Comparing Names in GSS-API
PAM Service Modules
access control list
Obtaining Context Information in GSS-API
Performing Anonymous Authentication in GSS-API
Security Extensions Framework
Security Services in GSS-API
PAM Authentication Process
PAM Service Modules
Auxiliary Property (auxprop) Plugins
Checking for Authorizations
Privileged Applications
About Authorizations
Auxiliary Property (auxprop) Plugins
auxprop plugins
Auxiliary Property (auxprop) Plugins
Message Digest Example
Sign and Verify Example
Random Byte Generation Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Symmetric Encryption Example
Message Digest Example
Sign and Verify Example
Sign and Verify Example
Random Byte Generation Example
Sign and Verify Example
PKCS #11 Functions: C_GetMechanismList
PKCS #11 Functions: C_GetSlotList
Sign and Verify Example
Random Byte Generation Example
PKCS #11 Functions: C_Initialize
PKCS #11 Functions: C_OpenSession
Random Byte Generation Example
Sign and Verify Example
Sign and Verify Example
Sign and Verify Example
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Oracle Solaris Key Management Framework
Features
KMF Key Management Tool
Establishing a Security Context With the Server
Oracle Solaris Cryptography Terminology
GSS-API Tokens
Accepting a Context in GSS-API
Accepting a Context
Cleaning Up a GSS-API Session
Working With Contexts in GSS-API
Establishing a Security Context for GSS-API
Obtaining Context Information in GSS-API
Deleting the Security Context
GSS-API Layer
Using Other Context Services in GSS-API
Cleanup in the GSSAPI Server Example
Initiating a Context in GSS-API
createMechOid Function
Delegating a Credential in GSS-API
Acquiring Credentials
Acquiring Credentials in GSS-API
Oracle Solaris Key Management Framework
Features
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Tagging Messages With gss_get_mic
Overview of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Overview of the Cryptoki Library
Requirements for Developers of User-Level Consumers
Requirements for Developers of User-Level Providers
Components of the Cryptographic Framework
Message Digest Example
Random Byte Generation Example
Sign and Verify Example
Symmetric Encryption Example
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Components of the Cryptographic Framework
System Security
Components of the Cryptographic Framework
Overview of the Cryptoki Library
KMF Key Management Tool
GSS-API Integers
Names in GSS-API
Privilege Data Types
Debugging When Using Security Extensions
Delegating a Credential in GSS-API
Requirements for Developers of User-Level Consumers
Requirements for Developers of User-Level Providers
Message Digest Example
Effective Privilege Set
Components of the Cryptographic Framework
Wrapping Messages With gss_wrap
Checking for Authorizations
Message Digest Example
Random Byte Generation Example
Sign and Verify Example
Symmetric Encryption Example
GSSAPI Client Example Overview
Client-Side Application
Miscellaneous GSS-API Sample Functions
GSSAPI Server Example Overview
Server-Side Application
Common Code
A Simple PAM Consumer Example
Writing Conversation Functions
Sample PAM Provider Service Module
Privilege Bracketing in the Least Privilege Model
SASL Client Example
SASL Server Example
Exporting and Importing Contexts in GSS-API
specific function name
GSS-API Functions
GSS-API
Sign and Verify Example
Random Byte Generation Example
Random Byte Generation Example
Acquiring Credentials
Performing Anonymous Authentication in GSS-API
Format of Anonymous Names
Introduction to GSS-API
Comparing Names in GSS-API
Sending Protected Data in GSS-API
Constructing Mechanism OIDs
Establishing a Security Context for GSS-API
Accepting a Context
Cleaning Up a GSS-API Session
Context Expiration
createMechOid Function
Working With Credentials in GSS-API
Credential Expiration
Detecting Sequence Problems in GSS-API
Developing Applications That Use GSS-API
Displaying Status Codes
Files with OID Values
GSS-API Functions
Generalized GSS-API Usage
Deleting the Security Context
Wrapping and Sending a Message
Reading and Verifying a Signature Block From
a GSS-API Client
Signing and Returning the Message
Unwrapping the Message
gss_str_to_oid Function
Generalized GSS-API Usage
Sending Protected Data in GSS-API
Context Exportation and Interprocess Tokens
Introduction to GSS-API
Kerberos v5 Status Codes
Language Bindings for GSS-API
Limitations of GSS-API
/etc/gss/mech File
Confirming Message Transmission in GSS-API
Use of minor_status Parameter
Miscellaneous GSS-API Sample Functions
Performing Mutual Authentication Between Peers in GSS-API
GSS-API OIDs
Using Other Context Services in GSS-API
