System Administration Guide: Security Services

Part I Security Overview

This book focuses on the features that enhance security in the SolarisTM operating environment. This book is intended for system administrators and users of these security features. The following is a list of the information in the overview chapter.

Chapter 1 Security Services (Overview)

Introduction to Security Services

To maintain the security of its computing environment, the Solaris operating environment software provides the following features:

For a general discussion of system security, see Chapter 2, Managing Machine Security (Overview).

Machine Security

Machine security ensures that the machine's resources are used properly. Access control enables users or administrators to restrict the users who are permitted access to resources on the system. The Solaris operating environment features for machine security and access control include the following:

Authentication Services

Authentication is a mechanism that identifies a user or service based on predefined criteria. Authentication services range from simple name-password pairs to more elaborate challenge-response systems, such as smart cards and biometrics. Strong authentication mechanisms rely on a user supplying information that only that person knows, and something that can be verified. A user name is an example of something that the person knows. A smart card or a fingerprint is an example of something that can be verified. The Solaris operating environment features for authentication include the following:

Secure Communication

The basis of secure communication is requiring authentication with encryption. Authentication helps ensure that the source and the destination are the intended parties. Encryption codes the communication at the source, and decodes the communication at the target. Encryption prevents intruders from reading any transmissions that the intruders might manage to intercept. The Solaris operating environment features for secure communication include the following:

Auditing and Device Management

Auditing is a fundamental concept of system security and maintainability. Auditing is the process of examining the history of actions and events on a system to find out what happened. Auditing entails keeping a log of what was done, by whom, when the action was done, and what was affected. Device management controls the allocation of peripheral devices, such as diskettes and CD-ROMs. For more information on Solaris auditing and device management, see Chapter 20, BSM (Overview).