oracle home
Securing Systems and Attached Devices in Oracle® Solaris 11.2
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Securing Systems and Attached Devices in ...
»
Index S
Updated: September 2014
Securing Systems and Attached Devices in Oracle
®
Solaris 11.2
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 Managing Machine Security
What's New in Securing Systems and Devices in Oracle Solaris 11.2
Controlling Access to a Computer System
Maintaining Physical Security
Maintaining Login Control
Managing Password Information
Local Passwords
NIS Passwords
LDAP Passwords
Password Encryption
Password Algorithm Identifiers
Algorithms Configuration in the policy.conf File
Special System Accounts
Remote Logins
Controlling Access to Devices
Device Policy
Device Allocation
Controlling Access to Machine Resources
Address Space Layout Randomization
Limiting and Monitoring Superuser Access
Configuring Role-Based Access Control to Replace Superuser
Preventing Unintentional Misuse of System Resources
Setting the PATH Variable
Assigning a Restricted Shell to Users
Restricting Access to Data in Files
Restricting setuid Executable Files
Using the Secure by Default Configuration
Using Resource Management Features
Using Oracle Solaris Zones
Monitoring Use of Machine Resources
Monitoring File Integrity
Controlling Access to Files
Encrypting Files on Disk
Using Access Control Lists
Sharing Files Across Machines
Restricting root Access to Shared Files
Controlling Network Access
Network Security Mechanisms
Authentication and Authorization for Remote Access
Firewall Systems
Encryption and Firewall Systems
Reporting Security Problems
Chapter 2 Protecting Oracle Solaris Systems Integrity
Using Verified Boot
Verified Boot and ELF Signatures
Verification Sequence During System Boot
Policies for Verified Boot
Enabling Verified Boot
SPARC: How to Enable Verified Boot on SPARC Systems With Oracle ILOM Verified-Boot Support
How to Enable Verified Boot on Legacy SPARC Systems and x86 Systems
How to Manage Certificates on Systems With Oracle ILOM Verified-Boot Support
How to Manually Verify the elfsign Signature
About Trusted Platform Module
Initializing TPM on Oracle Solaris Systems
How to Check Whether the TPM Device Is Recognized by the Operating System
SPARC: How to Initialize TPM Using the Oracle ILOM Interface
x86: How to Initialize TPM Using BIOS
How to Enable PKCS #11 Consumers to Use TPM as a Secure Keystore
Troubleshooting TPM
Chapter 3 Controlling Access to Systems
Securing Logins and Passwords
How to Display the User's Login Status
How to Display Users Without Passwords
How to Temporarily Disable User Logins
Changing the Default Algorithm for Password Encryption
How to Specify an Algorithm for Password Encryption
How to Specify a New Password Algorithm for an NIS Domain
How to Specify a New Password Algorithm for an LDAP Domain
Monitoring and Restricting root Access
How to Monitor Who Is Using the su Command
How to Restrict and Monitor root Logins
Controlling Access to System Hardware
How to Require a Password for SPARC Hardware Access
How to Disable a System's Abort Sequence
Chapter 4 Controlling Access to Devices
Configuring Device Policy
How to View Device Policy
How to Audit Changes in Device Policy
How to Retrieve IP MIB-II Information From a /dev/* Device
Managing Device Allocation
How to Enable Device Allocation
How to Authorize Users to Allocate a Device
How to View Allocation Information About a Device
How to Forcibly Allocate a Device
How to Forcibly Deallocate a Device
How to Change Which Devices Can Be Allocated
How to Audit Device Allocation
Allocating Devices
How to Allocate a Device
How to Mount an Allocated Device
How to Deallocate a Device
Device Protection Reference
Device Policy Commands
Device Allocation
Components of Device Allocation
Device Allocation Service
Device Allocation Rights Profiles
Device Allocation Commands
Authorizations for the Allocation Commands
Allocate Error State
device_maps File
device_allocate File
Device-Clean Scripts
Device-Clean Script for Tapes
Device-Clean Scripts for Diskettes and CD-ROM Drives
Device-Clean Script for Audio
Writing New Device-Clean Scripts
Chapter 5 Virus Scanning Service
About Virus Scanning
About the vscan Service
Using the vscan Service
How to Enable Virus Scanning on a File System
How to Enable the vscan Service
How to Add a Scan Engine
How to View Vscan Properties
How to Limit the Size of Scanned Files
How to Exclude Files From Virus Scans
Security Glossary
Index
Index Numbers and Symbols
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index Z
Please tell us how to improve our documentation:
Provide more details about the topic
Fix incorrect information
0 of 500
Provide missing information
0 of 500
Provide translated version
--Select--
Deutsch
Español
Français
Italiano
Português Brasil
日本語
한국어
简体中文
繁體中文
Other Language
Other
0 of 500
Terms of Use |
Your Privacy Rights
Thank you for your feedback! If you want to participate in content improvement and share additional information, please click Feedback button.
Rate this document:
Language:
English
S
–S
option
st_clean
script
Writing New Device-Clean Scripts
scripts for cleaning devices
See
device-clean scripts
SCSI devices
st_clean
script
device_allocate File
Secure by Default installation option
Using the Secure by Default Configuration
Secure RPC
alternative
Authentication Services for Remote Access
overview
Authentication and Authorization for Remote Access
securing
network at installation
Using the Secure by Default Configuration
passwords
Securing Logins and Passwords Task Map
security
device allocation
Controlling Access to Devices
devices
Controlling Access to Devices
installation options
Using the Secure by Default Configuration
netservices limited
installation option
Using the Secure by Default Configuration
password encryption
Password Encryption
preventing remote login
How to Restrict and Monitor root Logins
protecting against denial of service
Using Resource Management Features
protecting against Trojan horse
Setting the PATH Variable
protecting devices
Device-Clean Scripts
protecting hardware
Controlling Access to System Hardware
protecting PROM
Controlling Access to System Hardware
Secure by Default
Using the Secure by Default Configuration
system hardware
Controlling Access to System Hardware
systems
Managing Machine Security
security attributes
using to mount allocated device
How to Authorize Users to Allocate a Device
Service Management Facility (SMF)
See
SMF
setuid
permissions
security risks
Restricting setuid Executable Files
SHA-2
algorithms
Password Encryption Algorithms
sharing files
and network security
Sharing Files Across Machines
SMF
device allocation service
Device Allocation Service
managing Secure by Default configuration
Using the Secure by Default Configuration
solaris.device.revoke
authorization
Authorizations for the Allocation Commands
sr_clean
script
description
Device-Clean Scripts for Diskettes and CD-ROM Drives
st_clean
script
Device-Clean Script for Tapes
device_allocate File
standard cleanup
st_clean
script
Writing New Device-Clean Scripts
starting
device allocation
How to Enable Device Allocation
su
command
displaying access attempts on console
How to Restrict and Monitor root Logins
monitoring use
How to Monitor Who Is Using the su Command
su
file
monitoring
su
command
How to Monitor Who Is Using the su Command
sulog
file
How to Monitor Who Is Using the su Command
Sun
MD5
algorithm
Password Encryption Algorithms
superuser
See
root
role
svc:/system/device/allocate
device allocation service
Device Allocation Service
System Administrator rights
protecting hardware
How to Require a Password for SPARC Hardware Access
system calls
ioctl to clean audio device
Device-Clean Script for Audio
system hardware
controlling access to
Controlling Access to System Hardware
system security
access
Managing Machine Security
displaying
user's login status
Displaying a User's Login Status
How to Display the User's Login Status
users with no passwords
How to Display Users Without Passwords
firewall systems
Firewall Systems
hardware protection
Controlling Access to System Hardware
Maintaining Physical Security
login access restrictions
Maintaining Login Control
Maintaining Login Control
machine access
Maintaining Physical Security
overview
Controlling Access to a Computer System
Managing Machine Security
password encryption
Password Encryption
passwords
Managing Password Information
restricted shell
Assigning a Restricted Shell to Users
Assigning a Restricted Shell to Users
restricting remote
root
access
How to Restrict and Monitor root Logins
role-based access control (RBAC)
Configuring Role-Based Access Control to Replace Superuser
root
access restrictions
How to Restrict and Monitor root Logins
Restricting root Access to Shared Files
special accounts
Special System Accounts
su
command monitoring
How to Monitor Who Is Using the su Command
Limiting and Monitoring Superuser Access
system variables
See also
variables
CRYPT_DEFAULT
How to Specify an Algorithm for Password Encryption
KEYBOARD_ABORT
How to Disable a System's Abort Sequence
Previous
Next