- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Trusted Systems
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-09-2003 01:00 PM
06-09-2003 01:00 PM
/usr/sbin/pwconv
It said I needed to use sam and convert the system to a trusted system. I'd like to do this, but I'm concerned that it will do crazy things, like force me to change passwords that more than one person needs access to, or that is coded in a script somewhere. Should I trust trusted systems? Is there a way to implement just portions of the trustedness? Thanks in advance,
Erich
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-09-2003 01:04 PM
06-09-2003 01:04 PM
Re: Trusted Systems
Using SAM to to turn your system into the trusted environment is th safest and easiest way. It will NOT force you to change passwords.
Hai
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-09-2003 01:07 PM
06-09-2003 01:07 PM
Re: Trusted Systems
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-09-2003 01:32 PM
06-09-2003 01:32 PM
SolutionD/L the software from
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=ShadowPassword
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-09-2003 01:49 PM
06-09-2003 01:49 PM
Re: Trusted Systems
Be careful - converting to trusted CAN alter PWs. Specifically PWs *longer* than 8 chars. What happens is ONLY the first 8 chars are converted, BUT when you enter the original PW ALL the chars are evaluated. Will work if after converting you ONLY enter the first 8 chars of the org PW.
Another thing to do when converting is to have TWO root windows open so that when you test the root login/PW - you have *another* window where you can manipulate the root PW from...just in case.
HTH,
Jeff
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-09-2003 02:10 PM
06-09-2003 02:10 PM
Re: Trusted Systems
Your better to get these people to use seperate accounts and run the same profile/menu program where you can.
if they need command line access, then have them 'su' to these accounts. Then at least everything is logged.
As far as passwords are concerned, and the length of these, Jeff has answered this question. Do bear in mind that *all* passwords expire when converting to a trusted system.
Regards
Michael
"When I have trouble spelling, it's called fat finger syndrome"
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-10-2003 07:04 AM
06-10-2003 07:04 AM
Re: Trusted Systems
If all you need is shadow passwords, definitely try the "Shadow Password" product mentioned above. Trusted systems also enables a lot of auditing features, which may or may not be needed in your environment.
-Keith
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
06-10-2003 10:41 AM
06-10-2003 10:41 AM