Sponsored Content
Full Discussion: Disable RBAC - AIX
Operating Systems AIX Disable RBAC - AIX Post 302628301 by zaxxon on Monday 23rd of April 2012 09:05:38 AM
Old 04-23-2012
No offense - maybe explain your boss what a Trusted AIX installation means.
Taken from Help - AIX 7.1 Information Center
Quote:
...
Please note that once you choose this mode of installation, you will not be able to go back to a regular AIX environment without performing an overwrite install of regular AIX. Evaluate your need for a Trusted AIX environment before choosing this mode of install. More details about Trusted AIX can be found in the AIX publicly available documentation.
...
* login and password controlled system and network access
* user, group, and world file access permissions
* access control lists (ACLs)
* Audit subsystem
* Role Based Access Control (RBAC)

Trusted AIX builds upon these primary AIX operating system security features to further enhance and extend AIX security into the networking subsystems.
...
I had a colleague trying out Trusted AIX, it was so limited in options that the idea was just discarded.

Maybe there is a slight chance that there is an option how to turn off RBAC, but my assumption is, that it is not possible.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

Disable Keyboard in AIX 5.2

Hi all. I have a log file that the operators monitor. This file is simply tailed -f on a screen in the ops room. I would like to know if there is anyway I can disable the keyboard from any input other than physically unpluging it. Something like a trap in the script. The system is AIX 5.2. ... (2 Replies)
Discussion started by: jhansrod
2 Replies

2. UNIX for Dummies Questions & Answers

Disable root for AIX 5.2

I am able to disable direct root login through telnet. But when I add the rlogin = false into the /etc/security/user file. I am unable to log in as root from ssh. I uncommented the "PermitRootLogin yes" in the sshd_config file. Still can't log in. Can anyone help? (0 Replies)
Discussion started by: james0125
0 Replies

3. AIX

disable inbound mail for AIX 5.3

Hi All, How do I disable inbound mail for AIX 5.3 server? I just need the outbound mail. It's using the native sendmail program. Thank you! (1 Reply)
Discussion started by: itik
1 Replies

4. AIX

FTP access disable in AIX

Hello, I have AIX machine communication to mainframe machine. From AIX machine, i have to use always SSH communication. For this, i have created SSH tunnel in AIX machine and using FTP with SSH. Now both connections are working: 1) only FTP to mainframe machine 2) create SSH and do FTP... (3 Replies)
Discussion started by: balareddy
3 Replies

5. AIX

Disable Banner Printing AIX ?

Can someone help me disable the banner printing in AIX 6 I am using HPjetDirect Drivers. SO whenever i print anything from Oracle application, a banner is printed. like the one below ######### User: alices@hostname ##### Title: /etc/release ##### Date: Fri 17:23 Mar 27, 2009 ##### ... (2 Replies)
Discussion started by: filosophizer
2 Replies

6. Shell Programming and Scripting

How to disable Enable/Disable Tab Key

Hi All, I have bash script, so what is sintax script in bash for Enable and Disable Tab Key. Thanks for your help.:( Thanks, Rico (1 Reply)
Discussion started by: carnegiex
1 Replies

7. AIX

How to disable/remove c-shell in aix?

Hi Team, I want to either disable C-shell permanently from my system. since the package bos.rte.shell 5.3.9.2 APPLIED Shells (bsh, ksh, csh) contains all 3 shells, please guide me how I can remove or permanently disable cshell from my box. I know I can rename /usr/bin/csh and disable but... (2 Replies)
Discussion started by: falgun6666
2 Replies

8. AIX

Allow telnet in AIX from specific IP adds, but disable for everyone else

I need to change the security on our AIX servers and disable telnet from all but certain IP addresses. I have hashed the telnet line in /etc/inetd.conf and added filter rules for those IP adds to allow access on port 23, but this didn't work. Does anyone have any ideas? Thanks. (2 Replies)
Discussion started by: Alps
2 Replies

9. Red Hat

SSL/TLS renegotiation DoS -how to disable? Is it advisable to disable?

