Sponsored Content
Special Forums Cybersecurity ID Management Security guideline for Linux, AIX, SunOS and HP UX Post 303018583 by blinkingdan on Monday 11th of June 2018 04:22:52 AM
Old 06-11-2018
ID Management Security guideline for Linux, AIX, SunOS and HP UX

I'm searching for COMPREHENSIVE ID management security guideline to manage user administration in my current job. I couldn't find it online or the books that could help.

What I need to know:
  1. User security directories and how to use it.
  2. How user should be managed.
  3. How the standard user policies should be.
  4. How to manage and check sudo logs.
  5. All about root id management.
  6. and many more that I'm suppose to know for ID management Security in corporate companies.

Please help. I really need this badly to set a standard policies and monitoring for my new project for Linux, AIX, SunOS and HP UX servers. We have about 10 000 servers which I need to standardize.

Last edited by rbatte1; 06-11-2018 at 10:56 AM.. Reason: Converted from text numbered list to formatted numbered list with LIST=1 tags
 

4 More Discussions You Might Find Interesting

1. Solaris

Java / SunOS Security question

Hi, I have a question about the Java that comes with the Solaris 9/10 OS. All my boxes are servers, only ssh allowed, no x windows, hardened, firewaled, etc... Their purpose is Oracle DB's and Sun One Dir servers. None of which use the OS version of Java as far as know. Question IS, can... (1 Reply)
Discussion started by: BG_JrAdmin
1 Replies

2. UNIX for Advanced & Expert Users

awk variable regexp works in AIX but not in SunOS?

Using awk variables for regular expressions is working for me in AIX. It is failing for me in SunOS. I don't know why. Can someone explain and/or suggest a fix for the SunOS version? Here is a little test script. It runs fine in AIX: $ cat test.ksh #! /bin/ksh print "Executed on OS: $(... (6 Replies)
Discussion started by: charles_n_may
6 Replies

3. Solaris

Patch management (Solaris, AIX , Linux )

Hi Guys, I am doing L1 Level support for Solaris Platform. Eg. User Management, File system , Print management and Job monitoring. I recently completer my IBM Aix 7 Administration certification. Issue is that my manager is asking me do full time unix / linux patch management work for new... (5 Replies)
Discussion started by: Nats
5 Replies

4. What is on Your Mind?

Individual Risk Management (Personal IT Security) and Browser Cache Management

Original post from this thread on browser caching. To add to this, it is an effective security measure to clear absolutely all cached data (cookies, web content, ....) when closing the browser - i.e. in case of a shutdown. It takes a bit of work to re-login to all the sites but websites will not... (7 Replies)
Discussion started by: bakunin
7 Replies
pam_dce(5)																pam_dce(5)

NAME
pam_dce - authentication, account, and password management PAM functions for DCE SYNOPSIS
/usr/lib/security/libpam_dce.so.1 DESCRIPTION
The DCE PAM modules allow integration of DCE into the system entry services (such as login, telnet, rlogin, ftp) through the pam.conf(4) file. The DCE service module for PAM consists of the following three modules: the authentication module, the account management module, and the password management module. All three modules are supported through the same loadable library, /usr/lib/security/libpam_dce.so.1 is the interface that services the requests from These requests will be communicated to the DCE security server, which in turn sends the response back to ilogind. This response is then sent back to /usr/lib/security/libpam_dce.so.1. Authentication Module The authentication module certifies the identity of a user and the user's credentials. It passes the authentication key derived from the user's password to the DCE Security Service. The Security Service then uses the authentication key to certify the user and the user's cre- dentials. The following options can be passed to the authentication module through the pam.conf(4) file: debug Turn on syslog debugging at the LOG_DEBUG level. nowarn Turn off warning messages about not being able to acquire DCE credentials. use_first_pass Use the initial password (entered when the user is authenticated to the first authentication module in the stack) to authenticate with DCE. If the user can not be authenticated or if this is the first authentication module in the stack, quit and do not prompt a password. It is recommended that this option be used only if the authentication mod- ule is designated as optional in the pam.conf(4) configuration file. try_first_pass Use the initial password (entered when the user is authenticated to the first authentication module in the PAM stack) to authenticate with DCE. If the user cannot be authenticated or if this is the first authentication module in the stack, prompt for a password. A user must be authenticated and the user's credentials set before a system entry service can access any file directories owned by the user that are mounted through DTS. Account Management Module The account management module provides a function to perform account management (pam_sm_acct_mgmt(3)). sends a request to the DCE implementation of pam_sm_acct_mgmt(3) function which retrieves the user's account and password expiration information from the DCE Security Server and verifies that the user's account and password have not expired. The following options can be passed to the account module through the pam.conf(4) file: debug Turn on syslog debugging at the LOG_DEBUG level. nowarn Turn off warning messages displayed when a user's account and/or password are going to expire. pam_sm_acct_mgmt(3) calls the function sec_login_inquire_net_info(3) to retrieve information about when a user's account and/or password is going to expire. Password Management Module The password management module provides a function to change passwords (pam_sm_chauthtok(3)). The following options can be passed to the password module through the pam.conf(4) file: debug Turn on syslog debugging at the LOG_DEBUG level. nowarn Turn off warning messages about not being able to change passwords. try_first_pass Use the initial password (entered to the first password module in the PAM stack) to authenticate with DCE. If the user cannot be authenticated or if this is the first password module in the stack, prompt for a password. use_first_pass Use the initial password (entered to the first password module in the PAM stack) to authenticate with DCE. If user cannot be authenticated or if this is the first password module in the stack, quit and do not prompt for a password. It is recommended that this option be used only if the DCE password module is designated as optional in the pam.conf(4) configuration file. SEE ALSO
pam(3), sec_login_setup_identity(3), sec_login_valid_and_cert_ident(3), sec_login_set_context(3), sec_login_inquire_net_info(3), pam.conf(4), pam_unix(5) ilogind(1m) HP DCE
pam_dce(5)
All times are GMT -4. The time now is 09:02 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy