<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic ENQUIRY: HP-UX disable direct login - only su allowed in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042655#M737754</link>
    <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I came across an interesting problem.&lt;BR /&gt;&lt;BR /&gt;Server runs HP-UX 11.11 (11v1), Gold&lt;BR /&gt;bundles 2005, TCB password database.&lt;BR /&gt;&lt;BR /&gt;For security reasons, they want to disable&lt;BR /&gt;direct logins to several Unix accounts&lt;BR /&gt;(it is not root!). Those accounts belong&lt;BR /&gt;to some applications (for example oracle).&lt;BR /&gt;&lt;BR /&gt;They want each user to log in as&lt;BR /&gt;themselves, and then su(1) to the&lt;BR /&gt;application account.&lt;BR /&gt;&lt;BR /&gt;If they had HP-UX 11v2 and above, some&lt;BR /&gt;very elegant solutions would be readily available. A few to mention:&lt;BR /&gt;&lt;BR /&gt;a) Role Based Access Control (RBAC).&lt;BR /&gt;&lt;BR /&gt;b) Extended Pluggable Authentication Module &lt;BR /&gt;(PAM).&lt;BR /&gt;&lt;BR /&gt;c) HP-UX Security Containment.&lt;BR /&gt;&lt;BR /&gt;d) Authentication against LDAP, Kerberos,&lt;BR /&gt;or Windows NTLM, (this is also possible with &lt;BR /&gt;11v1, but in a limited fashion).&lt;BR /&gt;&lt;BR /&gt;e) Smart Card.&lt;BR /&gt;&lt;BR /&gt;and so on.&lt;BR /&gt;&lt;BR /&gt;Alas, we are dealing with HP-UX 11v1 and most of the above do not apply.&lt;BR /&gt;&lt;BR /&gt;* One of my ideas was to install HP-UX PAM &lt;BR /&gt;Requisite bundle (it is free to download&lt;BR /&gt;from HP) and play with /etc/pam_user.conf.&lt;BR /&gt;This is a special per-user PAM authentication.&lt;BR /&gt;But, I found so little information about it&lt;BR /&gt;at HP. This would require more time for&lt;BR /&gt;testing by trial-and-error.&lt;BR /&gt;&lt;BR /&gt;* Another option were possible if they used a&lt;BR /&gt;newer version of SSH. There is an SSH config option called PasswordAuthDenyUsers.&lt;BR /&gt;But this also needs to be tested and possibly &lt;BR /&gt;even upgrade SSH...&lt;BR /&gt;&lt;BR /&gt;* For small passwords file, SSH could be set&lt;BR /&gt;to use AllowUsers option. Then, only&lt;BR /&gt;selected users could connect via SSH&lt;BR /&gt;(telnet, rlogin and similar are already&lt;BR /&gt;disabled) and then su(1) to application&lt;BR /&gt;account. This might be nice simple method&lt;BR /&gt;to test.&lt;BR /&gt;&lt;BR /&gt;* Method without SSH:&lt;BR /&gt;&lt;BR /&gt;Nobody should know passwords for those special &lt;BR /&gt;Unix accounts.&lt;BR /&gt;&lt;BR /&gt;Therefore, nobody could log into them&lt;BR /&gt;directly.&lt;BR /&gt;&lt;BR /&gt;The staff that need to use su(1) to assume identity of those special accounts would use Super or SUDO.&lt;BR /&gt;&lt;BR /&gt;SUDO and Super commands are loggable.&lt;BR /&gt;&lt;BR /&gt;Any attempt to change password for those&lt;BR /&gt;special accounts (unless it is done by&lt;BR /&gt;root), should invoke disciplinary measure&lt;BR /&gt;or immediate dismissal.&lt;BR /&gt;&lt;BR /&gt;A good security policy should be in place.&lt;BR /&gt;&lt;BR /&gt;Plus, if auditing is enabled (which is currently disabled), special Unix accounts&lt;BR /&gt;could be fully audited for every&lt;BR /&gt;command they execute!&lt;BR /&gt;&lt;BR /&gt;I can come up with many more ideas.&lt;BR /&gt;&lt;BR /&gt;But to save time and money, I am asking if anyone else has come up with a simple method&lt;BR /&gt;to disable direct login for certain accounts&lt;BR /&gt;and force use of su(1) under HP-UX 11v1.&lt;BR /&gt;It is easy for root (/etc/securetty)&lt;BR /&gt;but I am talking about "ordinary" accounts &lt;BR /&gt;here.&lt;BR /&gt;&lt;BR /&gt;I have done it via RBAC and other methods&lt;BR /&gt;for newer HP-UX versions, Linux and Solaris.&lt;BR /&gt;Alas, HP-UX 11v1 does not have many options.&lt;BR /&gt;&lt;BR /&gt;Any comment is appreciated.&lt;BR /&gt;&lt;BR /&gt;Maybe I am too tired today and cannot&lt;BR /&gt;see a simple solution (14-hour day&lt;BR /&gt;is quite enough for me),&lt;BR /&gt;&lt;BR /&gt;Well, I am off to sleep and maybe someone&lt;BR /&gt;reads it overnight :)&lt;BR /&gt;&lt;BR /&gt;Greetings from Sydney in far-away Australia,&lt;BR /&gt;&lt;BR /&gt;VK2COT</description>
    <pubDate>Thu, 26 Apr 2007 06:54:13 GMT</pubDate>
    <dc:creator>VK2COT</dc:creator>
    <dc:date>2007-04-26T06:54:13Z</dc:date>
    <item>
      <title>ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042655#M737754</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;I came across an interesting problem.&lt;BR /&gt;&lt;BR /&gt;Server runs HP-UX 11.11 (11v1), Gold&lt;BR /&gt;bundles 2005, TCB password database.&lt;BR /&gt;&lt;BR /&gt;For security reasons, they want to disable&lt;BR /&gt;direct logins to several Unix accounts&lt;BR /&gt;(it is not root!). Those accounts belong&lt;BR /&gt;to some applications (for example oracle).&lt;BR /&gt;&lt;BR /&gt;They want each user to log in as&lt;BR /&gt;themselves, and then su(1) to the&lt;BR /&gt;application account.&lt;BR /&gt;&lt;BR /&gt;If they had HP-UX 11v2 and above, some&lt;BR /&gt;very elegant solutions would be readily available. A few to mention:&lt;BR /&gt;&lt;BR /&gt;a) Role Based Access Control (RBAC).&lt;BR /&gt;&lt;BR /&gt;b) Extended Pluggable Authentication Module &lt;BR /&gt;(PAM).&lt;BR /&gt;&lt;BR /&gt;c) HP-UX Security Containment.&lt;BR /&gt;&lt;BR /&gt;d) Authentication against LDAP, Kerberos,&lt;BR /&gt;or Windows NTLM, (this is also possible with &lt;BR /&gt;11v1, but in a limited fashion).&lt;BR /&gt;&lt;BR /&gt;e) Smart Card.&lt;BR /&gt;&lt;BR /&gt;and so on.&lt;BR /&gt;&lt;BR /&gt;Alas, we are dealing with HP-UX 11v1 and most of the above do not apply.&lt;BR /&gt;&lt;BR /&gt;* One of my ideas was to install HP-UX PAM &lt;BR /&gt;Requisite bundle (it is free to download&lt;BR /&gt;from HP) and play with /etc/pam_user.conf.&lt;BR /&gt;This is a special per-user PAM authentication.&lt;BR /&gt;But, I found so little information about it&lt;BR /&gt;at HP. This would require more time for&lt;BR /&gt;testing by trial-and-error.&lt;BR /&gt;&lt;BR /&gt;* Another option were possible if they used a&lt;BR /&gt;newer version of SSH. There is an SSH config option called PasswordAuthDenyUsers.&lt;BR /&gt;But this also needs to be tested and possibly &lt;BR /&gt;even upgrade SSH...&lt;BR /&gt;&lt;BR /&gt;* For small passwords file, SSH could be set&lt;BR /&gt;to use AllowUsers option. Then, only&lt;BR /&gt;selected users could connect via SSH&lt;BR /&gt;(telnet, rlogin and similar are already&lt;BR /&gt;disabled) and then su(1) to application&lt;BR /&gt;account. This might be nice simple method&lt;BR /&gt;to test.&lt;BR /&gt;&lt;BR /&gt;* Method without SSH:&lt;BR /&gt;&lt;BR /&gt;Nobody should know passwords for those special &lt;BR /&gt;Unix accounts.&lt;BR /&gt;&lt;BR /&gt;Therefore, nobody could log into them&lt;BR /&gt;directly.&lt;BR /&gt;&lt;BR /&gt;The staff that need to use su(1) to assume identity of those special accounts would use Super or SUDO.&lt;BR /&gt;&lt;BR /&gt;SUDO and Super commands are loggable.&lt;BR /&gt;&lt;BR /&gt;Any attempt to change password for those&lt;BR /&gt;special accounts (unless it is done by&lt;BR /&gt;root), should invoke disciplinary measure&lt;BR /&gt;or immediate dismissal.&lt;BR /&gt;&lt;BR /&gt;A good security policy should be in place.&lt;BR /&gt;&lt;BR /&gt;Plus, if auditing is enabled (which is currently disabled), special Unix accounts&lt;BR /&gt;could be fully audited for every&lt;BR /&gt;command they execute!&lt;BR /&gt;&lt;BR /&gt;I can come up with many more ideas.&lt;BR /&gt;&lt;BR /&gt;But to save time and money, I am asking if anyone else has come up with a simple method&lt;BR /&gt;to disable direct login for certain accounts&lt;BR /&gt;and force use of su(1) under HP-UX 11v1.