System Administration Guide: Security Services is part of a multivolume set that covers a significant part of the SolarisTM system administration information. This book assumes that you have already installed the SunOSTM 5.9 operating system. This book also assumes that you have set up the networking software that you plan to use. The SunOS 5.9 operating system is part of the Solaris 9 product family. The Solaris 9 product family includes many features, such as the Solaris Common Desktop Environment (CDE).
The Solaris operating environment runs on two types of hardware, or platforms – the SPARC® platform and the x86 platform. The Solaris operating environment runs on a 64-bit address space and a 32-bit address space. The information in this document pertains to both platforms and to both address spaces. Exceptions are called out in a special chapter, section, note, bullet, figure, table, example, or code example.
This book is intended for anyone who is responsible for administering one or more systems that run the Solaris 9 release. To use this book, you should have one year to two years of UNIX® system administration experience. Your attending training courses in UNIX system administration might be helpful.
The following is a list of the topics that are covered by the volumes of the System Administration Guides.
Book Title |
Topics |
---|---|
User accounts and groups, server and client support, shutting down and booting a system, removable media, managing software (packages and patches), disks and devices, file systems, and backing up and restoring data |
|
Printing services, terminals and modems, system resources (disk quotas, accounting, and crontabs), system processes, and troubleshooting Solaris software problems |
|
TCP/IP networks, IPv4 and IPv6, DHCP, IP Security, Mobile IP, and IP Network Multipathing |
|
System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP) |
DNS, NIS, and LDAP naming and directory services |
System Administration Guide: Naming and Directory Services (FNS and NIS+) |
FNS and NIS+ naming and directory services |
System Administration Guide: Resource Management and Network Services |
Resource management, remote file systems, mail, SLP, and PPP |
Auditing, Device allocation, PAM, RBAC, Solaris Secure Shell, and SEAM |
The following is a list of related documentation that is referred to in this book.
Carasik, Anne. UNIX Secure Shell. McGraw Hill, 1999.
Cheswick, William R. and Steven M. Bellovin. Firewalls and Internet Security. Addison Wesley, 1994.
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table describes the typographic changes that are used in this book.
Table P–1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories On-screen computer output |
Edit your .login file. Use ls -a to list all files. machine_name% you have mail. |
AaBbCc123 |
What you type, contrasted with on-screen computer output |
machine_name% su Password: |
AaBbCc123 |
Command-line placeholder that you replace with a real name or value |
To delete a file, type rm filename. |
AaBbCc123 |
Book titles, new words, or terms, or words to be emphasized. |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P–2 Shell Prompts
Shell |
Prompt |
---|---|
C shell prompt | machine_name% |
C shell superuser prompt | machine_name# |
Bourne shell and Korn shell prompt | $ |
Role shell prompt | $ |
Bourne shell and Korn shell superuser prompt | # |