Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
Using the Cryptographic Framework (Task Map)
Protecting Files With the Solaris Cryptographic Framework (Task Map)
Protecting Files With the Solaris Cryptographic Framework
Administering the Cryptographic Framework (Task Map)
Administering the Cryptographic Framework
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
31. Solaris Auditing (Reference)
Glossary
Index
The following task map points to procedures for administering software and hardware providers in the Solaris Cryptographic Framework.
Task
Description
For Instructions
List the providers in the Solaris Cryptographic Framework
Lists the algorithms, libraries, and hardware devices that are available for use in the Solaris Cryptographic Framework.
How to List Available Providers
Add a software provider
Adds a PKCS #11 library or a kernel module to the Solaris Cryptographic Framework. The provider must be signed.
How to Add a Software Provider
Prevent the use of a user-level mechanism
Removes a software mechanism from use. The mechanism can be enabled again.
How to Prevent the Use of a User-Level Mechanism
Temporarily disable mechanisms from a kernel module
Temporarily removes a mechanism from use. Usually used for testing.
How to Prevent the Use of a Kernel Software Provider
Uninstall a provider
Removes a kernel software provider from use.
Example 14-27
List available hardware providers
Shows the attached hardware, shows the mechanisms that the hardware provides, and shows which mechanisms are enabled for use.
How to List Hardware Providers
Disable mechanisms from a hardware provider
Ensures that selected mechanisms on a hardware accelerator are not used.
How to Disable Hardware Provider Mechanisms and Features
Restart or refresh cryptographic services
Ensures that cryptographic services are available.
How to Refresh or Restart All Cryptographic Services