<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497649#M758784</link>
    <description>Seem to forget a line which goes above the others ;)&lt;BR /&gt;&lt;BR /&gt;rechtstreeks=`/usr/bin/logname`&lt;BR /&gt;&lt;BR /&gt;(p.s. rechtstreeks is a Dutch word voor "straight" so you can make-up your own variable here)</description>
    <pubDate>Fri, 23 Feb 2001 11:15:33 GMT</pubDate>
    <dc:creator>Ralf Bosz_2</dc:creator>
    <dc:date>2001-02-23T11:15:33Z</dc:date>
    <item>
      <title>Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497647#M758782</link>
      <description>I know about /etc/securetty restricting root's login ttys/console, however is there a similar file for each user?  I have some common application logins which are quite powerful (database, application etc).  I would like to force users to login as themselves then su to the appliaction login i.e.&lt;BR /&gt;login: joe_blog&lt;BR /&gt;Password: ********&lt;BR /&gt;% su - informix&lt;BR /&gt;....&lt;BR /&gt;This should allow me to find out what users(people, not apps) did what!&lt;BR /&gt;Cheers</description>
      <pubDate>Fri, 23 Feb 2001 10:43:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497647#M758782</guid>
      <dc:creator>Tim D Fulford</dc:creator>
      <dc:date>2001-02-23T10:43:16Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497648#M758783</link>
      <description>But this at the end of the user .profile (or in the /etc/profile):&lt;BR /&gt;&lt;BR /&gt;if [ $rechtstreeks = user ];then&lt;BR /&gt;        echo "Access Denied, use su - user"&lt;BR /&gt;        exec sleep 5&lt;BR /&gt;        exit&lt;BR /&gt;fi&lt;BR /&gt;&lt;BR /&gt;Oh and just a reminder, user search next time, I got this from a search (I thought of something likewise but didn't use logname)</description>
      <pubDate>Fri, 23 Feb 2001 11:12:57 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497648#M758783</guid>
      <dc:creator>Ralf Bosz_2</dc:creator>
      <dc:date>2001-02-23T11:12:57Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497649#M758784</link>
      <description>Seem to forget a line which goes above the others ;)&lt;BR /&gt;&lt;BR /&gt;rechtstreeks=`/usr/bin/logname`&lt;BR /&gt;&lt;BR /&gt;(p.s. rechtstreeks is a Dutch word voor "straight" so you can make-up your own variable here)</description>
      <pubDate>Fri, 23 Feb 2001 11:15:33 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497649#M758784</guid>
      <dc:creator>Ralf Bosz_2</dc:creator>
      <dc:date>2001-02-23T11:15:33Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497650#M758785</link>
      <description>Is this the only method of resticting login? I'm used to AIX, where you can set login=no and rlogin=no, surely there must be a better equivalent than putting something in the .profile?&lt;BR /&gt;&lt;BR /&gt;Thanks &lt;BR /&gt;&lt;BR /&gt;Jon. ( I have the same requirement as the original poster)</description>
      <pubDate>Mon, 26 Feb 2001 05:01:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497650#M758785</guid>
      <dc:creator>Jon Gittoes</dc:creator>
      <dc:date>2001-02-26T05:01:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497651#M758786</link>
      <description>The way we have done this is to use sudo and to set the password of the appropriate account as an invalid password (like a *).  We then set up a script (or alias) for the users so that when they type oracle, it does a 'sudo su - oracle' and then asks for their password.  Also via sudo you can control who does and does not have access to the script.&lt;BR /&gt;&lt;BR /&gt;Doing this also makes sure that no one logs in directly as the application id, but forces you to do an su.</description>
      <pubDate>Mon, 26 Feb 2001 05:11:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497651#M758786</guid>
      <dc:creator>Patrick Wallek</dc:creator>
      <dc:date>2001-02-26T05:11:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497652#M758787</link>
      <description>Many Thanks for the replies&lt;BR /&gt;&lt;BR /&gt;It took me a while to clear this one up! sorry,  I'm using Ralf's method.  It is not what we want exactly but it has similar functionality.&lt;BR /&gt;&lt;BR /&gt;Sudo is a definite contender for the future, but one step at a time&lt;BR /&gt;&lt;BR /&gt;Again many thanks all&lt;BR /&gt;&lt;BR /&gt;Tim F</description>
      <pubDate>Mon, 18 Jun 2001 15:32:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security/m-p/2497652#M758787</guid>
      <dc:creator>Tim D Fulford</dc:creator>
      <dc:date>2001-06-18T15:32:53Z</dc:date>
    </item>
  </channel>
</rss>

