JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Oracle Solaris Secure Shell (Tasks)

20.  Oracle Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Oracle Solaris Auditing (Tasks)

31.  Oracle Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

C

-C option, auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
C shell, privileged version, index iconProfile Shells and RBAC
-c option
auditreduce command
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
bsmrecord command, index iconHow to Display Audit Record Formats
c2audit:audit_load entry, system file, index iconsystem File
c2audit module, verifying is loaded, index iconHow to Determine That Oracle Solaris Auditing Is Running
cache, credential, index iconHow the Kerberos Authentication System Works
canon_user_plugin option, SASL and, index iconSASL Options
caret (^) in audit class prefixes, index iconAudit Class Syntax
CD-ROM drives
allocating, index iconHow to Mount an Allocated Device
security, index iconDevice-Clean Scripts
cdrw command, authorizations required, index iconCommands That Require Authorizations
certificates
exporting for use by another system, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
generating with pktool gencert command, index iconHow to Create a Certificate by Using the pktool gencert Command
importing into keystore, index iconHow to Import a Certificate Into Your Keystore
ChallengeResponseAuthentication keyword, See KbdInteractiveAuthentication keyword
changepw principal, index iconAdministering Keytab Files
changing
ACL entries, index iconHow to Change ACL Entries on a File
allocatable devices, index iconHow to Change Which Devices Can Be Allocated
audit_class file, index iconHow to Add an Audit Class
audit_control file, index iconHow to Modify the audit_control File
audit_event file, index iconHow to Change an Audit Event's Class Membership
default password algorithm, index iconChanging the Password Algorithm (Task Map)
device policy, index iconHow to Change the Device Policy on an Existing Device
file ownership, index iconHow to Change the Owner of a Local File
file permissions
absolute mode, index iconHow to Change File Permissions in Absolute Mode
special, index iconHow to Change Special File Permissions in Absolute Mode
symbolic mode, index iconHow to Change File Permissions in Symbolic Mode
group ownership of file, index iconHow to Change Group Ownership of a File
NFS secret keys, index iconImplementation of Diffie-Hellman Authentication
passphrase for Secure Shell, index iconHow to Change the Passphrase for a Secure Shell Private Key
password algorithm for a domain, index iconHow to Specify a New Password Algorithm for an NIS Domain
password algorithm task map, index iconChanging the Password Algorithm (Task Map)
password of role, index iconHow to Change the Password of a Role
properties of role, index iconHow to Change the Properties of a Role
rights profile contents, index iconHow to Create or Change a Rights Profile
rights profile from command line, index iconHow to Create or Change a Rights Profile
root user into role, index iconHow to Make root User Into a Role
special file permissions, index iconHow to Change Special File Permissions in Absolute Mode
user properties from command line, index iconHow to Change the RBAC Properties of a User
your password with kpasswd, index iconChanging Your Password
your password with passwd, index iconChanging Your Password
CheckHostIP keyword, ssh_config file, index iconKeywords in Secure Shell
chgrp command
description, index iconCommands for Viewing and Securing Files
syntax, index iconHow to Change Group Ownership of a File
chkey command
index iconImplementation of Diffie-Hellman Authentication
index iconHow to Set Up a Diffie-Hellman Key for an NIS User
chmod command
changing special permissions
index iconHow to Change Special File Permissions in Absolute Mode
index iconHow to Change Special File Permissions in Absolute Mode
description, index iconCommands for Viewing and Securing Files
syntax, index iconHow to Change Special File Permissions in Absolute Mode
choosing, your password, index iconAdvice on Choosing a Password
chown command, description, index iconCommands for Viewing and Securing Files
ChrootDirectory keyword, ssh_config file, index iconKeywords in Secure Shell
Cipher keyword, ssh_config file, index iconKeywords in Secure Shell
Ciphers keyword, Secure Shell, index iconKeywords in Secure Shell
cklist.rpt file
index iconSystem Files Checks
index iconFormat of ASET Report Files
CKLISTPATH_level variable (ASET), index iconCKLISTPATH_level Environment Variables
classes, See audit classes
cleaning up, binary audit files, index iconHow to Clean Up a not_terminated Audit File
clear protection level, index iconOverview of Kerberized Commands
ClearAllForwardings keyword, Secure Shell port forwarding, index iconKeywords in Secure Shell
client names, planning for in Kerberos, index iconClient and Service Principal Names
ClientAliveCountMax keyword, ssh_config file, index iconKeywords in Secure Shell
ClientAliveInterval keyword, ssh_config file, index iconKeywords in Secure Shell
clients
AUTH_DH client-server session, index iconImplementation of Diffie-Hellman Authentication
configuring for Secure Shell
index iconSession Characteristics in Secure Shell
index iconClient Configuration in Secure Shell
configuring Kerberos, index iconConfiguring Kerberos Clients
definition in Kerberos, index iconAuthentication-Specific Terminology
clntconfig principal
creating
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
clock skew
Kerberos and, index iconSynchronizing Clocks Between KDCs and Kerberos Clients
Kerberos planning and, index iconClock Synchronization Within a Realm
clock synchronizing
Kerberos master KDC and
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
Kerberos planning and, index iconClock Synchronization Within a Realm
Kerberos slave KDC and, index iconHow to Manually Configure a Slave KDC
Kerberos slave server and, index iconHow to Configure a Slave KDC to Use Full Propagation
cmd audit token
index iconAuditing Enhancements in the Solaris 10 Release
index iconcmd Token
cnt audit policy, description, index iconDetermining Audit Policy
combining audit files
auditreduce command
index iconHow to Merge Audit Files From the Audit Trail
index iconauditreduce Command
from different zones, index iconAuditing and Oracle Solaris Zones
command execution, Secure Shell, index iconCommand Execution and Data Forwarding in Secure Shell
command-line equivalents of SEAM Tool, index iconCommand-Line Equivalents of the SEAM Tool
commands
See also individual commands
ACL commands, index iconCommands for Administering UFS ACLs
auditing commands, index iconAudit Commands
cryptographic framework commands, index iconAdministrative Commands in the Oracle Solaris Cryptographic Framework
determining user's privileged commands, index iconHow to Determine the Privileged Commands That You Can Run
device allocation commands, index iconDevice Allocation Commands
device policy commands, index iconDevice Policy Commands
file protection commands, index iconCommands for Viewing and Securing Files
for administering privileges, index iconAdministrative Commands for Handling Privileges
Kerberos, index iconKerberos Commands
RBAC administration commands, index iconCommands That Manage RBAC
Secure RPC commands, index iconImplementation of Diffie-Hellman Authentication
Secure Shell commands, index iconSecure Shell Commands
that assign privileges, index iconAssigning Privileges
that check for privileges, index iconApplications That Check for Privileges
user-level cryptographic commands, index iconUser-Level Commands in the Oracle Solaris Cryptographic Framework
common keys
calculating, index iconImplementation of Diffie-Hellman Authentication
DH authentication and, index iconDiffie-Hellman Authentication and Secure RPC
components
BART, index iconBART Components
device allocation mechanism, index iconComponents of Device Allocation
RBAC, index iconOracle Solaris RBAC Elements and Basic Concepts
Secure Shell user session, index iconCommand Execution and Data Forwarding in Secure Shell
Compression keyword, Secure Shell, index iconKeywords in Secure Shell
CompressionLevel keyword, ssh_config file, index iconKeywords in Secure Shell
Computer Emergency Response Team/Coordination Center (CERT/CC), index iconReporting Security Problems
computer security, See system security
computing
DH key, index iconHow to Set Up a Diffie-Hellman Key for an NIS Host
digest of a file, index iconHow to Compute a Digest of a File
MAC of a file, index iconHow to Compute a MAC of a File
secret key
index iconHow to Generate a Symmetric Key by Using the dd Command
index iconHow to Generate a Symmetric Key by Using the pktool Command
configuration decisions
auditing
file storage, index iconHow to Plan Storage for Audit Records
policy, index iconDetermining Audit Policy
who and what to audit, index iconHow to Plan Who and What to Audit
zones, index iconHow to Plan Auditing in Zones
Kerberos
client and service principal names, index iconClient and Service Principal Names
clients, index iconClient Configuration Options
clock synchronization, index iconClock Synchronization Within a Realm
database propagation, index iconWhich Database Propagation System to Use
encryption types, index iconKerberos Encryption Types
KDC server, index iconKDC Configuration Options
mapping host names onto realms, index iconMapping Host Names Onto Realms
number of realms, index iconNumber of Realms
ports, index iconPorts for the KDC and Admin Services
realm hierarchy, index iconRealm Hierarchy
realm names, index iconRealm Names
realms, index iconPlanning Kerberos Realms
slave KDCs, index iconThe Number of Slave KDCs
password algorithm, index iconPassword Encryption
configuration files
ASET, index iconAutomated Security Enhancement Tool (ASET)
audit_class file, index iconaudit_class File
audit_control file
index iconHow to Modify the audit_control File
index iconauditd Daemon
index iconaudit_control File
audit_event file, index iconaudit_event File
audit_startup script, index iconaudit_startup Script
audit_user database, index iconaudit_user Database
device_maps file, index icondevice_maps File
nsswitch.conf file, index iconMaintaining Login Control
for password algorithms, index iconPassword Encryption
policy.conf file
index iconPassword Encryption
index iconHow to Specify an Algorithm for Password Encryption
index iconCommands That Manage RBAC
Secure Shell, index iconSession Characteristics in Secure Shell
syslog.conf file
index iconHow to Monitor All Failed Login Attempts
index iconFiles With Privilege Information
index iconsyslog.conf File
system file, index iconsystem File
with privilege information, index iconFiles With Privilege Information
configuring
ahlt audit policy, index iconHow to Configure Audit Policy
ASET
index iconConfiguring ASET
index iconModifying the Tune Files
audit_class file, index iconHow to Add an Audit Class
audit_control file, index iconHow to Modify the audit_control File
audit_event file, index iconHow to Change an Audit Event's Class Membership
audit files, index iconConfiguring Audit Files (Tasks)
audit files task map, index iconConfiguring Audit Files (Task Map)
audit policy, index iconHow to Configure Audit Policy
audit policy temporarily, index iconHow to Configure Audit Policy
audit service task map, index iconConfiguring and Enabling the Audit Service (Task Map)
audit_startup script, index iconHow to Configure Audit Policy
audit trail overflow prevention, index iconHow to Prevent Audit Trail Overflow
audit_user database, index iconHow to Change a User's Audit Characteristics
audit_warn script, index iconHow to Configure the audit_warn Email Alias
auditconfig command, index iconauditconfig Command
auditing in zones
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
custom roles, index iconHow to Create a Role From the Command Line
device allocation, index iconManaging Device Allocation (Task Map)
device policy, index iconConfiguring Device Policy (Task Map)
devices task map, index iconConfiguring Devices (Task Map)
DH key for NIS+ user, index iconHow to Set Up a Diffie-Hellman Key for an NIS+ User
DH key for NIS user, index iconHow to Set Up a Diffie-Hellman Key for an NIS User
DH key in NIS, index iconHow to Set Up a Diffie-Hellman Key for an NIS Host
DH key in NIS+, index iconHow to Set Up a Diffie-Hellman Key for an NIS+ Host
dial-up logins, index iconHow to Create a Dial-Up Password
hardware security, index iconControlling Access to System Hardware
host-based authentication for Secure Shell, index iconHow to Set Up Host-Based Authentication for Secure Shell
identical auditing for non-global zones, index iconHow to Configure All Zones Identically for Auditing
Kerberos
adding administration principals
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
clients, index iconConfiguring Kerberos Clients
cross-realm authentication, index iconConfiguring Cross-Realm Authentication
master KDC server, index iconHow to Manually Configure a Master KDC
master KDC server using LDAP, index iconHow to Configure a KDC to Use an LDAP Data Server
NFS servers, index iconHow to Configure Kerberos NFS Servers
overview, index iconConfiguring the Kerberos Service (Tasks)
slave KDC server, index iconHow to Manually Configure a Slave KDC
task map, index iconConfiguring the Kerberos Service (Task Map)
name service, index iconHow to Make root User Into a Role
password for hardware access, index iconHow to Require a Password for Hardware Access
per-zone auditing, index iconHow to Configure Per-Zone Auditing
perzone audit policy, index iconHow to Configure Audit Policy
port forwarding in Secure Shell, index iconHow to Configure Port Forwarding in Secure Shell
RBAC
index iconConfiguring RBAC
index iconHow to Plan Your RBAC Implementation
RBAC task map, index iconConfiguring RBAC (Task Map)
rights profile from command line, index iconHow to Create or Change a Rights Profile
rights profiles
index iconHow to Create or Change a Rights Profile
index iconHow to Create or Change a Rights Profile
roles
index iconHow to Create and Assign a Role by Using the GUI
index iconHow to Change the Properties of a Role
from command line, index iconHow to Create a Role From the Command Line
root user as role, index iconHow to Make root User Into a Role
Secure Shell, index iconOracle Solaris Secure Shell (Task Map)
clients, index iconClient Configuration in Secure Shell
servers, index iconServer Configuration in Secure Shell
Secure Shell task map, index iconConfiguring Oracle Solaris Secure Shell (Task Map)
ssh-agent daemon, index iconHow to Set Up the ssh-agent Command to Run Automatically in CDE
textual audit logs, index iconHow to Configure syslog Audit Logs
configuring application servers, index iconConfiguring Kerberos Network Application Servers
ConnectionAttempts keyword, ssh_config file, index iconKeywords in Secure Shell
console, displaying su command attempts, index iconHow to Restrict and Monitor Superuser Logins
CONSOLE in Secure Shell, index iconSecure Shell and Login Environment Variables
consumers, definition in cryptographic framework, index iconTerminology in the Oracle Solaris Cryptographic Framework
context-sensitive help, SEAM Tool, index iconPrint and Online Help Features of the SEAM Tool
control manifests (BART), index iconBasic Audit Reporting Tool (Overview)
controlling
access to system hardware, index iconSPARC: Controlling Access to System Hardware (Task Map)
system access, index iconControlling System Access (Task Map)
system usage, index iconControlling Access to Machine Resources
conversation keys
decrypting in secure RPC, index iconImplementation of Diffie-Hellman Authentication
generating in secure RPC, index iconImplementation of Diffie-Hellman Authentication
converting
audit records to readable format
index iconHow to View the Contents of Binary Audit Files
index iconpraudit Command
copying
ACL entries, index iconHow to Copy an ACL
files using Secure Shell, index iconHow to Copy Files With Secure Shell
copying audit messages to single file, index iconHow to Select Audit Events From the Audit Trail
cost control, and auditing, index iconControlling Auditing Costs
crammd5.so.1 plug-in, SASL and, index iconSASL Plug-ins
creating
audit trail
auditd daemon, index iconAudit Trail
auditd daemon's role, index iconauditd Daemon
credential table, index iconHow to Create a Credential Table
customized role, index iconHow to Create a Role From the Command Line
d_passwd file, index iconHow to Create a Dial-Up Password
dial-up passwords
index iconHow to Create a Dial-Up Password
index iconHow to Create a Dial-Up Password
/etc/d_passwd file, index iconHow to Create a Dial-Up Password
file digests, index iconHow to Compute a Digest of a File
keytab file
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
local user, index iconHow to Make root User Into a Role
new device-clean scripts, index iconDevice-Clean Scripts
new policy (Kerberos)
index iconHow to Create a New Kerberos Principal
index iconHow to Create a New Kerberos Policy
new principal (Kerberos), index iconHow to Create a New Kerberos Principal
Operator role, index iconHow to Create and Assign a Role by Using the GUI
partitions for binary audit files, index iconHow to Create Partitions for Audit Files
passwords for temporary user, index iconHow to Create a Dial-Up Password
rights profiles, index iconHow to Create or Change a Rights Profile
rights profiles with Solaris Management Console, index iconHow to Create or Change a Rights Profile
roles
for particular profiles, index iconHow to Create and Assign a Role by Using the GUI
on command line, index iconHow to Create a Role From the Command Line
with limited scope, index iconHow to Create and Assign a Role by Using the GUI
root user as role, index iconHow to Make root User Into a Role
secret keys
for encryption
index iconHow to Generate a Symmetric Key by Using the dd Command
index iconHow to Generate a Symmetric Key by Using the pktool Command
Secure Shell keys, index iconHow to Generate a Public/Private Key Pair for Use With Secure Shell
security-related roles, index iconHow to Create and Assign a Role by Using the GUI
stash file
index iconHow to Manually Configure a Slave KDC
index iconHow to Configure a Slave KDC to Use Full Propagation
System Administrator role, index iconHow to Create and Assign a Role by Using the GUI
tickets with kinit, index iconCreating a Kerberos Ticket
cred database
adding client credential, index iconHow to Set Up a Diffie-Hellman Key for an NIS+ Host
adding user credential, index iconHow to Set Up a Diffie-Hellman Key for an NIS+ User
DH authentication, index iconDiffie-Hellman Authentication and Secure RPC
cred table
DH authentication and, index iconDiffie-Hellman Authentication and Secure RPC
information stored by server, index iconImplementation of Diffie-Hellman Authentication
credential
cache, index iconHow the Kerberos Authentication System Works
description
index iconImplementation of Diffie-Hellman Authentication
index iconAuthentication-Specific Terminology
obtaining for a server, index iconObtaining a Credential for a Server
obtaining for a TGS, index iconObtaining a Credential for the Ticket-Granting Service
or tickets, index iconHow the Kerberos Service Works
credential table, adding single entry to, index iconHow to Add a Single Entry to the Credential Table
credentials, mapping, index iconMapping GSS Credentials to UNIX Credentials
crontab files
authorizations required, index iconCommands That Require Authorizations
running ASET periodically, index iconAutomated Security Enhancement Tool (ASET)
stop running ASET periodically, index iconHow to Stop Running ASET Periodically
cross-realm authentication, configuring, index iconConfiguring Cross-Realm Authentication
CRYPT_ALGORITHMS_ALLOW keyword, policy.conf file, index iconPassword Encryption
CRYPT_ALGORITHMS_DEPRECATE keyword, policy.conf file, index iconPassword Encryption
crypt_bsdbf password algorithm, index iconPassword Encryption
crypt_bsdmd5 password algorithm, index iconPassword Encryption
crypt command, file security, index iconProtecting Files With Encryption
crypt.conf file
changing with new password module, index iconHow to Install a Password Encryption Module From a Third Party
third-party password modules, index iconHow to Install a Password Encryption Module From a Third Party
CRYPT_DEFAULT keyword, policy.conf file, index iconPassword Encryption
CRYPT_DEFAULT system variable, index iconHow to Specify an Algorithm for Password Encryption
crypt_sha256 password algorithm, index iconPassword Encryption
crypt_sunmd5 password algorithm
index iconPassword Encryption
index iconPassword Encryption
crypt_unix password algorithm
index iconPassword Encryption
index iconChanging the Default Algorithm for Password Encryption
Crypto Management (RBAC)
creating role, index iconHow to Assign a Role to a Local User
use of rights profile
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
cryptoadm command
description, index iconScope of the Oracle Solaris Cryptographic Framework
disabling cryptographic mechanisms
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
disabling hardware mechanisms, index iconHow to Disable Hardware Provider Mechanisms and Features
installing PKCS #11 library, index iconHow to Add a Software Provider
listing providers, index iconHow to List Available Providers
-m option
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
-p option
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
restoring kernel software provider, index iconHow to Prevent the Use of a Kernel Software Provider
cryptoadm install command, installing PKCS #11 library, index iconHow to Add a Software Provider
cryptographic framework
administering with role, index iconHow to Assign a Role to a Local User
connecting providers, index iconPlugins to the Oracle Solaris Cryptographic Framework
consumers, index iconOracle Solaris Cryptographic Framework
cryptoadm command
index iconScope of the Oracle Solaris Cryptographic Framework
index iconAdministrative Commands in the Oracle Solaris Cryptographic Framework
definition of terms, index iconTerminology in the Oracle Solaris Cryptographic Framework
description, index iconOracle Solaris Cryptographic Framework
elfsign command
index iconScope of the Oracle Solaris Cryptographic Framework
index iconBinary Signatures for Third-Party Software
error messages, index iconHow to Encrypt and Decrypt a File
hardware plugins, index iconOracle Solaris Cryptographic Framework
installing providers, index iconPlugins to the Oracle Solaris Cryptographic Framework
interacting with, index iconScope of the Oracle Solaris Cryptographic Framework
listing providers
index iconHow to List Available Providers
index iconHow to List Available Providers
PKCS #11 library, index iconOracle Solaris Cryptographic Framework
providers
index iconOracle Solaris Cryptographic Framework
index iconTerminology in the Oracle Solaris Cryptographic Framework
refreshing, index iconHow to Refresh or Restart All Cryptographic Services
registering providers, index iconPlugins to the Oracle Solaris Cryptographic Framework
restarting, index iconHow to Refresh or Restart All Cryptographic Services
signing providers, index iconPlugins to the Oracle Solaris Cryptographic Framework
task maps, index iconUsing the Cryptographic Framework (Task Map)
user-level commands, index iconUser-Level Commands in the Oracle Solaris Cryptographic Framework
zones and
index iconCryptographic Services and Zones
index iconHow to Refresh or Restart All Cryptographic Services
cryptographic services, See cryptographic framework
Cryptoki, See PKCS #11 library
csh command, privileged version, index iconProfile Shells and RBAC
.cshrc file, path variable entry, index iconSetting the PATH Variable
Custom Operator (RBAC), creating role, index iconHow to Create a Role From the Command Line
customizing, manifests, index iconHow to Customize a Manifest
customizing a report (BART), index iconHow to Customize a BART Report by Using a Rules File