O'Reilly logo

Solaris™ 8 Advanced System Administrator's Guide, Third Edition by Janice Winsor

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Part 7: System Security

This part introduces system security in four chapters. Chapter 20 introduces the basic concepts of system security, including file, system, and network security. Chapter 21 describes how to use ASET. Chapter 22 describes authentication methods. It provides an overview of DES encryption and Diffie-Hellman authentication. It also explains how to use pluggable authentication modules (PAM). Chapter 23 describes the new Role-Based Access Control (RBAC) functionality available in the Solaris 8 Version 3 release.

Refer to these chapters if you want to familiarize yourself with the basics of system security, if you want to use authentication services and ASET security, and if you want to assign system administrators rights to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required