Securing Users and Processes in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

Following Your Chosen Rights Model

User and process rights management can be an integral part of managing your systems deployment. Planning requires a thorough knowledge of the security requirements of your organization as well as an understanding of rights in Oracle Solaris. This section describes the general process for planning your site's use of rights.

  1. Learn the basic concepts about rights.

    Read Chapter 1, About Using Rights to Control Users and Processes. Using rights to administer a system is very different from using conventional UNIX administrative practices.

  2. Examine your security policy.

    Your organization's security policy details the potential threats to your system, measures the risk of each threat, and provides strategies to counter these threats. Isolating the security-relevant tasks through rights can be a part of the strategy.

    For example, your site might require that you separate security administration from non-security administration. To implement separation of duty, see Example 3–3.

    If your security policy relies on Authorization Rules Managed On RBAC (ARMOR), you must install and use the ARMOR package. For its use in Oracle Solaris, see Example 3–1.

  3. Review the default rights profiles.

    The default rights profiles collect the rights that are required to complete a task. To review available rights profiles, see Listing Rights Profiles

  4. Decide whether you are going to use roles or assign rights profiles to users directly.

    Roles can ease the administration of rights. The role name identifies the tasks that the role can perform and isolates role rights from user rights. If you are going to use roles, you have three options:

    • You can install the ARMOR package, which installs the seven roles that the Authorization Roles Managed on RBAC (ARMOR) standard defines. See Example 3–1.

    • You can define your own roles and also use ARMOR roles. See Creating a Role and Example 3–1.

    • You can define your own roles and not use ARMOR roles. See Creating a Role.

    If roles are not required at your site, you can directly assign rights profiles to users. To require a password when users perform an administrative task from their rights profiles, use authenticated rights profiles. See Example 3–11.

  5. Decide whether you need to create additional rights profiles.

    Look for other applications or families of applications at your site that might benefit from restricted access. Applications that affect security, that can cause denial-of-service problems, or that require special administrator training are good candidates for using rights. For example, users of Sun Ray systems do not require all basic privileges. For an example of a rights profile that limits users, see Example 3–22.

    1. Determine which rights are needed for the new task.

    2. Decide whether an existing rights profile is appropriate for this task.

    3. Order the rights profile so that commands execute with their required privileges.

      For information about ordering, see Order of Search for Assigned Rights.

  6. Decide which users should be assigned which rights.

    According to the principle of least privilege, you assign users to roles that are appropriate to the user's level of trust. When you prevent users from performing tasks that the users do not need to perform, you reduce potential problems.


    Note -  Rights that apply to all users of a system image are specified in the /etc/security/policy.conf file.

Once you have a plan, create logins for trusted users who can be assigned rights profiles or roles. For details on creating users, see Task Map for Setting Up and Managing User Accounts by Using the CLI in Managing User Accounts and User Environments in Oracle Solaris 11.2 .

To assign rights, start with the procedures in Assigning Rights to Users. The sections that follow provide examples of expanding rights, limiting rights, assigning rights to resources, and troubleshooting rights assignments.