HP -UX B6941-90001 Administrator's Reference Manual page 436

Management server on hp-ux
Table of Contents

Advertisement

Table 10-7
Restricted Area
ACLs
Agent Installation
Application Passwords
Tuning, Troubleshooting, Security, and Maintenance
ITO Security
General Security Guidelines in ITO
A C2-secure or "trusted" system uses a number of techniques to improve
security at system level. These techniques would include, amongst other
things, the following:
Imposing strict password and user authentication methods for the
UNIX login
Auditing networking, shared memory, file systems and so on
Controlling access to terminals
Managing access to files
For information about the implications these security recommendations
can have with regard to the configuration of ITO, see "Restrictions" on
page 436.
Restrictions
Running ITO in a C2-secure environment imposes a number of
important restrictions on the ITO configuration. Table 10-7 on page 436
lists those areas and provides a brief explanation of the cause of the
restriction. It is the administrator's decision as to where security
priorities lie.
Restrictions in a C2-secure Environment
Although C2 recommends the use of ACLs, the OpenView
file tree does not support them. In addition, opc_backup
and opc_restore are not aware of ACLs.
If root-login over the network is not allowed, the ITO
agent has to be installed manually. For more information
about installing the agent manually, see the HP OpenView
IT/Operations Installation Guide for the Management
Server
Password aging and changing can lead to problems with
remote application startup.
436
Explanation
Chapter 10

Advertisement

Table of Contents
loading

This manual is also suitable for:

Openview it

Table of Contents