System Administration Guide: Security Services
Previous Next
Chapter 1

Security Services (Overview)

To maintain the security of the Solaris Operating System (Solaris OS), Solaris software provides the following features:

  • System Security – The ability to prevent intrusion, to protect machine resources and devices from misuse, and to protect files from malicious modification or unintentional modification by users or intruders

    For a general discussion of system security, see Chapter 2, Managing Machine Security (Overview).

  • Solaris Cryptographic Services – The ability to scramble data so that only the sender and the designated receiver can read the contents, and to manage cryptographic providers and public key objects

  • Authentication Services – The ability to securely identify a user, which requires the user's name and some form of proof, typically a password

  • Authentication With Encryption – The ability to ensure that authenticated parties can communicate without interception, modification, or spoofing

  • Solaris Auditing – The ability to identify the source of security changes to the system, including file access, security-related system calls, and authentication failures

  • Security Policy – The design and implementation of security guidelines for a computer or network of computers

Previous Next