Security Management Guide (G06.29+, H06.08+, J06.03+)

Contents
Security Management Guide 522283-021
iv
5. Concerns for the Application Programmer
File Privilege 4-7
OSS Process Security 4-9
Process Security Attributes 4-10
Adopting the Owner ID of a Program File 4-12
5. Concerns for the Application Programmer
Authentication 5-1
Authentication User IDs 5-1
Application-Specific User IDs 5-4
6. Concerns for the System Administration Team
Managing User Names 6-1
Administrative Groups 6-1
File-Sharing Groups 6-2
Multiple User Names for One Person 6-3
Super-Group User IDs 6-4
Group-Manager User IDs 6-5
Anonymous or Guest User IDs 6-5
Unused User IDs 6-6
Removing a User From the System 6-6
Managing Passwords 6-7
Password Length 6-8
Valid Characters in Passwords 6-8
Quality Password and Embedded Spaces 6-8
Password Reuse 6-9
Initial Password 6-10
Password Change Periods 6-13
Password Expiration Warning 6-13
Physical Security 6-13
The Computer Room 6-13
The System Console 6-13
The Remote Maintenance Interface (RMI) 6-14
The Computer Cabinet 6-14
The Printers 6-14
The Tape Units 6-14
The Tape Library 6-14
Off-Site Storage 6-15
Dial-Up Access and Security 6-15
Authorization Lists 6-15
Additional External Passwords 6-15