JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 11.1 Administration: Security Services     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Virus Scanning Service (Tasks)

5.  Controlling Access to Devices (Tasks)

6.  Verifying File Integrity by Using BART (Tasks)

7.  Controlling Access to Files (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Security Attributes in Oracle Solaris (Reference)

Part IV Cryptographic Services

11.  Cryptographic Framework (Overview)

12.  Cryptographic Framework (Tasks)

13.  Key Management Framework

Part V Authentication Services and Secure Communication

14.  Using Pluggable Authentication Modules

15.  Using Secure Shell

16.  Secure Shell (Reference)

17.  Using Simple Authentication and Security Layer

18.  Network Services Authentication (Tasks)

Part VI Kerberos Service

19.  Introduction to the Kerberos Service

20.  Planning for the Kerberos Service

21.  Configuring the Kerberos Service (Tasks)

22.  Kerberos Error Messages and Troubleshooting

23.  Administering Kerberos Principals and Policies (Tasks)

24.  Using Kerberos Applications (Tasks)

25.  The Kerberos Service (Reference)

Part VII Auditing in Oracle Solaris

26.  Auditing (Overview)

27.  Planning for Auditing

28.  Managing Auditing (Tasks)

29.  Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Z

C

-C option, auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
C shell, privileged version, index iconProfile Shells and RBAC
-c option
auditrecord command, index iconHow to Display Audit Record Definitions
auditreduce command, index iconHow to Select Audit Events From the Audit Trail
cache, credential, index iconHow the Kerberos Authentication System Works
canon_user_plugin option, SASL and, index iconSASL Options
caret (^)
in audit class prefixes
index iconHow to Configure a User's Audit Characteristics
index iconHow to Find Audit Records of Changes to Specific Files
using prefix in audit_flags value, index iconHow to Configure a User's Audit Characteristics
CD-ROM drives
allocating, index iconHow to Mount an Allocated Device
security, index iconDevice-Clean Scripts
cdrw command, authorizations required, index iconSelected Commands That Require Authorizations
certificate signing requests (CSR), See certificates
certificates
exporting for use by another system, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
generating with pktool gencert command, index iconHow to Create a Certificate by Using the pktool gencert Command
importing into keystore, index iconHow to Import a Certificate Into Your Keystore
signing PKCS #10 CSR
using the pktool command, index iconHow to Sign a Certificate Request by Using the pktool signcsr Command
ChallengeResponseAuthentication keyword, See KbdInteractiveAuthentication keyword
changing
allocatable devices, index iconHow to Change Which Devices Can Be Allocated
audit_class file, index iconHow to Add an Audit Class
audit_event file, index iconHow to Change an Audit Event's Class Membership
auditing defaults, index iconHow to Preselect Audit Classes
default password algorithm, index iconChanging the Default Algorithm for Password Encryption (Tasks)
file ownership, index iconHow to Change the Owner of a File
file permissions
absolute mode, index iconHow to Change File Permissions in Absolute Mode
special, index iconHow to Change Special File Permissions in Absolute Mode
symbolic mode, index iconHow to Change File Permissions in Symbolic Mode
group ownership of file, index iconHow to Change Group Ownership of a File
NFS secret keys, index iconImplementation of Diffie-Hellman Authentication
passphrase for Secure Shell, index iconHow to Change the Passphrase for a Secure Shell Private Key
password algorithm for a domain, index iconHow to Specify a New Password Algorithm for an NIS Domain
password algorithm task map, index iconChanging the Default Algorithm for Password Encryption (Tasks)
password of role, index iconHow to Change the Password of a Role
properties of role, index iconHow to Change the Security Attributes of a Role
rights profile contents, index iconHow to Create a Rights Profile
root password, index iconHow to Change the root Password
root role into user, index iconHow to Change the root Role Into a User
special file permissions, index iconHow to Change Special File Permissions in Absolute Mode
your password with kpasswd, index iconChanging Your Password
your password with passwd, index iconChanging Your Password
CheckHostIP keyword, ssh_config file, index iconKeywords in Secure Shell
chgrp command
description, index iconCommands for Viewing and Securing Files
