This tab lets you specify attributes that are specific to an IBM AIX server.
The fields in this property sheet are listed below:
Specifies the administrative status of the user.
Checked: The user is an administrator.
Unchecked: The default. The user is not an administrator.
Specifies if other logins can “su” to this login.
Use the calendar to specify the date when the login is no longer valid. If you do not want to assign an expiration date, do not select the Password Expired check box.
When checked, specifies that the user account is locked.
Indicates whether the user can log into the system with the login command.
Checked: The default. The user can log into the system.
Unchecked: The user cannot log into the system.
Specifies if the login can be performed from remote locations.
Defines which terminals can access the login. Type a valid TTYs in the text field to add it to the list box.
Specifies the access permissions a file has when the login creates it.
Specifies the audit events to trace while the user is working on the server if auditing is enabled. Type the audit event in the text field to add it to the list box.
Specifies the value for the trusted path that is used by the server when the account invokes a trusted shell, a trusted process, or a secure attention key (SAK) sequence.
The valid values are:
Disables SAK for the user’s processes so that the user can transfer binary files containing SAK sequences.
Stops the user from invoking trusted processes and does not allow the user to use SAK.
Specifies that the user can execute only trusted processes.
Specifies standard trusted path characteristics. The user can invoke trusted processes and use SAK.
Specifies the primary authentication methods for a user.
The valid values are:
Allows the user to run only programs
Keeps the password clear until the user logs on for the first time
Keeps the userid frozen until an administrator gives it a password
Provides normal user authentication
Specifies the second level authentication methods for a user.
The valid values are:
Allows the user to run only programs
Keeps the password clear until the user logs on for the first time
Keeps the userid frozen until an administrator gives it a password
Provides normal user authentication
Specifies the value for the maximum file size in blocks.
Specifies the value for the maximum data segment size in blocks.
Specifies the value for the maximum core file size in blocks.
Specifies the value for CPU time limits in seconds.
Specifies the value for the maximum stack segment size in blocks.
Specifies the value for the maximum real memory usage in blocks (512 bytes).
This attribute applies to AIX 4.2 or later.
Specifies the largest file a user's process can create or extend. The value is an integer representing the number of 512-byte blocks.
To make files greater than 2G, specify -1, meaning unlimited.
Minimum Value: 8192.
This attribute applies to AIX 4.2 or later.
Specifies the largest data segment for a user's process. The value is an integer representing the number of 512-byte blocks.
Minimum Value: 1272.
This attribute applies to AIX 4.2 or later.
Specifies the largest core file a user's process can create. The value is an integer representing the number of 512-byte blocks.
This attribute applies to AIX 4.2 or later.
Specifies the largest amount of system unit time, in seconds, which a user's process can use.
The default value is -1, which turns off restrictions.
This attribute applies to AIX 4.2 or later.
Specifies the largest stack segment for a user's process. The value is an integer representing the number of 512-byte blocks to allot.
Minimum Value: 49.
Copyright © 2015 CA Technologies.
All rights reserved.
|
|