System Administration Guide: Security Services

Chapter 14 Managing System Security Topics

This topic map identifies the chapters that are related to managing system security in the Solaris environment.

Chapter 15, Managing Machine Security (Overview)

Provides overview information about file security, machine security, and network security. 

Chapter 16, Securing Files (Tasks)

Provides step-by-step instructions on how to display file information, change file ownership and file permissions, and set special file permissions. 

Chapter 17, Securing Machines (Tasks)

Provides step-by-step instructions on how to protect machines, monitor machine use, and guard against the misuse of root access. 

Chapter 18, Role-Based Access Control (Overview)

Provides overview information for using role-based access control (RBAC). 

Chapter 19, Role-Based Access Control (Tasks)

Provides step-by-step instructions for using RBAC. 

Chapter 20, Role-Based Access Control (Reference)

Provides reference information about RBAC. 

Chapter 21, Using the Automated Security Enhancement Tool (Tasks)

Provides overview information about the Automated Security Enhancement Tool (ASET) and step-by-step instructions on how to run ASET interactively or periodically (by using a cron job). This chapter also includes information about collecting client ASET reports on a server.