The PAM ESM Module provides a Linux feature similar to what the OS ESM Module does for Windows, but since the mechanism it
               uses is different it also has different configuration requirements. For Security Managers using the OS ESM Module, 
               		Micro Focus makes the following hardening recommendations: 
               	 
            
 
            	 
             
               		 
               		  
               - Module 
                  		  
               
- Set this to 
                  			 pam_esm, with no path, and no bitness, threadedness, or file extension suffixes. ESF loads ESM Modules from the product installation
                  directory automatically – it does not search the library load path. ESF will select the appropriate bitness and threadedness
                  automatically. 
                  		  
               
- Authorized user 
                  		  
               
- The PAM ESM Module uses this as the service name passed to the Linux-PAM API. The PAM API uses the service name to identify
                  a PAM configuration file (or stanza, if PAM is configured to use a single configuration file). The configuration file determines
                  how PAM operates for the caller, so the information in this file is critical. 
                  			 Micro Focus recommends that you create a PAM configuration file specifically for the PAM ESM Module, preferably using the default name
                  "microfocus-es", to avoid unexpected PAM configuration changes with OS updates and to simplify problem determination. You
                  can copy a suitable existing PAM configuration file to create this configuration. 
                  			 
                  Note: Configuring PAM is outside the scope of this document. 
                     			 
                   
               Configuration text settings relevant to hardening
 
               		 
               		
               The PAM ESM Module only has a few configuration options which affect hardening: 
                  		
               
 
               		
                
                  		   
                  			 
                  - Process groups 
                     			 
                  
- Enable this option if you want the PAM ESM Module to be able to add the user's PAM groups to the groups known to 
                     				Enterprise Server. If the organization intends to create resource access rules which refer to those groups, enable this option; otherwise,
                     disable it to reduce the processing performed by and attack surface of the PAM ESM Module. 
                     			 
                  
- Enable 
                     			 
                  
- This setting enables the PAM ESM Module to generate and accept passtokens. Unlike the MLDAP ESM Module, the PAM ESM Module
                     does not offer per-user control over passtokens, so if feasible do not use the PAM ESM Module to provide passtokens. 
                     				
                     Note: Only one Security Manager needs to support passtokens, you can disable passtokens entirely if you do not require them. Enabling
                        surrogate passtokens by setting this option to 
                        				  any is a significant security vulnerability. 
                        				
                      
- SecretFile 
                     			 
                  
- If ESF passtokens are used, for passing authentication between subsystems such as MFDS and ESMAC, or for DCAS, then 
                     				Micro Focus strongly recommends using this option. The "secret file" can contain anything, as long as it has at least 128 bits or so
                     of entropy; even 1 KB or so of ordinary text would suffice. The point of this setting is to avoid using either the built-in
                     secret (which is available to anyone with a copy of the product) or a secret in the configuration (which is available to anyone
                     who can view the configuration) to generate passtokens. Otherwise, a technically-skilled attacker could forge passtokens.
                     
                     				
                     Note: There is no space between "Secret" and "File" in the name of this setting. 
                        				
                      
- Trace settings 
                     			 
                  
- Tracing is useful in diagnosing issues, but might reveal sensitive data to an attacker who can obtain copies of log files.
                     Disable tracing when it is not required.