Hi all Expertise, I have following issue to solve, SSL / TLS Renegotiation DoS (low) 222.225.12.13 Ease of Exploitation Moderate Port 443/tcp Family Miscellaneous Following is the problem description:------------------ Description The remote service encrypts traffic using TLS / SSL and... (2 Replies)
Discussion started by: manalisharmabe
2 Replies

10. AIX

AIX Disable direct root login problems

I have disabled rlogin for root successfully , but after that i could not login to root from console and could not su to root from other users as it responded as expired account I did not have any admin user but I have managed to recover the situation by accessing rootvg before mounting it, but... (5 Replies)
Discussion started by: majd_ece
5 Replies
roleadm(1M)															       roleadm(1M)

NAME
roleadm - noninteractive editing of role-related information in RBAC databases SYNOPSIS
[comments] [role] DESCRIPTION
is a noninteractive command that allows users with the appropriate authorization to modify and list the role information in and See rbac(5) for information on these RBAC databases. HP recommends that only the and commands be used to edit and view the RBAC databases. Do not edit the RBAC files directly. Options recognizes the following options: Add a role to the system list of valid roles. Appends a line in file with rolename. You can enter an optional comment after the role. Remove a role from the system list of valid roles. If role is present in remove entry. If role is not present, then returns an error code; see Change the name of a role. This option causes a modification of the RBAC databases and replacing each occurrence of oldrolename with newrolename. Assign a role to a user or a group. First verifies that the user is a valid user, and the role is present in the file. When this is the case, the role is appended to the user->role mapping in the file. If user argument has an ampersand at the beginning (such as &users), then it is assumed that what follows after the ampersand is a group name - the ampersand must be shell escaped or put in quotes such as users or "&users". An administrator may specify a default set of roles by assigning roles to the keyword. If a user is not otherwise explicitly assigned roles in the database, he or she will be given roles assigned to the role. Revoke a role from the specified user. If no role is specified, then all roles are revoked for the given user. (The user entry is removed from If user argument has an ampersand at the beginning (such as &users), then it is assumed that what follows after the ampersand is a group name - the amper- sand must be shell escaped or put in quotes such as users or "&users". List user and role information from the RBAC databases, and If neither nor are specified, then list all the users with assigned roles. If is specified, then only the role(s) of the specified user will be listed. If user has an ampersand at the beginning (such as &users), then it is assumed that what follows after the ampersand is a group name - the ampersand must be shell escaped or put in quotes such as users or "&users". If only is specified, then only list the user(s) assigned to the specified role. If both and are specified, then the entry with the user username and role rolename will be listed, if it exists. If the specified user does not exist in the system and there exists the special user, in the database, then the roles listed for the specified user will be those of the user. In the event that there is more than one user defined in the database, the system will recognize only the last one. If is specified, then all the roles in the roles database, will be listed. When is specified, no other argument will be taken by Authorizations In order to invoke the user must either be root, (running with effective uid of 0), or have the appropriate authorization(s). The follow- ing is a list of the required authorizations for running with particular options: hpux.security.access.role.add,* Allows user to run roleadm with "add" option. hpux.security.access.role.delete,* Allows user to run roleadm with "delete" option. hpux.security.access.role.modify,* Allows user to run roleadm with "modify" option. hpux.security.access.role.assign,* Allows user to run roleadm with "assign" option. hpux.security.access.role.revoke,* Allows user to run roleadm with "revoke" option. hpux.security.access.role.list,* Allows user to run roleadm with "list" option. EXTERNAL INFLUENCES
Environment Variables determines the language in which messages are displayed. International Code Set Support Single-byte character code set is supported. RETURN VALUE
Upon completion, returns one of the following values: Success. Failure. An appropiate error message is printed to stderr. EXAMPLES
The following command will append the line to file. The following command will append the line to the file. The following command will delete line in file and other databases. The following command will delete line from the file. The following command will replace role name with in and The following command will append line to file: The following command will remove the line from file: The following command will remove all the roles for user from file: The following command will remove all the roles for group name from file: The following command will list all the roles for user The following command will list all users and groups with role The following command will list entries with user and rolename The following command will list entries with group name The following command will list all the entries in FILES
Database containing valid definitions of all roles. Database containing definitions of all valid authorizations. Database specifying the roles allowed for each specified user. Database that defines the allowed authorization for each specified role. Database containing the authorization to execute specified commands and the privileges to alter uid and gid for command execution. SEE ALSO
authadm(1M), cmdprivadm(1M), privrun(1M), rbacdbchk(1M), rbac(5). roleadm(1M)
All times are GMT -4. The time now is 01:38 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy