HPE GreenLake Administration
Operating System - HP-UX
1830061
Members
2576
Online
109998
Solutions
Forums
Categories
Company
Local Language
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2000 03:28 AM
10-24-2000 03:28 AM
Hi
I have converted my system to a trusted system. Do you know of where I can get some reading material on features and on how to setup various things on a trusted system?
Stephen
I have converted my system to a trusted system. Do you know of where I can get some reading material on features and on how to setup various things on a trusted system?
Stephen
Solved! Go to Solution.
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2000 03:36 AM
10-24-2000 03:36 AM
Solution- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2000 03:56 AM
10-24-2000 03:56 AM
Re: Manuals
Hi.
For Trusted System there is also some good information on the http://docs.hp.com the following manual:
Select
-> HP-UX 10.x Operating System (on main menu)
-> System Administration (area)
-> HP-UX System Administration Tasks (HP-UX 10.x) (manual)
-> Managing System Security (entire chapter on trusted system)
For Trusted System there is also some good information on the http://docs.hp.com the following manual:
Select
-> HP-UX 10.x Operating System (on main menu)
-> System Administration (area)
-> HP-UX System Administration Tasks (HP-UX 10.x) (manual)
-> Managing System Security (entire chapter on trusted system)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
10-24-2000 04:16 AM
10-24-2000 04:16 AM
Re: Manuals
Recently HP sent following "Technical Tips":
Document ID: 2100067383
Date Loaded: 20001014
Title: UNIX: comparing trusted and non-trusted systems
PROBLEM
Please inform as to the differences between trusted and non-trusted UNIX
systems.
CONFIGURATION
Operating System - HPUX
RESOLUTION
The following is a list of differences between trusted and non-trusted
systems:
1) A trusted system allows system auditing to be turned on. System
auditing enables the ability to trace every system call issued by
each user on the system. Non-trusted systems run with system
auditing disabled.
2) Trusted systems have improved password management. Below is a list
of features of this password management:
a. Specification of a grace period and expiration period for
passwords.
b. The ability to specify system-wide password aging.
c. The ability to specify an absolute account life.
d. The ability to disable accounts after repeated login
failures.
e. Passwords lengths of up to forty (40) characters.
f. The ability to access a random password generator.
3) Trusted systems also have additional login restrictions, while
non-trusted systems do not. Below are the features of
trusted system login restrictions:
a. In addition to account disabling, the account may also be
locked.
b. Setting accounts to be accessed only at certain times of
the day.
c. The ability to specify account location access. In other
words, account access at specific devices, workstations, etc.
d. The ability to specify a single-user boot password.
NOTE: These login restrictions are NOT available on
NON-TRUSTED systems.
4) A trusted system has shadowed passwords, while a non-trusted system
does not. Shadowed passwords are kept in locations other than
/etc/passwd. This prevents users from viewing the /etc/passwd
file and determining which accounts do not have passwords. This
also prevents hackers from running "password cracker programs"
against passwords in the /etc/passwd file.
Document ID: 2100067383
Date Loaded: 20001014
Title: UNIX: comparing trusted and non-trusted systems
PROBLEM
Please inform as to the differences between trusted and non-trusted UNIX
systems.
CONFIGURATION
Operating System - HPUX
RESOLUTION
The following is a list of differences between trusted and non-trusted
systems:
1) A trusted system allows system auditing to be turned on. System
auditing enables the ability to trace every system call issued by
each user on the system. Non-trusted systems run with system
auditing disabled.
2) Trusted systems have improved password management. Below is a list
of features of this password management:
a. Specification of a grace period and expiration period for
passwords.
b. The ability to specify system-wide password aging.
c. The ability to specify an absolute account life.
d. The ability to disable accounts after repeated login
failures.
e. Passwords lengths of up to forty (40) characters.
f. The ability to access a random password generator.
3) Trusted systems also have additional login restrictions, while
non-trusted systems do not. Below are the features of
trusted system login restrictions:
a. In addition to account disabling, the account may also be
locked.
b. Setting accounts to be accessed only at certain times of
the day.
c. The ability to specify account location access. In other
words, account access at specific devices, workstations, etc.
d. The ability to specify a single-user boot password.
NOTE: These login restrictions are NOT available on
NON-TRUSTED systems.
4) A trusted system has shadowed passwords, while a non-trusted system
does not. Shadowed passwords are kept in locations other than
/etc/passwd. This prevents users from viewing the /etc/passwd
file and determining which accounts do not have passwords. This
also prevents hackers from running "password cracker programs"
against passwords in the /etc/passwd file.
no users -- no problems
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
Company
Events and news
Customer resources
© Copyright 2025 Hewlett Packard Enterprise Development LP