&lt;BR /&gt;It is easy for root (/etc/securetty)&lt;BR /&gt;but I am talking about "ordinary" accounts &lt;BR /&gt;here.&lt;BR /&gt;&lt;BR /&gt;I have done it via RBAC and other methods&lt;BR /&gt;for newer HP-UX versions, Linux and Solaris.&lt;BR /&gt;Alas, HP-UX 11v1 does not have many options.&lt;BR /&gt;&lt;BR /&gt;Any comment is appreciated.&lt;BR /&gt;&lt;BR /&gt;Maybe I am too tired today and cannot&lt;BR /&gt;see a simple solution (14-hour day&lt;BR /&gt;is quite enough for me),&lt;BR /&gt;&lt;BR /&gt;Well, I am off to sleep and maybe someone&lt;BR /&gt;reads it overnight :)&lt;BR /&gt;&lt;BR /&gt;Greetings from Sydney in far-away Australia,&lt;BR /&gt;&lt;BR /&gt;VK2COT</description>
      <pubDate>Thu, 26 Apr 2007 06:54:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042655#M737754</guid>
      <dc:creator>VK2COT</dc:creator>
      <dc:date>2007-04-26T06:54:13Z</dc:date>
    </item>
    <item>
      <title>Re: ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042656#M737755</link>
      <description>&lt;!--!*#--&gt;Shalom down in Austrailia,&lt;BR /&gt;&lt;BR /&gt;Happy Friday by the time you read this.&lt;BR /&gt;&lt;BR /&gt;Of the solutions above seems the openssh based approach is the easiest. I recommend it because playing around with the ssh_config and the sshd_config files is relatively simple to do.&lt;BR /&gt;&lt;BR /&gt;I recommend this only if the feature you want is available in a version of secure shell provided by HP at &lt;A href="http://software.hp.com" target="_blank"&gt;http://software.hp.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;That software is relatively well tested.&lt;BR /&gt;&lt;BR /&gt;Most interesting is this document:&lt;BR /&gt;&lt;A href="http://docs.hp.com/en/B2355-90680/login.1.html" target="_blank"&gt;http://docs.hp.com/en/B2355-90680/login.1.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;There may be a way in there to force su login with normal users. see exec login&lt;BR /&gt;&lt;BR /&gt;Sudo is a decent tool.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Last however is a simple add in to /etc/profile&lt;BR /&gt;&lt;BR /&gt;REALNAME=$(who am i)&lt;BR /&gt;if [ "$LOGNAME" == "$REALNAME" ]&lt;BR /&gt;   echo "Naughty child, direct login disabled $LOGNAME"&lt;BR /&gt;   exit 1&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;Note that who am i is different than LOGNAME when su - is used.&lt;BR /&gt;&lt;BR /&gt;You will have to add a loop to only check these users, lets say they are in a list&lt;BR /&gt;&lt;BR /&gt;while read -r uname&lt;BR /&gt;&lt;BR /&gt;if [ "$LOGNAME" == "$uname"&lt;BR /&gt;then&lt;BR /&gt;  REALNAME=$(who am i)&lt;BR /&gt;  if [ "$LOGNAME" == "$REALNAME" ]&lt;BR /&gt;  then&lt;BR /&gt;     echo "Naughty child, direct login disabled $LOGNAME"&lt;BR /&gt;     exit 1&lt;BR /&gt;  fi&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;done &amp;lt; /etc/specialusers&lt;BR /&gt;&lt;BR /&gt;Some debugging required.&lt;BR /&gt;Also its possible for a user to break out of this loop unless you disable ctrl-c&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 26 Apr 2007 07:10:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042656#M737755</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-26T07:10:27Z</dc:date>
    </item>
    <item>
      <title>Re: ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042657#M737756</link>
      <description>Hi there,&lt;BR /&gt;&lt;BR /&gt;I used to 'quick-fix' this through the .profile of the accounts in question.&lt;BR /&gt;&lt;BR /&gt;I made sure the .profile of these generic accounts could be edited by me only, and added something like this inthere:&lt;BR /&gt;&lt;BR /&gt;###&lt;BR /&gt;if [ $(whoami) = $(logname) ]&lt;BR /&gt;then&lt;BR /&gt; echo "Access denied. Please first log in with your personal account and then use the su command."&lt;BR /&gt; exit&lt;BR /&gt;fi&lt;BR /&gt;###&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Wout</description>
