Skip Navigation Links | |
Exit Print View | |
System Administration Guide: Security Services Oracle Solaris 10 1/13 Information Library |
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
Controlling Access to a Computer System
Controlling Access to Machine Resources
Limiting and Monitoring Superuser
Configuring Role-Based Access Control to Replace Superuser
Preventing Unintentional Misuse of Machine Resources
Assigning a Restricted Shell to Users
Restricting Access to Data in Files
Restricting setuid Executable Files
Using the Automated Security Enhancement Tool
Using the Oracle Solaris Security Toolkit
Using the Secure by Default Configuration
Using Resource Management Features
Monitoring Use of Machine Resources
Protecting Files With Encryption
Restricting root Access to Shared Files
Authentication and Authorization for Remote Access
Encryption and Firewall Systems
3. Controlling Access to Systems (Tasks)
4. Controlling Access to Devices (Tasks)
5. Using the Basic Audit Reporting Tool (Tasks)
6. Controlling Access to Files (Tasks)
7. Using the Automated Security Enhancement Tool (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
Part IV Cryptographic Services
13. Oracle Solaris Cryptographic Framework (Overview)
14. Oracle Solaris Cryptographic Framework (Tasks)
15. Oracle Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
19. Using Secure Shell (Tasks)
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Auditing in Oracle Solaris
28. Oracle Solaris Auditing (Overview)
29. Planning for Oracle Solaris Auditing
30. Managing Oracle Solaris Auditing (Tasks)
Since the Solaris 9 release, the following features have been introduced to enhance system security:
Strong password encryption is available and configurable. For more information, see Password Encryption.
Device policy is enforced with privileges. For more information, see Device Policy (Overview).
For device allocation, the /etc/security/dev directory might not be supported in future releases of Oracle Solaris.
The Basic Audit Reporting Tool (BART) can monitor the authenticity of the files on your system. For more information, see Chapter 5, Using the Basic Audit Reporting Tool (Tasks).
Files can be protected with strong encryption. For more information, see Protecting Files With Encryption.
Privileges enforce process rights at the kernel level. For more information, see Privileges (Overview).
The Cryptographic Framework centralizes cryptographic services for providers and for consumers. For more information, see Chapter 13, Oracle Solaris Cryptographic Framework (Overview).
The PAM framework provides functionality for many programs, such as Secure Shell. For more information, see Changes to PAM for the Solaris 10 Release.
Oracle Solaris zones and resource management control access to machine resources. For more information, see System Administration Guide: Oracle Solaris Containers-Resource Management and Oracle Solaris Zones.