syntax, index iconHow to Change Group Ownership of a File
chkey command
index iconImplementation of Diffie-Hellman Authentication
index iconHow to Set Up a Diffie-Hellman Key for an NIS User
chmod command
changing special permissions
index iconHow to Change Special File Permissions in Absolute Mode
index iconHow to Change Special File Permissions in Absolute Mode
description, index iconCommands for Viewing and Securing Files
syntax, index iconHow to Change Special File Permissions in Absolute Mode
choosing, your password, index iconAdvice on Choosing a Password
chown command, description, index iconCommands for Viewing and Securing Files
chroot directory, sftp and, index iconHow to Create an Isolated Directory for sftp Files
ChrootDirectory keyword, ssh_config file, index iconKeywords in Secure Shell
Cipher keyword, ssh_config file, index iconKeywords in Secure Shell
Ciphers keyword, Secure Shell, index iconKeywords in Secure Shell
classes, See audit classes
cleaning up, binary audit files, index iconHow to Clean Up a not_terminated Audit File
clear protection level, index iconOverview of Kerberized Commands
ClearAllForwardings keyword, Secure Shell port forwarding, index iconKeywords in Secure Shell
client names, planning for in Kerberos, index iconClient and Service Principal Names
ClientAliveCountMax keyword, ssh_config file, index iconKeywords in Secure Shell
ClientAliveInterval keyword, ssh_config file, index iconKeywords in Secure Shell
clients
AUTH_DH client-server session, index iconImplementation of Diffie-Hellman Authentication
configuring for Secure Shell
index iconSession Characteristics in Secure Shell
index iconClient Configuration in Secure Shell
configuring Kerberos, index iconConfiguring Kerberos Clients
definition in Kerberos, index iconAuthentication-Specific Terminology
clntconfig principal
creating
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
clock skew
Kerberos and, index iconSynchronizing Clocks Between KDCs and Kerberos Clients
Kerberos planning and, index iconClock Synchronization Within a Realm
clock synchronizing
Kerberos master KDC and
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
Kerberos planning and, index iconClock Synchronization Within a Realm
Kerberos slave KDC and, index iconHow to Manually Configure a Slave KDC
Kerberos slave server and, index iconHow to Configure a Slave KDC to Use Full Propagation
cloning, rights profile contents, index iconHow to Clone and Modify a System Rights Profile
cmd audit token, index iconcmd Token
cnt audit policy
description, index iconUnderstanding Audit Policy
with ahlt policy, index iconAudit Policies for Asynchronous and Synchronous Events
combining audit files
auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
from different zones, index iconAuditing and Oracle Solaris Zones
command execution, Secure Shell, index iconCommand Execution and Data Forwarding in Secure Shell
command-line equivalents of SEAM Tool, index iconCommand-Line Equivalents of the SEAM Tool
commands
See also individual commands
Cryptographic Framework commands, index iconAdministrative Commands in the Cryptographic Framework
determining user's privileged commands, index iconHow to Determine the Privileged Commands That You Can Run
device allocation commands, index iconDevice Allocation Commands
device policy commands, index iconDevice Policy Commands
file protection commands, index iconCommands for Viewing and Securing Files
for administering privileges, index iconAdministrative Commands for Handling Privileges
Kerberos, index iconKerberos Commands
RBAC administration commands, index iconCommands That Manage RBAC
Secure RPC commands, index iconImplementation of Diffie-Hellman Authentication
Secure Shell commands, index iconSecure Shell Commands
that assign privileges, index iconAssigning Privileges
that check for privileges, index iconApplications That Check for Privileges
user-level cryptographic commands, index iconUser-Level Commands in the Cryptographic Framework
common keys
calculating, index iconImplementation of Diffie-Hellman Authentication
DH authentication and, index iconDiffie-Hellman Authentication and Secure RPC
components
BART, index iconBART Components
device allocation mechanism, index iconComponents of Device Allocation
RBAC, index iconRBAC Elements and Basic Concepts
Secure Shell user session, index iconCommand Execution and Data Forwarding in Secure Shell
compressing, audit files on disk, index iconHow to Compress Audit Files on a Dedicated File System
Compression keyword, Secure Shell, index iconKeywords in Secure Shell
CompressionLevel keyword, ssh_config file, index iconKeywords in Secure Shell
Computer Emergency Response Team/Coordination Center (CERT/CC), index iconReporting Security Problems
computer security, See system security
computing
DH key, index iconHow to Set Up a Diffie-Hellman Key for an NIS Host
digest of a file, index iconHow to Compute a Digest of a File
MAC of a file, index iconHow to Compute a MAC of a File
secret key, index iconHow to Generate a Symmetric Key by Using the pktool Command
configuration decisions
auditing
file storage, index iconHow to Plan Disk Space for Audit Records
policy, index iconUnderstanding Audit Policy
remote file storage, index iconHow to Prepare to Stream Audit Records to Remote Storage
who and what to audit, index iconHow to Plan Who and What to Audit
zones, index iconHow to Plan Auditing in Zones
Kerberos
client and service principal names, index iconClient and Service Principal Names
clients, index iconClient Configuration Options
clock synchronization, index iconClock Synchronization Within a Realm
database propagation, index iconWhich Database Propagation System to Use
encryption types, index iconKerberos Encryption Types
KDC server, index iconKDC Configuration Options
mapping host names onto realms, index iconMapping Host Names Onto Realms
number of realms, index iconNumber of Realms
ports, index iconPorts for the KDC and Admin Services
realm hierarchy, index iconRealm Hierarchy
realm names, index iconRealm Names
realms, index iconPlanning Kerberos Realms
slave KDCs, index iconThe Number of Slave KDCs
password algorithm, index iconPassword Encryption
configuration files
auditing, index iconAudit Service Man Pages
device_maps file, index icondevice_maps File
PAM
syntax, index iconPAM Configuration (Reference)
for password algorithms, index iconPassword Encryption
policy.conf file
index iconPassword Encryption
index iconHow to Specify an Algorithm for Password Encryption
index iconCommands That Manage RBAC
Secure Shell, index iconSession Characteristics in Secure Shell
syslog.conf file, index iconFiles With Privilege Information
with privilege information, index iconFiles With Privilege Information
configured audit policy, permanent audit policy, index iconHow to Change Audit Policy
configuring
active audit policy, index iconHow to Change Audit Policy
ahlt audit policy, index iconHow to Change Audit Policy
audit_class file, index iconHow to Add an Audit Class
audit classes, index iconHow to Preselect Audit Classes
audit_event file, index iconHow to Change an Audit Event's Class Membership
audit logs task map, index iconConfiguring Audit Logs (Task Map)
audit policy, index iconHow to Change Audit Policy
audit policy temporarily, index iconHow to Change Audit Policy
audit queue controls, index iconHow to Change Audit Queue Controls
audit service policy, index iconHow to Change Audit Policy
audit trail overflow prevention, index iconHow to Prevent Audit Trail Overflow
audit_warn script, index iconHow to Configure the audit_warn Email Alias
auditing, index iconConfiguring the Audit Service (Tasks)
auditing in zones
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
auditing task map, index iconConfiguring the Audit Service (Task Map)
authorizations, index iconHow to Create an Authorization
chroot directory for sftp, index iconHow to Create an Isolated Directory for sftp Files
device allocation, index iconManaging Device Allocation (Task Map)
device policy, index iconConfiguring Device Policy (Task Map)
DH key for NIS user, index iconHow to Set Up a Diffie-Hellman Key for an NIS User
DH key in NIS, index iconHow to Set Up a Diffie-Hellman Key for an NIS Host
exceptions to Secure Shell system defaults, index iconHow to Create User and Host Exceptions to Secure Shell Defaults
hardware security, index iconControlling Access to System Hardware (Tasks)
host-based authentication for Secure Shell, index iconHow to Set Up Host-Based Authentication for Secure Shell
identical auditing for non-global zones, index iconHow to Configure All Zones Identically for Auditing
Kerberos
adding administration principals, index iconHow to Configure a KDC to Use an LDAP Data Server
clients, index iconConfiguring Kerberos Clients
cross-realm authentication, index iconConfiguring Cross-Realm Authentication
master KDC server
index iconHow to Automatically Configure a Master KDC
index iconHow to Interactively Configure a Master KDC
index iconHow to Manually Configure a Master KDC
master KDC server using LDAP, index iconHow to Configure a KDC to Use an LDAP Data Server
NFS servers, index iconHow to Configure Kerberos NFS Servers
overview, index iconConfiguring the Kerberos Service (Tasks)
slave KDC server
