System Administration Guide: Security Services is part of a multivolume set that covers a significant part of the SolarisTM Operating System (Solaris OS) administration information. This book assumes that you have already installed a Solaris Express Community Edition release, and you have set up any networking software that you plan to use. The Solaris OS is part of the Solaris product family, which includes many features, such as the Java Desktop System.
This Solaris release supports systems that use the SPARC® and x86 families of processor architectures. The supported systems appear in the Solaris OS: Hardware Compatibility Lists. This document cites any implementation differences between the platform types.
In this document these x86 related terms mean the following:
“x86” refers to the larger family of 64-bit and 32-bit x86 compatible products.
“x64” relates specifically to 64-bit x86 compatible CPUs.
“32-bit x86” points out specific 32-bit information about x86 based systems.
For supported systems, see the Solaris OS: Hardware Compatibility Lists.
This book is intended for anyone who is responsible for administering one or more systems that run a Solaris Express Community Edition release. To use this book, you should have more than two years of UNIX® system administration experience. Attending training courses in UNIX system administration might be helpful.
Here is a list of the topics that are covered by the volumes of the System Administration Guides.
Book Title |
Topics |
---|---|
User accounts and groups, server and client support, shutting down and booting a system, managing services, and managing software (packages and patches) |
|
Terminals and modems, system resources (disk quotas, accounting, and crontabs), system processes, and troubleshooting Solaris software problems |
|
Removable media, disks and devices, file systems, and backing up and restoring data |
|
TCP/IP network administration, IPv4 and IPv6 address administration, DHCP, IPsec, IKE, Solaris IP filter, Mobile IP, IP network multipathing (IPMP), and IPQoS |
|
System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP) |
DNS, NIS, and LDAP naming and directory services, including transitioning from NIS to LDAP and transitioning from NIS+ to LDAP |
System Administration Guide: Naming and Directory Services (NIS+) |
NIS+ naming and directory services |
System Administration Guide: Network Interfaces and Network Virtualization |
Networking stack, NIC driver property configuration, network interface configuration, administration of VLANs and link aggregations, configuring WiFi wireless networking. |
Web cache servers, time-related services, network file systems (NFS and Autofs), mail, SLP, and PPP |
|
Auditing, device management, file security, BART, Kerberos services, PAM, Solaris Cryptographic Framework, privileges, RBAC, SASL, and Solaris Secure Shell |
|
System Administration Guide: Virtualization Using the Solaris Operating System |
Resource management features, which enable you to control how applications use available system resources; zones software partitioning technology, which virtualizes operating system services to create an isolated environment for running applications; and virtualization using SunTM xVM hypervisor technology, which supports multiple operating system instances simultaneously |
Solaris CIFS service, which enables you to configure a Solaris system to make CIFS shares available to CIFS clients; and native identity mapping services, which enables you to map user and group identities between Solaris systems and Windows systems |
|
ZFS storage pool and file system creation and management, snapshots, clones, backups, using access control lists (ACLs) to protect ZFS files, using ZFS on a Solaris system with zones installed, emulated volumes, and troubleshooting and data recovery |
|
System installation, configuration, and administration that is specific to Solaris Trusted Extensions |
|
Solaris printing topics and tasks, using services, tools, protocols, and technologies to set up and administer printing services and printers |
Third party URLs are referenced in this document and provide additional, related information.
Sun is not responsible for the availability of third-party web sites mentioned in this document. Sun does not endorse and is not responsible or liable for any content, advertising, products, or other materials that are available on or through such sites or resources. Sun will not be responsible or liable for any actual or alleged damage or loss caused by or in connection with the use of or reliance on any such content, goods, or services that are available on or through such sites or resources.
The Sun web site provides information about the following additional resources:
The following table describes the typographic conventions that are used in this book.
Table P–1 Typographic Conventions
Typeface |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories, and onscreen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with onscreen computer output |
machine_name% su Password: |
aabbcc123 |
Placeholder: replace with a real name or value |
The command to remove a file is rm filename. |
AaBbCc123 |
Book titles, new terms, and terms to be emphasized |
Read Chapter 6 in the User's Guide. A cache is a copy that is stored locally. Do not save the file. Note: Some emphasized items appear bold online. |
The following table shows the default UNIX system prompt and superuser prompt for shells that are included in the Solaris OS. Note that the default system prompt that is displayed in command examples varies, depending on the Solaris release.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
Bash shell, Korn shell, and Bourne shell |
$ |
Bash shell, Korn shell, and Bourne shell for superuser |
# |
C shell |
machine_name% |
C shell for superuser |
machine_name# |