Endpoint Administration Guide for UNIX › Protecting Accounts
This section contains the following topics:
Why Protect Accounts?
Safe User Substitution
Setting Up the Surrogate DO Facility
Defining SUDO Records
Preventing Password Attacks
Checking User Inactivity