beautypg.com

Compaq AA-RH8RD-TE User Manual

Page 29

background image

Part 1 is aimed at general users. It introduces the enhanced security
features and helps users to start using them. Other topics include the
following:

How to connect to other systems

Using the security features of the Common Desktop Environment
(CDE)

Using access control lists (ACLs) on files and directories

Part 2 describes how to set up and administer the operating system’s
enhanced security, which includes enhanced passwords and the audit
subsystem. Topics in this part include the following:

Creating and modifying secure devices

Creating and maintaining accounts

Administering the audit subsystem

Administering ACLs

Ensuring authentication database integrity

Working within the framework of the Security Integration
Architecture (SIA) layer

Troubleshooting a trusted system

Part 3 describes how to write programs that run on the Tru64 UNIX
operating system with enhanced security. The reader should have
general programming knowledge, including knowing how to use the
Tru64 UNIX programming tools. Topics in this part include the following:

Using the security information stored in the authentication database

Using the per-process audit ID (AUID), which is unique to Tru64
UNIX

The mechanics of writing and reading audit records

Using the Security Integration Architecture (SIA) interfaces

Programming with ACLs

2.1.10 Technical Overview for Version 5.1A (revised)

The Technical Overview for Version 5.1A describes the major components
of the Tru64 UNIX operating system. The opening chapter provides
an introduction to the operating system, including discussions of recent
enhancements, licensing, and available optional software. This is followed
by more in-depth discussions on various aspects of the operating system.
A partial list of the topics follows:

Features available to system administrators

General User Documentation 2–5