This book provides system administrators with information about user and group, file, system, and network security for the AIX operating system. This guide contains information about how to perform such tasks as changing permissions, setting up authentication methods, and configuring the Trusted Computing Base environment and Controlled Access Protection Profile (CAPP) with Evaluation Assurance Level 4+ (EAL4+) features.
The AIX 5L Version 5.2 Security Guide contains the following parts: Standalone System Security, Network and Internet Security, and the Appendixes.
This book is intended for system administrators and IT security managers.
The following highlighting conventions are used in this book:
Bold | Identifies commands, subroutines, keywords, files, structures, directories, and other items whose names are predefined by the system. Also identifies graphical objects such as buttons, labels, and icons that the user selects. |
Italics | Identifies parameters whose actual names or values are to be supplied by the user. |
Monospace | Identifies examples of specific data values, examples of text similar to what you might see displayed, examples of portions of program code similar to what you might write as a programmer, messages from the system, or information you should actually type. |
Everything in the AIX operating system is case-sensitive, which means that it distinguishes between uppercase and lowercase letters. For example, you can use the ls command to list files. If you type LS, the system responds that the command is "not found." Likewise, FILEA, FiLea, and filea are three distinct file names, even if they reside in the same directory. To avoid causing undesirable actions to be performed, always ensure that you use the correct case.
ISO 9000 registered quality systems were used in the development and manufacturing of this product.
The following publications contain related information: