JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
SPARC M5-32 and SPARC M6-32 Servers Security Guide
Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon

Document Information

Understanding Hardware Security

Understanding Software Security

Prevent Unauthorized Access (Oracle Solaris OS)

Prevent Unauthorized Access (Oracle ILOM)

Prevent Unauthorized Access (Oracle VM Server for SPARC)

Restricting Access (OpenBoot)

Implement Password Protection (OpenBoot)

Check for Failed Logins (OpenBoot)

Provide a Power-On Banner (OpenBoot)

Oracle System Firmware

Secure WAN Boot

Prevent Unauthorized Access (Oracle ILOM)

  1. Use the Oracle ILOM commands to restrict user access to the Oracle ILOM software, to change the factory-set password, to limit the use of the root superuser account, and to secure the private network to the service processor.

    Obtain the Oracle ILOM Security Guide at:

    http://www.oracle.com/goto/ILOM/docs

  2. Use the platform-specific Oracle ILOM commands to secure individual domains by creating user accounts with roles that apply to a specific physical domain.

    When you assign user roles to a physical domain, the capabilities for that domain mirror those of the user roles assigned for the platform, but they are restricted to the commands executed on the given component.


    Note - Only user roles of administrator (a), console (c), and reset (r) can be assigned for individual physical domains.

    Obtain the SPARC M5-32 and SPARC M6-32 Servers Administration Guide at:

    http://www.oracle.com/goto/M6-32/docs