oracle home
Securing Systems and Attached Devices in Oracle
®
Solaris 11.2
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
» ...
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Securing Systems and Attached Devices in ...
»
Index C
Updated: September 2014
Securing Systems and Attached Devices in Oracle
®
Solaris 11.2
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 Managing Machine Security
What's New in Securing Systems and Devices in Oracle Solaris 11.2
Controlling Access to a Computer System
Maintaining Physical Security
Maintaining Login Control
Managing Password Information
Local Passwords
NIS Passwords
LDAP Passwords
Password Encryption
Password Algorithm Identifiers
Algorithms Configuration in the policy.conf File
Special System Accounts
Remote Logins
Controlling Access to Devices
Device Policy
Device Allocation
Controlling Access to Machine Resources
Address Space Layout Randomization
Limiting and Monitoring Superuser Access
Configuring Role-Based Access Control to Replace Superuser
Preventing Unintentional Misuse of System Resources
Setting the PATH Variable
Assigning a Restricted Shell to Users
Restricting Access to Data in Files
Restricting setuid Executable Files
Using the Secure by Default Configuration
Using Resource Management Features
Using Oracle Solaris Zones
Monitoring Use of Machine Resources
Monitoring File Integrity
Controlling Access to Files
Encrypting Files on Disk
Using Access Control Lists
Sharing Files Across Machines
Restricting root Access to Shared Files
Controlling Network Access
Network Security Mechanisms
Authentication and Authorization for Remote Access
Firewall Systems
Encryption and Firewall Systems
Reporting Security Problems
Chapter 2 Protecting Oracle Solaris Systems Integrity
Using Verified Boot
Verified Boot and ELF Signatures
Verification Sequence During System Boot
Policies for Verified Boot
Enabling Verified Boot
SPARC: How to Enable Verified Boot on SPARC Systems With Oracle ILOM Verified-Boot Support
How to Enable Verified Boot on Legacy SPARC Systems and x86 Systems
How to Manage Certificates on Systems With Oracle ILOM Verified-Boot Support
How to Manually Verify the elfsign Signature
About Trusted Platform Module
Initializing TPM on Oracle Solaris Systems
How to Check Whether the TPM Device Is Recognized by the Operating System
SPARC: How to Initialize TPM Using the Oracle ILOM Interface
x86: How to Initialize TPM Using BIOS
How to Enable PKCS #11 Consumers to Use TPM as a Secure Keystore
Troubleshooting TPM
Chapter 3 Controlling Access to Systems
Securing Logins and Passwords
How to Display the User's Login Status
How to Display Users Without Passwords
How to Temporarily Disable User Logins
Changing the Default Algorithm for Password Encryption
How to Specify an Algorithm for Password Encryption
How to Specify a New Password Algorithm for an NIS Domain
How to Specify a New Password Algorithm for an LDAP Domain
Monitoring and Restricting root Access
How to Monitor Who Is Using the su Command
How to Restrict and Monitor root Logins
Controlling Access to System Hardware
How to Require a Password for SPARC Hardware Access
How to Disable a System's Abort Sequence
Chapter 4 Controlling Access to Devices
Configuring Device Policy
How to View Device Policy
How to Audit Changes in Device Policy
How to Retrieve IP MIB-II Information From a /dev/* Device
Managing Device Allocation
How to Enable Device Allocation
How to Authorize Users to Allocate a Device
How to View Allocation Information About a Device
How to Forcibly Allocate a Device
How to Forcibly Deallocate a Device
How to Change Which Devices Can Be Allocated
How to Audit Device Allocation
Allocating Devices
How to Allocate a Device
How to Mount an Allocated Device
How to Deallocate a Device
Device Protection Reference
Device Policy Commands
Device Allocation
Components of Device Allocation
Device Allocation Service
Device Allocation Rights Profiles
Device Allocation Commands
Authorizations for the Allocation Commands
Allocate Error State
device_maps File
device_allocate File
Device-Clean Scripts
Device-Clean Script for Tapes
Device-Clean Scripts for Diskettes and CD-ROM Drives
Device-Clean Script for Audio
Writing New Device-Clean Scripts
Chapter 5 Virus Scanning Service
About Virus Scanning
About the vscan Service
Using the vscan Service
How to Enable Virus Scanning on a File System
How to Enable the vscan Service
How to Add a Scan Engine
How to View Vscan Properties
How to Limit the Size of Scanned Files
How to Exclude Files From Virus Scans
Security Glossary
Index
Index Numbers and Symbols
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index Z
Language:
English
C
CD-ROM drives
allocating
Allocating a CD-ROM Drive
security
Device-Clean Scripts for Diskettes and CD-ROM Drives
changing
allocatable devices
How to Change Which Devices Can Be Allocated
default password algorithm
Changing the Default Algorithm for Password Encryption
password algorithm for a domain
How to Specify a New Password Algorithm for an NIS Domain
password algorithm task map
Changing the Default Algorithm for Password Encryption
commands
See also
individual commands
device allocation commands
Device Allocation Commands
device policy commands
Device Policy Commands
components
device allocation mechanism
Components of Device Allocation
computer security
See
system security
configuration decisions
password algorithm
Password Encryption
configuration files
device_maps
file
device_maps File
for password algorithms
Password Algorithm Identifiers
policy.conf
file
How to Specify an Algorithm for Password Encryption
Password Algorithm Identifiers
configuring
device allocation
Managing Device Allocation Task Map
device policy
Configuring Device Policy Task Map
hardware security
Controlling Access to System Hardware
password for hardware access
How to Require a Password for SPARC Hardware Access
console
displaying
su
command attempts
How to Restrict and Monitor root Logins
control lists
See
ACL
controlling
system usage
Controlling Access to Machine Resources
creating
new device-clean scripts
Writing New Device-Clean Scripts
crypt
command
file security
Encrypting Files on Disk
CRYPT_ALGORITHMS_ALLOW
keyword
policy.conf
file
Algorithms Configuration in the policy.conf File
CRYPT_ALGORITHMS_DEPRECATE
keyword
policy.conf
file
Algorithms Configuration in the policy.conf File
crypt_bsdbf
password algorithm
Password Encryption Algorithms
crypt_bsdmd5
password algorithm
Password Encryption Algorithms
CRYPT_DEFAULT system variable
How to Specify an Algorithm for Password Encryption
CRYPT_DEFAULT
keyword
policy.conf
file
Algorithms Configuration in the policy.conf File
crypt_sha256
password algorithm
Password Encryption Algorithms
crypt_sha256
password algorithm
Changing the Default Algorithm for Password Encryption
crypt_sunmd5
password algorithm
Password Encryption Algorithms
Password Encryption Algorithms
crypt_unix
password algorithm
Password Encryption Algorithms
Previous
Next