      <pubDate>Thu, 26 Apr 2007 07:14:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042657#M737756</guid>
      <dc:creator>Wouter Jagers</dc:creator>
      <dc:date>2007-04-26T07:14:12Z</dc:date>
    </item>
    <item>
      <title>Re: ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042658#M737757</link>
      <description>I am a big fan of the unknown password route.  Set the password to some unknown value and use sudo to allow logins.&lt;BR /&gt;&lt;BR /&gt;You could even write a quick script that would automatically do the sudo for the user.&lt;BR /&gt;&lt;BR /&gt;# cat oracle&lt;BR /&gt;#!/usr/bin/sh&lt;BR /&gt;sudo su - oracle&lt;BR /&gt;&lt;BR /&gt;Then the user just has to type 'oracle' at the prompt and supply their own password.&lt;BR /&gt;&lt;BR /&gt;If you are concerned about people changing the password of these users, I would recommend a 2 pronged approach.  &lt;BR /&gt;&lt;BR /&gt;Step 1) Write a wrapper script so that any attempt to run the passwd program results in a failure and an e-mail sent to the appropriate people.  I would exclude root from this check just in case you actually DO need to change the password.  &lt;BR /&gt;&lt;BR /&gt;Step 2) Have a script run nightly in cron that changes the password for these accounts.  There is a good article in Sys Admin magazine about this topic.  See here: &lt;A href="http://www.samag.com/documents/s=9494/sam0502h/0502h.htm" target="_blank"&gt;http://www.samag.com/documents/s=9494/sam0502h/0502h.htm&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I use exactly this approach for some user-ids on my systems.&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Apr 2007 08:12:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042658#M737757</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2007-04-26T08:12:20Z</dc:date>
    </item>
    <item>
      <title>Re: ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042659#M737758</link>
      <description>Relatively modern versions of ssh also have a "DenyGroups" directive so that you can just modify group memberships to block direct login via ssh - much easier than listing everybody in DenyUsers. Naturally, this assumes that all non-SSH access to the server is disabled.&lt;BR /&gt;&lt;BR /&gt;Relying on something in the profile doesn't work. Unless you use a custom shell that forces it, it's generally quite trivial to run commands or get a shell without running any of the login scripts.&lt;BR /&gt;&lt;BR /&gt;If people are OK with sudo, that's a much better approach - frequently more elegant than the methods vendors provide. A lot of times you don't need to mess around with secret passwords, you just use a locked password like the various system users (bin, uucp, etc.). Then only root can set a password, nobody can su, nobody can log in. Add a sudoers entry to run a shell as that user (NOT an entry to allow them to run "su - user" as root) and pretty much everything runs fine. For that matter, if you only use sudo for access the user doesn't even need a valid shell.&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Apr 2007 10:54:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042659#M737758</guid>
      <dc:creator>Heironimus</dc:creator>
      <dc:date>2007-04-26T10:54:30Z</dc:date>
    </item>
    <item>
      <title>Re: ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042660#M737759</link>
      <description>Although the OS does not provide this capability directly (there is nothing&lt;BR /&gt;similar to /etc/securetty for root), adding the following statements to&lt;BR /&gt;/etc/profile or /etc/csh.login should prevent a certain user from&lt;BR /&gt;login but allow su - username.&lt;BR /&gt;&lt;BR /&gt;Expand on the "if" statement if there are multiple accounts.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;For Bourne and POSIX shells, add the following to /etc/profile:&lt;BR /&gt;&lt;BR /&gt;#unsupported statements to prevent users from login but allow su.&lt;BR /&gt;name=`logname`&lt;BR /&gt;if [ $name = username ]&lt;BR /&gt;then&lt;BR /&gt;  echo $name not allowed to login...only su&lt;BR /&gt;  logout&lt;BR /&gt;fi&lt;BR /&gt;#end&lt;BR /&gt;&lt;BR /&gt; Note:  username should be replaced with the name of the user to&lt;BR /&gt;        whom direct login access is denied.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;For C shell, add the following to /etc/csh.login:&lt;BR /&gt;&lt;BR /&gt;#unsupported statements to prevent users from login but allow su.&lt;BR /&gt;set name=`logname`&lt;BR /&gt;if ( $name == username ) then&lt;BR /&gt;  echo $name not allowed to login...only su&lt;BR /&gt;  exit&lt;BR /&gt;endif&lt;BR /&gt;#end&lt;BR /&gt;&lt;BR /&gt; Note:  username should be replaced with the name of the user to&lt;BR /&gt;        whom direct login access is denied.&lt;BR /&gt;&lt;BR /&gt;I hope this script helps,&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;&lt;BR /&gt;Marco</description>
      <pubDate>Thu, 26 Apr 2007 13:56:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042660#M737759</guid>
      <dc:creator>Marco A.</dc:creator>
      <dc:date>2007-04-26T13:56:47Z</dc:date>
    </item>
    <item>
      <title>Re: ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042661#M737760</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;Many thansk for all comments.&lt;BR /&gt;&lt;BR /&gt;I will implement and test both login profile&lt;BR /&gt;and SSH methods next week.&lt;BR /&gt;&lt;BR /&gt;I still want to play with PAM as well,&lt;BR /&gt;but maybe time will not allow me to do it&lt;BR /&gt;in the short-term. If I find a PAM solution,&lt;BR /&gt;I will share it at ITRC forum.&lt;BR /&gt;&lt;BR /&gt;Greetings from rainy Sydney (rain is very&lt;BR /&gt;rare in NSW so we welcome it :))&lt;BR /&gt;&lt;BR /&gt;VK2COT</description>
      <pubDate>Fri, 27 Apr 2007 17:26:18 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042661#M737760</guid>
      <dc:creator>VK2COT</dc:creator>
      <dc:date>2007-04-27T17:26:18Z</dc:date>
    </item>
    <item>
      <title>Re: ENQUIRY: HP-UX disable direct login - only su allowed</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042662#M737761</link>
      <description>Hello,&lt;BR /&gt;&lt;BR /&gt;This is the final solution. I will write a&lt;BR /&gt;Knowledge Brief about it:&lt;BR /&gt;&lt;BR /&gt;a) As in any good company, inetd-based&lt;BR /&gt;protocols were disabled (telnet, rsh, rlogin).&lt;BR /&gt;&lt;BR /&gt;b) Ordinary users have access to the server&lt;BR /&gt;via SSH only.&lt;BR /&gt;&lt;BR /&gt;c) Added into sshd_config:&lt;BR /&gt;&lt;BR /&gt;DenyUsers oracle prdadm&lt;BR /&gt;&lt;BR /&gt;d) Installed SUDO and SUDOSH.&lt;BR /&gt;Everyone is familar with sudo, and&lt;BR /&gt;sudosh is available at:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://sourceforge.net/projects/sudosh" target="_blank"&gt;http://sourceforge.net/projects/sudosh&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;For example, to log in as oracle:&lt;BR /&gt;&lt;BR /&gt;/bin/sudo -u oracle /usr/local/bin/sudosh&lt;BR /&gt;&lt;BR /&gt;SUDOSH captures all keystrokes on the tty and &lt;BR /&gt;the user cannot forge them! There is also a &lt;BR /&gt;replay command to check what the user did:&lt;BR /&gt;&lt;BR /&gt;sudosh-replay&lt;BR /&gt;&lt;BR /&gt;Note that sudosh can be a login Shell too!&lt;BR /&gt;&lt;BR /&gt;Bingo: SUDOSH was a perfect and relatively easy method that made the customer happy.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;VK2COT</description>
      <pubDate>Sun, 06 May 2007 23:24:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/enquiry-hp-ux-disable-direct-login-only-su-allowed/m-p/5042662#M737761</guid>
      <dc:creator>VK2COT</dc:creator>
      <dc:date>2007-05-06T23:24:37Z</dc:date>
    </item>
  </channel>
</rss>

