This section provides instructions for managing system security in the Solaris environment. This section contains these chapters.
Provides overview information about file, system, and network security. |
|
Provides step-by-step instructions to display file information, change file ownership and permissions, and set special permissions. |
|
Provides step-by-step instructions to check login status, set up dial-up passwords, restrict root access, and monitor root access and su attempts. |
|
Provides overview information and instructions for using role-based access control. |
|
Provides step-by-step instructions for setting up Kerberos login authentication and Pluggable Authentication Module (PAM). |
|
Provides overview information about the Sun Enterprise Authentication Mechanism (SEAM) security product. |
|
Provides step-by-step instructions for configuring SEAM in your network. |
|
Provides reference information on the SEAM security product. |
|
Chapter 24, Using Automated Security Enhancement Tool (Tasks) |
Provides overview information about Automated Security Enhancement Tool (ASET) and step-by-step instructions to run ASET interactively or periodically (by using a cron job). It also includes information about collecting client ASET reports on a server. |