System Administration Guide

Authentication and Authorization

Authentication is a way to restrict access to specific users when accessing a remote system, which can be set up at both the system or network level. Once a user gains access to a remote system, authorization is a way to restrict operations that the user can perform on the remote system. Table 50-3 lists the types of authentications and authorizations that can help protect your systems on the network against unauthorized use.

Table 50-3 Types of Authentication and Authorization

Type 

Description 

Where to Find Information 

NIS+  

The NIS+ name service can provide both authentication and authorization at the network level. 

NIS+ and FNS Administration Guide

Remote Login Programs  

The remote login programs (rlogin, rcp, ftp) enable users to log in to a remote system over the network and use its resources. If you are a "trusted host," authentication is automatic; otherwise, you are asked to authenticate yourself.

Chapter 46, Working With Remote Systems (Tasks)

Secure RPC  

Secure RPC improves the security of network environments by authenticating users who make requests on remote systems. You can use either the UNIX, DES, or Kerberos authentication system for Secure RPC.  

NFS Administration Guide

 

Secure RPC can also be used to provide additional security to the NFS(TM) environment, called Secure NFS. 

"NFS Services and Secure RPC"

DES Encryption 

The Data Encryption Standard (DES) encryption functions use a 56-bit key to encrypt a secret key.  

"DES Encryption"

Diffie-Hellman Authentication 

This authentication method is based on the ability of the sending system to use the common key to encrypt the current time, which the receiving system can decrypt and check against its current time.  

"Diffie-Hellman Authentication"

Kerberos Version 4 

Kerberos uses DES encryption to authenticate a user when logging in to the system.  

"Kerberos Version 4"

Solstice AdminSuite  

The Solstice AdminSuite product provides authentication and authorization mechanisms to remotely manage systems with the AdminSuite tools. 

Solstice AdminSuite 2.3 Administration Guide