Sponsored Content
Operating Systems AIX Switch off TCB (Trusted Computing Base) Post 302168934 by dig1tal on Tuesday 19th of February 2008 08:28:29 PM
Old 02-19-2008
that's great, thanks!. i felt like such a rube when i enabled tcb during a test install and couldn't find out how to disable it.
 

8 More Discussions You Might Find Interesting

1. Cybersecurity

Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work. How many... (0 Replies)
Discussion started by: kduffin
0 Replies

2. Virtualization and Cloud Computing

Event Cloud Computing - IBM Turning Data Centers Into ?Computing Cloud?

Tim Bass Thu, 15 Nov 2007 23:55:07 +0000 *I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies

3. AIX

AIX and TCB

Hi I have a question with regards to AIX 5.3 & TCB. I have a client that is requesting TCB to be installed in AIX. However it seems that the perception of TCB is that it causes major headaches when it comes to configuring the system in real world environments, such as large scale Oracle... (15 Replies)
Discussion started by: kimyo
15 Replies

4. AIX

Implementing a TCB-Environment in AIX

Habe folgende Frage an der ich mich schwer tue, Welche Möglichkeiten bietet IBM's Betriebssystem "AIX" hinsichtlich der Ausbildung einer TCB-Umgebung? vielen Dank (6 Replies)
Discussion started by: Invisibleye86
6 Replies

5. Linux

Linux kernel & Trusted Computing

Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies

6. Red Hat

CentOS 6.1 base install (like FreeBSD base install)?

Hello, What is the simplest way to install CentOS 6.1 with console base-system only using official LiveDVD image on VirtualBox machine? I'd like to get simplest console with network support like FreeBSD base installation. Then, install services which I need. The installer jest extracts the... (2 Replies)
Discussion started by: newbie_develope
2 Replies

7. AIX

Is it must to enable TCB on AIX LPARs ?

Hi, I've verified my AIX 7.1 LPAR , and TCB is disabled by default. #odmget -q attribute=TCB_STATE PdAt PdAt: uniquetype = "" attribute = "TCB_STATE" deflt = "tcb_disabled" values = "" width = "" type = "" generic = "" ... (3 Replies)
Discussion started by: System Admin 77
3 Replies

8. UNIX for Beginners Questions & Answers

Adding an application in trusted computing base

How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu? (0 Replies)
Discussion started by: iambharatmanral
0 Replies
secauthmigrate(8)					      System Manager's Manual						 secauthmigrate(8)

NAME
secauthmigrate - Convert ULTRIX auth(5) authentication data to authcap(4) authentication data (Enhanced Security) SYNOPSIS
/usr/sbin/secauthmigrate [options] files ... | /usr/sbin/secauthmigrate [options] - DESCRIPTION
The secauthmigrate utility reads records from the specified files or from standard input (-). These records must be formatted according to the ULTRIX auth(Section 5) format. These can be generated by getauth on ULTRIX, or (for the Hesiod/BIND master host) can be found in /var/dss/namedb/src/auth. For each authentication record found, secauthmigrate will attempt to find a matching username record for the given UID. If that translation can be performed, an authcap(4) entry for the extended profile information for that user is created from the data in the input record. If the extended profile entry already exists, then the converted entry is left in /tcb/files/auth/?/user- name:ULT rather than overwrite the entry in /tcb/files/auth/?/username. If ROOTDIR is defined, it is used instead of / as the root of the directory tree when creating the /tcb/files/auth/?/* files. FLAGS
-v Indicate successful conversions on standard output. -U Give a long usage message. ERRORS
Failed to find name for UID # xxxx -- skipped No BSD style (/etc/passwd or NIS data) account exists. If you need this account, create a BSD style account and run secauthmigrate again. Existing file for username -- conversion saved in /tcb/files/auth/?/username:ULT Extended profile already exists. Compare the files to determine the differences. If the differences are not related to the password, use the dxaccounts program to update the existing file. If the differences are related to the password, disable logins and edit the /tcb/files/auth/?/username file. secauthmigrate -- unrecognized option '${opt}' The option you provided was not recognized. The options are -v and -U. Usage: secauthmigrate [options] files (Try secauthmigrate -U for help.) The -U option provides extensive help. FILES
${ROOTDIR}/tcb/files/auth/?/* RELATED INFORMATION
authcap(4), prpasswd(4) auth(Section 5) and getauth(Section 8) on ULTRIX. Security delim off secauthmigrate(8)
All times are GMT -4. The time now is 04:45 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy