Sponsored Content
Full Discussion: Converting system to trusted
Top Forums UNIX for Advanced & Expert Users Converting system to trusted Post 303013933 by gull04 on Friday 2nd of March 2018 06:10:26 AM
Old 03-02-2018
Hi,

It's been a long time since I worked on HPUX (15 Years), but from memory there was an other way of preparing the system which I think used the "tsconvert -x" command followed by the "pwconv" command.

This might not be relevant any more as this was HPUX 10.20, but it might be worth exploring - although I may just be having a senior moment.

Regards

Gull04
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

PAM Vs Trusted mode in HP-UX

Hi All, Some questions on PAM (Pluggable Authentication Modulues) and Trusted mode in HP-UX. As default, when I turn on trusted mode (need shadow password only), the PAM is atomatically installed(not sure the word "installed" is appropriate or not). Can we turn on the trusted mode only,... (0 Replies)
Discussion started by: wilsonchan1000
0 Replies

2. Cybersecurity

Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work. How many... (0 Replies)
Discussion started by: kduffin
0 Replies

3. HP-UX

Trusted system: Please Help.

I was playing with sam and i turned on the Trusted System feature (UX11i). Now i cant log onto it anymore, i can ping it, but icant telnet, rlogin or login at the login screen. I dont want to reboot my machine because i am affraid it wont boot and ask for a password. My root password is not... (1 Reply)
Discussion started by: Netghost
1 Replies

4. UNIX for Dummies Questions & Answers

Converting a Windows system to a UNIX system

Hello I am looking for advise on how to convert a windows based computer system into a UNIX based operating system.. I would like to be able to learn UNIX better than I know it and work didn't allow me to work with UNIX much. Is there a book where I could learn how to accomplish that... (6 Replies)
Discussion started by: baksg1995
6 Replies

5. HP-UX

shadowed password file on non-trusted system?

Is it possible to have shadowed password file without implementing a Trusted System? (3 Replies)
Discussion started by: linuxdude
3 Replies

6. Solaris

Solaris Trusted Extension ?

How to check if a system has Solaris trusted extensions installed or not on a solaris 10 system ? (5 Replies)
Discussion started by: fugitive
5 Replies

7. What is on Your Mind?

Converting an old windows vista system to Unix

I have an old Dell system that I would like to convert over to a Unix system and I have no idea how to do this. Where can I go to get the information to do this. This will be a secondary computer that I will learn and "play" with. I have heard that it is fairly easy to do and that once I get used... (0 Replies)
Discussion started by: Richard.Borden2
0 Replies

8. HP-UX

Enable telnet as root to 11.31 non-trusted system?

I have a new box that was set up for me and I want to allow telnet to the box as root. I know that it's not secure but due to the nature of what I test I need an easy and reliable way back in if I've messed up the other connection methods(SSH). This is in a protected lab environment. Eventually... (17 Replies)
Discussion started by: gctaylor
17 Replies

9. HP-UX

HP-UX revert from trusted system to default

All, I have inherited some software that is running on HP-HX 11.11. The software ofers a GUI login and the user passwords can be either internal to the software, user defined or based on the matching unix account. The problem I have is that the server has been converted to 'trusted' years... (7 Replies)
Discussion started by: rbatte1
7 Replies
xip(1)							    BSD General Commands Manual 						    xip(1)

NAME
xip -- Create a signed archive for secure distribution SYNOPSIS
xip [options] --sign identity input-file ... output-archive DESCRIPTION
The xip tool archives one or more files or directories into a signed XIP file. A XIP file is an analog to zip(1), but allows for a digital signature to be applied and verified on the receiving system, before the archive is expanded. When a XIP file is opened (by double-clicking), Archive Utility will automatically expand it (but only if the digital signature is intact). To create a XIP file, you will need to have a certificate and corresponding private key -- together called an ``identity'' -- in one of your accessible keychains. To add a signature, specify the name of the identity using the --sign option. The identity's name is the same as the ``Common Name'' of the certificate. If you want to search for the identity in a specific keychain, specify the path to the keychain file using the --keychain option. Otherwise, the default keychain search path is used. xip will embed the signing certificate in the XIP file, as well as any intermediate certificates that are found in the keychain. The signature can optionally include a trusted timestamp. This is enabled by default when signing with a Developer ID identity, but it can be enabled explicitly using the --timestamp option. A timestamp server must be contacted to embed a trusted timestamp. If you aren't connected to the Internet, you can use --timestamp=none to disable timestamps, even for a Developer ID identity. ARGUMENTS AND OPTIONS
--sign identity-name The name of the identity to use for signing the archive. --keychain keychain-path Specify a specific keychain to search for the signing identity. --timestamp Include a trusted timestamp with the signature. --timestamp=none Disable trusted timestamp, regardless of identity. input-file ... The path to one or more files or directories to be archived. output-archive The path to which the signed archive will be written. Mac OS September 23, 2011 Mac OS
All times are GMT -4. The time now is 03:22 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy