| Document Information Preface Part I Security Overview 1.  Security Services (Overview) Part II System, File, and Device Security 2.  Managing Machine Security (Overview) Controlling Access to a Computer System Controlling Access to Devices Controlling Access to Machine Resources Controlling Access to Files Controlling Network Access Reporting Security Problems 3.  Controlling Access to Systems (Tasks) 4.  Virus Scanning Service (Tasks) 5.  Controlling Access to Devices (Tasks) 6.  Using the Basic Audit Reporting Tool (Tasks) 7.  Controlling Access to Files (Tasks) Part III Roles, Rights Profiles, and Privileges 8.  Using Roles and Privileges (Overview) 9.  Using Role-Based Access Control (Tasks) 10.  Role-Based Access Control (Reference) 11.  Privileges (Tasks) 12.  Privileges (Reference) Part IV Solaris Cryptographic Services 13.  Solaris Cryptographic Framework (Overview) 14.  Solaris Cryptographic Framework (Tasks) 15.  Solaris Key Management Framework Part V Authentication Services and Secure Communication 16.  Using Authentication Services (Tasks) 17.  Using PAM 18.  Using SASL 19.  Using Solaris Secure Shell (Tasks) 20.  Solaris Secure Shell (Reference) Part VI Kerberos Service 21.  Introduction to the Kerberos Service 22.  Planning for the Kerberos Service 23.  Configuring the Kerberos Service (Tasks) 24.  Kerberos Error Messages and Troubleshooting 25.  Administering Kerberos Principals and Policies (Tasks) 26.  Using Kerberos Applications (Tasks) 27.  The Kerberos Service (Reference) Part VII Solaris Auditing 28.  Solaris Auditing (Overview) 29.  Planning for Solaris Auditing 30.  Managing Solaris Auditing (Tasks) 31.  Solaris Auditing (Reference) Glossary Index |       	 
             
Enhancements to Machine Security in the Solaris 10 ReleaseSince the Solaris 9 release, the following features have been introduced to enhance
system security: Strong password encryption is available and configurable. For more information, see Password Encryption.Device policy is enforced with privileges. For more information, see Device Policy (Overview). For device allocation, the /etc/security/dev directory might not be supported in future releases of the Solaris OS.The Basic Audit Reporting Tool (BART) can monitor the authenticity of the files on your system. For more information, see Chapter 6, Using the Basic Audit Reporting Tool (Tasks).Files can be protected with strong encryption. For more information, see Protecting Files With Encryption.Privileges enforce process rights at the kernel level. For more information, see Privileges (Overview).The Solaris Cryptographic Framework centralizes cryptographic services for providers and for consumers. For more information, see Chapter 13, Solaris Cryptographic Framework (Overview).The PAM framework provides functionality for many programs, such as Solaris Secure Shell. For more information, see Changes to PAM for the Solaris 10 Release.Solaris zones and resource management control access to machine resources. For more information, see System Administration Guide: Virtualization Using the Solaris Operating System.
 |