Security Management Guide (G06.29+, H06.08+, J06.03+)
Contents
Security Management Guide — 522283-021
vii
B. How Passwords are Encrypted
B. How Passwords are Encrypted
C. TACL Macros
Example 1. Snapshot Routine C-1
Example 2. Snapshotcheck Routine C-2
Example 3. Fapply Routine C-4
Example 4. Findone Routine C-5
Example 5. Lock Routine C-6
D.
HP- Supplied Files with LICENSE and PROGID Attributes
Licensed Files D-1
PROGID Files D-4
Glossary
Index
Figures
Figure 4-1. OSS File and Directory Permissions 4-4
Tables
Table i. Summary of Contents xi
Table 2-1. Security-Relevant Commands and Programs 2-2
Table 2-2. Guardian Disk-File Security Settings 2-4
Table 2-3. Status of Guardian and OSS Process Attributes 2-6
Table
2-4. Recommended Security of System Files 2-8
Table 3-1. Safeguard Equivalents for Guardian Security Strings 3-13
Table
4-1. OSS File and Directory Commands 4-6
Table 4-2. Security-Related OSS Process Attributes 4-10
Table
4-3. OSS Process-Management Functions 4-11
Table 6-1. Sample Operator Access Requirements 6-19
Table
7-1. Privileged User Classes 7-5
Table
7-2. File Access Levels 7-10
Table 7-3. Security Setting Derivation 7-13
Table
D-1. Files with the LICENSE Attribute Set D-1
Table
D-2. Files with the PROGID attribute set D-5