The software described in this documentation is either in Extended Support or Sustaining Support. See https://www.oracle.com/us/support/library/enterprise-linux-support-policies-069172.pdf for more information.
Oracle recommends that you upgrade the software described by this documentation as soon as possible.
Table of Contents
- 3.1 Configuring and Using Data Encryption
- 3.2 Configuring a GRUB Password
- 3.3 Configuring and Using Certificate Management
- 3.4 Configuring and Using Authentication
- 3.5 Configuring and Using Pluggable Authentication Modules
- 3.6 Configuring and Using Access Control Lists
- 3.7 Configuring and Using SELinux
- 3.8 Configuring and Using Auditing
- 3.9 Configuring and Using System Logging
- 3.10 Configuring and Using Process Accounting
- 3.11 Configuring and Using Software Management
- 3.12 Configuring Access to Network Services
- 3.13 Configuring and Using Chroot Jails
- 3.14 Configuring and Using Linux Containers
- 3.15 Configuring and Using Kernel Security Mechanisms
This chapter describes the various ways in which you can configure the security of an Oracle Linux system.