Managing system security
This topic includes:
Introduction to security
Introduces security concepts, outlines procedures
for administering security and controlling
Includes procedures to maintain the security of your system.
Describes how to assign privileges to users that override
the default restrictions. It explains the file privilege
mechanism and how these privileges are administered.
Trusted facility management
Explains how to assign roles and otherwise enable users to
run command line facilities reserved for administrators.
© 2004 The SCO Group, Inc. All rights reserved.
UnixWare 7 Release 7.1.4 - 22 April 2004