JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Oracle Solaris Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Solaris Secure Shell (Tasks)

20.  Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Solaris Auditing (Tasks)

31.  Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

E

-e option
auditreduce command, How to Select Audit Events From the Audit Trail
ppriv command, How to Determine Which Privileges a Program Requires
ebusy string, audit_warn script, audit_warn Script
eeprom command
Maintaining Physical Security
Controlling Access to System Hardware
eeprom.rpt file
eeprom Check
Format of ASET Report Files
effective privilege set, How Privileges Are Implemented
efficiency, auditing and, Auditing Efficiently
eject command, device cleanup and, Device-Clean Scripts
elfsign command
description
Scope of the Oracle Solaris Cryptographic Framework
Binary Signatures for Third-Party Software
enabling
audit service, How to Enable the Audit Service
audit service task map, Configuring and Enabling the Audit Service (Task Map)
auditing, How to Enable the Audit Service
cryptographic mechanisms, How to Prevent the Use of a User-Level Mechanism
device allocation
How to Make a Device Allocatable
How to Make a Device Allocatable
Kerberized applications only, How to Enable Only Kerberized Applications
kernel software provider use, How to Prevent the Use of a Kernel Software Provider
keyboard abort, How to Disable a System's Abort Sequence
mechanisms and features on hardware provider, How to Disable Hardware Provider Mechanisms and Features
encrypt command
description, User-Level Commands in the Oracle Solaris Cryptographic Framework
error messages, How to Encrypt and Decrypt a File
syntax, How to Generate a Symmetric Key by Using the dd Command
troubleshooting, How to Encrypt and Decrypt a File
encrypting
communications between hosts, How to Log In to a Remote Host With Solaris Secure Shell
encrypt command, How to Encrypt and Decrypt a File
files
Protecting Files With Encryption
Protecting Files With the Oracle Solaris Cryptographic Framework (Task Map)
How to Encrypt and Decrypt a File
network traffic between hosts, Solaris Secure Shell (Overview)
passwords, Changing the Password Algorithm (Task Map)
private key of NIS user, How to Set Up a Diffie-Hellman Key for an NIS User
Secure NFS, DES Encryption With Secure NFS
using user-level commands, User-Level Commands in the Oracle Solaris Cryptographic Framework
encryption
algorithms
Kerberos and, Kerberos Encryption Types
DES algorithm, DES Encryption With Secure NFS
generating symmetric key
using the dd command, How to Generate a Symmetric Key by Using the dd Command
using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
installing third-party password modules, How to Install a Password Encryption Module From a Third Party
list of password algorithms, Password Encryption
modes
Kerberos and, Kerberos Encryption Types
password algorithm, Password Encryption
privacy service, What Is the Kerberos Service?
specifying algorithms in ssh_config file, Keywords in Solaris Secure Shell
specifying password algorithm
locally, Changing the Password Algorithm (Task Map)
specifying password algorithms in policy.conf file, Password Encryption
types
Kerberos and
Kerberos Encryption Types
Using Kerberos Encryption Types
with -x option, Overview of Kerberized Commands
ending, signal received during auditing shutdown, audit_warn Script
env.rpt file
Environment Variables Check
Format of ASET Report Files
environment variables
See also variables
ASETDIR (ASET), ASETDIR Environment Variable
ASETSECLEVEL (ASET), ASETSECLEVEL Environment Variable
audit token for, exec_env Token
CKLISTPATH_level (ASET)
Specifying Directories for System Files Checks Task: CKLISTPATH
CKLISTPATH_level Environment Variables
overriding proxy servers and ports, How to Set Up Default Connections to Hosts Outside a Firewall
PATH, Preventing Unintentional Misuse of Machine Resources
PERIODIC_SCHEDULE (ASET)
Scheduling ASET Execution: PERIODIC_SCHEDULE
PERIODIC_SCHEDULE Environment Variable
presence in audit records
Determining Audit Policy
Audit Token Formats
Solaris Secure Shell and, Solaris Secure Shell and Login Environment Variables
summary (ASET), ASET Environment Variables
TASKS (ASET)
Choosing Which Tasks to Run: TASKS
TASKS Environment Variable
UID_ALIASES (ASET)
The uid_aliases File
Specifying an Aliases File: UID_ALIASES
UID_ALIASES Environment Variable
use with ssh-agent command, Solaris Secure Shell Commands
YPCHECK (ASET)
Extending Checks to NIS+ Tables: YPCHECK
YPCHECK Environment Variable
equal sign (=), file permissions symbol, File Permission Modes
error messages
encrypt command, How to Encrypt and Decrypt a File
Kerberos, Kerberos Error Messages
with kpasswd, Changing Your Password
errors
allocate error state, Allocate Error State
audit directories full
auditd Daemon
audit_warn Script
internal errors, audit_warn Script
EscapeChar keyword, ssh_config file, Keywords in Solaris Secure Shell
/etc/d_passwd file
and /etc/passwd file, Dial-Up Logins
creating, How to Create a Dial-Up Password
disabling dial-up logins temporarily, How to Temporarily Disable Dial-Up Logins
/etc/default/kbd file, How to Disable a System's Abort Sequence
/etc/default/login file
description, Solaris Secure Shell Files
login default settings, How to Monitor All Failed Login Attempts
restricting remote root access, How to Restrict and Monitor Superuser Logins
Solaris Secure Shell and, Solaris Secure Shell and Login Environment Variables
/etc/default/su file
displaying su command attempts, How to Restrict and Monitor Superuser Logins
monitoring access attempts, How to Restrict and Monitor Superuser Logins
monitoring su command, How to Monitor Who Is Using the su Command
/etc/dfs/dfstab file
security modes, How to Set Up a Secure NFS Environment With Multiple Kerberos Security Modes
sharing files, Sharing Files Across Machines
/etc/dialups file, creating, How to Create a Dial-Up Password
/etc/group file, ASET checks, User and Group Checks
/etc/hosts.equiv file, description, Solaris Secure Shell Files
/etc/krb5/kadm5.acl file, description, Kerberos Files
/etc/krb5/kadm5.keytab file, description, Kerberos Files
/etc/krb5/kdc.conf file, description, Kerberos Files
/etc/krb5/kpropd.acl file, description, Kerberos Files
/etc/krb5/krb5.conf file, description, Kerberos Files
/etc/krb5/krb5.keytab file, description, Kerberos Files
/etc/krb5/warn.conf file, description, Kerberos Files
/etc/logindevperm file, Remote Logins
/etc/nologin file
description, Solaris Secure Shell Files
disabling user logins temporarily, How to Temporarily Disable User Logins
/etc/nsswitch.conf file, Maintaining Login Control
/etc/pam.conf file, Kerberos and, Kerberos Files
/etc/passwd file, ASET checks, User and Group Checks
/etc/publickey file, DH authentication and, Diffie-Hellman Authentication and Secure RPC
/etc/security/audit_event file, audit events and, Audit Events
/etc/security/audit_startup file, audit_startup Script
/etc/security/audit_warn script, audit_warn Script
/etc/security/bsmconv script, device_maps File
description, bsmconv Script
/etc/security/crypt.conf file
changing with new password module, How to Install a Password Encryption Module From a Third Party
third-party password modules, How to Install a Password Encryption Module From a Third Party
/etc/security/device_allocate file, device_allocate File
/etc/security/device_maps file, device_maps File
/etc/security/policy.conf file, algorithms configuration, How to Specify an Algorithm for Password Encryption
/etc/ssh_host_dsa_key.pub file, description, Solaris Secure Shell Files
/etc/ssh_host_key.pub file, description, Solaris Secure Shell Files
/etc/ssh_host_rsa_key.pub file, description, Solaris Secure Shell Files
/etc/ssh/shosts.equiv file, description, Solaris Secure Shell Files
/etc/ssh/ssh_config file
configuring Solaris Secure Shell, Client Configuration in Solaris Secure Shell
description, Solaris Secure Shell Files
host-specific parameters, Host-Specific Parameters in Solaris Secure Shell
keywords, Keywords in Solaris Secure Shell
override, Solaris Secure Shell Files
/etc/ssh/ssh_host_dsa_key file, description, Solaris Secure Shell Files
/etc/ssh/ssh_host_key file
description, Solaris Secure Shell Files
override, Solaris Secure Shell Files
/etc/ssh/ssh_host_rsa_key file, description, Solaris Secure Shell Files
/etc/ssh/ssh_known_hosts file
controlling distribution, Maintaining Known Hosts in Solaris Secure Shell
description, Solaris Secure Shell Files
override, Solaris Secure Shell Files
secure distribution, Maintaining Known Hosts in Solaris Secure Shell
/etc/ssh/sshd_config file
description, Solaris Secure Shell Files
keywords, Keywords in Solaris Secure Shell
/etc/ssh/sshrc file, description, Solaris Secure Shell Files
/etc/syslog.conf file
auditing and
How to Configure syslog Audit Logs
syslog.conf File
executable stack messages and, Preventing Executable Files From Compromising Security
failed logins and, How to Monitor All Failed Login Attempts
PAM and, How to Log PAM Error Reports
/etc/system file, system File
event, description, Audit Events
event modifier field flags (header token), header Token
exec_args audit token
argv policy and, exec_args Token
format, exec_args Token
exec_attr database
description, exec_attr Database
summary, Databases That Support RBAC
exec audit class, Definitions of Audit Classes
exec_env audit token, format, exec_env Token
executable stacks
disabling logging messages, How to Disable Programs From Using Executable Stacks
logging messages, Preventing Executable Files From Compromising Security
protecting against
Preventing Executable Files From Compromising Security
How to Disable Programs From Using Executable Stacks
execute permissions, symbolic mode, File Permission Modes
execution log (ASET), ASET Execution Log
exit audit token, format, exit Token (Obsolete)
export subcommand, pktool command, How to Export a Certificate and Private Key in PKCS #12 Format
EXTERNAL security mechanism plug-in, SASL and, SASL Plug-ins