This chapter discussed authentication and authorization issues in Solaris 8. You saw how to configure and use role-based access control (RBAC), once available only with military-grade systems, but now present in the standard Solaris 8 operating environment. You also saw how to modify certain system settings to increase system security. I introduced and explained the Open Card Framework (OCF), the Pluggable Authentication Modules (PAM) framework, and the dial-up passwords feature. The next chapter introduces Kerberos: what it is, how it works, how to configure it, and—last but not least—whether you need it.