Sponsored Content
Operating Systems Solaris SunSolaris-v5.9: Default Security Settings Post 84792 by eysheikah on Wednesday 28th of September 2005 03:36:41 PM
Old 09-28-2005
Question SunSolaris-v5.9: Default Security Settings

I am working on SunSolaris- v5.9 and am trying to obtain default security settings (including password settings).

Although in the AIX environment, to obtain default setting the following commands are used:

/etc/security/user
/etc/security/limits
/etc/security/environ
/etc/security/mkuser.default

However, I am not sure what commands are used in the SunSolaris- v5.9 environment to obtain default security settings. Any assistance will be greatly appreciated.

Thanks.
ASheikh
 

9 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

mandrake 8.0 experts...how come it won't accept changes to security settings??

well after a possible hack last week that was a pain in the as* i have reinstalled and i am setting up my security settings before i connect to the internet this time... problem is that when i try to change the security setting using in the control setting the left panel (where the change is... (2 Replies)
Discussion started by: justchillin
2 Replies

2. Shell Programming and Scripting

how to monitor 25 different digitalUnix and Sunsolaris machines

Hi I am a new Junior System Administartor..currently in our team we have around 25 different machines comprising of Sun-Solaris and digital Unix machines...and every morning we telent into the system to check 1)all demons are workin fine 2)all cpus are up 3)the memory is okay But... (4 Replies)
Discussion started by: xiamin
4 Replies

3. Solaris

Find cmd working in Linux and not in SunSolaris 5.8

find . -type f -mtime -1 -ls command not working in sun solaris 5.8 (4 Replies)
Discussion started by: navjotbaweja
4 Replies

4. Solaris

Sunsolaris shell script runs only as super user

Hi Friends, I am new to Sun solaris unix.I am facing problem while runing my kornshell script just as an ordinary user.The script works fine while i am working as a super user.the script just uses awk to check the first charcter of a file and then copies the file to another folder. Do i... (4 Replies)
Discussion started by: gjithin
4 Replies

5. Programming

GUI applications on SunSolaris and RedHat Linux

Hello, I want know about building a product on Sun solaris and Redhat Linux. Product would contain C,C++, Java, UNIX Shell scripts and so on. It will not be a client server programme. Thanks! Shafi (5 Replies)
Discussion started by: shafi2all
5 Replies

6. UNIX for Advanced & Expert Users

Problem with grep command options in Sunsolaris

Hi Experts I need the following output from grep command of Sunsolaris on a set of input files. Output:........ 1st search string from file1 2nd search string from file1 3rd search string from file1 1st search string from file2 2nd search string from file2 3rd search string from... (3 Replies)
Discussion started by: ks_reddy
3 Replies

7. Shell Programming and Scripting

Write a shell script security policy settings for linux

The pro help! Write a shell script setup for linux security policies include: 1. login (username and password login). 2. add, delete your username and password. 3. firewall. Note: Write a shell script file as follows: If login successful then Step 2. If step 2 succeeds (ie add,... (1 Reply)
Discussion started by: ngovuongbinhtay
1 Replies

8. AIX

default settings of security password in AIX

Hi Guy's Just I want to know the default settings of security password in AIX there is some changes happened in my machine when I try to change my password I'm getting this message Changing password for "root" root's New password: a minimum of 1 elapsed week between changes.... (1 Reply)
Discussion started by: Mr.AIX
1 Replies

9. SuSE

Suse Security Settings

1) PermitEmptyPasswords is set to No # grep "^PermitEmptyPasswords" /etc/ssh/sshd_config PermitEmptyPasswords no If there is no output does it implies 'As parameter was not set mean system will also not accepted emptypassword.' 2) Users is not allowed to set... (2 Replies)
Discussion started by: alvinoo
2 Replies
su(1)							      General Commands Manual							     su(1)

NAME
su - Substitutes user ID temporarily SYNOPSIS
su [- | -f] [user] [shell_option] [shell_command] OPTIONS
Prevents the user's shell initialization file from being executed by passing the -f option to the user's shell, thus making su start up faster. The -f option is supported by the csh family of shells. Simulates a full login by executing the commands in either the and files for csh or the file for sh and ksh and by setting the current working directory to the user's home directory. Passes the specified shell option flag to the newly invoked user's shell for execution. The shell_option must be supported by the invoked shell. The csh, sh, ksh, and any other interactive command shell support the commonly used -c shell option. By default (no "shell_option"), the shell is opened with the -i (interactive) shell option. See the reference page for the shell you are using for more information on the shell options. Passes the specified command to the newly invoked user's shell for execution. The shell_command must be supported by the invoked shell. DESCRIPTION
The su command demands the password of the specified user, and if it is given, changes to that user and invokes the user's shell without changing the current directory. Except in a case where the - option is used, the user environment is unchanged except for HOME, SHELL, USER, and LOGNAME which are taken from the password file for the user being substituted (see environ). The new user ID stays in force until the shell exits. If no user is specified, root is assumed. Only users who belong to group number 0 (system) can issue su to become root, even with the root password. To remind superusers of their responsibilities, the shell substitutes a # (number sign) for its usual prompt. Shell commands may be passed to the shell that is spawned by su by including them on the command line after the su flags and arguments. After the flags recognized by su and the user argument are processed, unrecognized command line flags (shell_options) and/or arguments (shell_commands) are passed to the shell for execution. If the spawned shell does not support the command or the format of the command, the command is not executed and the resulting shell behavior and error messages are determined by the shell. Security Restrictions The su command fails if any lock conditions exist on the target account. Specifically, if the destination account was retired, if the num- ber of unsuccessful login attempts exceeds the maximum allowed, if the administrative lock was applied, or the password's lifetime was exceeded, the Information System Security Officer (ISSO) must unlock the destination account before any user can log in to it or use su to transition to it. SECURITY NOTE
This security-sensitive command uses SIA (Security Integration Architecture) as an interface to the security mechanism(s) that perform the actual user validation. See the matrix.conf(4) reference page for more information. ENVIRONMENT VARIABLES
The following environment variables affect the behavior of su: SEE ALSO
Commands: csh(1), ksh(1), sh(1) su(1)
All times are GMT -4. The time now is 07:20 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy