Unit objectives IBM Power Systems
|
|
|
- Maximillian Oliver
- 10 years ago
- Views:
Transcription
1 User-level security Course materials may not be reproduced in whole or in part without the prior written permission of IBM. 9.0
2 Unit objectives After completing this unit, you should be able to: Describe the concepts of Pluggable Authentication Modules (PAMs) Define ways of controlling root access to the system Define the use of SUID, SGID, and sticky bit permissions bits Configure access control lists Identify the data files associated with users
3 User-level security overview Authentication: Verifying that you are who you say you are Can be based on: Something you only know (for example: password, PIN) Something you only have (for example: smartcard, token, key) Something you only are (for example: fingerprints, retina scan) Authorization: Determining your level of access File permissions, ACLs Account restrictions (login times, login tty, and so forth)
4 Pluggable Authentication Modules Authentication system of Linux Implemented as a suite of shared libraries Enables the system administrator to choose how applications authenticate users Provides flexibility to applications that need authentication Initially developed by Sun Microsystems Adapted for Linux
5 Authentication before PAM Login ftp httpd Other program Very secure program /etc/passwd httpd authentication Other authentication Retina scan Voice recognition
6 Authentication with PAM Login ftp httpd Other program Very secure program PAM config files in /etc/pam.d PAM /etc/passwd httpd authentication Other authentication Retina scan Voice recognition
7 PAM configuration file example # cat /etc/pam.d/login #%PAM-1.0 auth required /lib/security/pam_securetty.so auth required /lib/security/pam_unix.so likeauth auth required /lib/security/pam_nologin.so auth required /lib/security/pam_env.so account required /lib/security/pam_unix.so password required /lib/security/pam_cracklib.so retry=3 password required /lib/security/pam_unix.so nullok session required /lib/security/pam_limits.so session required /lib/security/pam_unix.so session optional /lib/security/pam_console.so Note: PAM configuration is different from distribution to distribution. Please see the notes area below.
8 Common Pluggable Authentication Modules Some commonly used PAMs are: pam_unix.so: Regular UNIX authentication (passwords) pam_env.so: Set environment variables pam_cracklib.so: Check passwords for strength pam_pwdb.so: Enforce password aging rules pam_pwcheck.so: Check passwords (SLES only) pam_nologin.so: Deny login if /etc/nologin exists pam_listfile.so: Allow/deny login if user listed in file pam_securetty.so: Allow login for root only from secure ttys pam_time.so: Allow/deny login based on time of day pam_stack.so: Include another PAM config file (RHEL/FC only) pam_limits.so: Set limits on CPU and memory usage pam_console.so: Set permissions for console users pam_deny.so: Always gives an error pam_selinux.so: Sets up the default security context for the next exceed shell Several PAMs have additional configuration files in /etc/security.
9 Advanced authentication options Network Information Service (NIS/NIS+) Provides a means to distribute password files, group files, and configuration information across a set of managed machines Server-Client model Must be securely deployed Secure Remote Password (SRP) Provides secure remote authorization of passwords using one way hashing of login Kerberos Modern network authentication protocol Provides strong authentication security using secret-key cryptography Server-Client model Lightweight Directory Access Protocol (LDAP) Powerful protocol that can be used to access information from an objectorientated database Allows centralization of user information (including passwords, home dirs, and so on), encryption of data, all in single place on the network
10 Principles of authorization Authorization in Linux is based on file permissions. Exception: Root is allowed to do everything Once logged in, users cannot change their identity except through a SUID program, which allows them to run a command as someone else (most often root). Examples of SUID programs: passwd: Allows users to update the /etc/shadow file mount: Allows users to mount a floppy or CD su: Runs a shell as another user, after supplying the password sudo: Runs a particular command as another user Various games (to track high scores) All SUID programs should be known to the administrator and checked/updated for security problems.
11 File permissions Permission File Directory r User can see contents of User can list the contents of s directory file w User can change contents of file User can change the contents of the directory x SUID SGID User can execute file as a command Program runs with effective user ID of owner Program runs with effective group ID of owner User can cd to directory and can use it in PATH No effect Files created in directory inherit the same group ID as the directory Sticky bit No effect Only the owner of the file and the owner of the directory can delete files in this directory
12 Changing permissions Setting file permissions is done with the chmod command. # chmod 1755 (or o+t) commondir # ls -ld commondir drwxr-xr-t 2 root proj May 19 09:00 commondir/ # chmod 2755 (or g+s) myprog # ls -l myprog -rwxr-sr-x 1 root root May 19 09:02 myprog # chmod 4755 (or u+s) passwd # ls -l /etc/passwd -rwsr-xr-x 1 root root 2721 Mar 15 10:58 /etc/passwd Changing file owner and group: # chown john finance # chgrp staff finance # chown john.staff finance
13 Access control lists (1 of 2) Access control lists (ACLs) provide additional user access controls. More flexibility and fine-grained control to files Enabled at the file system level; in /etc/fstab ACL for a file displayed using getfacl command: # getfacl myfile.txt # file: myfile.txt # owner: tux1 # group: tux1 user::rw- group::r-- other::r--
14 Access control lists (2 of 2) ACLs for a file are set using the setfacl command. The ls -l command indicates ACLs marked by a +. # setfacl -m u:tux2:rw- myfile.txt # file: myfile.txt # owner: tux1 # group: tux1 user::rwuser:tux2:rwgroup::r-- mask::rw- other::r-- # ls -l myfile.txt -rw-rw-r--+ 1 tux1 tux1 1 Jan 1 16:59 myfile.txt The mask entry indicates the effective rights mask. The mask will take precedence if it is more restrictive than the ACL permissions.
15 umask Sets the default permissions on new files System-wide umask for all users in /etc/profile Individual umask in $HOME/.bash_profile or $HOME/.profile Default value of umask is: For root 022 For user 002 (if user private groups are used) or 022 (otherwise)
16 Example: Creating a team directory Create a group: # groupadd penguins Add users to the group: # usermod -G penguins tux1 or: # gpasswd -a tux1 penguins Create a directory and set group permissions: # mkdir /groups/penguins # chgrp penguins /groups/penguins # chmod 2770 /groups/penguins
17 Root access Dangerous Root's password should be changed on an unannounced schedule by the system administrator. Assign different root passwords to different machines. Always log in as yourself, not as root. Remote login as root by default is disabled. Some Linux distributions (such as Ubuntu) disable local login as root altogether, opting to force users down a more secure path of using sudo for admin commands.
18 su command Switch to another user ID: $ whoami tux1 $ su Password: # whoami root Using su - <user> changes to the environment of that user. Execute a command as another user: $ su - root -c /sbin/poweroff Password: $ Broadcast message from root (tty1): The system is going down for system halt NOW!
19 sudo command Allows users to execute specific commands as another user without requiring that user s password. Do not use sudo for interactive commands! /etc/sudoers file lists which users are allowed to execute which commands on which host as which user. Edit this file with visudo only. Macros can be defined to reduce complexity. Syntax: user host = [(newuser)] command # cat /etc/sudoers User_Alias OPERATORS = tux1, tux2, tux3 Host_Alias WEBSERVERS = www, www-1, www-2 Cmnd_Alias PRINTCMDS = /usr/bin/printtool, /usr/bin/klpq tux1 WEBSERVERS = (root) /sbin/service httpd restart OPERATORS printsvr = (root) PRINTCMDS
20 Security logs /var/log/lastlog /var/log/messages /var/log/secure /var/log/wtmp /var/run/utmp - Last successful login - General log file - Failed logins - Successful logins - Currently logged in users
21 Useful commands Who is logged in and doing what? Who is logged in and examine the contents of /var/log/wtmp and /var/log/utmp? # w 09:43:46 up 17 days, 20:50, 6 users, load average: 0.00, 0.02, 0.00 USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT root pts/3 sig :40 2: s 0.01s ssh root pts/4 sig :40 2: s 0.01s ssh root pts/5 sig : s 0.02s 0.01s ssh root pts/6 sig : s 0.01s 0.00s w # who root pts/3 May 19 09:40 (sig mts.ibm.com) root pts/2 May 8 07:43 (:1.0) root pts/1 May 8 10:22 (:1.0) root pts/4 May 19 09:40 (sig mts.ibm.com) root pts/5 May 19 09:41 (sig mts.ibm.com) root pts/6 May 19 09:43 (sig mts.ibm.com)
22 Additional commands (1 of 2) Show information about a user: # id uid=0(root) gid=0(root) groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel) context=root:system_r:unconfined_t Show the last time a user logged in or the last time a tty was used to log in: # last root pts/6 sig Fri May 19 09:43 still logged in... reboot system boot ELsmp Mon May 1 12:53 (17+20:53) root pts/1 sig m Mon May 1 11:40 - down (00:03) wtmp begins Mon May 1 11:40:
23 Additional commands (2 of 2) Show the last login time of all users: # lastlog Username Port From Latest root pts/6 sig Fri May 19 09:43: bin **Never logged in**... guest pts/7 sig m Mon Apr 24 10:52:
24 Checkpoint 1. What is the difference between authentication and authorization? 2. True or false: The user root can log in anywhere, anytime. 3. True or false: PAM is the subsystem responsible for user authentication.
25 Checkpoint solutions 1. What is the difference between authentication and authorization? The answer is authentication is how you identify yourself to the system, and authorization specifies what you can do once logged in. 2. True or false: The user root can log in anywhere, anytime. The answer is false. 3. True or false: PAM is the subsystem responsible for user authentication. The answer is true.
26 Exercise: User-level security What you will do in this exercise: Perform various activities related to user-level security
27 Unit summary Having completed this unit, you should be able to: Describe the concepts of Pluggable Authentication Modules (PAMs) Define ways of controlling root access to the system Define the use of SUID, SGID, and sticky bit permissions bits Configure access control lists Identify the data files associated with users
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as packet
GL-550: Red Hat Linux Security Administration. Course Outline. Course Length: 5 days
GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range
Using Network Attached Storage with Linux. by Andy Pepperdine
Using Network Attached Storage with Linux by Andy Pepperdine I acquired a WD My Cloud device to act as a demonstration, and decide whether to use it myself later. This paper is my experience of how to
GL550 - Enterprise Linux Security Administration
GL550 - Enterprise Linux Security Administration This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control
TEL2821/IS2150: INTRODUCTION TO SECURITY Lab: Operating Systems and Access Control Version 3.4, Last Edited 9/10/2011 Students Name: Date of Experiment: Read the following guidelines before working in
ENTERPRISE LINUX SECURITY ADMINISTRATION
ENTERPRISE LINUX SECURITY ADMINISTRATION COURSE DESCRIPTION: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
User Authentication HOWTO
User Authentication HOWTO Peter Hernberg Floris Lambrechts Language changes, various small fixes (v0.8). 2000 05 02 Revision History Revision 0.8 2003 02 20 Revised by: fl language changes, various small
Local File Sharing in Linux
Local File Sharing in Linux Would you like to share files among multiple users on the same Linux system? Surprisingly, this is trickier to accomplish than it appears, so here is a method that works. The
Attunity RepliWeb PAM Configuration Guide
Attunity RepliWeb PAM Configuration Guide Software Version 5.2 For Linux and UNIX operating systems June 28, 2012 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954)
Installing Squid with Active Directory Authentication
Installing Squid with Active Directory Authentication 18May06 Proxy servers are fairly essential devices that should be part of a network s perimeter defense strategy. They are devices that allow clients
Univention Corporate Server. Extended domain services documentation
Univention Corporate Server Extended domain services documentation 2 Table of Contents 1. Integration of Ubuntu clients into a UCS domain... 4 1.1. Integration into the LDAP directory and the SSL certificate
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT. Ubuntu Security. www.uscyberpatriot.org
AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM UNIT EIGHT Ubuntu Security www.uscyberpatriot.org AIR FORCE ASSOCIATION S CYBERPATRIOT NATIONAL YOUTH CYBER EDUCATION PROGRAM
Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting
Course ID RHL200 Red Hat Linux Administration II Installation, Configuration, Software and Troubleshooting Course Description Students will experience added understanding of configuration issues of disks,
Enabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
Distributed File System
Petru Maior University, Târgu-Mureș Science Department Information Technolgy Master Course Distributed File System Students: Bardosi Florin Cifor Crina Danciu Ioana Hintea Dan Alexandru Table of Contents
