts.equiv files.</description>
    <pubDate>Tue, 16 Jul 2002 23:14:13 GMT</pubDate>
    <dc:creator>Michael Tully</dc:creator>
    <dc:date>2002-07-16T23:14:13Z</dc:date>
    <item>
      <title>SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765333#M73505</link>
      <description>I have created the file /etc/securetty to force my admins to su&lt;BR /&gt;rather than logging directly into root. Is there a method in HPUX11.00&lt;BR /&gt;to limit who can use the su command or better yet, a method to limit su&lt;BR /&gt;to root?&lt;BR /&gt;&lt;BR /&gt;John Carver&lt;BR /&gt;</description>
      <pubDate>Tue, 16 Jul 2002 20:03:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765333#M73505</guid>
      <dc:creator>John Carver</dc:creator>
      <dc:date>2002-07-16T20:03:27Z</dc:date>
    </item>
    <item>
      <title>Re: SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765334#M73506</link>
      <description>Hi john,&lt;BR /&gt;&lt;BR /&gt;"su" is a regular unix command. If you want that su should work only if root is passed as an argument, you can move the binary executable su to a location not in the regular user path and then put a wrapper around the su command in a script such that the script can check if root is passed as aan arguement, if so it works else it fails.&lt;BR /&gt;&lt;BR /&gt;however is there a problem in allowing the regular users to su to another user id than root?. should be okay if the user can do an su to another user id since any userid other than root will be required to give the passwd for the userid someone is su'ing to.&lt;BR /&gt;&lt;BR /&gt;Hope this helps.&lt;BR /&gt;&lt;BR /&gt;regds&lt;BR /&gt;</description>
      <pubDate>Tue, 16 Jul 2002 20:13:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765334#M73506</guid>
      <dc:creator>Sanjay_6</dc:creator>
      <dc:date>2002-07-16T20:13:13Z</dc:date>
    </item>
    <item>
      <title>Re: SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765335#M73507</link>
      <description>hi John,&lt;BR /&gt;&lt;BR /&gt;Maybe you can use sudo for it :&lt;BR /&gt;&lt;BR /&gt;see :  &lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xaf7e37f45ef7d4118fef0090279cd0f9,00.html" target="_blank"&gt;http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0xaf7e37f45ef7d4118fef0090279cd0f9,00.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;regards&lt;BR /&gt;&lt;BR /&gt;Steven</description>
      <pubDate>Tue, 16 Jul 2002 20:15:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765335#M73507</guid>
      <dc:creator>Steven Mertens</dc:creator>
      <dc:date>2002-07-16T20:15:06Z</dc:date>
    </item>
    <item>
      <title>Re: SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765336#M73508</link>
      <description>Add&lt;BR /&gt;SU_ROOT_GROUP=group name&lt;BR /&gt;&lt;BR /&gt;in the file /etc/default/security. So only the users in that particular users will be able to su to root.</description>
      <pubDate>Tue, 16 Jul 2002 20:15:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765336#M73508</guid>
      <dc:creator>Arockia Jegan</dc:creator>
      <dc:date>2002-07-16T20:15:19Z</dc:date>
    </item>
    <item>
      <title>Re: SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765337#M73509</link>
      <description>Hi John&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Here is how we do it .  edit /etc/profile and add the following lines :&lt;BR /&gt;&lt;BR /&gt;loginid=`who am i | awk '{print $1}'`&lt;BR /&gt;&lt;BR /&gt;echo $loginid&lt;BR /&gt;if [ $loginid = root ]&lt;BR /&gt;then&lt;BR /&gt;exit&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;this will throw out anyone trying to log in as root , so to go to root you have to su to root after logging in as a normal user.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Manoj Srivastava</description>
      <pubDate>Tue, 16 Jul 2002 20:18:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765337#M73509</guid>
      <dc:creator>MANOJ SRIVASTAVA</dc:creator>
      <dc:date>2002-07-16T20:18:23Z</dc:date>
    </item>
    <item>
      <title>Re: SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765338#M73510</link>
      <description>There is an another way to setup this security. Install sudo software and modify the /&lt;SUDO dir=""&gt;/etc/sudoers file to allow only the particular users to su to root.&lt;BR /&gt;&lt;BR /&gt;You can get sudo from here,&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/sudo-1.6.6/" target="_blank"&gt;http://hpux.cs.utah.edu/hppd/hpux/Sysadmin/sudo-1.6.6/&lt;/A&gt;&lt;BR /&gt;&lt;/SUDO&gt;</description>
      <pubDate>Tue, 16 Jul 2002 20:18:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765338#M73510</guid>
      <dc:creator>Arockia Jegan</dc:creator>
      <dc:date>2002-07-16T20:18:34Z</dc:date>
    </item>
    <item>
      <title>Re: SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765339#M73511</link>
      <description>Just a note about the /etc/default/security file: although it is standard on 11i, you'll need the latest libpam patch PHCO_25527. Unfortunately, the man page for security is missing so you'll need to look at docs.hp.com for the details:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90696/B2355-90696_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90696/00/01/111-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90696/00/01/111-toc.html&amp;amp;searchterms=security%7c4&amp;amp;queryid=20020716-171645" target="_blank"&gt;http://docs.hp.com/cgi-bin/fsearch/framedisplay?top=/hpux/onlinedocs/B2355-90696/B2355-90696_top.html&amp;amp;con=/hpux/onlinedocs/B2355-90696/00/01/111-con.html&amp;amp;toc=/hpux/onlinedocs/B2355-90696/00/01/111-toc.html&amp;amp;searchterms=security%7c4&amp;amp;queryid=20020716-171645&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;and&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://docs.hp.com/hpux/onlinedocs/5185-4391/5185-4391.html" target="_blank"&gt;http://docs.hp.com/hpux/onlinedocs/5185-4391/5185-4391.html&lt;/A&gt;</description>
      <pubDate>Tue, 16 Jul 2002 23:07:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765339#M73511</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2002-07-16T23:07:51Z</dc:date>
    </item>
    <item>
      <title>Re: SU  Restriction</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765340#M73512</link>
      <description>sudo is the recommendation. To restrict admins even further, you could go one step further and lock up the root passwd as well. Have the IT manager keep it (them) in a locked safe with limited access. You don't need the root passwd if sudo is installed and *used* correctly. Each instance of it's usage can be logged and tracked, as to who does what and when. Also remove '.rhosts' and '/etc/hosts.equiv files.</description>
      <pubDate>Tue, 16 Jul 2002 23:14:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/su-restriction/m-p/2765340#M73512</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2002-07-16T23:14:13Z</dc:date>
    </item>
  </channel>
</rss>

