01.10.2015 Views

HP Operations Manager for UNIX Administrator’s Reference

HP Operations Manager for UNIX Administrator's Reference

HP Operations Manager for UNIX Administrator's Reference

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

About <strong>HP</strong>OM Security<br />

About System Security<br />

About System Security<br />

This section describes how <strong>HP</strong>OM behaves in trusted system<br />

environments.<br />

NOTE<br />

Be<strong>for</strong>e installing and running <strong>HP</strong>OM on any system, you must ensure<br />

that the system-level security measures comply with your organization’s<br />

system security policies. To learn about system-level security policies, see<br />

the product documentation <strong>for</strong> the relevant operating systems as well as<br />

your specific company guidelines.<br />

Guidelines <strong>for</strong> System Security<br />

A secure or “trusted” system uses a number of techniques to improve<br />

security at system level. Many different system security standards exist,<br />

ranging from standards with industry-wide recognition such as the C2<br />

system developed by the United States Defense Department, to<br />

standards that are established and used internally in IT departments<br />

within enterprises.<br />

NOTE<br />

Installing and running <strong>HP</strong>OM in a C2-secure environment is not<br />

certified.<br />

Different system security standards vary in stringency and apply a<br />

variety of system security techniques, including the following:<br />

❏<br />

Authentication<br />

System security standards may impose strict password and user<br />

authentication methods <strong>for</strong> the user login procedure. <strong>HP</strong>OM<br />

supports a pluggable authentication module (PAM) <strong>for</strong> the<br />

authentication of users during the Java GUI login sequence. PAM<br />

enables multiple authentication technologies to be added without<br />

changing any of the login services, thereby preserving existing<br />

system environments. For more in<strong>for</strong>mation on PAM authentication,<br />

see “About PAM Authentication” on page 364.<br />

354<br />

Chapter 11

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!