Open System Services Management and Operations Guide (G06.25+, H06.03+)

Open System Services Management and Operations Guide527191-002
8-1
8 Managing Security
This section covers:
Common and Unique Characteristics of OSS and UNIX Security on page 8-1
Managing Users and Groups on page 8-8
OSS Security Auditing on page 8-23
Protecting Your System on page 8-26
Common and Unique Characteristics of OSS
and UNIX Security
Basic file security is the same for the OSS environment as on a UNIX system. Files are
accessed according to a file mode and access permissions, as described in the Open
System Services User’s Guide.
Certain differences might require you to code the security-management portions of a
shell script in a manner specific to the OSS environment. If you are experienced in
UNIX security administration, review the following topics before proceeding with the
rest of this section:
Administrative Files and Directories on page 8-1
Administrative Tools on page 8-4
Users and Groups on page 8-6
Components of OSS Security Management on page 8-7
Administrative Files and Directories
Most of the directories and files with security considerations on UNIX systems are
absent from the OSS environment. For example:
OSS user and group administration does not use any of the following files or
directories in the /etc directory, which can be the target of UNIX security
intruders:
groups
passwd
security
shadow
C functions provide access to information needed from the security database.
However, the database files themselves are not available in the OSS file system.
OSS administration of device access does not use files in the /dev directory that
are available on some UNIX systems, such as:
console
cua*
fd
kmem or mem