HP Security Monitor/iX User's Guide: HP 3000 MPE/iX Computer Systems
Chapter 2 Accessing the System
»
Technical documentation
Complete book in PDF
»
Feedback
»
Table of Contents
»
Index
Table of Contents
Getting Started
To Log On
Guidelines for Selecting Passwords
Protecting Your System with Passwords
Changing Your Password
If Your Password Expires
Discussion
Effects of Expired User Passwords
Password Encryption
Discussion
Minimum Password Lengths
Mandatory Password Prompts
Discussion
Controlling System Access with Logon Restrictions
Terminating Sessions on Initial UDC Failure
Limiting the Number of Logon Attempts
Providing Minimal Logon Assistance
Dealing with Embedded Passwords in Remote Logons
Passwords in Batch Submissions
Embedded Passwords in Job Files
Restricting Job Cross Streaming
The Cross Streaming Authorization Option
Eliminating Password Exposure with the Stream Privilege Option
Stream Privilege Option Features
Feedback to webmaster