Endpoint Administration Guide for UNIX › Protecting Accounts
Protecting Accounts
This section contains the following topics:
Why Protect Accounts?
Safe User Substitution
Setting Up the Surrogate DO Facility
Defining SUDO Records
Preventing Password Attacks
Checking User Inactivity
|
Copyright © 2012 CA.
All rights reserved.
|
|