Securing the Authentication Process
So far, you’ve learned the basics of the authentication scheme, including steps for making user passwords stronger. You’ve also learned how to identify files by their type, their access modes, and how file ownership determines who is authorized to use a given file. You’ve also learned the foundation tools for changing file modes and authorizations as you see fit. There’s one more thing you need in host security, and that’s to protect communications with the system from a remote machine.
Remote communication is, again, another chicken-and-egg problem. If you’re logging in to one system from another, your authentication credentials go out over the network. Your username and password would normally go across in ...
Get OCA Oracle Solaris 11 System Administration Exam Guide (Exam 1Z0-821) now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.