JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Virus Scanning Service (Tasks)

5.  Controlling Access to Devices (Tasks)

6.  Using the Basic Audit Reporting Tool (Tasks)

7.  Controlling Access to Files (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Oracle Solaris Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Solaris Secure Shell (Tasks)

20.  Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Oracle Solaris Auditing (Tasks)

31.  Oracle Solaris Auditing (Reference)

Oracle Solaris Audit Service

Audit Commands

audit Command

audit_warn Script

auditconfig Command

auditrecord Command

auditreduce Command

auditstat Command

praudit Command

Files Used in the Audit Service

audit_class File

audit_event File

syslog.conf File

Rights Profiles for Administering Auditing

Auditing and Oracle Solaris Zones

Audit Classes

Definitions of Audit Classes

Audit Class Syntax

Audit Plugins

Audit Policy

Process Audit Characteristics

Audit Trail

Conventions for Binary Audit File Names

Binary Audit File Names

Binary Audit File Timestamps

Audit Record Structure

Audit Record Analysis

Audit Token Formats

acl Token

argument Token

attribute Token

cmd Token

exec_args Token

exec_env Token

file Token

fmri Token

group Token

header Token

ip address Token

ip port Token

ipc Token

IPC_perm Token

path Token

path_attr Token

privilege Token

process Token

return Token

sequence Token

socket Token

subject Token

text Token

trailer Token

use of authorization Token

use of privilege Token

user Token

zonename Token

Glossary

Index

Audit Classes

Oracle Solaris defines audit classes as convenient containers for large numbers of audit events

You can reconfigure audit classes and make new audit classes. Audit class names can be up to 8 characters in length. The class description is limited to 72 characters. Numeric and non-alphanumeric characters are allowed.

For details, see the audit_class(4) man page.

Definitions of Audit Classes

The following table shows each predefined audit class, the descriptive name for each audit class, and a short description.

Table 31-1 Predefined Audit Classes

Audit Flag
Descriptive Name
Description
aa
audit utilization
Audit utilization
ad
old administrative
Administrative actions (old administrative metaclass)
all
all
All classes (metaclass)
am
administrative
Administrative actions (metaclass)
ap
application
Application-defined event
as
system-wide administration
System-wide administration
cl
file close
close system call
cy
cryptographic
Cryptographic operations
ex
exec
Program execution
fa
file attribute access
Access of object attributes: stat, pathconf
fc
file create
Creation of object
fd
file delete
Deletion of object
fm
file attribute modify
Change of object attributes: chown, flock
fr
file read
Read of data, open for reading
ft
sftp
SFTP transactions
fw
file write
Write of data, open for writing
io
ioctl
ioctl() system call
ip
ipc
System V IPC operations
lo
login or logout
Login and logout events
na
non_attribute
Non-attributable events
no
invalid class
Null value for turning off event preselection
nt
network
Network events: bind, connect, accept
ot
other
Miscellaneous, such as device allocation and memcntl()
pc
process
Process (metaclass)
pm
process modify
Process modify
ps
process start/stop
Process start and process stop
ss
change system state
Change system state
ua
user administration
User administration
Trusted Extensions classes
xc, xp, xs, and xx

You can define new classes by modifying the /etc/security/audit_class file. You can also rename existing classes. For more information, see the audit_class(4) man page and How to Add an Audit Class.

Audit Class Syntax

Events in an audit class can be audited for success, events can be audited for failure, and events can be audited for both. Without a prefix, a class of events is audited for success and for failure. With a plus (+) prefix, a class of events is audited for success only. With a minus (-) prefix, a class of events is audited for failure only. The following table shows some possible representations of audit classes.

Table 31-2 Plus and Minus Prefixes to Audit Classes

[prefix]class
Explanation
lo
Audit all successful attempts to log in and log out, and all failed attempts to log in. A user cannot fail an attempt to log out. This class includes screenlock and role assumption. For details, run the auditrecord -c lo command.
+lo
Audit all successful attempts to log in and log out.
-all
Audit all failed events.
+all
Audit all successful events.

Caution

Caution - The all class can generate large amounts of data and quickly fill up disks. Use the all class only if you have extraordinary reasons to audit all activities.


Audit classes that were previously selected can be further modified by a caret prefix, ^. The following table shows how the caret prefix modifies a preselected audit class.

Table 31-3 Caret Prefix That Modifies Already-Specified Audit Classes

^[prefix]class
Explanation
-all,^-fc
Audit all failed events, except do not audit failed attempts to create file objects
ad,^+aa
Audit all administrative events for success and for failure, except do not audit successful attempts to use auditing
am,^ua
Audit all administrative events for success and for failure, except do not audit user administration events

The audit classes and their prefixes can be specified in the following commands: