<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Restricting User Access in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497299#M830554</link>
    <description>Hi Darren,&lt;BR /&gt;&lt;BR /&gt;Don't worry, you're not talking 'out of your hat' (maybe was I ?)&lt;BR /&gt;I should have read your answer more carefully. You deserve the 10 points ;-)&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;&lt;BR /&gt;Dan&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Thu, 22 Feb 2001 17:01:15 GMT</pubDate>
    <dc:creator>Dan Hetzel</dc:creator>
    <dc:date>2001-02-22T17:01:15Z</dc:date>
    <item>
      <title>Restricting User Access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497294#M830549</link>
      <description>Is it possible to restrict certain user accounts from being able to directly telnet into a server. In essence, to force users to SU to the account from a personal account (like what happens when you have a securetty file for root.). I don't want to filter by IP address, but by user name. &lt;BR /&gt;&lt;BR /&gt;For my particular environment, I'm looking to limit our DBAs ability to login directly as "oracle" to the server. I want them to login with their username first, then SU.</description>
      <pubDate>Thu, 22 Feb 2001 14:33:23 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497294#M830549</guid>
      <dc:creator>Paul Czetwertynski</dc:creator>
      <dc:date>2001-02-22T14:33:23Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting User Access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497295#M830550</link>
      <description>Although the OS does not provide this capability directly (there is nothing&lt;BR /&gt;similar to /etc/securetty for root), adding the following statements to&lt;BR /&gt;/etc/profile or /etc/csh.login should prevent a certain user from&lt;BR /&gt;login but allow su - username.&lt;BR /&gt;&lt;BR /&gt;Expand on the "if" statement if there are multiple accounts.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;For Bourne and POSIX shells, add the following to /etc/profile:&lt;BR /&gt;&lt;BR /&gt;name=`logname`&lt;BR /&gt;if [ $name = username ]&lt;BR /&gt;then&lt;BR /&gt;  echo $name not allowed to login...only su&lt;BR /&gt;  exit&lt;BR /&gt;fi&lt;BR /&gt;#end&lt;BR /&gt;&lt;BR /&gt;For C shell, add the following to /etc/csh.login:&lt;BR /&gt;&lt;BR /&gt;set name=`logname`&lt;BR /&gt;if ( $name == username ) then&lt;BR /&gt;  echo $name not allowed to login...only su&lt;BR /&gt;  exit&lt;BR /&gt;endif&lt;BR /&gt;#end&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Feb 2001 15:07:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497295#M830550</guid>
      <dc:creator>unixdaddy</dc:creator>
      <dc:date>2001-02-22T15:07:25Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting User Access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497296#M830551</link>
      <description>Darren, Paul,&lt;BR /&gt;&lt;BR /&gt;DBAs usually need the full oracle environment, so they will use 'su -' to become oracle user.&lt;BR /&gt;&lt;BR /&gt;In that case (su -) the /etc/profile and $HOME/.profile are sourced and checking for the oracle user name in one of those files will not help.&lt;BR /&gt;&lt;BR /&gt;AN alternative would be to prevent all login by replacing the password field in /etc/passwd with a string that is a guaranteed no-match, i.e. an asterisk.&lt;BR /&gt;In that case, 'su - oracle' can only be issued by root as it won't prompt for a password.&lt;BR /&gt;To circumvent this, you could use 'sudo' and allow members of the dba group to issue 'su - oracle'. It won't ask for the oracle user password.&lt;BR /&gt;&lt;BR /&gt;SUDO can be downloaded from the HP Software Archive and Porting Center of from &lt;A href="http://www.courtesan.com" target="_blank"&gt;http://www.courtesan.com&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;&lt;BR /&gt;Dan</description>
      <pubDate>Thu, 22 Feb 2001 15:36:56 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497296#M830551</guid>
      <dc:creator>Dan Hetzel</dc:creator>
      <dc:date>2001-02-22T15:36:56Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting User Access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497297#M830552</link>
      <description>Paul,&lt;BR /&gt;Dan's suggestion is right on.  I am utilizing the sudo program to allow certain users access to 'application owner' IDs on our systems (i.e. oracle), and it works like a champ.  It also gives you additional information about who is using certain IDs, how often, etc. through log files and e-mail to root.&lt;BR /&gt;&lt;BR /&gt;Mark</description>
      <pubDate>Thu, 22 Feb 2001 16:11:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497297#M830552</guid>
      <dc:creator>Mark Wyckoff</dc:creator>
      <dc:date>2001-02-22T16:11:59Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting User Access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497298#M830553</link>
      <description>I'm confused (Isn't hard).  I thought the requirement was to stop users from login into oracle directly.  The /etc/profile (with amended code)will check that the user attempting to log in isn't oracle.  If they therefore log in directly the test will succeed and exit out. If they su then the login name is different and therefore the test will fail allowing login.  Is that correct or am I talking out of my hat?</description>
      <pubDate>Thu, 22 Feb 2001 16:32:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497298#M830553</guid>
      <dc:creator>unixdaddy</dc:creator>
      <dc:date>2001-02-22T16:32:51Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting User Access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497299#M830554</link>
      <description>Hi Darren,&lt;BR /&gt;&lt;BR /&gt;Don't worry, you're not talking 'out of your hat' (maybe was I ?)&lt;BR /&gt;I should have read your answer more carefully. You deserve the 10 points ;-)&lt;BR /&gt;&lt;BR /&gt;Best regards,&lt;BR /&gt;&lt;BR /&gt;Dan&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 22 Feb 2001 17:01:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497299#M830554</guid>
      <dc:creator>Dan Hetzel</dc:creator>
      <dc:date>2001-02-22T17:01:15Z</dc:date>
    </item>
    <item>
      <title>Re: Restricting User Access</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497300#M830555</link>
      <description>the utility tcpwrapper will allow you to control who can login and from where. it will also control ftp if your intersted. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;jim mc.....</description>
      <pubDate>Fri, 23 Feb 2001 20:29:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/restricting-user-access/m-p/2497300#M830555</guid>
      <dc:creator>james mcintyre_1</dc:creator>
      <dc:date>2001-02-23T20:29:59Z</dc:date>
    </item>
  </channel>
</rss>

