Open System Services Management and Operations Guide (G06.30+, H06.08+, J06.03+)

Configuring Expand Users................................................................................................213
Configuring FTP Users......................................................................................................213
Allowing Anonymous FTP Use............................................................................................214
Disallowing OSS Use by Specific Users...............................................................................215
Configuring Special Users.................................................................................................215
9 Managing Security.................................................................................216
Common and Unique Characteristics of OSS and UNIX Security.................................................216
Administrative Files and Directories....................................................................................217
Administrative Tools.........................................................................................................219
User and Group Security in the OSS Environment.................................................................220
Components of OSS Security Management.........................................................................221
Differences Between OSS and UNIX User and User-Group Configuration.....................................222
OSS Security Auditing...........................................................................................................223
Audit Records for OSS Objects..........................................................................................224
Object Names in Audit Records....................................................................................224
Object Name Changes................................................................................................225
Auditing of OSS Shell Commands......................................................................................225
Protecting Your System...........................................................................................................225
OSS Shell Commands Useful for Security Administration.......................................................226
Creating a Logon Session With the su Command............................................................226
Displaying Your User Login Name.................................................................................226
Changing Your User Group..........................................................................................226
Use of suid Scripts...........................................................................................................227
Preventing Security Problems.............................................................................................227
Using Restricted-Access Filesets and File Privileges................................................................228
Restricted-Access Filesets..............................................................................................228
File Privilege File Attribute.............................................................................................229
PRIVSOARFOPEN File Privilege................................................................................230
PRIVSETID File Privilege...........................................................................................230
Authenticated Logons, Authorized Privileged Switch ID Operations, and Restricted-Access
Filesets .................................................................................................................230
Identifying Attempts to Break Security.................................................................................231
Using an OSS Security Event-Exit Process (SEEP)...................................................................231
OSS SEEP-Related Attributes for Filesets and OSS Name Server ........................................231
Starting and Stopping an OSS SEEP..............................................................................232
OSS SEEP-Related EMS Events......................................................................................234
10 Managing With the Shell.......................................................................235
OSS Management With the Shell...........................................................................................235
Customizing the OSS Shell.....................................................................................................236
Setting Up a Default .profile File........................................................................................236
Setting Up an /etc/profile File...........................................................................................236
Adding Commands for User Convenience......................................................................237
Controlling Reference Page Searches and Display...........................................................237
Using the /etc/profile File Instead of a motd Command...................................................238
Localizing Software..........................................................................................................238
Localizing Reference Pages...............................................................................................240
Monitoring the OSS Environment With the Shell........................................................................241
Slow Performance............................................................................................................241
Overuse of Resources.......................................................................................................241
Controlling the Growth of Directories.......................................................................................241
Defragmenting Disks.............................................................................................................242
Compressing Files.................................................................................................................242
Executing Remote Shell Commands.........................................................................................243
Parsing Command Options With the getopts Command............................................................243
8 Contents