System Administration Guide: Security Services is part of a multivolume set that covers a significant part of the SolarisTM system administration information. This book assumes that you have already installed the SunOSTM 5.9 operating system, and you have set up any networking software that you plan to use. The SunOS 5.9 operating system is part of the Solaris 9 product family, which also includes many features, such as the Solaris Common Desktop Environment (CDE).
The Solaris operating environment runs on two types of hardware, or platforms—SPARCTM and IA. The Solaris operating environment runs on both 64-bit and 32-bit address spaces. The information in this document pertains to both platforms and address spaces unless called out in a special chapter, section, note, bullet, figure, table, example, or code example.
This book is intended for anyone who is responsible for administering one or more systems that run the Solaris 9 release. To use this book, you should have one to two years of UNIX® system administration experience. Attending training courses in UNIX system administration might be helpful.
Here is a list of the topics that are covered by the volumes of the System Administration Guides.
Book Title |
Topics |
---|---|
User accounts and groups, server and client support, shutting down and booting a system, removable media, managing software (packages and patches), disks and devices, file systems, and backing up and restoring data |
|
Printing services, terminals and modems, system resources (disk quotas, accounting, and crontabs), system processes, and troubleshooting Solaris software problems |
|
TCP/IP networks, IPv4 and IPv6, DHCP, IP Security, Mobile IP, and IP Network Multipathing |
|
System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP) |
DNS, NIS, and LDAP naming and directory services |
System Administration Guide: Naming and Directory Services (FNS and NIS+) |
FNS and NIS+ naming and directory services |
System Administration Guide: Resource Management and Network Services |
Resource management, remote file systems, mail, SLP, and PPP |
Auditing, PAM, RBAC, and SEAM |
This is a list of related documentation that is referred to in this book.
Carasik, Anne. UNIX Secure Shell. McGraw Hill, 1999.
Cheswick, William R. and Steven M. Bellovin. Firewalls and Internet Security. Addison Wesley, 1994.
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table describes the typographic changes that are used in this book.
Table P–1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 | The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 | What you type, contrasted with on-screen computer output |
machine_name% su Password: |
AaBbCc123 | Command-line placeholder: replace with a real name or value |
To delete a file, type rm filename. |
AaBbCc123 |
Book titles, new words, or terms, or words to be emphasized. |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell prompt | machine_name% |
C shell superuser prompt | machine_name# |
Bourne shell and Korn shell prompt | $ |
Bourne shell and Korn shell superuser prompt | # |