JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Oracle Solaris Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Solaris Secure Shell (Tasks)

20.  Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Solaris Auditing (Tasks)

31.  Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

T

tables, gsscred, Using the gsscred Table
tail command, example of use, Auditing Efficiently
tape drives
allocating, How to Allocate a Device
cleaning of data, Device-Clean Scripts
device-clean scripts, device_allocate File
task maps
administering cryptographic framework, Administering the Cryptographic Framework (Task Map)
administering policies (Kerberos), Administering Kerberos Policies (Task Map)
administering principals (Kerberos), Administering Kerberos Principals (Task Map)
administering Secure RPC, Administering Secure RPC (Task Map)
allocating devices, Allocating Devices (Task Map)
ASET, Running ASET (Task Map)
auditing, Solaris Auditing (Task Map)
changing default algorithm for password encryption, Changing the Password Algorithm (Task Map)
configuring audit files, Configuring Audit Files (Task Map)
configuring audit service, Configuring and Enabling the Audit Service (Task Map)
configuring device policy, Configuring Device Policy (Task Map)
configuring devices, Configuring Devices (Task Map)
configuring Kerberos NFS servers, Configuring Kerberos NFS Servers
configuring RBAC, Configuring RBAC (Task Map)
configuring Solaris Secure Shell, Configuring Solaris Secure Shell (Task Map)
controlling access to system hardware, SPARC: Controlling Access to System Hardware (Task Map)
cryptographic framework, Using the Cryptographic Framework (Task Map)
device allocation, Managing Device Allocation (Task Map)
device policy, Configuring Device Policy (Task Map)
devices, Configuring Devices (Task Map)
enabling audit service, Configuring and Enabling the Audit Service (Task Map)
Kerberos configuration, Configuring the Kerberos Service (Task Map)
Kerberos maintenance, Configuring Additional Kerberos Services (Task Map)
managing and using privileges, Managing and Using Privileges (Task Map)
managing audit records, Managing Audit Records (Task Map)
managing device allocation, Managing Device Allocation (Task Map)
managing device policy, Configuring Device Policy (Task Map)
managing RBAC, Managing RBAC (Task Map)
monitoring and restricting superuser, Monitoring and Restricting Superuser (Task Map)
PAM, PAM (Tasks)
planning auditing, Planning Oracle Solaris Auditing (Task Map)
protecting against programs with security risk, Protecting Against Programs With Security Risk (Task Map)
protecting files, Protecting Files (Task Map)
protecting files with ACLs, Protecting UFS Files With ACLs (Task Map)
protecting files with cryptographic mechanisms, Protecting Files With the Oracle Solaris Cryptographic Framework (Task Map)
protecting files with UNIX permissions, Protecting Files With UNIX Permissions (Task Map)
protecting system hardware, SPARC: Controlling Access to System Hardware (Task Map)
running ASET, Running ASET (Task Map)
securing logins and passwords, Securing Logins and Passwords (Task Map)
securing systems, Controlling System Access (Task Map)
Solaris Secure Shell, Solaris Secure Shell (Task Map)
system access, Controlling System Access (Task Map)
troubleshooting Solaris auditing, Troubleshooting Solaris Auditing (Task Map)
Using BART task map, Using BART (Task Map)
using device allocation, Allocating Devices (Task Map)
using RBAC, Using RBAC (Task Map)
using roles, Using Roles (Task Map)
using Solaris Secure Shell, Using Solaris Secure Shell (Task Map)
using the cryptographic framework, Using the Cryptographic Framework (Task Map)
Using the Key Management Framework (Task Map), Using the Key Management Framework (Task Map)
TASKS variable (ASET)
Choosing Which Tasks to Run: TASKS
TASKS Environment Variable
taskstat command (ASET)
ASET Task List
Example of an ASET Execution Log File
TCP
addresses, iport Token
Solaris Secure Shell and
How to Configure Port Forwarding in Solaris Secure Shell
Command Execution and Data Forwarding in Solaris Secure Shell
telnet command
Kerberos and
Overview of Kerberized Commands
Kerberos Commands
telnetd daemon, Kerberos and, Kerberos Daemons
terminal ID, audit, Proscess Audit Characteristics
terminating, signal received during auditing shutdown, audit_warn Script
terminology
authentication-specific, Authentication-Specific Terminology
Kerberos, Kerberos Terminology
Kerberos-specific, Kerberos-Specific Terminology
test manifests, BART Report
text audit token, format, text Token
TGS, getting credential for, Obtaining a Credential for the Ticket-Granting Service
TGT, in Kerberos, Initial Authentication: the Ticket-Granting Ticket
third-party password algorithms, adding, How to Install a Password Encryption Module From a Third Party
ticket file, See credential cache
ticket-granting service, See TGS
ticket-granting ticket, See TGT
tickets
creating, Do You Need to Worry About Tickets?
creating with kinit, Creating a Kerberos Ticket
definition, How the Kerberos Service Works
definition in Kerberos, Authentication-Specific Terminology
destroying, Destroying Kerberos Tickets
-F option or -f option, Overview of Kerberized Commands
file
See credential cache
forwardable
How the Kerberos Service Works
Creating a Kerberos Ticket
Forwarding Kerberos Tickets
Types of Tickets
initial, Types of Tickets
invalid, Types of Tickets
-k option, Overview of Kerberized Commands
klist command, Viewing Kerberos Tickets
lifetime, Ticket Lifetimes
maximum renewable lifetime, Ticket Lifetimes
obtaining, Do You Need to Worry About Tickets?
or credentials, How the Kerberos Service Works
postdatable, Types of Tickets
postdated, How the Kerberos Service Works
proxiable, Types of Tickets
proxy, Types of Tickets
renewable, Types of Tickets
requesting for specific realm, Overview of Kerberized Commands
types of, Types of Tickets
viewing, Viewing Kerberos Tickets
warning about expiration, How to Manually Configure a Kerberos Client
TIMEOUT in Solaris Secure Shell, Solaris Secure Shell and Login Environment Variables
timestamps
ASET reports, ASET Reports
audit files, Binary Audit File Timestamps
/tmp/krb5cc_uid file, description, Kerberos Files
/tmp/ovsec_adm.xxxxx file, description, Kerberos Files
tmpfile string, audit_warn script, audit_warn Script
TMPFS file system, security, Sticky Bit
token, definition in cryptographic framework, Terminology in the Oracle Solaris Cryptographic Framework
trail audit policy
and trailer token, Determining Audit Policy
description, Determining Audit Policy
trailer audit token
format, trailer Token
order in audit record, trailer Token
praudit display, trailer Token
transparency, definition in Kerberos, How the Kerberos Service Works
Trojan horse, Setting the PATH Variable
troubleshooting
allocating a device, How to Allocate a Device
ASET errors, Troubleshooting ASET Problems
audit classes
customized
How to Add an Audit Class
How to Determine That Solaris Auditing Is Running
auditing, Troubleshooting Solaris Auditing (Task Map)
becoming superuser, How to Make root User Into a Role
computer break-in attempts, How to Monitor Failed Login Attempts
encrypt command
How to Encrypt and Decrypt a File
How to Encrypt and Decrypt a File
finding files with setuid permissions, How to Find Files With Special File Permissions
Kerberos, Kerberos Troubleshooting
lack of privilege, How to Determine Which Privileges a Program Requires
list_devices command, How to View Allocation Information About a Device
mounting a device, How to Mount an Allocated Device
praudit command, How to View the Contents of Binary Audit Files
preventing programs from using executable stacks, How to Disable Programs From Using Executable Stacks
privilege requirements, How to Determine Which Privileges a Program Requires
remote superuser access, How to Restrict and Monitor Superuser Logins
rights profiles, How to Create or Change a Rights Profile
role capabilities, How to Create and Assign a Role by Using the GUI
root as a role, How to Make root User Into a Role
terminal where su command originated, How to Monitor Who Is Using the su Command
user running privileged commands, How to Determine the Privileged Commands That You Can Run
truss command, for privilege debugging, How to Determine Which Privileges a Program Requires
trusted hosts, Firewall Systems
tune files (ASET)
description, Tune Files
examples
Tune File Examples
Tune File Examples
modifying, Modifying the Tune Files
rules, Tune File Examples
tune.rpt file
System Files Permissions Tuning
Format of ASET Report Files
types of tickets, Types of Tickets
TZ in Solaris Secure Shell, Solaris Secure Shell and Login Environment Variables