Solaris Naming Administration Guide

Solaris Security--Overview

In essence, Solaris security is provided by gates that users must pass through in order to enter the Solaris environment, and permission matrixes that determine what they are able to do once inside. (See Figure 6-1 for a schematic representation of this system.)

Figure 6-1 Solaris Security Gates and Filters


As you can see in Figure 6-1, the overall system is composed of four gates and two permission matrixes: