Security Management Guide (G06.24+, H06.03+)

Contents
Security Management Guide522283-008
ii
2. Guardian System Security (continued)
2. Guardian System Security (continued)
Disposition of Orphan Files 2-11
Optional Security Features 2-11
PWCONFIG Utility 2-14
$CMON 2-18
Managing the Super ID 2-18
Abilities of the Super ID 2-18
Controlling the Super ID 2-19
Operating Without the Super ID 2-19
Tasks That Require the Super ID 2-21
Licensing Programs 2-22
Privileged Operations 2-22
Controlled and Orderly Access to Resources 2-22
The Licensing Operation 2-23
Effect of Copying a Licensed Program 2-23
Security Implications 2-23
Limiting Access to HP Licensed Programs 2-24
Administrative Procedures 2-24
General Comments 2-25
Detecting Licensed Programs 2-25
PROGID Programs 2-26
Uses of PROGID Programs 2-26
Enabling a PROGID Program 2-27
Possible Security Concerns 2-27
Detecting PROGID Programs 2-29
3. Safeguard System Security
Preliminary Preparation 3-2
Read the Safeguard Manuals 3-2
Remove ADDUSER, DELUSER, and RPASSWRD 3-2
Convert the USERID File 3-2
Copy SYSnn Subvolume Authorization Record 3-2
Privileged User Roles 3-3
Adding Users 3-3
Securing Objects 3-3
Controlling the OBJECTTYPE Records 3-4
Membership in Security Groups 3-4
Controlling the Super ID 3-5
Controlling User Access 3-6