The following task map points to tasks for using the cryptographic framework.
Task |
Description |
For Instructions |
---|---|---|
Protect individual files or sets of files |
Ensures that file content has not been tampered with. Prevents files from being read by intruders. These procedures can be done by ordinary users. |
Protecting Files With the Solaris Cryptographic Framework (Task Map) |
Administer the framework |
Adds, configures, and removes software providers. Disables and enables hardware provider mechanisms. These procedures are administrative procedures. | |
Sign a provider |
Enables a provider to be added to the Solaris Cryptographic Framework. These procedures are developer procedures. |
Appendix F, Packaging and Signing Cryptographic Providers, in Solaris Security for Developers Guide. |