Provides terminal state management.
The tsm command invokes the terminal state manager, which controls the ports used in the trusted path. The functions are:
Note: The tsm command is not entered on the command line.
Trusted path management occurs in
|login||This phase is in effect if a user has not successfully logged in. If the secure attention key (SAK) signal is detected, the system restarts getty-login type processing. The next login puts the user into the trusted state, if the port and the user support the trusted state.|
|shell||This phase occurs after successful user authentication. The
command functions according to the user's tpath
attribute. The following are valid:
Access Control: This command should grant execute (x) permission to any user. The command should be setuid to the root user and have the trusted computing base attribute.
To provide terminal state management on tty0, add the following line to the /etc/inittab file:
This initializes the port /dev/tty0 and sets up the characteristics of the port.
|/usr/sbin/tsm||Contains the tsm command.|
|/etc/security/login.cfg||Contains configuration information.|
|/etc/security/user||Contains extended user attributes.|
The getty command, init command, login command, logout command, setgroups command, shell command, su command, tsh command.
For more information about the identification and authentication of users, discretionary access control, the trusted computing base, and auditing, refer to the Security Administration in AIX 5L Version 5.1 System Management Concepts: Operating System and Devices.