Linux Security. Paul Cobbaut
Linux Security Paul Cobbaut Linux Security Paul Cobbaut Paul Cobbaut Publication date 2015-05-24 CEST Abstract This book is meant to be used in an instructor-led training. For self-study, the intent is
Filesystem Security. General Principles
Filesystem Security 1 General Principles Files and folders are managed by the operating system Applications, including shells, access files through an API Access control entry (ACE) Allow/deny a certain
Lecture 10 - Authentication
Lecture 10 - Authentication CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Kerberos: What to know 1) Alice T rent : {Alice + Bob
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
RStudio Server Administrator s Guide
TM RStudio Server Administrator s Guide RStudio Server Professional v0.98.501 Copyright c 2013 RStudio, Inc. Contents 1 Getting Started 4 1.1 Introduction......................................... 4 1.2
Linux Security Ideas and Tips
Linux Security Ideas and Tips Hugh Brown Sr. Systems Administrator ITS Enterprise Infrastructure University of Iowa October 8, 2014 Hugh Brown (University of Iowa) Linux Security Ideas and Tips October
NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment
NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version 1.00 10/01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. E-mail: [email protected] UNIX/LINUX
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01
Allion Ingrasys Europe NAStorage Security policy under a UNIX/LINUX environment Version 2.01 Security policy under a UNIX/LINUX environment Start Enabling a Unix/Linux Network (NFS Protocol) Adding a UNIX
AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE. RADIUS installation and configuration
AGLARBRI PROJECT AFRICAN GREAT LAKES RURAL BROADBAND RESEARCH INFRASTRUCTURE RADIUS installation and configuration Project Manager: Miguel Sosa ([email protected]) Member Email Position and number of credits
HP Education Services
HP Education Services HP-UX Security (H3541S) Concerned about system security? HP s updated and enhanced HP-UX Security course can help you secure your systems and mitigate risks. Designed for experienced
System Security Fundamentals
System Security Fundamentals Alessandro Barenghi Dipartimento di Elettronica, Informazione e Bioingegneria Politecnico di Milano alessandro.barenghi - at - polimi.it April 28, 2015 Lesson contents Overview
Installing Sun's VirtualBox on Windows XP and setting up an Ubuntu VM
Installing Sun's VirtualBox on Windows XP and setting up an Ubuntu VM laptop will need to have 10GB of free space to install download the latest VirtualBox software from www.sun.com make sure you pick
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2)
How to Tunnel Remote Desktop using SSH (Cygwin) for Windows XP (SP2) The ssh server is an emulation of the UNIX environment and OpenSSH for Windows, by Redhat, called cygwin This manual covers: Installation
Best Practices Guide for NerveCenter System and Security Administrators. Windows and UNIX Version 5.x Version 6.x. July 2011 NCBPSA5200-05
Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x Version 6.x July NCBPSA5200-05 Copyright Portions Copyright 1989- LogMatrix, Inc. / OpenService, Inc.
SAS 9.4 In-Database Products
SAS 9.4 In-Database Products Administrator s Guide Fifth Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. SAS 9.4 In-Database Products:
Nixu SNS Security White Paper May 2007 Version 1.2
1 Nixu SNS Security White Paper May 2007 Version 1.2 Nixu Software Limited Nixu Group 2 Contents 1 Security Design Principles... 3 1.1 Defense in Depth... 4 1.2 Principle of Least Privilege... 4 1.3 Principle
FileCruiser Backup & Restoring Guide
FileCruiser Backup & Restoring Guide Version: 0.3 FileCruiser Model: VA2600/VR2600 with SR1 Date: JAN 27, 2015 1 Index Index... 2 Introduction... 3 Backup Requirements... 6 Backup Set up... 7 Backup the
Oracle Virtual Desktop Infrastructure. VDI Demo (Microsoft Remote Desktop Services) for Version 3.2
Oracle Virtual Desktop Infrastructure VDI Demo (Microsoft Remote Desktop Services) for Version 2 April 2011 Copyright 2011, Oracle and/or its affiliates. All rights reserved. This software and related
See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux
Linux Installation See the installation page http://wiki.wocommunity.org/display/documentation/deploying+on+linux Added goodies (project Wonder) Install couple of more goodies from Wonder. I Installed
CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.
