OSF DCE Administration Guide--Introduction
OSF DCE Administration Guide—Introduction
Registry policies include certain password and account information. Policies also
include overrides, which are exceptions tied to a specific machine. Use the dcecp
program’s registry commands to set and maintain registry policies. Details on how to
these commands are in Chapter 35 of the .
Ticket expiration date, password life span, password format, and password expiration
date are examples of registry policies that you can set. If both an organizational
policy and a registry policy exist for password format, for example, the more
restrictive policy applies.
You can establish overrides to the information contained in the registry. Override
information is stored in the passwd_override and group_override files on a local
machine. The passwd_override file contains the home directory, the login shell,
entries for overriding the password, and GECOS information, which is general
information that is used by users but not required by the system, such as office and
phone numbers. For details about how to edit the passwd_override file, refer to
Chapter 36 of the .
• Backing up the registry
Chapter 36 of the describes the back-up procedure to follow for the master registry
site. When you restore the database, it is automatically propagated to the slaves.
• Setting up and maintaining Audit Service data"
Audit Service data includes event numbers, event class numbers, event class files,
audit filters, and audit trail files. Use the dcecp aud, audevents, audfilter, and
audtrail objects to manage Audit Service data. The OSF DCE Administration
Reference provides descriptions of audit-related dcecp objects and commands. See
Chapters 42 and 43 in the
for more information about Audit Service administration.
• Troubleshooting
When you encounter problems that cannot be resolved through routine management
procedures, or when hardware failures stop the registry from operating, there are
several troubleshooting procedures you can use. Chapter 40 of the describes the
following tasks:
— Recreating a registry replica
— Recovering the master registry
— Forcibly deleting a replica
— Adopting registry objects that are orphaned because their owner has been deleted
5.6.2 Reconfiguring the Registry
There are two main reconfiguration tasks included in the administration of the Security
Service. The following tasks are described in Chapter 37 of the :
• Changing the master registry site when you plan to move the machine that runs the
master registry server from your network or shut the machine down for an extended
period
5− 10 Tandem Computers Incorporated 124244