Operating System - HP-UX
1819751 Members
3243 Online
109606 Solutions
New Discussion юеВ

Re: need to know the difference between trusted and non-trusted

 
SOLVED
Go to solution
Shankar_6
Regular Advisor

need to know the difference between trusted and non-trusted

hi all,

i like to know the differences between trusted and non-trusted systems and why its needed?

also like to know about securepath..

regards
shankar
5 REPLIES 5
Biswajit Tripathy
Honored Contributor
Solution

Re: need to know the difference between trusted and non-trusted

Jannik
Honored Contributor

Re: need to know the difference between trusted and non-trusted

There are no easy answer to your question, exsept you get a lot of tools in the trusted system you don't have on normal systems like:
- auditing
- shadow password
- user expiring
- password setup policies
etc.

There is a lot more, i recomend that you allways use trusted systems.
Read more in the document below!

http://docs.hp.com/en/B2355-90121/index.html
jaton
Nick W
Frequent Advisor

Re: need to know the difference between trusted and non-trusted

You also were asking about Securepath.

HP StorageWorks Secure Path satisfies the customer requirement for solutions that provide no-single-point-of-failure in a storage area network (SAN) and external storage solutions. In addition, Secure Path provides path management infrastructure for technologies such as disaster tolerance and high availability clusters.
Secure Path is multi-path, high availability software that manages and maintains continuous data access to HP storage systems, enabling no-single-point-of-failure from server to storage. Secure Path is host-resident software that monitors the data paths between server and storage to increase availability of information. In the event that a path failure is detected, Secure Path fails over to an alternative path. When that path becomes available, Secure Path can automatically failback to the original path.

more info available from - www.hp.com/go/securepath

Please note that this has no relationship with trusted/non-trusted systems


Regards,
Nick
Dani Seely
Valued Contributor

Re: need to know the difference between trusted and non-trusted

Hey Shankar,
I won't try to list the differences between trusted and non-trusted systems, rather I will tell you that a system that has been converted to run in trusted mode can be made more secure by implementing additional logon, password, and terminal management security features. Below are just some of the benefits you will get by enabling your system in trusted mode ...

First of all, HP refers to the use of its C2 level software as running in trusted mode. When trusted mode is configured, it also enables the auditing capability. Auditing and system logging facilities work together to track user actions. All UNIX systems provide some basic auditing or logging functions using ASCII files/logs. C2 auditing is more complex, and tracks specific user actions on a real-time basis.

A system that has been configured to run in trusted mode enables a SA to track user activities by the system calls they evoke. You will also have tunable auditing parameters.

Also, during the system conversion to trusted mode, the process creates audit ID numbers for all users to enable specific tracking of user activities.

There's lots more benefits from enabling your system in trusted mode, this is just a quick outline on some of the security benefits I have come to depend on. Hope this helps.
Together We Stand!
John Jimenez
Super Advisor

Re: need to know the difference between trusted and non-trusted

These are some good advantages. Are there any disadvantages to running in trusted mode?
Hustle Makes things happen