| Skip Navigation Links | |
| Exit Print View | |
|
Developer's Guide to Oracle Solaris 11 Security Oracle Solaris 11.1 Information Library |
1. Oracle Solaris Security for Developers (Overview)
2. Developing Privileged Applications
3. Writing PAM Applications and Services
4. Writing Applications That Use GSS-API
7. Writing Applications That Use SASL
8. Introduction to the Oracle Solaris Cryptographic Framework
9. Writing User-Level Cryptographic Applications
10. Introduction to the Oracle Solaris Key Management Framework
A. Secure Coding Guidelines for Developers
B. Sample C-Based GSS-API Programs
Writing PAM Applications and Services
PAM Authentication Process
A Simple PAM Consumer Example
Introduction to the PAM Framework
Requirements for PAM Consumers
PAM Library
Requirements for PAM Consumers
Network Security Architecture
PAM Service Modules
Sample PAM Provider Service Module
Requirements for PAM Service Providers
Writing Conversation Functions
Requirements for PAM Consumers
Other Useful PAM Functions
Other Useful PAM Functions
Requirements for PAM Consumers
A Simple PAM Consumer Example
Requirements for PAM Consumers
Specifying a Non-Default Mechanism
GSSAPI Client Example: main() Function
GSS-API Tokens
Permitted Privilege Set
PKCS #11 Functions: C_GetInfo()
PKCS #11 Functions: C_GetMechanismList()
PKCS #11 Functions: C_GetSlotList()
PKCS #11 Functions: C_GetTokenInfo()
PKCS #11 Functions: C_Initialize()
PKCS #11 Functions: C_OpenSession()
PKCS #11 Function List
Overview of the Cryptoki Library
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Introduction to the Oracle Solaris Key Management Framework
KMF Key Management Tool
Oracle Solaris Cryptography Terminology
SASL Plug-in Overview
Components of the Cryptographic Framework
Names in GSS-API
Privilege Categories
Privilege Data Types
Privilege Data Types
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Data Types
Privilege Data Types
priv_str_to_set() for Mapping Privileges
Privilege Data Types
How Privileges Are Implemented
Privileged Applications
How Administrators Assign Privileges
Privilege Bracketing in the Least Privilege Model
Privilege Bracketing in the Superuser Model
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Bracketing in the Least Privilege Model
Compatibility Between the Superuser and Privilege Models
Privilege Data Types
Privileged Applications
Privilege Interfaces
System Security
Privilege Data Types
About Privileges
priv_str_to_set() for Mapping Privileges
Privilege Data Types
Programming with Privileges
setppriv(): for Setting Privileges
Guidelines for Developing Privileged Applications
Privilege Categories
Sending Protected Data in GSS-API
Network Security Architecture
Introduction to the Oracle Solaris Key Management Framework