<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Command Permission Matrix in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592928#M755754</link>
    <description>By default you can't create groups that can do only a certain number of 'root' tasks. &lt;BR /&gt;&lt;BR /&gt;There is a software called SEOS before but now called e-Trust by Computer Associates that can be used to specify the way we control the accesses. For ex., bdf command may be exexuted by one ordinary user not "root". !!! Reboot can be performed by a security administrator but not a super user. Also we can restrict the permissions on different files for different user. In fact, SEOS intercepts certain system calls and reacts based on a set of rules that are customizable. I guess it may help you lot.&lt;BR /&gt;&lt;BR /&gt;Is this what you are asking?&lt;BR /&gt;&lt;BR /&gt;-Sridhar</description>
    <pubDate>Thu, 11 Oct 2001 01:03:09 GMT</pubDate>
    <dc:creator>Sridhar Bhaskarla</dc:creator>
    <dc:date>2001-10-11T01:03:09Z</dc:date>
    <item>
      <title>Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592927#M755753</link>
      <description>Hi Everyone,&lt;BR /&gt;&lt;BR /&gt;This may appear to be a strange thing to ask, but I am working on a security review project and am building a Sys Admin task matrix, listing the type of tasks that are done, and the lowest level of access that is required.  For example, a user within the user group may be able to execute the bdf command, but not reboot the system.  I have looked for documentation on this, but haven't found anything.&lt;BR /&gt;&lt;BR /&gt;Does anyone have such a matrix and are willing to share it?  It'll save me alot of time - instead of having to check permissions/ownership for each task.&lt;BR /&gt;&lt;BR /&gt;I do award points!  And will definitely be appreciative of any help.&lt;BR /&gt;&lt;BR /&gt;With Regards,&lt;BR /&gt;&lt;BR /&gt;Jo</description>
      <pubDate>Thu, 11 Oct 2001 00:55:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592927#M755753</guid>
      <dc:creator>Joanne Keegan</dc:creator>
      <dc:date>2001-10-11T00:55:31Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592928#M755754</link>
      <description>By default you can't create groups that can do only a certain number of 'root' tasks. &lt;BR /&gt;&lt;BR /&gt;There is a software called SEOS before but now called e-Trust by Computer Associates that can be used to specify the way we control the accesses. For ex., bdf command may be exexuted by one ordinary user not "root". !!! Reboot can be performed by a security administrator but not a super user. Also we can restrict the permissions on different files for different user. In fact, SEOS intercepts certain system calls and reacts based on a set of rules that are customizable. I guess it may help you lot.&lt;BR /&gt;&lt;BR /&gt;Is this what you are asking?&lt;BR /&gt;&lt;BR /&gt;-Sridhar</description>
      <pubDate>Thu, 11 Oct 2001 01:03:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592928#M755754</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2001-10-11T01:03:09Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592929#M755755</link>
      <description>Joe,&lt;BR /&gt;&lt;BR /&gt;I am jealous of NT in this particular aspect. We don't have groups like powerusers, backup administrators in HP by default unfortunately. &lt;BR /&gt;It could either be super users or ordinary users. However, you can still do it by setting setuid bits, but that is not advisable and will introduce more security risks. You gotta to a lot of work. Try out the above software.&lt;BR /&gt;&lt;BR /&gt;-Sri</description>
      <pubDate>Thu, 11 Oct 2001 01:07:06 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592929#M755755</guid>
      <dc:creator>Sridhar Bhaskarla</dc:creator>
      <dc:date>2001-10-11T01:07:06Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592930#M755756</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;If you already hadn't thought of it perhaps the 'sudo' tool will able to do this. &lt;BR /&gt;&lt;BR /&gt;Here are the links:&lt;BR /&gt;&lt;BR /&gt;Source&lt;BR /&gt;&lt;A href="http://www.courtesan.com/sudo/" target="_blank"&gt;http://www.courtesan.com/sudo/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Execs:&lt;BR /&gt;&lt;A href="http://hpux.connect.org.uk/" target="_blank"&gt;http://hpux.connect.org.uk/&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;HTH&lt;BR /&gt;-Michael</description>
      <pubDate>Thu, 11 Oct 2001 01:27:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592930#M755756</guid>
      <dc:creator>Michael Tully</dc:creator>
      <dc:date>2001-10-11T01:27:12Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592931#M755757</link>
