Etrust Access Control for UNIX Utilities Guide
Total Page:16
File Type:pdf, Size:1020Kb
e Trust™ Access Control for UNIX Utilities Guide 5.3 G00153-1E This documentation and related computer software program (hereinafter referred to as the “Documentation”) is for the end user’s informational purposes only and is subject to change or withdrawal by Computer Associates International, Inc. (“CA”) at any time. This documentation may not be copied, transferred, reproduced, disclosed or duplicated, in whole or in part, without the prior written consent of CA. This documentation is proprietary information of CA and protected by the copyright laws of the United States and international treaties. Notwithstanding the foregoing, licensed users may print a reasonable number of copies of this documentation for their own internal use, provided that all CA copyright notices and legends are affixed to each reproduced copy. Only authorized employees, consultants, or agents of the user who are bound by the confidentiality provisions of the license for the software are permitted to have access to such copies. This right to print copies is limited to the period during which the license for the product remains in full force and effect. Should the license terminate for any reason, it shall be the user’s responsibility to return to CA the reproduced copies or to certify to CA that same have been destroyed. To the extent permitted by applicable law, CA provides this documentation “as is” without warranty of any kind, including without limitation, any implied warranties of merchantability, fitness for a particular purpose or noninfringement. In no event will CA be liable to the end user or any third party for any loss or damage, direct or indirect, from the use of this documentation, including without limitation, lost profits, business interruption, goodwill, or lost data, even if CA is expressly advised of such loss or damage. The use of any product referenced in this documentation and this documentation is governed by the end user’s applicable license agreement. The manufacturer of this documentation is Computer Associates International, Inc. Provided with “Restricted Rights” as set forth in 48 C.F.R. Section 12.212, 48 C.F.R. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions. 2003 Computer Associates International, Inc. All trademarks, trade names, service marks, and logos referenced herein belong to their respective companies. Contents Chapter 1: Utilities by Category Categories ................................................................................... 1-1 User Utilities ................................................................................. 1-2 Administrator Utilities ........................................................................ 1-2 Installation Utilities ........................................................................... 1-3 Support Utilities .............................................................................. 1-4 Password Utilities ............................................................................ 1-4 Daemons..................................................................................... 1-4 Chapter 2: Utilities in Detail dbmgr ....................................................................................... 2-1 Creating a Database ....................................................................... 2-1 Generating Reports ....................................................................... 2-3 Creating a Script .......................................................................... 2-5 Copying Data to a Flat File ................................................................. 2-6 Managing a Database...................................................................... 2-9 Backing Up a Database ................................................................... 2-10 Restoring a Database ..................................................................... 2-11 defclass ..................................................................................... 2-11 exporttngdb ................................................................................. 2-12 issec ........................................................................................ 2-12 migopts..................................................................................... 2-13 seagent ..................................................................................... 2-14 seaudit...................................................................................... 2-15 seauxd...................................................................................... 2-25 sebuildla .................................................................................... 2-27 sechkey ..................................................................................... 2-30 Changing the Encryption Key ............................................................. 2-31 Changing the selogrd Daemon Encryption Key ............................................. 2-32 Clearing the selogrd Daemon Encryption Key .............................................. 2-32 Contents iii seclassadm .................................................................................. 2-33 secompas .................................................................................... 2-35 secons....................................................................................... 2-37 secrepsw .................................................................................... 2-46 sedbpchk .................................................................................... 2-46 seerrlog ..................................................................................... 2-48 segrace ...................................................................................... 2-49 segracex ..................................................................................... 2-50 seini ........................................................................................ 2-52 selang ....................................................................................... 2-55 seload ....................................................................................... 2-61 selock ....................................................................................... 2-63 selockcom ................................................................................... 2-68 selogmix .................................................................................... 2-69 selogrcd ..................................................................................... 2-71 selogrd ...................................................................................... 2-73 semsgtool ................................................................................... 2-88 senable ...................................................................................... 2-91 senone ...................................................................................... 2-92 SEOS_load................................................................................... 2-93 SEOS_syscall................................................................................. 2-94 seosd........................................................................................ 2-95 seostngd.................................................................................... 2-101 seoswd ..................................................................................... 2-104 sepass ...................................................................................... 2-106 sepmd...................................................................................... 2-115 Administering Subscribers ............................................................... 2-115 Truncating the Update File ............................................................... 2-117 Dual Control ............................................................................ 2-118 Managing the Policy Model Log File ...................................................... 2-120 Other PMDB Administration ............................................................. 2-121 sepmdadm ................................................................................. 2-122 sepmdd .................................................................................... 2-127 sepropadm ................................................................................. 2-132 sepurgdb ................................................................................... 2-134 sereport .................................................................................... 2-135 seretrust .................................................................................... 2-139 serevu...................................................................................... 2-141 sessfgate.................................................................................... 2-148 sesu........................................................................................ 2-148 sesudo ..................................................................................... 2-150 iv Utilities Guide seuidpgm .................................................................................. 2-155 seversion................................................................................... 2-158 sewhoami .................................................................................. 2-159 uninstall_eTrust ...........................................................................