System Administration Guide, Volume 2

Chapter 15 Managing System Security Topics

This section provides instructions for managing system security in the Solaris environment. This section contains these chapters.

Chapter 16, Managing System Security (Overview)

Provides overview information about file, system, and network security.  

Chapter 17, Securing Files (Tasks)

Provides step-by-step instructions to display file information, change file ownership and permissions, and set special permissions.  

Chapter 18, Securing Systems (Tasks)

Provides step-by-step instructions to check login status, set up dial-up passwords, restrict root access, and monitor root access and su attempts.

Chapter 19, Role-Based Access Control

Provides overview information and instructions for using role-based access control. 

Chapter 20, Using Authentication Services (Tasks)

Provides step-by-step instructions for setting up Kerberos login authentication and Pluggable Authentication Module (PAM).  

Chapter 21, SEAM Overview

Provides overview information about the Sun Enterprise Authentication Mechanism (SEAM) security product. 

Chapter 22, Configuring SEAM

Provides step-by-step instructions for configuring SEAM in your network. 

Chapter 23, SEAM Reference

Provides reference information on the SEAM security product. 

Chapter 24, Using Automated Security Enhancement Tool (Tasks)

Provides overview information about Automated Security Enhancement Tool (ASET) and step-by-step instructions to run ASET interactively or periodically (by using a cron job). It also includes information about collecting client ASET reports on a server.