index iconHow to Automatically Configure a Slave KDC
index iconHow to Interactively Configure a Slave KDC
index iconHow to Manually Configure a Slave KDC
task map, index iconConfiguring the Kerberos Service (Task Map)
password for hardware access, index iconHow to Require a Password for SPARC Hardware Access
per-zone auditing, index iconHow to Configure Per-Zone Auditing
permanent audit policy, index iconHow to Change Audit Policy
perzone audit policy, index iconHow to Change Audit Policy
port forwarding in Secure Shell, index iconHow to Configure Port Forwarding in Secure Shell
privileged users, index iconHow to Change the Security Attributes of a User
RBAC
index iconCustomizing RBAC for Your Site (Tasks)
index iconHow to Plan Your RBAC Implementation
RBAC task map, index iconInitially Configuring RBAC (Task Map)
rights profiles, index iconHow to Create a Rights Profile
roles
index iconHow to Create a Role
index iconHow to Change the Security Attributes of a Role
root role as user, index iconHow to Change the root Role Into a User
Secure Shell
clients, index iconClient Configuration in Secure Shell
servers, index iconServer Configuration in Secure Shell
Secure Shell task map, index iconConfiguring Secure Shell (Task Map)
space for audit trail, index iconHow to Assign Audit Space for the Audit Trail
temporary audit policy, index iconHow to Change Audit Policy
text summaries of audit records, index iconHow to Configure syslog Audit Logs
configuring application servers, index iconConfiguring Kerberos Network Application Servers
ConnectionAttempts keyword, ssh_config file, index iconKeywords in Secure Shell
ConnectTimeout keyword, ssh_config file, index iconKeywords in Secure Shell
console, displaying su command attempts, index iconHow to Restrict and Monitor root Logins
CONSOLE in Secure Shell, index iconSecure Shell and Login Environment Variables
Console User (RBAC), rights profile, index iconRights Profiles
CONSOLE_USER keyword, policy.conf file, index iconpolicy.conf File
consumers, definition in Cryptographic Framework, index iconTerminology in the Cryptographic Framework
context-sensitive help, SEAM Tool, index iconPrint and Online Help Features of the SEAM Tool
control flags, PAM, index iconHow PAM Stacking Works
control manifests (BART), index iconBART (Overview)
controlling, system usage, index iconControlling Access to Machine Resources
conversation keys
decrypting in secure RPC, index iconImplementation of Diffie-Hellman Authentication
generating in secure RPC, index iconImplementation of Diffie-Hellman Authentication
converting, audit records to readable format, index iconHow to View the Contents of Binary Audit Files
Coordinated Universal Time (UTC)
time stamp use in auditing
index iconHow to Merge Audit Files From the Audit Trail
index iconConventions for Binary Audit File Names
copying, files using Secure Shell, index iconHow to Copy Files With Secure Shell
copying audit records to single file, index iconHow to Select Audit Events From the Audit Trail
cost control, and auditing, index iconControlling Auditing Costs
crammd5.so.1 plug-in, SASL and, index iconSASL Plug-ins
creating
audit trail, index iconAudit Trail
authorization, index iconHow to Create an Authorization
credential table, index iconHow to Create a Credential Table
file digests, index iconHow to Compute a Digest of a File
key pair, index iconHow to Generate a Key Pair by Using the pktool genkeypair Command
new device-clean scripts, index iconDevice-Clean Scripts
new policy (Kerberos)
index iconHow to Create a New Kerberos Principal
index iconHow to Create a New Kerberos Policy
new principal (Kerberos), index iconHow to Create a New Kerberos Principal
privileged users, index iconHow to Change the Security Attributes of a User
rights profile for a group of users, index iconHow to Configure a User's Audit Characteristics
rights profiles, index iconHow to Create a Rights Profile
roles, index iconHow to Create a Role
root user, index iconHow to Change the root Role Into a User
secret keys
for encryption, index iconHow to Generate a Symmetric Key by Using the pktool Command
Secure Shell keys, index iconHow to Generate a Public/Private Key Pair for Use With Secure Shell
stash file
index iconHow to Manually Configure a Slave KDC
index iconHow to Configure a Slave KDC to Use Full Propagation
storage for binary audit files, index iconHow to Create ZFS File Systems for Audit Files
tickets with kinit, index iconCreating a Kerberos Ticket
cred database, DH authentication, index iconDiffie-Hellman Authentication and Secure RPC
cred table
DH authentication and, index iconDiffie-Hellman Authentication and Secure RPC
information stored by server, index iconImplementation of Diffie-Hellman Authentication
credential
cache, index iconHow the Kerberos Authentication System Works
description
index iconImplementation of Diffie-Hellman Authentication
index iconAuthentication-Specific Terminology
mapping, index iconMapping GSS Credentials to UNIX Credentials
obtaining for a server, index iconObtaining a Credential for a Server
obtaining for a TGS, index iconObtaining a Credential for the Ticket-Granting Service
or tickets, index iconHow the Kerberos Service Works
credential table, adding single entry to, index iconHow to Add a Single Entry to the Credential Table
crontab files, authorizations required, index iconSelected Commands That Require Authorizations
cross-realm authentication, configuring, index iconConfiguring Cross-Realm Authentication
CRYPT_ALGORITHMS_ALLOW keyword, policy.conf file, index iconPassword Encryption
CRYPT_ALGORITHMS_DEPRECATE keyword, policy.conf file, index iconPassword Encryption
crypt_bsdbf password algorithm, index iconPassword Encryption
crypt_bsdmd5 password algorithm, index iconPassword Encryption
crypt command, file security, index iconProtecting Files With Encryption
CRYPT_DEFAULT keyword, policy.conf file, index iconPassword Encryption
CRYPT_DEFAULT system variable, index iconHow to Specify an Algorithm for Password Encryption
crypt_sha256 password algorithm
index iconPassword Encryption
index iconChanging the Default Algorithm for Password Encryption (Tasks)
crypt_sunmd5 password algorithm
index iconPassword Encryption
index iconPassword Encryption
crypt_unix password algorithm, index iconPassword Encryption
Crypto Management (RBAC), creating role, index iconHow to Assign a Role
cryptoadm command
description, index iconScope of the Cryptographic Framework
disabling cryptographic mechanisms
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
disabling hardware mechanisms, index iconHow to Disable Hardware Provider Mechanisms and Features
installing PKCS #11 library, index iconHow to Add a Software Provider
listing providers, index iconHow to List Available Providers
-m option
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
-p option
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
restoring kernel software provider, index iconHow to Prevent the Use of a Kernel Software Provider
cryptoadm install command, installing PKCS #11 library, index iconHow to Add a Software Provider
Cryptographic Framework
administering with role, index iconHow to Assign a Role
connecting providers, index iconPlugins to the Cryptographic Framework
consumers, index iconIntroduction to the Cryptographic Framework
cryptoadm command
index iconScope of the Cryptographic Framework
index iconAdministrative Commands in the Cryptographic Framework
definition of terms, index iconTerminology in the Cryptographic Framework
description, index iconIntroduction to the Cryptographic Framework
elfsign command, index iconBinary Signatures for Third-Party Software
error messages, index iconHow to Encrypt and Decrypt a File
FIPS–140 and, index iconCryptographic Framework and FIPS-140
hardware plugins, index iconIntroduction to the Cryptographic Framework
interacting with, index iconScope of the Cryptographic Framework
listing providers
index iconHow to List Available Providers
index iconHow to List Available Providers
PKCS #11 library, index iconIntroduction to the Cryptographic Framework
providers
index iconIntroduction to the Cryptographic Framework
index iconTerminology in the Cryptographic Framework
refreshing, index iconHow to Refresh or Restart All Cryptographic Services
registering providers, index iconPlugins to the Cryptographic Framework
restarting, index iconHow to Refresh or Restart All Cryptographic Services
signing providers, index iconPlugins to the Cryptographic Framework
SPARC T4 series optimizations, index iconCryptographic Framework and the SPARC T-Series Servers in This Release
user-level commands, index iconUser-Level Commands in the Cryptographic Framework
zones and
index iconCryptographic Services and Zones
index iconHow to Refresh or Restart All Cryptographic Services
cryptographic mechanisms, optimized for SPARC T4 series, index iconCryptographic Framework and the SPARC T-Series Servers in This Release
cryptographic services, See Cryptographic Framework
Cryptoki, See PKCS #11 library
csh command, privileged version, index iconProfile Shells and RBAC
customizing, manifests, index iconHow to Customize a Manifest
customizing a report (BART), index iconHow to Customize a BART Report by Using a Rules File