oracle home
Securing Systems and Attached Devices in Oracle
®
Solaris 11.2
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
» ...
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Securing Systems and Attached Devices in ...
»
Index A
Updated: September 2014
Securing Systems and Attached Devices in Oracle
®
Solaris 11.2
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 Managing Machine Security
What's New in Securing Systems and Devices in Oracle Solaris 11.2
Controlling Access to a Computer System
Maintaining Physical Security
Maintaining Login Control
Managing Password Information
Local Passwords
NIS Passwords
LDAP Passwords
Password Encryption
Password Algorithm Identifiers
Algorithms Configuration in the policy.conf File
Special System Accounts
Remote Logins
Controlling Access to Devices
Device Policy
Device Allocation
Controlling Access to Machine Resources
Address Space Layout Randomization
Limiting and Monitoring Superuser Access
Configuring Role-Based Access Control to Replace Superuser
Preventing Unintentional Misuse of System Resources
Setting the PATH Variable
Assigning a Restricted Shell to Users
Restricting Access to Data in Files
Restricting setuid Executable Files
Using the Secure by Default Configuration
Using Resource Management Features
Using Oracle Solaris Zones
Monitoring Use of Machine Resources
Monitoring File Integrity
Controlling Access to Files
Encrypting Files on Disk
Using Access Control Lists
Sharing Files Across Machines
Restricting root Access to Shared Files
Controlling Network Access
Network Security Mechanisms
Authentication and Authorization for Remote Access
Firewall Systems
Encryption and Firewall Systems
Reporting Security Problems
Chapter 2 Protecting Oracle Solaris Systems Integrity
Using Verified Boot
Verified Boot and ELF Signatures
Verification Sequence During System Boot
Policies for Verified Boot
Enabling Verified Boot
SPARC: How to Enable Verified Boot on SPARC Systems With Oracle ILOM Verified-Boot Support
How to Enable Verified Boot on Legacy SPARC Systems and x86 Systems
How to Manage Certificates on Systems With Oracle ILOM Verified-Boot Support
How to Manually Verify the elfsign Signature
About Trusted Platform Module
Initializing TPM on Oracle Solaris Systems
How to Check Whether the TPM Device Is Recognized by the Operating System
SPARC: How to Initialize TPM Using the Oracle ILOM Interface
x86: How to Initialize TPM Using BIOS
How to Enable PKCS #11 Consumers to Use TPM as a Secure Keystore
Troubleshooting TPM
Chapter 3 Controlling Access to Systems
Securing Logins and Passwords
How to Display the User's Login Status
How to Display Users Without Passwords
How to Temporarily Disable User Logins
Changing the Default Algorithm for Password Encryption
How to Specify an Algorithm for Password Encryption
How to Specify a New Password Algorithm for an NIS Domain
How to Specify a New Password Algorithm for an LDAP Domain
Monitoring and Restricting root Access
How to Monitor Who Is Using the su Command
How to Restrict and Monitor root Logins
Controlling Access to System Hardware
How to Require a Password for SPARC Hardware Access
How to Disable a System's Abort Sequence
Chapter 4 Controlling Access to Devices
Configuring Device Policy
How to View Device Policy
How to Audit Changes in Device Policy
How to Retrieve IP MIB-II Information From a /dev/* Device
Managing Device Allocation
How to Enable Device Allocation
How to Authorize Users to Allocate a Device
How to View Allocation Information About a Device
How to Forcibly Allocate a Device
How to Forcibly Deallocate a Device
How to Change Which Devices Can Be Allocated
How to Audit Device Allocation
Allocating Devices
How to Allocate a Device
How to Mount an Allocated Device
How to Deallocate a Device
Device Protection Reference
Device Policy Commands
Device Allocation
Components of Device Allocation
Device Allocation Service
Device Allocation Rights Profiles
Device Allocation Commands
Authorizations for the Allocation Commands
Allocate Error State
device_maps File
device_allocate File
Device-Clean Scripts
Device-Clean Script for Tapes
Device-Clean Scripts for Diskettes and CD-ROM Drives
Device-Clean Script for Audio
Writing New Device-Clean Scripts
Chapter 5 Virus Scanning Service
About Virus Scanning
About the vscan Service
Using the vscan Service
How to Enable Virus Scanning on a File System
How to Enable the vscan Service
How to Add a Scan Engine
How to View Vscan Properties
How to Limit the Size of Scanned Files
How to Exclude Files From Virus Scans
Security Glossary
Index
Index Numbers and Symbols
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index Z
Language:
English
A
access
address space
Address Space Layout Randomization
restricting for
devices
Configuring Device Policy
Controlling Access to Devices
system hardware
Controlling Access to System Hardware
root
access
displaying attempts on console
How to Restrict and Monitor root Logins
monitoring
su
command attempts
How to Monitor Who Is Using the su Command
Limiting and Monitoring Superuser Access
restricting
How to Restrict and Monitor root Logins
Restricting root Access to Shared Files
security
ACLs
Using Access Control Lists
controlling system usage
Controlling Access to Machine Resources
devices
Configuring Device Policy
file access restriction
Restricting Access to Data in Files
firewall setup
Firewall Systems
Firewall Systems
login access restrictions
Maintaining Login Control
Maintaining Login Control
login control
Maintaining Login Control
monitoring system usage
Monitoring File Integrity
Monitoring Use of Machine Resources
network control
Controlling Network Access
PATH variable setting
Setting the PATH Variable
peripheral devices
Controlling Access to Devices
physical security
Maintaining Physical Security
protecting system integrity
Protecting Oracle Solaris Systems Integrity
reporting problems
Reporting Security Problems
root
login tracking
Limiting and Monitoring Superuser Access
setuid
programs
Restricting setuid Executable Files
system hardware
Controlling Access to System Hardware
sharing files
Sharing Files Across Machines
ACL
description
Using Access Control Lists
add_drv
command
description
Device Management Commands
adding
allocatable device
How to Enable Device Allocation
security to devices
Managing Device Allocation
security to system hardware
How to Require a Password for SPARC Hardware Access
address space
random layout
Address Space Layout Randomization
administering
device allocation
Managing Device Allocation Task Map
device policy
Configuring Device Policy Task Map
password algorithms
Changing the Default Algorithm for Password Encryption
algorithms
list of password configuration
How to Specify an Algorithm for Password Encryption
password encryption
Changing the Default Algorithm for Password Encryption
Password Encryption
allocate error state
Allocate Error State
allocate
command
allocate error state
Allocate Error State
authorizations required
Authorizations for the Allocation Commands
removable media
Allocating a USB Flash Drive
user authorization
How to Authorize Users to Allocate a Device
using
How to Allocate a Device
allocating devices
by users
How to Allocate a Device
forcibly
How to Forcibly Allocate a Device
troubleshooting
Allocating a USB Flash Drive
antivirus software
See
virus scanning
appending arrow (>>)
preventing appending
Assigning a Restricted Shell to Users
asterisk (
*
)
device_allocate
file
device_allocate File
device_allocate File
at sign (
@
)
device_allocate
file
device_allocate File
audio devices
security
Device-Clean Script for Audio
auditing
changes in device policy
How to Audit Changes in Device Policy
device allocation
How to Audit Device Allocation
authentication
description
Authentication and Authorization for Remote Access
network security
Authentication and Authorization for Remote Access
types
Authentication and Authorization for Remote Access
authorizations
for device allocation
Authorizations for the Allocation Commands
Device Allocation Rights Profiles
How to Authorize Users to Allocate a Device
not requiring for device allocation
Permitting Any User to Allocate a Device
solaris.device.allocate
Device Allocation Commands
How to Authorize Users to Allocate a Device
solaris.device.revoke
Authorizations for the Allocation Commands
types
Authentication and Authorization for Remote Access
Previous
Next