Welcome to Uma's Blog,
This Blog shares technical information about AIX Security & other components. Various number of articles were written under "IBM developer Works" and those were published under AIX & UNIX zone. All those information can be found under this Blog.
1) LDAP configuration management and troubleshooting on AIX.
This article provides an overview of LDAP and its architecture. It also discusses LDAP configuration and management on AIX.
The article focuses on troubleshooting different types of problems while configuring the LDAP server and client.
2. Configure IBM LDAP net groups with Windows Active Directory server.
This article provides an overview of Net-group functionality. Its also discusses the steps to implement net-group when AIX is configured as client in heterogeneous environment like Microsoft windows Active directory server.
3. The power of Network installation manager (NIM).
This article provides the overview and steps to implement NIM environment. In an environment with many AIX® systems, installing, upgrading, and maintaining software can become cumbersome and time consuming. Network Installation Manager provides an easy, efficient way to install, upgrade, and even maintain your AIX systems over the network, while reducing down time. You can use Network Installation Manager to remotely manage AIX installations and upgrades on several systems without using AIX CD's.
4. Configuring Network information service server and client on AIX
This article provides the steps to implement Network information service server and client in AIX. Network Information Service (NIS), originally known as Yellow Pages, is sometimes called Name Services and follows the client-server architecture. NIS servers maintain replicated servers, with the principal servers being referred to as master servers and the replicated servers referred to as replica or slave servers.
5. Configuration of AIX Fast connect and SMBFS.
This article provides an overview of CIFS and SMBFS filesystem in AIX. The Common Internet File System (CIFS), also known as Server Message Block (SMB), is a standard remote file system access protocol over the Internet, enabling groups of users to work together and share documents and printers across the Internet or within corporate intranets.
6. Extending non-IBM LDAP servers to support full AIX functionality
The scope of this article is to extend some non-IBM LDAP servers with AIX LDAP schema and to configure AIX to work with such servers.
7. AIX security commands
AIX provides a vast array of commands to handle user and group management. This article discusses some of these core security commands and provides a list that you can use as a ready reference.
8. Kerberos LDAP master-slave configuration management
This article provides an overview of implementing Kerberos LDAP master slave environment.
9. Configure single sign-on authentication on AIX
This article provides an overview of Single Sign-on authentication mechanism, its advantages and its implementation in AIX.
10. Configuring an AIX client with multiple Kerberos realms
This article provides an overview of Kerberos, its advantages with multiple realms. Steps to implement multiple realms in heterogeneous environment.
11. Configure Open-SSH Public Key Authentication with EFS on AIX 610 TL 4.
This article provides an Overview & Steps for Configuring Open-SSH Public Key Authentication with EFS (Encrypted File System).
12. Introduction to PowerHA
This article introduces PowerHA and provides a detailed explanation of how to configure a two node cluster.
13. Memory allocation subsystem in AIX.
Memory management is one of the most important responsibilities of an operating system. It allocates portions of memory to programs at their request and frees it for reuse when no longer needed. This article describes different allocation algorithms which are available in AIX® for memory management and their features.
14. AIX Pluggable Authentication modules
Pluggable authentication module (PAM) supports authentication mechanism. Applications can make use of this module for implementing authentication mechanism in AIX®. PAM provides different service modules, and each module supports different functionality. Make use of these PAM service modules to enable PAM with authentication, account, password, and session management mechanisms in AIX.
15. Introduction to Domain RBAC
This article provides an overview of Domain RBAC functionality in AIX. Domain RBAC is mechanism to control the access on resources on system from un-authorized users.
16. AIX Security commands 2
This article provides a list of security commands which were introduced to handle AIX Security advanced features in 6.1 release.
19. LDAP Schema Manager
LDAP Schema Manager tool provides a facility to extend and expand the Lightweight Directory Access Protocol (LDAP) server schema-related attributes. It provides a provision to add new schema attributes to the LDAP directory server and it helps in managing an LDAP server schema in heterogeneous environment.
20. IBM AIX audit on an LDAP server
Audit mechanism helps to record security-related information and alert administrators about potential or actual violations of the system security policy.This article provides an overview of configuring the IBM® AIX® audit subsystem on a Lightweight Directory Access Protocol (LDAP) server. Using this method, administrators can download the AIX audit configuration file to all LDAP clients that are configured to the LDAP server.
21. Integration of Passthrough authentication server to IBM Tivoli Directory Server.
This article provides an overview passthrough authentication server, and how IBM Tivoli directory server need to be integrated with other directory server. The article shows an example with of the integration against Microsoft windows AD server.