CCM 4350 Week 11 Security Architecture and Engineering Guest Lecturer: Mr Louis Slabbert School of Science and Technology CCM4350_CNSec 1 Web Server Security The Web is the most visible part of the net
IT6204 Systems & Network Administration. (Optional)
Systems & Network Administration (Optional) INTRODUCTION This is one of the Optional courses designed for Semester 6 of the Bachelor of Information Technology Degree program. This course on Systems & Network
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
Command Line Install and Config For IBM BPM 8.5
PERFICIENT Command Line Install and Config For IBM BPM 8.5 Command line Install and Configure of BPM v8.5 Technical Architect: Chuck Misuraca Change History Table 1: Document Change History Document Revision
INASP: Effective Network Management Workshops
INASP: Effective Network Management Workshops Linux Familiarization and Commands (Exercises) Based on the materials developed by NSRC for AfNOG 2013, and reused with thanks. Adapted for the INASP Network
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
RStudio Server Administrator s Guide
TM RStudio Server Administrator s Guide RStudio Server Professional v0.98.983 Copyright c 2013 RStudio, Inc. Contents 1 Getting Started 5 1.1 Introduction......................................... 5 1.2
RStudio Server Administrator s Guide
RStudio Server Administrator s Guide RStudio Server Professional v0.99.482 Copyright 2013 RStudio, Inc. Contents 1 Getting Started 5 1.1 Introduction......................................... 5 1.2 Installation.........................................
RH033 Red Hat Linux Essentials or equivalent experience with Red Hat Linux..
RH131 Red Hat Linux System Administration Course Summary For users of Linux (or UNIX) who want to start building skills in systems administration on Red Hat Linux, to a level where they can attach and
Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015)
Deploying a Virtual Machine (Instance) using a Template via CloudStack UI in v4.5.x (procedure valid until Oct 2015) Access CloudStack web interface via: Internal access links: http://cloudstack.doc.ic.ac.uk
Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite
WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure
How To Harden An Hp Server For A Long Time
Linux Security on HP Servers: General Security Topics Technical introduction This white paper discusses general security technologies available in Red Hat Enterprise Linux (RHEL) and SUSE Linux Enterprise
How to upload large files to a JTAC Case
How to upload large files to a JTAC Case Summary: JTAC often requires data to be collected (such as configuration files, tracedump data, log files, etc) and sent in for review. If the files are larger
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0))
SELinux Policy Editor RBAC(Role Based Access Control) guide (for Ver 2.0)) Yuichi Nakamura July 3, 2006 Contents 1 What is RBAC 2 1.1 Overview............................... 2 1.2 How RBAC works in SELinux....................
