<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Administration on Unix in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059013#M908217</link>
    <description>Hi,&lt;BR /&gt;You could define a user, and give him access to a restricted sam where you have given him the privileges you wish, that is by typing as root sam -r then do the config for you user, dont forget to save the privileges...&lt;BR /&gt;You can as others mentionned use sudo, or su2 which gives root access to given users....&lt;BR /&gt;&lt;BR /&gt;All the best&lt;BR /&gt;Victor</description>
    <pubDate>Thu, 28 Aug 2003 15:33:32 GMT</pubDate>
    <dc:creator>Victor BERRIDGE</dc:creator>
    <dc:date>2003-08-28T15:33:32Z</dc:date>
    <item>
      <title>Security Administration on Unix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059009#M908213</link>
      <description>Hi all,&lt;BR /&gt;    Recently we have bought a HP RP5470. We are responsibles for system administration, but other area (security) want to manage the security part. &lt;BR /&gt;Does anybody know how can they manage the security whitout a "root" account ? We don??t want to give them the root account. &lt;BR /&gt;I am new in Unix environments, but in other platforms (HP Nonstop Himalaya for example) exist products which allow you to manage ACLs, to define a security administrator and that kind of thing.&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;PD: Sorry for my English. I??m learning ...</description>
      <pubDate>Thu, 28 Aug 2003 15:04:51 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059009#M908213</guid>
      <dc:creator>Gustavo_20</dc:creator>
      <dc:date>2003-08-28T15:04:51Z</dc:date>
    </item>
    <item>
      <title>Re: Security Administration on Unix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059010#M908214</link>
      <description>Your English is fine.&lt;BR /&gt;&lt;BR /&gt;There is no way to completely administer security without root access.  Its a function of systems adminsitration and the responsibility of the admin who needs root access.&lt;BR /&gt;&lt;BR /&gt;That being said, if managing security is merely managing permissions on a bunch of files, a regular user can do that.  That user needs to own the files and have some basic training.&lt;BR /&gt;&lt;BR /&gt;A security administrator is the system administrator in my opinion.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 28 Aug 2003 15:10:09 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059010#M908214</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2003-08-28T15:10:09Z</dc:date>
    </item>
    <item>
      <title>Re: Security Administration on Unix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059011#M908215</link>
      <description>You have a number of options, depending on what level of access they need;&lt;BR /&gt;&lt;BR /&gt;You can set up a second root account for them&lt;BR /&gt;for example rootsec, which gives them full root access.&lt;BR /&gt;&lt;BR /&gt;To do this, use&lt;BR /&gt;&lt;BR /&gt;useradd -g sys -o -u 0 -m -c "Security root user" -s /sbin/sh rootsec&lt;BR /&gt;&lt;BR /&gt;If that's too much access, you can set them up with a standard user account, using the sudo utility to give them sufficient access to restricted commands.  You can download this from&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.6/" target="_blank"&gt;http://hpux.connect.org.uk/hppd/hpux/Sysadmin/sudo-1.6.6/&lt;/A&gt; &lt;BR /&gt;&lt;BR /&gt;Alternatively, you could look at setting up a Restricted SAM account for them (similar to the sudo idea, but uses the standard SAM interface)</description>
      <pubDate>Thu, 28 Aug 2003 15:21:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059011#M908215</guid>
      <dc:creator>Chris Wilshaw</dc:creator>
      <dc:date>2003-08-28T15:21:31Z</dc:date>
    </item>
    <item>
      <title>Re: Security Administration on Unix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059012#M908216</link>
      <description>We provide exe and scripts with specific suid and ACL for dedicated people to manage user accounts for example.&lt;BR /&gt;&lt;BR /&gt;This probably goes back to sudo type function.&lt;BR /&gt;&lt;BR /&gt;At the end of the day "root" is doing the job.&lt;BR /&gt;&lt;BR /&gt;JL</description>
      <pubDate>Thu, 28 Aug 2003 15:25:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059012#M908216</guid>
      <dc:creator>Jean-Luc Oudart</dc:creator>
      <dc:date>2003-08-28T15:25:42Z</dc:date>
    </item>
    <item>
      <title>Re: Security Administration on Unix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059013#M908217</link>
      <description>Hi,&lt;BR /&gt;You could define a user, and give him access to a restricted sam where you have given him the privileges you wish, that is by typing as root sam -r then do the config for you user, dont forget to save the privileges...&lt;BR /&gt;You can as others mentionned use sudo, or su2 which gives root access to given users....&lt;BR /&gt;&lt;BR /&gt;All the best&lt;BR /&gt;Victor</description>
      <pubDate>Thu, 28 Aug 2003 15:33:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059013#M908217</guid>
      <dc:creator>Victor BERRIDGE</dc:creator>
      <dc:date>2003-08-28T15:33:32Z</dc:date>
    </item>
    <item>
      <title>Re: Security Administration on Unix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059014#M908218</link>
      <description>As explained in above answers, there is no way to handle/manage security fully without being root or root equivalent.&lt;BR /&gt;Above it is also mentioned how this can be achieved either with making an equivalent user or by using a "frontend" program where you can control/limit some parts of the system.&lt;BR /&gt;&lt;BR /&gt;I would rather propose that the Security Officers gain restricted access to the system - as an ordinary user, and challenges the security on the system.&lt;BR /&gt;If they find any "holes" either from the inside as an ordinary user, or from the outside by challenging the different services/programs running on the machine, they could notify you as administrator to get this fixed.&lt;BR /&gt;&lt;BR /&gt;We use external companies to make audits of our system. They can request any kind of information to be delivered them, but they do not get direct access to the system.&lt;BR /&gt;example:&lt;BR /&gt;- give me a full listing of files with permissions&lt;BR /&gt;- give me the passwd and group file&lt;BR /&gt;- how many have access to root user password&lt;BR /&gt;They will see if you have set the appropriate rights and keep the correct segregation.&lt;BR /&gt;They will also see what kind of password policy you are using and try to crack the passwords.&lt;BR /&gt;In addition there is used "hacker tools" from outside of the system to challenge the system.&lt;BR /&gt;&lt;BR /&gt;As stated: Findings is reported to system administrator, and [s]he will perform the necessary corrective actions.</description>
      <pubDate>Fri, 29 Aug 2003 07:05:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059014#M908218</guid>
      <dc:creator>Tor-Arne Nostdal</dc:creator>
      <dc:date>2003-08-29T07:05:21Z</dc:date>
    </item>
    <item>
      <title>Re: Security Administration on Unix</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059015#M908219</link>
      <description>Not sure what is meant by handling security.&lt;BR /&gt;&lt;BR /&gt;If the groups function is auditing. The task might be easier to implement than you think.&lt;BR /&gt;&lt;BR /&gt;For example.  I am auditing file permissions and userid's on all my system right now. I have several scripts that I run as a "regular" user.  Later, I go through the output and then email the users on how to tighten up security, following up later to make sure they did fix the problem. I look at things like the ability of "world" to edit or replace executable. I put my self in certain group ID's and validate group permissions for applications.  For example: The group cannot modify logs or edit\release executables without being the owner.&lt;BR /&gt;&lt;BR /&gt;Adding user and changing passwords can be implemented in sam. &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Rory&lt;BR /&gt;</description>
      <pubDate>Fri, 29 Aug 2003 16:50:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-administration-on-unix/m-p/3059015#M908219</guid>
      <dc:creator>Rory R Hammond</dc:creator>
      <dc:date>2003-08-29T16:50:50Z</dc:date>
    </item>
  </channel>
</rss>

