System Administration Guide: Security Services

Securing Machines (Task Map)

A computer is as secure as its weakest point of entry. The following task map shows the areas that you should monitor and secure.

Task 

Description 

For Instructions 

Display a user's login status 

Use the logins command to view a user's login status information.

How to Display a User's Login Status

Find users who do not have passwords 

Use the logins command to find only those users whose accounts do not require a password.

How to Display Users Without Passwords

Disable logins temporarily 

Deny user logins to a machine as part of system shutdown or routine maintenance.  

How to Temporarily Disable User Logins

Provide strong password encryption 

Specify algorithms for password encryption.  

How to Specify an Algorithm for Password Encryption

Provide strong password encryption with a name service 

Specify algorithms for password encryption when you are using a name service. 

How to Specify a New Password Algorithm for an NIS+ Domain

How to Specify a New Password Algorithm for an NIS Domain

How to Specify a New Password Algorithm for an LDAP Domain

Add new password encryption module 

Add third-party algorithms. 

How to Install a Password Encryption Module From a Third Party

Save failed login attempts 

Create a log of users who failed to provide the correct password after five attempts. 

How to Save Failed Login Attempts

Create a dial-up password 

Require an additional password for users who log in remotely through a modem or dial-up port. 

How to Create a Dial-up Password

Disable dial-up entry temporarily 

Prevent users from dialing in remotely through a modem or port. 

How to Temporarily Disable Dial-up Logins

Monitor who is using the su command

Read the sulog file on a regular basis.

How to Monitor Who Is Using the su Command

Display superuser activity on the console 

Monitor superuser access attempts. 

How to Display Superuser (root) Access Attempts to the Console

Prevent remote access to the console as superuser 

Require remote users to log in with their username and then become root. 

How to Prevent Remote Login by Superuser (root)

Prevent users from changing machine parameters 

Prevent users from changing PROM settings. 

How to Require a Password for Hardware Access

Disable the abort sequence 

Prevent users from accessing the PROM. 

How to Disable or Enable a System's Abort Sequence