Adding an application in trusted computing base


Login or Register for Dates, Times and to Reply

 
Thread Tools Search this Thread
# 1  
Adding an application in trusted computing base

How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu?

Last edited by RudiC; 03-07-2019 at 06:01 AM.. Reason: Removed italic formatting
Login or Register for Dates, Times and to Reply

Previous Thread | Next Thread
Thread Tools Search this Thread
Search this Thread:
Advanced Search

7 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Help Generate new port base on the last port but not in used by other application

Hi Expert, Anybody can figure it out on how to generate new port base on my last port let say my last port var1=124 and increment for new port 125,126 but this new two ports need to look at first if this port is not in used by any service, if the port is in used add 1 to new port and if in used... (6 Replies)
Discussion started by: lxdorney
6 Replies

2. HP-UX

From a C++ application how to find if a hpux host is in standard mode or trusted mode

is there a way for my C++ application to find out which mode the hpux OS is running in? standard mode or trusted mode. (3 Replies)
Discussion started by: einsteinBrain
3 Replies

3. Shell Programming and Scripting

Adding Extra Column in txt file base on Condition

HI Guys, I have below input. Output Base on Below Condition. 1> if forth column is empty and next coming line have same name with \es then add that column name on all rows 2>rest of all are es:vsDataEUtranCellFDD Input:- CCL01736 CCL01736_7A_1 es:vsDataEUtranCellFDD ... (3 Replies)
Discussion started by: pareshkp
3 Replies

4. Linux

Linux kernel & Trusted Computing

Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel? (0 Replies)
Discussion started by: Varsel
0 Replies

5. AIX

Switch off TCB (Trusted Computing Base)

I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before". Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
3 Replies

6. Virtualization and Cloud Computing

Event Cloud Computing - IBM Turning Data Centers Into ?Computing Cloud?

Tim Bass Thu, 15 Nov 2007 23:55:07 +0000 *I predict we may experience less*debates*on the use of the term “event cloud”*related to*CEP in the future, now that both IBM and Google* have made announcements about “cloud computing” and “computing cloud”, IBM Turning Data Centers Into ‘Computing... (0 Replies)
Discussion started by: Linux Bot
0 Replies

7. Cybersecurity

Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work. How many... (0 Replies)
Discussion started by: kduffin
0 Replies
pam_acct_mgmt(3)					     Library Functions Manual						  pam_acct_mgmt(3)

NAME
pam_acct_mgmt() - perform PAM account validation procedures SYNOPSIS
[ flag ... ] file ... [ library ... ] DESCRIPTION
The function is called to determine if the current user's account is valid. This includes checking for password expiration, account expi- ration, account locks and access hour restrictions. This function is typically called after the user has been authenticated with See pam_authenticate(3). The pamh argument is an authentication handle obtained by a prior call to The following flags may be set in the flags field: The account management service should not generate any messages The account management service should return if the user has a null authentication token. APPLICATION USAGE
Refer to pam(3) for information on thread-safety of PAM interfaces. RETURN VALUE
Upon successful completion, is returned. In addition to the error return values described in pam(3), the following values may be returned: User not known to underlying account management module. Access permission is denied. New authentication token required. This is normally returned if the machine security policies require that the password should be changed because the password is NULL or it has aged. User account has expired. User account has been disabled (trusted mode only). Terminal has been disabled (trusted mode only). User is not authorized for terminal access (trusted mode only). Wrong time to login (trusted mode only). WARNINGS
HP-UX 11i Version 3 is the last release to support trusted systems functionality. SEE ALSO
pam(3), pam_start(3), pam_sm_acct_mgmt(3), pam_authenticate(3). pam_acct_mgmt(3)

Featured Tech Videos