Security Management Guide (G06.29+, H06.08+, J06.03+)

Index
Security Management Guide 522283-021
Index - 5
R
Privileged user IDs
adding 3-6
control of 3-6
defined 7-5
verifying validity of 8-2
PRIV_SETID 4-8
PRIV_SOARFOPEN 4-8
Processes
critical 3-15
stopping 3-5
PROCESS_GETINFO_ system procedure
call 2-5
PROCESS_SETINFO_ system procedure
call 7-13
PROGID
and system files 2-9
audit consequences of 2-30, 8-5
detecting 2-31, 8-5
enabling and disabling 2-29
for backups 2-22, 2-29
for database control 2-29
for super ID programs 2-24
hazards of 2-30, 8-5
Protecting key definitions 7-19
Protecting printouts 7-3
Protecting your terminal 7-3
PUP and licensing 2-9
PURGE authority 7-10
Purge protection 3-5
PWCONFIG 2-14
R
READ authority 7-10
Real group ID 4-10
Real user ID 4-10
Remote passwords for network IDs 6-19
Removing users 3-10, 6-6
Restricted-Access Filesets 4-7
Restricting applications 5-3
Reusing user names or user IDs 6-7
RMI (Remote Maintenance Interface) 6-14
RPASSWRD program, removing 3-2
S
SAFECOM
ADD TERMINAL command 3-10
ADD USER command 3-7
log files 3-18
Safeguard
and CLEARONPURGE 7-15
and precedence over Guardian 7-15
bit 3-21
configuration for users 3-8
interoperability with OSS 4-1
Saved-set-group-ID 4-10
Saved-set-user-ID 4-10
Search lists 7-19
Securing
critical disk files 3-14
critical processes 3-15
data files 3-15
object code files 3-15
subvolumes 3-15
system files 2-7
TACL macros 7-19
Securing objects
authority for 3-3
SAFECOM ADD command 3-12
Security
roles 1-2
setting, propagation of 7-12
Security event exit 5-1
Security groups, specifying 3-20
Security policy
contents
1-1
procedures to support A-1
samples A-1, A-2
Security strings
displaying with FILEINFO 7-11