6 Standard Mode Security Extensions
This chapter describes the Standard Mode Security Extensions features of
•“Overview”
•“Security Attributes and the User Database”
•“Auditing”
Overview
NOTE: HP does not recommend that you use
To determine whether a system has been converted to trusted mode, check for the following file:
/tcb/files/auth/system/default
If this file exists, the system is running in trusted mode. To convert the system back to standard mode, use the sam(1M) command.
Refer to security(4) for more information on configurations supported with each of the
The following new feature is included in
User Database Previously, all
The following trusted mode features are available in standard mode with
•Audit all users and events on a system
•Display the last successful and unsuccessful user logins
•Lock a user account if there are too many authentication failures
•Display password history
•Expire inactive accounts
•Prevent users from logging in with a null password
•Restrict user logins to specific time periods
The following new features are included in
•When used in conjunction with
•The userstat command displays the account status of local users. It checks the status of local user accounts and reports abnormal conditions, such as account locks. See userstat(1M) for more information.
Overview 71