Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Mail Systems
Eclipse Documentation

How To Guides
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Problem Solutions
Privacy Policy




System Administration Guide: Security Services
Previous Next
Chapter 1

Security Services (Overview)

To maintain the security of the Solaris Operating System (Solaris OS), Solaris software provides the following features:

  • System Security – The ability to prevent intrusion, to protect machine resources and devices from misuse, and to protect files from malicious modification or unintentional modification by users or intruders

    For a general discussion of system security, see Chapter 2, Managing Machine Security (Overview).

  • Solaris Cryptographic Services – The ability to scramble data so that only the sender and the designated receiver can read the contents, and to manage cryptographic providers and public key objects

  • Authentication Services – The ability to securely identify a user, which requires the user's name and some form of proof, typically a password

  • Authentication With Encryption – The ability to ensure that authenticated parties can communicate without interception, modification, or spoofing

  • Solaris Auditing – The ability to identify the source of security changes to the system, including file access, security-related system calls, and authentication failures

  • Security Policy – The design and implementation of security guidelines for a computer or network of computers

Previous Next

  Published under the terms fo the Public Documentation License Version 1.01. Design by Interspire