JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Sun ZFS Appliance Monitor

Security Guide, Version 1.0

search filter icon
search icon

Document Information

Using This Documentation

1.  Overview

Product Overview

Basic Security Principles

Keep Software Up To Date

Restrict Network Access to Critical Services

Follow the Principle of Least Privilege

Monitor System Activity

Mobile Device Security Features

Architecture Overview

2.  Secure Installation and Configuration

Installation Overview

Password Protection

3.  Security Features

Security Model

Configuring and Using Authentication

Configuring and Using Access Control

Granting Privileges

Secure Deployment Checklist

Create a Separate User Account

Use a Secure Password for the User Account

Use a Strong Passcode on the iOS Device

VPN Access to Appliances

Security Model

The critical security features that provide protection are:

Configuring and Using Authentication

All authentication configuration is done through the configuration view on the appliance monitor which includes both the manual option and the remote configuration file option (see Installation Overview). All authentication is user name and password based. Without credentials, the appliance monitor is unable to access the appliance.

Configuring and Using Access Control

Authorization includes primarily two processes:

The basic concepts and mechanisms for placing or removing such limitations on users, individually or in groups, are described in the next section.

Granting Privileges

A privilege is a right to execute a particular type of XML-RPC command on the appliance. Some examples of privileges include the right to:

These types of privileges should only be granted to a user who requires this kind of functionality in their job responsibilities. Ultimately the appliance monitor logs into a user account on the appliance, and Solaris enforces the appropriate user policies, based on administrator settings.