Controlling System Access

Every administrator should be familiar with the three pillars of a security plan. The first pillar concerns letting only users (or remote systems) you trust access your system, and letting those users do only what you allow them to do. This domain is called authentication and authorization. The second pillar, encryption, protects the communication between two authenticated parties. The third pillar you rely on ensures that data passed between two parties hasn’t been corrupted in some way. This is called message integrity, but is also known informally as signing, and involves providing a secure digital key that can verify some bundle of data as unchanged. When you connect to a secure HTTP site, your browser affects these ...

Get OCA Oracle Solaris 11 System Administration Exam Guide (Exam 1Z0-821) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.