Securing Systems and Attached Devices in Oracle® Solaris 11.2

Exit Print View

Updated: September 2014
 
 

S

–S option
st_clean scriptindex iconWriting New Device-Clean Scripts
scripts for cleaning devices  Seeindex icondevice-clean scripts
SCSI devices
st_clean scriptindex icondevice_allocate File
Secure by Default installation optionindex iconUsing the Secure by Default Configuration
Secure RPC
alternativeindex iconAuthentication Services for Remote Access
overviewindex iconAuthentication and Authorization for Remote Access
securing
network at installationindex iconUsing the Secure by Default Configuration
passwordsindex iconSecuring Logins and Passwords Task Map
security
device allocationindex iconControlling Access to Devices
devicesindex iconControlling Access to Devices
installation optionsindex iconUsing the Secure by Default Configuration
netservices limited installation optionindex iconUsing the Secure by Default Configuration
password encryptionindex iconPassword Encryption
preventing remote loginindex iconHow to Restrict and Monitor root Logins
protecting against denial of serviceindex iconUsing Resource Management Features
protecting against Trojan horseindex iconSetting the PATH Variable
protecting devicesindex iconDevice-Clean Scripts
protecting hardwareindex iconControlling Access to System Hardware
protecting PROMindex iconControlling Access to System Hardware
Secure by Defaultindex iconUsing the Secure by Default Configuration
system hardwareindex iconControlling Access to System Hardware
systemsindex iconManaging Machine Security
security attributes
using to mount allocated deviceindex iconHow to Authorize Users to Allocate a Device
Service Management Facility (SMF)  Seeindex iconSMF
setuid permissions
security risksindex iconRestricting setuid Executable Files
SHA-2 algorithmsindex iconPassword Encryption Algorithms
sharing files
and network securityindex iconSharing Files Across Machines
SMF
device allocation serviceindex iconDevice Allocation Service
managing Secure by Default configurationindex iconUsing the Secure by Default Configuration
solaris.device.revoke authorizationindex iconAuthorizations for the Allocation Commands
sr_clean script
descriptionindex iconDevice-Clean Scripts for Diskettes and CD-ROM Drives
st_clean script
index iconDevice-Clean Script for Tapes
index icondevice_allocate File
standard cleanup
st_clean scriptindex iconWriting New Device-Clean Scripts
starting
device allocationindex iconHow to Enable Device Allocation
su command
displaying access attempts on consoleindex iconHow to Restrict and Monitor root Logins
monitoring useindex iconHow to Monitor Who Is Using the su Command
su file
monitoring su commandindex iconHow to Monitor Who Is Using the su Command
sulog fileindex iconHow to Monitor Who Is Using the su Command
Sun MD5 algorithmindex iconPassword Encryption Algorithms
superuser  Seeindex iconroot role
svc:/system/device/allocate
device allocation serviceindex iconDevice Allocation Service
System Administrator rights
protecting hardwareindex iconHow to Require a Password for SPARC Hardware Access
system calls
ioctl to clean audio deviceindex iconDevice-Clean Script for Audio
system hardware
controlling access toindex iconControlling Access to System Hardware
system security
accessindex iconManaging Machine Security
displaying
user's login status
index iconDisplaying a User's Login Status
index iconHow to Display the User's Login Status
users with no passwordsindex iconHow to Display Users Without Passwords
firewall systemsindex iconFirewall Systems
hardware protection
index iconControlling Access to System Hardware
index iconMaintaining Physical Security
login access restrictions
index iconMaintaining Login Control
index iconMaintaining Login Control
machine accessindex iconMaintaining Physical Security
overview
index iconControlling Access to a Computer System
index iconManaging Machine Security
password encryptionindex iconPassword Encryption
passwordsindex iconManaging Password Information
restricted shell
index iconAssigning a Restricted Shell to Users
index iconAssigning a Restricted Shell to Users
restricting remote root accessindex iconHow to Restrict and Monitor root Logins
role-based access control (RBAC)index iconConfiguring Role-Based Access Control to Replace Superuser
root access restrictions
index iconHow to Restrict and Monitor root Logins
index iconRestricting root Access to Shared Files
special accountsindex iconSpecial System Accounts
su command monitoring
index iconHow to Monitor Who Is Using the su Command
index iconLimiting and Monitoring Superuser Access
system variables  See alsoindex iconvariables
CRYPT_DEFAULTindex iconHow to Specify an Algorithm for Password Encryption
KEYBOARD_ABORTindex iconHow to Disable a System's Abort Sequence