Where to Get More Information on GSS-API
Application Portability With GSS-API
Protection of Channel-Binding Information
Human-Readable Name Syntax
Cleanup in the GSSAPI Server Example
Deletion of Contexts and Stored Data
Remote Procedure Calls With GSS-API
Functions From Previous Versions of GSS-API
Network Security Architecture
GSSAPI Client Example Overview
Client-Side Application
GSSAPI Server Example Overview
Server-Side Application
Specifying a Non-Default Mechanism
Specifying an OID
Status Code Macros
Types of Credentials Supported
GSS-API Tokens
GSS-API Tokens
Interprocess Tokens in GSS-API
GSS-API Tokens
Translating a Service Name into GSS-API Format
Wrap Size Limits and QOP Values
Deleting the Security Context
Miscellaneous GSSAPI Context Operations on
the Client Side
Miscellaneous GSSAPI Context Operations on
the Client Side
Miscellaneous GSSAPI Context Operations on
the Client Side
Wrapping and Sending a Message
Reading and Verifying a Signature Block From
a GSS-API Client
GSSAPI Client Example Overview
Signing and Returning the Message
Unwrapping the Message
GSSAPI Server Example Overview
GSS-API Functions
Accepting a Context in GSS-API
server_establish_context Function
GSS-API Functions
Acquiring Credentials in GSS-API
Acquiring Credentials
GSS-API Functions
Acquiring Credentials in GSS-API
GSS-API Functions
gss_buffer_desc Data Type
Strings and Similar Data in GSS-API
Strings and Similar Data in GSS-API
Working With Credentials in GSS-API
Working With Credentials in GSS-API
Working With Credentials in GSS-API
GSS-API Functions
Using gss_import_name
gss_channel_bindings_struct Data Type
Using Channel Bindings in GSS-API
GSS-API Functions
GSS-API Functions
GSS-API Functions
Functions for Manipulating OIDs
GSS-API Functions
Cleaning Up a GSS-API Session
Deletion of Contexts and Stored Data
GSS-API Functions
Using gss_import_name
GSS-API Functions
Displaying Status Codes
GSS-API Functions
Interprocess Tokens in GSS-API
GSS-API Functions
GSS-API Functions
Exporting and Importing Contexts in GSS-API
GSS-API Functions
Sending Protected Data in GSS-API
Signing and Returning the Message
GSS-API Functions
Names in GSS-API
Translating a Service Name into GSS-API Format
Acquiring Credentials
GSS-API Functions
Exporting and Importing Contexts in GSS-API
GSS-API Functions
GSS-API Functions
Establishing a Security Context for GSS-API
Performing Anonymous Authentication in GSS-API
Performing Mutual Authentication Between Peers in GSS-API
Obtaining Context Information in GSS-API
GSS-API Functions
GSS-API Functions
GSS-API Functions
GSS-API Functions
GSS-API Functions
GSS-API OIDs
gss_OID_desc Data Type
OIDs Structure
gss_OID_set_desc Data Type
OIDs Structure
Functions for Manipulating OIDs
GSS-API Functions
GSS-API Functions
Cleaning Up a GSS-API Session
GSS-API Functions
Cleaning Up a GSS-API Session
Cleanup in the GSSAPI Server Example
GSS-API Functions
Cleaning Up a GSS-API Session
Deletion of Contexts and Stored Data
GSSAPI Client Example: main Function
Acquiring Credentials
GSS-API Functions
Cleaning Up a GSS-API Session
Renamed Functions
Renamed Functions
GSS-API Functions
Renamed Functions
GSS-API Functions
Unwrapping the Message
Renamed Functions
GSS-API Functions
GSS-API Functions
Sending Protected Data in GSS-API
Wrapping Messages With gss_wrap
GSS-API Functions
Handling Wrap Size Issues in GSS-API
Generalized GSS-API Usage
Guidelines for Developing Privileged Applications
Generalized GSS-API Usage
Exporting and Importing Contexts in GSS-API
Checking for inetd
Inheritable Privilege Set
GSS-API Integers
Privilege Categories
System Security
System Security
Introduction to the
Oracle Solaris Key Management Framework
Introduction to the
Oracle Solaris Key Management Framework
KMF Policy Enforcement Mechanisms
PAM Library
Components of the Cryptographic Framework
libsasl Initialization
Communication in SASL
SASL Library Basics
Limit Privilege Set
GSS-API Status Codes
GSS-API Status Codes
GSS-API Status Codes
GSS-API Status Codes
GSS-API Major Status Code Values
GSS-API Status Codes
/etc/gss/mech File
Using gss_import_name
Oracle Solaris Cryptography Terminology
gss_str_to_oid Function
Mechanisms and QOPs in GSS-API
Comparing Names (Slow)
Message Digest Example
MICs
data
Wrapping Messages With gss_wrap
GSS-API Tokens
Detecting Sequence Problems in GSS-API
Confirming Message Transmission in GSS-API
Unwrapping the Message
Tagging Messages With gss_get_mic
Handling Wrap Size Issues in GSS-API
Oracle Solaris Cryptography Terminology
Tagging Messages With gss_get_mic
Confirming Message Transmission in GSS-API
GSS-API Status Codes
Mechanism Name
Name Types
Comparing Names in GSS-API
Names in GSS-API
