O'Reilly logo

OCA Oracle Solaris 11 System Administration Exam Guide (Exam 1Z0-821) by Michael Ernest

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Controlling System Access

Every administrator should be familiar with the three pillars of a security plan. The first pillar concerns letting only users (or remote systems) you trust access your system, and letting those users do only what you allow them to do. This domain is called authentication and authorization. The second pillar, encryption, protects the communication between two authenticated parties. The third pillar you rely on ensures that data passed between two parties hasn’t been corrupted in some way. This is called message integrity, but is also known informally as signing, and involves providing a secure digital key that can verify some bundle of data as unchanged. When you connect to a secure HTTP site, your browser affects these ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required