Security Management Guide (G06.24+, H06.03+)

Index
Security Management Guide522283-008
Index-4
N
N
Network access 7-15
Network user IDs 7-15, 7-16, 8-3
O
Object code files 3-14
OBJECTTYPE DEVICE 3-3
OBJECTTYPE DISKFILE 3-3
OBJECTTYPE OBJECTTYPE 3-4
OBJECTTYPE records, controlling 3-4
OBJECTTYPE USER 3-3, 3-5
OBJECTTYPE VOLUME 3-3
Operator privileges 7-15
Optional ACL entries 4-5
Orphan files
detecting 2-11
disposition of 2-11
OSS
Auditing 4-3
directory permissions 4-3
file permissions 4-3
file security 4-7
initial directory 4-1
Ownership for system files 2-9
P
PAID (process access ID) 2-24
PASSWORD 2-16
PASSWORD program
security features of 2-11
using 5-2
Passwords 2-16
blank 7-7
changing 5-1, 5-2
choice of 5-2
configuration 3-9
controlling 3-9, 7-7
encryption of 3-9
establishing 7-8
Passwords 2-16 (continued)
expiration
forced 7-9
grace period 3-10
warning 3-9
for electronic mail 5-16
initial 7-8
length of 3-9, 7-7
of the super ID 2-19
protecting 5-1
verifying proper control of 8-3
PASSWORD-COMPATIBILITY-MODE 2-16
PASSWORD-ENCRYPT attribute 3-9
PASSWORD-EXPIRES attribute 7-9
PASSWORD-HISTORY attribute 3-9
PASSWORD-MAY-CHANGE attribute 3-7
PASSWORD-MINIMUM-LENGTH
attribute 3-9, 7-7
PASSWORD-MUST-CHANGE attribute 3-7
Permission codes
altering 4-6, 5-21
defined 4-3
Permissive security 8-4
Physical security
defined 1-2
for printers 7-10
for tape drives 7-11
for the computer room 7-10
for the RMI 7-10
for the system console 7-10
Printouts
and electronic mail 5-16
protecting 5-3
PRIV attribute 2-23
Privileged code 2-22
Privileged user IDs
adding 3-5
control of 3-6
defined 5-5
verifying validity of 8-2