| Skip Navigation Links | |
| Exit Print View | |
|
Developer's Guide to Oracle Solaris 10 Security Oracle Solaris 10 1/13 Information Library |
1. Oracle Solaris Security for Developers (Overview)
2. Developing Privileged Applications
3. Writing PAM Applications and Services
4. Writing Applications That Use GSS-API
7. Writing Applications That Use SASL
8. Introduction to the Oracle Solaris Cryptographic Framework
9. Writing User-Level Cryptographic Applications and Providers
10. Using the Smart Card Framework
A. Sample C-Based GSS-API Programs
D. Source Code for SASL Example
Packaging Cryptographic Provider Applications and Modules
Writing PAM Applications and Services
PAM Authentication Process
PAM Configuration
A Simple PAM Consumer Example
Introduction to the PAM Framework
Requirements for PAM Consumers
PAM Library
Requirements for PAM Consumers
Network Security Architecture
PAM Service Modules
Sample PAM Provider Service Module
Requirements for PAM Service Providers
Writing Conversation Functions
Requirements for PAM Consumers
Other Useful PAM Functions
Other Useful PAM Functions
Requirements for PAM Consumers
A Simple PAM Consumer Example
Requirements for PAM Consumers
Specifying a Non-Default Mechanism
GSSAPI Client Example: main() Function
GSS-API Tokens
Permitted Privilege Set
PKCS #11 Functions: C_GetInfo()
PKCS #11 Functions: C_GetMechanismList()
PKCS #11 Functions: C_GetSlotList()
PKCS #11 Functions: C_GetTokenInfo()
PKCS #11 Functions: C_Initialize()
PKCS #11 Functions: C_OpenSession()
PKCS #11 Function List
Overview of the Cryptoki Library
Components of the Cryptographic Framework
Components of the Cryptographic Framework
SASL Plug-in Overview
Oracle Solaris Cryptography Terminology
Components of the Cryptographic Framework
Names in GSS-API
Privilege Categories
Privilege Data Types
Privilege Data Types
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Data Types
Privilege Data Types
priv_str_to_set() for Mapping Privileges
Privilege Data Types
How Privileges Are Implemented
Privileged Applications
How Administrators Assign Privileges
Privilege Bracketing in the Least Privilege Model
Privilege Bracketing in the Superuser Model
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Bracketing in the Least Privilege Model
Compatibility Between the Superuser and Privilege Models
Privilege Data Types
Privileged Applications
Privilege Interfaces
System Security
Privilege Data Types
About Privileges
priv_str_to_set() for Mapping Privileges
Privilege Data Types
Programming with Privileges
setppriv(): for Setting Privileges
Guidelines for Developing Privileged Applications
Privilege Categories
Sending Protected Data in GSS-API
Network Security Architecture
Packaging Kernel-Level Provider Modules
Packaging User-Level Provider Applications