You can configure Oracle Solaris security features to protect your system use, including applications and services on the system and on the network.
Table 6 Securing System Access and Use Task Map
|
You can limit application configuration to trusted users or roles by adding the application to the Service Management Facility (SMF) feature of Oracle Solaris, then requiring rights to start, refresh, and stop the service.
For services that are run by inetd, you should control the number of concurrent processes to prevent a security breach. For more information, see Recommendations for Configuring Systems That Run inetd Based Services in Administering TCP/IP Networks, IPMP, and IP Tunnels in Oracle Solaris 11.3.
For information and procedures see the following:
Selected man pages include smf(5), smf_security(5), svcadm(1M), svcbundle(1M), and svccfg(1M).
You can protect your network with the Kerberos service. This client-server architecture provides secure transactions over networks. The service offers strong user authentication, as well as integrity and privacy. Using the Kerberos service, you can log in to other systems, execute commands, exchange data, and transfer files securely. Additionally, the service enables administrators to restrict access to services and systems. As a Kerberos user, you can regulate other people's access to your account.
For information and procedures that are specific to MIT Kerberos on an Oracle Solaris system, see the following:
Selected man pages include kadmin (1M) , pam_krb5 (5) , and kclient (1M) .