      <description>Hi,&lt;BR /&gt;Yoy may consider using rsh shell.Restricted version of the POSIX or Bourne shell command&lt;BR /&gt;interpreter.  Sets up a login name and execution&lt;BR /&gt;environment whose capabilities are more controlled&lt;BR /&gt;(restricted) than normal user shells.&lt;BR /&gt;&lt;BR /&gt;You can define what are the commands a user can use in his/her home directory.&lt;BR /&gt;&lt;BR /&gt;Thanks&lt;BR /&gt;Animesh&lt;BR /&gt;</description>
      <pubDate>Thu, 11 Oct 2001 02:05:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592931#M755757</guid>
      <dc:creator>Animesh Chakraborty</dc:creator>
      <dc:date>2001-10-11T02:05:33Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592932#M755758</link>
      <description>I think what Joanne is asking for is a list of commands that an operator would use normally and the lowest access level that they would need in order to use the command.  For example, fuser and swapinfo can only be executed by root by default, so you would need root privs to run those commands (I know there are ways around this but this just an example).&lt;BR /&gt;&lt;BR /&gt;Joanne, most commands can be run with a non-root account for read-only access.  But things that modify the system, such as the lvcreate, pvcreate, ifconfig, etc. need root access.  I've never come across a comprehensive list of these commands and their associated access levels though.&lt;BR /&gt;&lt;BR /&gt;-Santosh</description>
      <pubDate>Thu, 11 Oct 2001 07:56:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592932#M755758</guid>
      <dc:creator>Santosh Nair_1</dc:creator>
      <dc:date>2001-10-11T07:56:16Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592933#M755759</link>
      <description>Hello Joanne,&lt;BR /&gt;&lt;BR /&gt;this is a rather interesting but perhaps a&lt;BR /&gt;little "doomed" task you have... &lt;BR /&gt;The reason is (in my opinion), that you could&lt;BR /&gt;modify a lot of the configuratio to permit &lt;BR /&gt;"least privileges", but then you are completly&lt;BR /&gt;*different* from the main-stream HPUX, and &lt;BR /&gt;perhaps even not supported, any longer. E.g.&lt;BR /&gt;you could modify the ACL for "swinstall" in a&lt;BR /&gt;way that a plain user could install and remove&lt;BR /&gt;software, but the HPRC will be lost on any&lt;BR /&gt;problem then, as they will not even think about&lt;BR /&gt;someone doing this...&lt;BR /&gt;Same for group-permissions instead of SUID,&lt;BR /&gt;file- and directory- permissions, and such.&lt;BR /&gt;All this IS needed, but *we* (who do this) are&lt;BR /&gt;kind of "left on our own", then :-(&lt;BR /&gt;Still, we might get such a list over time and&lt;BR /&gt;effort from all of us (I do not expect much in&lt;BR /&gt;that direction from hp, as that would have a&lt;BR /&gt;dramatic kost impact on their products, their&lt;BR /&gt;quality testing, and all - everything they &lt;BR /&gt;would have to change then).&lt;BR /&gt;&lt;BR /&gt;Just my ?0.02,&lt;BR /&gt;Wodisch</description>
      <pubDate>Thu, 11 Oct 2001 08:17:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592933#M755759</guid>
      <dc:creator>Wodisch</dc:creator>
      <dc:date>2001-10-11T08:17:24Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592934#M755760</link>
      <description>Thank-you to all that replied to my question.  From what you have said, it confirms what I thought - unfortunately.&lt;BR /&gt;&lt;BR /&gt;Michael - I am looking at sudo.  I will check out the sites you mentioned to ensure I have the latest version.&lt;BR /&gt;&lt;BR /&gt;Santosh &amp;amp; Wodisch - Thank-you for your help.  I agree with what you both wrote.&lt;BR /&gt;&lt;BR /&gt;I have been working on a task matrix and by doing this, it is evident that it is not a simple job.  If anyone is interested in what I come up with, let me know (joanne.keegan@nzdf.mil.nz), and I'll post it for comments/refinement, etc.&lt;BR /&gt;&lt;BR /&gt;I do not intend to change the system to a state where it is no longer "mainstream" HPUX and unsupportable.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Jo</description>
      <pubDate>Thu, 11 Oct 2001 18:15:26 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592934#M755760</guid>
      <dc:creator>Joanne Keegan</dc:creator>
      <dc:date>2001-10-11T18:15:26Z</dc:date>
    </item>
    <item>
      <title>Re: Command Permission Matrix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592935#M755761</link>
      <description>On Solaris the is a set of commands you can use with the sudo option, these are groups you can set up for certain users.&lt;BR /&gt;</description>
      <pubDate>Tue, 06 Nov 2001 04:46:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/command-permission-matrix/m-p/2592935#M755761</guid>
      <dc:creator>Jerrie Womeldorf</dc:creator>
      <dc:date>2001-11-06T04:46:19Z</dc:date>
    </item>
  </channel>
</rss>

