Etrust 8 1 not updating

69Defining Password Policies .................................................................... 70 Setting Up Password Quality Checking...................................................... 71Implementing Password Policy Rules ........................................................... 72Password Expiration and Grace Logins ......................................................... 72 Specifying the Password Interval........................................................... 73 Specifying Grace Logins ................................................................... 74Chapter 6: Protecting Files and Programs 77Restricting Access to Files and Directories ......................................................

77 How File Protection Works ................................................................. 80 Protecting Files ........................................................................... 81 Restricting File Access..................................................................... 82Blocking Trojan Horses with the _abspath Group................................................

IN NO EVENT WILL CA BE LIABLE TO THE END USER OR ANY THIRD PARTY FOR ANYLOSS OR DAMAGE, DIRECT OR INDIRECT, FROM THE USE OF THIS DOCUMENTATION, INCLUDING WITHOUTLIMITATION, LOST PROFITS, BUSINESS INTERRUPTION, GOODWILL, OR LOST DATA, EVEN IF CA IS EXPRESSLYADVISED OF SUCH LOSS OR DAMAGE. ........................................................................ 45 Users .................................................................................... 45 Groups ................................................................................... 46 Determining Access: A Summary .......................................................... 48Modifying User Records ....................................................................... 48 Examples: Create or Modify Users .........................................................The use of any product referenced in the Documentation is governed by the end user’s applicable licenseagreement. Provided with “Restricted Rights.” Use, duplication or disclosure by the United States Government is subject to therestrictions set forth in FAR Sections 12.212, 52.227-14, and 52.227-19(c)(1) - (2) and DFARS Section 252.227-7014(b)(3), as applicable, or their successors. CA Product References This document references the following CA products: „ e Trust® Access Control (e Trust AC) „ e Trust® Single Sign-On (e Trust SSO) „ e Trust® Web Access Control (e Trust Web AC) „ e Trust® CA-Top Secret® „ e Trust® CA-ACF2® „ e Trust® Audit „ Unicenter® TNG „ Unicenter® Network and Systems Management (Unicenter NSM) „ Unicenter® Software Delivery Contact Technical Support For online technical assistance and a complete list of locations, primary service hours, and telephone numbers, contact Technical Support at ..................................................................... 49 Special Predefined Users .................................................................. 49Modifying Group Records ...................................................................... 50 Nested Groups............................................................................ 50 Contents v Special Predefined Groups .................................................................Should the license terminate forany reason, it shall be the user’s responsibility to certify in writing to CA that all copies and partial copies of the Documentation have been returned to CA or destroyed. ...................................................................... 21 Access Control Lists ....................................................................... 21 Default Access Field ....................................................................... 21 Default Record for Class ................................................................... 22 UACC Class ............................................................................... 22 Conditional Access Control Lists............................................................ 23 Negative Access Control Lists (NACLs) .....................................................EXCEPT AS OTHERWISE STATED IN THE APPLICABLE LICENSE AGREEMENT, TO THE EXTENT PERMITTED BYAPPLICABLE LAW, CA PROVIDES THIS DOCUMENTATION “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDINGWITHOUT LIMITATION, ANY IMPLIED WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSEOR NONINFRINGEMENT. ...................................................................... 24 Accumulative Group Rights ................................................................ 24 Security Levels ........................................................................... 25 Security Categories ....................................................................... 25 Security Labels ........................................................................... 25 Generic Access Rules...................................................................... 26Graphical Access Summary.................................................................... 27Chapter 3: Users, Groups, and Resources 45Introduction to Users and Groups ..............................................................All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Contents Chapter 1: Introduction 13About this Guide.............................................................................. .......................................................... 50 Examples: Create or Modify Group Records ................................................. .......................................................................... 52 A Special Resource: Abstract Object .......................................................

13Who Should Use this Guide.................................................................... 13Command Notation Conventions ............................................................... 13Chapter 2: Basic Concepts 15e Trust AC .................................................................................... ...................................................................... 52 Records and ACLs......................................................................... 53Examples: Setting ACLs ....................................................................... 53Classes ...................................................................................... 54 Predefined Classes ........................................................................ 54 User-Defined Classes...................................................................... 57Chapter 4: Protecting Accounts 59Why Protect Accounts?

96 Generic Login Program Interception ........................................................ 97Defining User Authority to Use Terminals....................................................... 97 Restricting Terminals for Root Users .......................................................

99 Recommended Restrictions ............................................................... 100Password Checking and Login Restrictions ..................................................... 101 Logon Checks............................................................................ 102Defining Time and Day Login Rules ...........................................................

Verifying : cronie-anacron-1.4.4-12.el6.x86_64 2/2 Failed: cronie-anacron.x86_64 0:1.4.4-12.el6 cronie-anacron.x86_64 0:1.4.4-15.el6 Complete! Executing [daemons] command: /opt/CA/Access Control/bin/serevu Starting serevu.

Running Transaction Updating : cronie-anacron-1.4.4-15.el6.x86_64 1/2 Cleanup : cronie-anacron-1.4.4-12.el6.x86_64 2/2 Verifying : cronie-anacron-1.4.4-15.el6.x86_64 1/2 Verifying : cronie-anacron-1.4.4-12.el6.x86_64 2/2 Updated: cronie-anacron.x86_64 0:1.4.4-15.el6 Complete!

85Synchronization with Native UNIX Security ..................................................... 86 Example: Synchronization ................................................................. 87 HP-UX Limitations......................................................................... 88 Sun Solaris Limitations .................................................................... 88vi Administrator Guide Monitoring Sensitive Files .....................................................................