Comparing Names in GSS-API
PAM Service Modules
access control list
Obtaining Context Information in GSS-API
Security Extensions Framework
Security Extensions Framework
Performing Anonymous Authentication in GSS-API
Security Extensions Framework
Security Services in GSS-API
PAM Authentication Process
PAM Service Modules
Checking for User Authorizations
Privileged Applications
About Authorizations
Privilege Categories
Message Digest Example
Sign and Verify Example
Random Byte Generation Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Message Digest Example
Sign and Verify Example
Sign and Verify Example
Random Byte Generation Example
Sign and Verify Example
PKCS #11 Functions: C_GetMechanismList
PKCS #11 Functions: C_GetSlotList
Sign and Verify Example
Random Byte Generation Example
PKCS #11 Functions: C_Initialize
PKCS #11 Functions: C_OpenSession
Random Byte Generation Example
Sign and Verify Example
Sign and Verify Example
Sign and Verify Example
Oracle Solaris Key Management Framework
Features
KMF Key Management Tool
Establishing a Security Context With the Server
Oracle Solaris Cryptography Terminology
GSS-API Tokens
Accepting a Context in GSS-API
Accepting a Context
Cleaning Up a GSS-API Session
Working With Contexts in GSS-API
Establishing a Security Context for GSS-API
Obtaining Context Information in GSS-API
Deleting the Security Context
GSS-API Layer
Using Other Context Services in GSS-API
Initiating a Context in GSS-API
createMechOid Function
Acquiring Credentials
Delegating a Credential in GSS-API
Oracle Solaris Key Management Framework
Features
Components of the Cryptographic Framework
Tagging Messages With gss_get_mic
Overview of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Overview of the Cryptoki Library
System Security
Requirements for Developers of User-Level Consumers
Requirements for Developers of User-Level Providers
Components of the Cryptographic Framework
Message Digest Example
Random Byte Generation Example
Sign and Verify Example
Symmetric Encryption Example
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Overview of the Cryptoki Library
KMF Key Management Tool
GSS-API Integers
Names in GSS-API
Privilege Data Types
Debugging When Using Security Extensions
Delegating a Credential in GSS-API
Requirements for Developers of User-Level Consumers
Requirements for Developers of User-Level Providers
Message Digest Example
/etc/gss/mech File
/etc/gss/qop File
Effective Privilege Set
Components of the Cryptographic Framework
Wrapping Messages With gss_wrap
Checking for User Authorizations
Message Digest Example
Random Byte Generation Example
Sign and Verify Example
Symmetric Encryption Example
GSSAPI Client Example Overview
Client-Side GSS-API Application
Miscellaneous GSS-API Sample Functions
GSSAPI Server Example Overview
Server-Side GSS-API Application
Simple PAM Consumer Example
Writing Conversation Functions
Sample PAM Provider Service Module
Privilege Bracketing in the Least Privilege Model
Exporting and Importing Contexts in GSS-API
PKCS #11
specific function name
GSS-API Functions
GSS-API
Sign and Verify Example
Random Byte Generation Example
Random Byte Generation Example
Acquiring Credentials
Performing Anonymous Authentication in GSS-API
GSS-API Format of Anonymous Names
Introduction to GSS-API
Comparing Names in GSS-API
Sending Protected Data in GSS-API
Constructing Mechanism OIDs
Establishing a Security Context for GSS-API
Accepting a Context
GSS-API Context Expiration
createMechOid Function
Working With Credentials in GSS-API
Credential Expiration in GSS-API
Network Security Architecture
Detecting Sequence Problems in GSS-API
Developing Applications That Use GSS-API
Displaying GSS-API Status Codes
Files with OID Values
GSS-API Functions
Generalized GSS-API Usage
Deleting the Security Context
Wrapping and Sending a Message
Reading and Verifying a Signature Block From
a GSS-API Client
Signing and Returning the Message
Unwrapping the Message
gss_str_to_oid Function
Generalized GSS-API Usage
Sending Protected Data in GSS-API
GSS-API Context Exportation and Interprocess Tokens
Introduction to GSS-API
Kerberos v5 Status Codes
Language Bindings for GSS-API
Limitations of GSS-API
/etc/gss/mech File
Confirming Message Transmission in GSS-API
Use of minor_status Parameter in GSS-API
Miscellaneous GSS-API Sample Functions
Performing Mutual Authentication Between Peers in GSS-API
GSS-API OIDs
Using Other Context Services in GSS-API
Where to Get More Information on GSS-API
Application Portability With GSS-API
Protection of GSS-API Channel-Binding Information
Human-Readable GSS-API Name Syntax
Cleaning Up the GSSAPI Server Example
Deletion of GSS-API Contexts and Stored Data
Remote Procedure Calls With GSS-API
Functions From Previous Versions of GSS-API
GSSAPI Client Example Overview
Client-Side GSS-API Application
GSSAPI Server Example Overview
Server-Side GSS-API Application
Specifying a Non-Default Mechanism
Specifying an OID
GSS-API Status Code Macros
Types of Credentials That GSS-API Supports
GSS-API Tokens
GSS-API Tokens
Interprocess Tokens in GSS-API
GSS-API Tokens
Translating a Service Name into GSS-API Format
GSS-API Wrap Size Limits and QOP Values
Deleting the Security Context
Miscellaneous GSSAPI Context Operations on
the Client Side
Miscellaneous GSSAPI Context Operations on
the Client Side
Miscellaneous GSSAPI Context Operations on
the Client Side
Wrapping and Sending a Message
Reading and Verifying a Signature Block From
a GSS-API Client
GSSAPI Client Example Overview
Signing and Returning the Message
Unwrapping the Message
GSSAPI Server Example Overview
GSS-API Functions
Accepting a Context in GSS-API
GSSAPI Server server_establish_context Function
GSS-API Functions
Acquiring Credentials in GSS-API
Acquiring Credentials
GSS-API Functions
Acquiring Credentials in GSS-API
GSS-API Functions
gss_buffer_desc Data Type
Strings and Similar Data in GSS-API
Strings and Similar Data in GSS-API
Working With Credentials in GSS-API
Working With Credentials in GSS-API
Working With Credentials in GSS-API
GSS-API Functions
Using gss_import_name
gss_channel_bindings_struct Data Type
Using Channel Bindings in GSS-API
GSS-API Functions
GSS-API Functions
GSS-API Functions
Functions for Manipulating OIDs
GSS-API Functions
Cleaning Up a GSS-API Session
Deletion of GSS-API Contexts and Stored Data
GSS-API Functions
Using gss_import_name
GSS-API Functions
Displaying GSS-API Status Codes
GSS-API Functions
Interprocess Tokens in GSS-API
GSS-API Functions
GSS-API Functions
Exporting and Importing Contexts in GSS-API
GSS-API Functions
Sending Protected Data in GSS-API
Signing and Returning the Message
GSS-API Functions
Names in GSS-API
Translating a Service Name into GSS-API Format
Acquiring Credentials
GSS-API Functions
Exporting and Importing Contexts in GSS-API
GSS-API Functions
GSS-API Functions
Establishing a Security Context for GSS-API
Performing Anonymous Authentication in GSS-API
Performing Mutual Authentication Between Peers in GSS-API
GSS-API Functions
Obtaining Context Information in GSS-API
GSS-API Functions
GSS-API Functions
GSS-API Functions
GSS-API Functions
GSS-API OIDs
gss_OID_desc Data Type
OIDs Structure
gss_OID_set_desc Data Type
OIDs Structure
Functions for Manipulating OIDs
GSS-API Functions
GSS-API Functions
Cleaning Up a GSS-API Session
GSS-API Functions
Cleaning Up a GSS-API Session
Cleaning Up the GSSAPI Server Example
GSS-API Functions
Cleaning Up a GSS-API Session
Deletion of GSS-API Contexts and Stored Data
GSSAPI Client Example: main Function
Acquiring Credentials
GSS-API Functions
Cleaning Up a GSS-API Session
Renamed GSS-API Functions
Renamed GSS-API Functions
GSS-API Functions
Renamed GSS-API Functions
GSS-API Functions
Unwrapping the Message
Renamed GSS-API Functions
GSS-API Functions
Sending Protected Data in GSS-API
Sending Protected Data in GSS-API
Handling Wrap Size Issues in GSS-API
Wrapping Messages With gss_wrap
GSS-API Functions
GSS-API Functions
Handling Wrap Size Issues in GSS-API
Generalized GSS-API Usage
Guidelines for Developing Privileged Applications
Generalized GSS-API Usage
Exporting and Importing Contexts in GSS-API
Checking for inetd
Inheritable Privilege Set
GSS-API Integers
System Security
Security Extensions Framework
System Security
Introduction to the
Oracle Solaris Key Management Framework
Introduction to the
Oracle Solaris Key Management Framework
KMF Policy Enforcement Mechanisms
PAM Library
Components of the Cryptographic Framework
Overview of the Cryptoki Library
PAM Library
