Elements of Security: AIX 4.1 by IBM Redbooks

By IBM Redbooks

This rfile discusses a number of the security-related parts of AIX 4.1. it's directed towards a reader who's a process administrator for a number of AIX structures, even if a lot of the fabric could be worthwhile to AIX clients. ideas and recommendations for set up and daily management are incorporated. really expert subject matters, together with DCE and NIS, aren't mentioned. easy UNIX wisdom is believed.

Show description

Read Online or Download Elements of Security: AIX 4.1 PDF

Similar unix books

Building a Virtual Private Network

What you are promoting has to be hooked up with a purpose to compete within the worldwide industry. staff want to know that their company's community is on the market at any time, from anywhere. A digital inner most community (VPN) accomplishes this through the use of distant connectivity applied sciences that mix latest inner networks with the net to safely speak info.

Mac OS X Leopard Phrasebook

Mac OS® X Leopard Phrasebook   Brian Tiemann   crucial Code and instructions   Mac OS X Leopard Phrasebook supplies the whole command words you must take complete good thing about the Leopard’s hidden and undocumented energy beneath the graphical person interface: time-saving options for successfully operating with records, folders, the Finder, highlight, textual content documents, servers, disks, CDs/DVDs, permissions, printing, functions, Expos?

DNS & BIND Cookbook

The DNS & BIND Cookbook offers options to the numerous difficulties confronted by means of community directors accountable for a reputation server. Following O'Reilly's well known problem-and-solution cookbook layout, this name is an quintessential better half to DNS & BIND, 4th version, the definitive consultant to the serious activity of brand server management.

Additional info for Elements of Security: AIX 4.1

Sample text

Images Notice that a separate logical volume (hd8 in this example) is used by JFS as the journal area. The special logical volumes and the logical volume manager itself are normally manipulated through smit, and this requires root authority. Other than protecting the root password, there is no routine security administrative work involved with the special logical volumes. 32 An inode is a control block in a file system that keeps track of various pointers to files and free space. 33 The well-known fsck command was frequently needed to repair this damage.

The results of defining a new user (using the smit panel shown above) are additions to several files: 1. /etc/passwd will contain a new line defining the user. 2. /etc/security/passwd will contain a new stanza for the user′ s encrypted password and a few flags. 3. /etc/security/user will contain a new stanza containing some of the user′ s restrictions. Chapter 3. U s e r Accounts 19 4. /etc/group will be altered to add the new user to one or more groups. 5. /etc/security/limits will contain a new stanza containing some of the user′ s environmental limits.

An encrypted password is always 13 characters long. Some accounts can have encrypted passwords in /etc/passwd and other accounts can have their encrypted passwords in /etc/security/passwd . AIX will work properly with both cases, but we strongly recommend against placing encrypted passwords in /etc/passwd . smit and the passwd command will automatically place an exclamation mark in /etc/passwd and place the encrypted password in /etc/security/passwd . There are several other files in the /etc/security directory.

Download PDF sample

Rated 4.16 of 5 – based on 12 votes