JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun Server X2-4

Security Guide

search filter icon
search icon

Document Information

Sun Server X2-4 Security Guide

Basic Security

Using Server Configuration and Management Tools Securely

Planning a Secure Environment

Maintaining a Secure Environment

Basic Security

There are basic security principles that you should adhere to when using all hardware and software. This section covers the four basic security principles:

Access

Access refers to physical access to hardware, or physical or virtual access to software.

Authentication

Authentication is how a user is identified, typically through confidential information such as user name and password. Authentication ensures that users of hardware and software are who they say they are.

Authorization

Authorization allows administrators to control what tasks or privileges a user may perform or use. Personnel can only perform the tasks and use the privileges that have been assigned to them. Authorization refers to restrictions placed on personnel to work with hardware or software.

Accounting and Auditing

Accounting and auditing refer to maintaining a record of a user's activity on the system. Oracle servers have hardware and software features that allow administrators to monitor login activity and to maintain hardware inventories.