Convert to a Trusted System
HP-UX offers some additional security features such as, a more stringent authentication system, auditing, terminal access control and time-based access control. These are in addition to the normal Unix security mechanisms that are generally available. But to take advantage of these features the system must be converted to a trusted system.* If security is important, it is recommended this be done. To convert a system you would need to:
/usr/sbin/sam
Select "Auditing and Security"
Select "System Security Policy"
Select "YES"
R T
Confirmation |
You need to convert to a Trusted System before proceeding. The conversion process does the following things: 1. Creates a protected database on the system for storing security information. 2. Moves user passwords in "/etc/passwd" to this database 3. Replaces all password fields in "/etc/passwd" with "*" For more details, refer to the "System Security" chapter of the . "System Administration Tasks" manual. . Do you want to convert to a Trusted System now? .,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,. [ Yes ] [[No ]] ,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,,, |
You will then see a message telling you that you’re converting to a trusted system...
Next you will receive a "Successfully converted to a trusted system" message. Press OK continue.
Time to setup your security policies. The following are recommendations only. Please curtail yours to fix your environment.