This book provides system administrators with information about user, group, file, system and network security for the AIX operating system. It is the central reference point for both overview and detailed security information.
This article provides some tips for documenting processes and will provide some help in passing your next audit. This is the first in a two-part series.
Out of standards comes a process that documents the steps a user must go through to get all of the necessary approvals, as well as the steps administrators go through to process the request. An examination of how this document should be structured.
This Redbook provides additional detailed information about virtual private networks (VPN), Kerberos security, the use of secure remote commands (RCMDS) and pluggable authentication modules (PAM), as well as examples of how to restrict users.
Read this article for an overview of the major elements of AIX security.
Why use OpenSSH? When you're running over insecure public networks like the Internet, you can use the SSH command suite instead of the insecure commands telnet, ftp and r-commands.
This IBM Redbook contains information about the first official release of the new clustering software IBM Cluster Systems Management (CSM) on AIX 5L Version 5.2, including a complete set of base security functions based on IBM host-based authentication (HBA) and offered through an abstraction layer in the CSM software.
This article addresses common security problems in UNIX environments.
OpenSSH is a free software tool that supports SSH1 and SSH2 protocols. Now it's easy to get OpenSSH already compiled and ready to install on AIX.
This Redbook describes additional tools and techniques you can use to enhance the security of your pSeries environment.