Skip Navigation Links | |
Exit Print View | |
Oracle Solaris 11 Security Guidelines Oracle Solaris 11.1 Information Library |
1. Overview of Oracle Solaris Security
2. Configuring Oracle Solaris Security
Installing the Oracle Solaris OS
How to Disable Unneeded Services
How to Remove Power Management Capability From Users
How to Place a Security Message in Banner Files
How to Place a Security Message on the Desktop Login Screen
How to Set Stronger Password Constraints
How to Set Account Locking for Regular Users
How to Set More Restrictive umask Value for Regular Users
How to Audit Significant Events in Addition to Login/Logout
How to Monitor lo Events in Real Time
How to Remove Unneeded Basic Privileges From Users
How to Display a Security Message to ssh Users
Protecting File Systems and Files
How to Limit the Size of the tmpfs File System
Protecting and Modifying Files
Creating a BART Snapshot of the System
Adding Multilevel (Labeled) Security
Configuring Trusted Extensions
You can configure Oracle Solaris security features to protect your applications.
Zones are containers that isolate processes. They are useful containers for applications and parts of applications. For example, zones can be used to separate a web site's database from the site's web server.
For information and procedures see the following:
Zones provide a number of tools to manage zone resources.
For information and procedures see the following:
IPsec and IKE protect network transmissions between nodes and networks that are jointly configured with IPsec and IKE.
For information and procedures see the following:
Chapter 6, IP Security Architecture (Overview), in Securing the Network in Oracle Solaris 11.1
Chapter 9, Internet Key Exchange (Overview), in Securing the Network in Oracle Solaris 11.1
Chapter 7, Configuring IPsec (Tasks), in Securing the Network in Oracle Solaris 11.1
Chapter 10, Configuring IKE (Tasks), in Securing the Network in Oracle Solaris 11.1
The IP Filter feature provides a firewall.
For information and procedures see the following:
Chapter 4, IP Filter in Oracle Solaris (Overview), in Securing the Network in Oracle Solaris 11.1
Chapter 5, IP Filter (Tasks), in Securing the Network in Oracle Solaris 11.1
You can protect your network with the Kerberos service. This client-server architecture provides secure transactions over networks. The service offers strong user authentication, as well as integrity and privacy. Using the Kerberos service, you can log in to other systems, execute commands, exchange data, and transfer files securely. Additionally, the service enables administrators to restrict access to services and systems. As a Kerberos user, you can regulate other people's access to your account.
For information and procedures see the following:
Selected man pages include kadmin(1M), pam_krb5(5), and kclient(1M).
You can limit application configuration to trusted users or roles by adding the application to the Service Management Facility (SMF) feature of Oracle Solaris.
For information and procedures see the following: