Mitsubishi Electric - Computing for a Connected World Insight CD Home Page

Products
Services
Knowledgebase
Bulletins (IPBs)
Guides
FAQs
Owner's Handbooks
Product Datasheets
Miscellaneous Items
Upgrades
Downloads
Search Insight
E-Mail us
Insight Service
Year 2000
Other Mitsubishi Sites
Site Disclaimer

 
Xenix - Unix I.P.B. 3048 10th November 1989 (RM)
Department Category Implementation
Unix Software Mandatory
Previous IPB Next IPB

SCO UNIX and Security

SCO Unix 386 incorporates "C2 trusted security". The presence of C2 security imposes certain restrictions on system setup and support as follows:-

  1. First and foremost, never ever attempt to edit the files '/etc/passwd' or '/etc/group'. If such action is attempted, no users will be able to subsequently access the system - the only solution where this advice has been ignored is to re-install the complete system!
  2. When setting up new users you must use the SYSADMSH(ADM) facility. This is a menu driven system administration utility and is invoked by keying - 'sysadmsh'.
  3. Never close the system down with '/etc/haltsys'. There are two techniques for shutting down the system - 'shutdown' (SHUTDOWN(ADM)) or 'init 0' (INIT(M)). Either procedure should only be run from the system console when all other users have logged out. 'shutdown' is the preferred command.

----------oOo----------

 

Computing for a Connected World