To help a site secure its computing environment, the Solaris operating environment software provides the following:
Authentication – The ability to securely identify a user, requiring the user's name and some form of proof (typically a password)
Access Control – The ability to restrict users to only those parts of the system that are necessary for their job
Secure Communication – The ability to ensure that authenticated parties can communicate without interception, modification, or spoofing
Auditing – The ability to identify the source of security changes to the system, including file access, security-related system calls, and authentication failures
For a general discussion of system security, see Chapter 14, Managing System Security (Overview).