Security Management Guide (G06.24+, H06.03+)
Index
Security Management Guide—522283-008
Index-5
R
Processes
critical 3-15
stopping 3-5
PROCESS_GETINFO_ system procedure
call 2-6
PROCESS_SETINFO_ system procedure
call 5-13
PROGID
and system files 2-10
audit consequences of 2-27, 8-5
detecting 2-29, 8-5
enabling and disabling 2-27
for backups 2-20, 2-26
for database control 2-27
for super ID programs 2-21
hazards of 2-27, 8-5
Protecting key definitions 5-19
Protecting printouts 5-3
Protecting your terminal 5-3
PUP and licensing 2-9
PURGE authority 5-10
Purge protection 3-5
PWCONFIG 2-14
R
READ authority 5-10
Real group ID 4-7
Real user ID 4-7
Remote passwords for network IDs 7-15
Removing users 3-10, 7-6
Restricting applications 6-3
Reusing user names or user IDs 7-7
RMI (Remote Maintenance Interface) 7-10
RPASSWRD program, removing 3-2
S
SAFECOM
ADD TERMINAL command 3-10
ADD USER command 3-7
log files 3-18
Safeguard
and CLEARONPURGE 5-15
and precedence over Guardian 5-15
bit 3-21
configuration for users 3-8
interoperability with OSS 4-1
Saved-set-group-ID 4-7
Saved-set-user-ID 4-7
Search lists 5-19
Securing
critical disk files 3-14
critical processes 3-15
data files 3-14
object code files 3-14
objects
authority for 3-3
SAFECOM ADD command 3-11
subvolumes 3-15
system files 2-8
TACL macros 5-19
Security
policy
contents 1-1
procedures to support A-1
samples A-1, A-2
roles 1-2
setting, propagation of 5-12
strings
displaying with FILEINFO 5-11
for Safeguard protected files 3-21,
5-15
Security event exit 6-1
Security groups, specifying 3-21
SECURITY-ADMINISTRATOR security
group
capabilities of 3-4, 3-21
specifying members 3-4
SECURITY-OSS-ADMINISTRSTOR
security group 3-4
Segregation of duties 1-2, 8-2