O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Role-Based Access Control

Role-based access control, which is also available in standard Solaris 8, is a very important part of Trusted Solaris. In line with the principle of least rights and compartmentalization, roles and privileges in Trusted Solaris 8 are divided, thus permitting stricter control over who can do what. Technically speaking, roles are accounts with a special setup (such as rights and privileges) designed for specific purposes. However, the difference between normal user accounts and role accounts is that users cannot log in directly to a role. They should log in as themselves (using regular usernames) and then su to a role. Another restriction is that a role cannot assume another role—it is first necessary to log out from ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required