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Remote Unix Lab Environment (RULE)
Remote Unix Lab Environment (RULE) Kris Mitchell [email protected] Introducing RULE RULE provides an alternative way to teach Unix! Increase student exposure to Unix! Do it cost effectively http://caia.swin.edu.au
Linux Authentication using LDAP and edirectory
Linux Authentication using LDAP and edirectory Adrián Malaguti www.novell.com Contents Table of Contents Contents...2 Objetive...3 Authentication scheme...3 Recommendations...3 Server configuration...4
Secure File Transfer Installation. Sender Recipient Attached FIles Pages Date. Development Internal/External None 11 6/23/08
Technical Note Secure File Transfer Installation Sender Recipient Attached FIles Pages Date Development Internal/External None 11 6/23/08 Overview This document explains how to install OpenSSH for Secure
Extending Remote Desktop for Large Installations. Distributed Package Installs
Extending Remote Desktop for Large Installations This article describes four ways Remote Desktop can be extended for large installations. The four ways are: Distributed Package Installs, List Sharing,
Security Configuration Guide P/N 300-010-493 Rev A05
EMC VPLEX Security Configuration Guide P/N 300-010-493 Rev A05 June 7, 2011 This guide provides an overview of VPLEX security configuration settings, including secure deployment and usage settings needed
CUIT UNIX Standard Operating Environment and Security Best Practices
Objective and Scope Effective Date: August 2008 This CUIT UNIX Standard Operating Environment (SOE) document defines the agreed system hardening requirements as well as security best practices for CUIT
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
Using Dedicated Servers from the game
Quick and short instructions for running and using Project CARS dedicated servers on PC. Last updated 27.2.2015. Using Dedicated Servers from the game Creating multiplayer session hosted on a DS Joining
Chapter 7: Unix Security. Chapter 7: 1
Chapter 7: Unix Security Chapter 7: 1 Objectives Understand the security features provided by a typical operating system. Introduce the basic Unix security model. See how general security principles are
Identity Management based on FreeIPA
Identity Management based on FreeIPA SLAC 2014 Thorsten Scherf Red Hat EMEA What is an Identity Management System (IdM) An IdM system is a set of services and rules to manage the users of an organization
Fermilab Central Web Service Site Owner User Manual. DocDB: CS-doc-5372
Fermilab Central Web Service Site Owner User Manual DocDB: CS-doc-5372 1 Table of Contents DocDB: CS-doc-5372... 1 1. Role Definitions... 3 2. Site Owner Responsibilities... 3 3. Tier1 websites and Tier2
Configuring SSH and Telnet
This chapter describes how to configure Secure Shell Protocol (SSH) and Telnet on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information About
SSH and FTP on Ubuntu 9.04. WNYLUG Neal Chapman 09/09/2009
SSH and FTP on Ubuntu 9.04 WNYLUG Neal Chapman 09/09/2009 SSH (Secure Shell) Secure Shell or SSH is a network protocol that allows data to be exchanged using a secure channel between two networked devices.
2. Boot using the Debian Net Install cd and when prompted to continue type "linux26", this will load the 2.6 kernel
These are the steps to build a hylafax server. 1. Build up your server hardware, preferably with RAID 5 (3 drives) plus 1 hotspare. Use a 3ware raid card, 8000 series is a good choice. Use an external
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Wolfr am Lightweight Grid M TM anager USER GUIDE
Wolfram Lightweight Grid TM Manager USER GUIDE For use with Wolfram Mathematica 7.0 and later. For the latest updates and corrections to this manual: visit reference.wolfram.com For information on additional
TFS UnixControl White Paper
White Paper Consolidate and simplify UNIX system management with TFS UnixControl TFS Technology www.tfstech.com Table of Contents Overview 3 Introduction 3 TFS UnixControl Functionality 3 System Architecture
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Automating Cloud Security with Centrify Express and RightScale
QUICK START GUIDE. MAY 2011 Automating Cloud Security with Centrify Express and RightScale How to secure cloud systems by joining them to your Active Directory infrastructure Abstract This Quick Start
Authentication in a Heterogeneous Environment
Authentication in a Heterogeneous Environment Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory Mike Patnode VP of Technology Centrify Corporation [email protected]
Contents III: Contents II: Contents: Rule Set Based Access Control (RSBAC) 4.2 Model Specifics 5.2 AUTH
Rule Set Based Access Control (RSBAC) Linux Kernel Security Extension Tutorial Amon Ott Contents: 1 Motivation: Why We Need Better Security in the Linux Kernel 2 Overview of RSBAC 3 How
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization Michael Heldebrant Solutions Architect, Red Hat Outline Authentication overview Basic LDAP
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
CipherMail Gateway Installation Guide
CIPHERMAIL EMAIL ENCRYPTION CipherMail Gateway Installation Guide March 26, 2015, Rev: 9094 Copyright c 2008-2015, ciphermail.com. Acknowledgments: Thanks goes out to Andreas Hödle for feedback and input
GWAVA 5. Migration Guide for Netware GWAVA 4 to Linux GWAVA 5
GWAVA 5 Migration Guide for Netware GWAVA 4 to Linux GWAVA 5 Copyright 2010 GWAVA, Inc. All rights reserved. Content may not be reproduced without permission. http://www.gwava.com Overview While GWAVA
15 AFS File Sharing. Client/Server Computing. Distributed File Systems
15 AFS File Sharing Adapted from the Open AFS Guide, http://openafs.org/doc/ AFS makes it easy for people to work together on the same files, no matter where the files are located. AFS users do not have
Configuring MailArchiva with Insight Server
Copyright 2009 Bynari Inc., All rights reserved. No part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any
SCS3205/4805 Quick Start Guide
Secure Console Server Quick Start Guide 2003 Copyright Lantronix is a trademark of Lantronix. All rights reserved. 900-287 Rev. B 8/03 QUICK START CONTENTS System Overview.......................................................2
Backing Up and Restoring Data
Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application
Introduction to Computer Security
Introduction to Computer Security Authentication and Access Control Pavel Laskov Wilhelm Schickard Institute for Computer Science Resource access: a big picture 1. Identification Which object O requests
CRYPTOCard Authentication. Using PAM for Linux and Solaris. Quick Start Guide. Copyright 2002-2003 CRYPTOCard Corporation All Rights Reserved 030428
CRYPTOCard Authentication Using PAM for Linux and Solaris Quick Start Guide Copyright 2002-2003 CRYPTOCard Corporation All Rights Reserved 030428 http://www.cryptocard.com Table of Contents CHANGE HISTORY...
2 Advanced Session... Properties 3 Session profile... wizard. 5 Application... preferences. 3 ASCII / Binary... Transfer
Contents I Table of Contents Foreword 0 Part I SecEx Overview 3 1 What is SecEx...? 3 2 Quick start... 4 Part II Configuring SecEx 5 1 Session Profiles... 5 2 Advanced Session... Properties 6 3 Session
Windows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol
Samba Samba Interoperating with Windows Nick Urbanik Copyright Conditions: GNU FDL (seehttp://www.gnu.org/licenses/fdl.html) A computing department Implements Microsoft s SMB protocol
SSH to Ubuntu Server Authenticating Users Using SecurAccess Server by SecurEnvoy
SSH to Ubuntu Server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading RG7 4AB Ryan Sheridan
Privileged Account Access Management: Why Sudo Is No Longer Enough
Access Control Excellence Privileged Account Access Management: Why Sudo Is No Longer Enough The new privileged access management solutions available on the market today provide highly efficient and effective
Novell Identity Manager Resource Kit
AUTHORIZED DOCUMENTATION Installation Guide for SUSE Linux Enterprise Server 10 SP2 Novell Identity Manager Resource Kit 1.2 August 17, 2009 www.novell.com Identity Manager Resource Kit 1.2 Installation
Creating Home Directories for Windows and Macintosh Computers
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
Unix Sampler. PEOPLE whoami id who
Unix Sampler PEOPLE whoami id who finger username hostname grep pattern /etc/passwd Learn about yourself. See who is logged on Find out about the person who has an account called username on this host
INF-110. GPFS Installation
INF-110 GPFS Installation Overview Plan the installation Before installing any software, it is important to plan the GPFS installation by choosing the hardware, deciding which kind of disk connectivity
Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1
Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called
Author A.Kishore/Sachin http://appsdba.info. VNC Background
VNC Background VNC means Virtual Network Computing, is an open-source, crossplatform protocol for viewing GUI desktops on remote machines within a LAN or over a WAN/Internet connection. This document discusses
Unifying Authorization Models
Unifying Authorization Models Merging /etc/group and 'Domain Users' Gerald Carter Centeris [email protected] http://www.samba.org/ Slide 1 Copyright G. Carter, 2006 Outline http://samba.org/~jerry/slides/lwny07_2up.pdf
