![IBM Novell 10 SP1 EAL4 Design Manual Download Page 39](http://html1.mh-extra.com/html/ibm/novell-10-sp1-eal4/novell-10-sp1-eal4_design-manual_4190246039.webp)
•
The
crontab
program is the program used to install, deinstall, or list the tables used to drive
the
cron
daemon. Users can have their own
crontab
files that set up the time and
frequency of execution, as well as the command or script to execute.
•
The
gpasswd
command administers the
/etc/group
file and
/etc/gshadow
file if
compiled with SHADOWGRP defined. The
gpasswd
command allows system
administrators to designate group administrators for a particular group. Refer to the
gpasswd
man page for more detailed information.
•
The
login
program is used when signing on to a system. If root is trying to log in, the
program makes sure that the login attempt is being made from a secure terminal listed in
/etc/securetty
. The login program prompts for the password and turns off the terminal
echo in order to prevent the password from being displayed as the user types it. The login
program then verifies the password for the account; although three attempts are allowed
before login dies, the response becomes slower after each failed attempt. Once the password
is successfully verified, various password aging restrictions, which are set in the
/etc/login.defs
file, are checked. If the password age is satisfactory, then the program
sets the user ID and group ID of the process, changes the current directory to the user’s home
directory, and executes a shell specified in the
/etc/passwd
file. Refer to the
login
man
page for more detailed information.
•
The
passwd
command updates a user’s authentication tokens, and is configured to work
through the PAM API. It then configures itself as a password service with PAM, and uses
configured password modules to authenticate and then update a user’s password. The
passwd
command turns off terminal echo while the user is typing the old as well as the new
password, in order to prevent displaying the password typed by the user. Refer to the
passwd
man page for more detailed information.
•
The
su
command allows a user to run a shell with substitute user and group IDs. It changes
the effective user and group IDs to those of the new user. Refer to the
su
man page for more
detailed information.
•
The following are trusted programs that do not fit into the above 2 categories.
•
The alternative Linux form of
getty
,
agetty
opens a tty port, prompts for a login name, and
invokes the
/bin/login
command. The
/sbin/init
program invokes it when the system
becomes available in a multi-user mode.
•
The
amtu
program is a special tool provided to test features of the underlying hardware that the
TSF depends on. The test tool runs on all hardware architectures that are targets of evaluation
and reports problems with any underlying functionalities.
•
In addition to setting the audit filter rules and watches on file system objects,
auditctl
can be used
to control the audit subsystem behavior in the kernel when
auditd
is running. Only an
administrative user is allowed to use this command.
•
The
ausearch
command finds audit records based on different criteria from the audit log. Only
an administrative user is allowed to use this command.
•
aureport
produces reports of the audit system logs.
•
The
init
program is the first program to run after the kernel starts running. It is the parent of all
processes, and its primary role is to create processes from a script stored in the /etc/inittab file.
This file usually has entries that cause
init
to spawn
getty
on each line that users can log in.
•
The
chsh
command allows users to change their login shells. If a shell is not given on the
command line,
chsh
prompts for one.
27
Summary of Contents for Novell 10 SP1 EAL4
Page 1: ...SUSE Linux Enterprise Server 10 SP1 EAL4 High Level Design Version 1 2 1...
Page 23: ...11...
Page 29: ...17...
Page 43: ...31...
Page 54: ...42 Figure 5 8 New data blocks are allocated and initialized for an ext3 field...
Page 117: ...105 Figure 5 48 Page Address Translation and access control...
Page 125: ...113 Figure 5 54 31 bit Dynamic Address Translation with page table protection...
Page 126: ...114 Figure 5 55 64 bit Dynamic Address Translation with page table protection...
Page 172: ...160 Figure 5 79 System x SLES boot sequence...
Page 214: ...202...