Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
Configuring Devices (Task Map)
Configuring Device Policy (Task Map)
Configuring Device Policy
Managing Device Allocation (Task Map)
Managing Device Allocation
Allocating Devices (Task Map)
Allocating Devices
Device Protection (Reference)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
31. Solaris Auditing (Reference)
Glossary
Index
The following task map points to device configuration procedures that are related to device policy.
Task
Description
For Instructions
View the device policy for the devices on your system
Lists the devices and their device policy.
How to View Device Policy
Require privilege for device use
Uses privileges to protect a device.
How to Change the Device Policy on an Existing Device
Remove privilege requirements from a device
Removes or lessens the privileges that are required to access a device.
Example 5-3
Audit changes in device policy
Records changes in device policy in the audit trail
How to Audit Changes in Device Policy
Access /dev/arp
Gets Solaris IP MIB-II information.
How to Retrieve IP MIB-II Information From a /dev/* Device