Can someone suggest me any means of having a controlled way to user access ...
basically we have a varied environment of people(users) logging in to AIX boxes ... either via
1) telnet ...
2) application
3) databse (SQL's)
what we need to do is formalise this .. can someone help me with this
Control access, in the sense keep a track of user actions from the time he logs in ... with everything being traced. Also restricting the users in usage od certain commands .. can this be achieved using restricted shell.