Name Types in GSS-API
Network Security Architecture
Security Extensions Framework
Security Extensions Framework
OIDs
Oracle Solaris Key Management Framework
Features
Constructing Mechanism OIDs
OID Set Structure
GSS-API OIDs
OIDs Structure
GSS-API OIDs
Oracle Solaris Key Management Framework
Features
Cryptographic Framework
SEAM
Writing
PAM Applications and Services
PAM Authentication Process
A Simple PAM Consumer Example
Introduction to the PAM Framework
PAM Library
Requirements for PAM Consumers
Network Security Architecture
PAM Service Modules
Sample PAM Provider Service Module
Requirements for PAM Service Providers
Writing Conversation Functions
PAM configuration file
Requirements for PAM Consumers
Other Useful PAM Functions
Other Useful PAM Functions
Requirements for PAM Consumers
A Simple PAM Consumer Example
Requirements for PAM Consumers
Specifying a Non-Default Mechanism
GSSAPI Client Example: main Function
GSS-API Tokens
Permitted Privilege Set
PKCS #11 Functions: C_GetInfo
PKCS #11 Functions: C_GetMechanismList
PKCS #11 Functions: C_GetSlotList
PKCS #11 Functions: C_GetTokenInfo
PKCS #11 Functions: C_Initialize
PKCS #11 Functions: C_OpenSession
PKCS #11 Function List
Overview of the Cryptoki Library
Components of the Cryptographic Framework
Components of the Cryptographic Framework
Introduction to the
Oracle Solaris Key Management Framework
KMF Key Management Tool
PAM
Components of the Cryptographic Framework
Oracle Solaris Cryptography Terminology
Names in GSS-API
Privilege Categories
Privilege Data Types
Privilege Data Types
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Data Types
Privilege Data Types
Privilege Data Types
Privileged Applications
How Administrators Assign Privileges
Privilege Bracketing in the Least Privilege Model
Privilege Bracketing in the Superuser Model
Privilege Categories
Privilege Categories
Privilege Categories
Privilege Categories
Compatibility Between the Superuser and Privilege Models
Privilege Data Types
Privileged Applications
Privilege Interfaces
System Security
Privilege Data Types
About Privileges
priv_str_to_set for Mapping
Privileges
Privilege Data Types
Programming with Privileges
setppriv for Setting Privileges
Guidelines for Developing Privileged Applications
Introduction to the
Oracle Solaris Key Management Framework
/etc/gss/qop File
Application Portability With GSS-API
Handling Wrap Size Issues in GSS-API
GSS-API OIDs
QOP
GSS-API Status Codes
Remote Procedure Calls With GSS-API
SASL Architecture
SASL Authentication
SASL Library Basics
Auxiliary Property (auxprop) Plugins
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
User Canonicalization Plugins
SASL Client Example
SASL Confidentiality and Integrity
SASL Connection Contexts
SASL Interface Summaries
SASL Confidentiality and Integrity
SASL Library Basics
Communication in SASL
libsasl Initialization
Steps in the SASL Cycle
Security Mechanisms
SASL Plugin Development Guidelines
Client Plugins
SASL Plugin Overview
Server Plugins
Important Structures for SASL Plugins
SASL Interface Summaries
libsasl Cleanup
Releasing SASL Sessions
Network Security Architecture
Common Code
SASL Example
SASL Server Example
SASL Session Initialization
SASL Session Initialization
SASL Library Basics
User Canonicalization Plugins
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
Communication in SASL
SASL Plugin Overview
SASL Session Initialization
SASL Authentication
SASL Authentication
SASL Confidentiality and Integrity
SASL Confidentiality and Integrity
SASL Confidentiality and Integrity
SASL Authentication
SASL Authentication
SASL Plugin Overview
SASL Session Initialization
SASL Authentication
contexts
GSS-API
Guidelines for Developing Privileged Applications
SSF
Establishing a Security Context for GSS-API
Server Plugins
Acquiring Credentials
Accepting a Context
SPI
PAM Service Modules
Oracle Solaris Cryptography Terminology
setppriv for Setting Privileges
Guidelines for Developing Privileged Applications
GSSAPI Server Example: main Function
Receiving Data From a Client
Reading and Verifying a Signature Block From
a GSS-API Client
Sign and Verify Example
SASL
Oracle Solaris Cryptography Terminology
Oracle Solaris Cryptography Terminology
Files with OID Values
Files with OID Values
Specifying an OID
GSS-API Status Codes
GSS-API Status Codes
Message Digest Example
Symmetric Encryption Example
Symmetric Encryption Example
Privilege Categories
Privilege Categories
Using the test_import_export_context Function
Oracle Solaris Cryptography Terminology
Oracle Solaris Cryptography Terminology
GSS-API Tokens
GSS-API Tokens
GSS-API Tokens
Interprocess Tokens in GSS-API
GSS-API Tokens
Sign and Verify Example