O'Reilly logo

OCA Oracle Solaris 11 System Administration Exam Guide (Exam 1Z0-821) by Michael Ernest

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the Authentication Process

So far, you’ve learned the basics of the authentication scheme, including steps for making user passwords stronger. You’ve also learned how to identify files by their type, their access modes, and how file ownership determines who is authorized to use a given file. You’ve also learned the foundation tools for changing file modes and authorizations as you see fit. There’s one more thing you need in host security, and that’s to protect communications with the system from a remote machine.

Remote communication is, again, another chicken-and-egg problem. If you’re logging in to one system from another, your authentication credentials go out over the network. Your username and password would normally go across in ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required