Components of the Cryptographic Framework
Limit Privilege Set
GSS-API Status Codes
GSS-API Status Codes
GSS-API Major Status Code Values
/etc/gss/mech File
Using gss_import_name
Oracle Solaris Cryptography Terminology
gss_str_to_oid Function
Mechanisms and QOPs in GSS-API
Comparing GSSAPI Names (Slow)
Message Digest Example
MICs
data
Wrapping Messages With gss_wrap
GSS-API Tokens
Detecting Sequence Problems in GSS-API
Confirming Message Transmission in GSS-API
Unwrapping the Message
Tagging Messages With gss_get_mic
Handling Wrap Size Issues in GSS-API
Oracle Solaris Cryptography Terminology
Tagging Messages With gss_get_mic
Confirming Message Transmission in GSS-API
GSS-API Status Codes
Mechanism Name
GSS-API Name Types
Comparing Names in GSS-API
Names in GSS-API
Name Types in GSS-API
Network Security Architecture
Security Extensions Framework
Security Extensions Framework
OIDs
Oracle Solaris Key Management Framework
Features
Constructing Mechanism OIDs
OID Set Structure
GSS-API OIDs
OIDs Structure
GSS-API OIDs
Oracle Solaris Key Management Framework
Features
Cryptographic Framework
PAM Authentication Process
Simple PAM Consumer Example
Network Security Architecture
Introduction to the PAM Framework
PAM Library
Requirements for PAM Consumers
PAM Service Modules
Sample PAM Provider Service Module
Requirements for PAM Service Providers
Writing PAM Applications and Services
Writing Conversation Functions
PAM configuration file
Requirements for PAM Consumers
Useful PAM Functions
Useful PAM Functions
Requirements for PAM Consumers
Simple PAM Consumer Example
Requirements for PAM Consumers
Specifying a Non-Default Mechanism
GSSAPI Client Example: main Function
GSS-API Tokens
Permitted Privilege Set
PKCS #11 Functions: C_GetInfo
PKCS #11 Functions: C_GetMechanismList
PKCS #11 Functions: C_GetSlotList
PKCS #11 Functions: C_GetTokenInfo
PKCS #11 Functions: C_Initialize
PKCS #11 Functions: C_OpenSession
System Security
PKCS #11 Function List
Overview of the Cryptoki Library
Components of the Cryptographic Framework
Introduction to the
Oracle Solaris Key Management Framework
KMF Key Management Tool
PAM
Components of the Cryptographic Framework
Oracle Solaris Cryptography Terminology
Names in GSS-API
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Data Types
Privilege Data Types
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Data Types
Privilege Data Types
priv_str_to_set for Mapping Privileges
Privilege Categories
Privilege Data Types
How Privileges Are Implemented
Developing Privileged Applications
How Administrators Assign Privileges
Privilege Categories
Privilege Bracketing in the Least Privilege Model
Privilege Bracketing in the Superuser Model
Privilege Categories
Compatibility Between the Superuser and Privilege Models
Privilege Data Types
Privileged Applications
Privilege Interfaces
System Security
Privilege Categories
Privilege Data Types
About Privileges
priv_str_to_set for Mapping Privileges
Privilege Data Types
Programming with Privileges
setppriv for Setting Privileges
Guidelines for Developing Privileged Applications
privileges
Introduction to the
Oracle Solaris Key Management Framework
Application Portability With GSS-API
Handling Wrap Size Issues in GSS-API
GSS-API OIDs
/etc/gss/qop File
QOP
GSS-API Status Codes
Remote Procedure Calls With GSS-API
Kerberos v5
contexts
GSS-API
Guidelines for Developing Privileged Applications
Establishing a Security Context for GSS-API
Acquiring Credentials
Accepting a Context
PAM Service Modules
Oracle Solaris Cryptography Terminology
setppriv for Setting Privileges
Guidelines for Developing Privileged Applications
GSSAPI Server Example: main Function
Receiving Data From a Client
Reading and Verifying a Signature Block From
a GSS-API Client
Sign and Verify Example
Oracle Solaris Cryptography Terminology
Oracle Solaris Cryptography Terminology
Files with OID Values
Files with OID Values
Specifying an OID
GSS-API Status Codes
GSS-API Status Codes
Message Digest Example
Symmetric Encryption Example
Symmetric Encryption Example
Using the test_import_export_context Function
Oracle Solaris Cryptography Terminology
Oracle Solaris Cryptography Terminology
GSS-API Tokens
GSS-API Tokens
Interprocess Tokens in GSS-API
GSS-API Tokens
Sign and Verify Example