Previous Topic: Configure Post-Installation Settings

Next Topic: Configure an Endpoint for Advanced Policy Management

Start CA Access Control

Assuming you are working in an X Windows environment, invoke CA Access Control, verify that it is correctly installed on your system, and perform the following steps to initiate important protection:

  1. Open two windows under root (superuser) authority.
  2. In either window, enter the command:
    seload
    

    Wait while the seload command starts three CA Access Control daemons: Engine, Agent, and Watchdog.

  3. After you have started the daemons, go to the other window and enter the command:
    secons -t+ -tv
    

    CA Access Control accumulates a file of messages reporting operating system events. The secons ‑tv command displays the messages on the screen as well.

  4. In the first window, where you gave the seload command, enter the following command:
    who
    

    Watch the second window, where CA Access Control is writing the trace messages, to see whether CA Access Control intercepts the execution of the who command and reports on it. CA Access Control is correctly installed on your system if it reports interception of the who command.

  5. If you want, enter more commands to see how CA Access Control reacts to them.

    The database does not yet contain any rules for blocking access attempts. Nevertheless, CA Access Control monitors the system so that you can see how the system behaves with CA Access Control installed and running, and which events CA Access Control intercepts.

  6. Shut down the seosd daemon, by entering the following command:
    secons -s
    

    The following message displays on the screen:

    CA Access Control is now DOWN !