1. Oracle Solaris Security for Developers (Overview)
Overview of Oracle Solaris Security Features for Developers
2. Developing Privileged Applications
3. Writing PAM Applications and Services
4. Writing Applications That Use GSS-API
7. Writing Applications That Use SASL
8. Introduction to the Oracle Solaris Cryptographic Framework
9. Writing User-Level Cryptographic Applications and Providers
10. Using the Smart Card Framework
A. Sample C-Based GSS-API Programs
D. Source Code for SASL Example
For system security, the Solaris OS provides process privileges. Process privileges are an alternative to the standard, superuser-based UNIX model for granting access to privileged applications. The system administrator assigns users a set of process privileges that permit access to privileged applications. A user does not need to become superuser to use a privileged application.
Privileges enable system administrators to delegate limited permission to users to override system security instead of giving users complete root access. Accordingly, developers who create new privileged applications should test for specific privileges instead of checking for UID = 0. See Chapter 2, Developing Privileged Applications.
For highly stringent system security, consider using the Oracle Solaris' Trusted Extensions feature. The Trusted Extensions feature enables system administrators to specify the applications and files that a particular user can access. The Trusted Extensions feature is outside of the scope of this book. See http://www.sun.com/software/solaris/ds/trusted_extensions.jsp for more information.