13.12.2012 Views

HP OpenView Operations Administrator's Reference - filibeto.org

HP OpenView Operations Administrator's Reference - filibeto.org

HP OpenView Operations Administrator's Reference - filibeto.org

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

About OVO Security<br />

About System Security<br />

480<br />

About System Security<br />

This section describes how OVO behaves in trusted system<br />

environments.<br />

NOTE Before installing and running OVO on any system, you must ensure that<br />

the system-level security measures comply with your <strong>org</strong>anization’s<br />

system security policies. To learn about system-level security policies, see<br />

the product documentation for the relevant operating systems as well as<br />

your specific company guidelines.<br />

Guidelines for System Security<br />

A secure or “trusted” system uses a number of techniques to improve<br />

security at system level. Many different system security standards exist,<br />

ranging from standards with industry-wide recognition such as the C2<br />

system developed by the United States Defense Department, to<br />

standards that are established and used internally in IT departments<br />

within enterprises.<br />

NOTE Installing and running OVO in a C2-secure environment is not certified.<br />

Different system security standards vary in stringency and apply a<br />

variety of system security techniques, including the following:<br />

❏ Authentication<br />

System security standards may impose strict password and user<br />

authentication methods for the user login procedure. OVO supports a<br />

pluggable authentication module (PAM) for the authentication of<br />

users during the Java GUI or Motif GUI login sequences. PAM<br />

enables multiple authentication technologies to be added without<br />

changing any of the login services, thereby preserving existing<br />

system environments. For more information on PAM authentication,<br />

see “About PAM Authentication” on page 500.<br />

Chapter 12

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!