O'Reilly logo

Solaris 8 Security by Edgar Danielyan

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Summary

This chapter discussed authentication and authorization issues in Solaris 8. You saw how to configure and use role-based access control (RBAC), once available only with military-grade systems, but now present in the standard Solaris 8 operating environment. You also saw how to modify certain system settings to increase system security. I introduced and explained the Open Card Framework (OCF), the Pluggable Authentication Modules (PAM) framework, and the dial-up passwords feature. The next chapter introduces Kerberos: what it is, how it works, how to configure it, and—last but not least—whether you need it.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required