Access control enables users or administrators to restrict the users who are permitted access to resources on the system. The Solaris operating environment features for access control include the following:
UNIX® permissions – Attributes of a file or directory that control the users and groups that are permitted to read, write, or execute a file, or search a directory. See Chapter 15, Securing Files (Tasks).
Role-Based Access Control (RBAC) – An architecture for creating special, restricted user accounts that are permitted to perform specific security-related tasks. See Chapter 17, Role-Based Access Control (Overview).
Device Allocation – A facility that enables restriction on who can use a device, such as a floppy or CD-ROM drive. The facility ensures that a device is used by only one qualified user at a time. See Managing Device Allocation.
Security Enhancement – Through the use of scripts, many system files and parameters can be adjusted to reduce security risks. See Chapter 20, Using the Automated Security Enhancement Tool (Tasks).