JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 11.1 Administration: Security Services     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

Securing Logins and Passwords (Tasks)

Securing Logins and Passwords (Task Map)

How to Change the root Password

How to Display a User's Login Status

How to Display Users Without Passwords

How to Temporarily Disable User Logins

About Failed Logins

Changing the Default Algorithm for Password Encryption (Tasks)

How to Specify an Algorithm for Password Encryption

How to Specify a New Password Algorithm for an NIS Domain

How to Specify a New Password Algorithm for an LDAP Domain

Monitoring and Restricting root Access (Tasks)

How to Monitor Who Is Using the su Command

How to Restrict and Monitor root Logins

Controlling Access to System Hardware (Tasks)

How to Require a Password for SPARC Hardware Access

How to Disable a System's Abort Sequence

4.  Virus Scanning Service (Tasks)

5.  Controlling Access to Devices (Tasks)

6.  Verifying File Integrity by Using BART (Tasks)

7.  Controlling Access to Files (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Security Attributes in Oracle Solaris (Reference)

Part IV Cryptographic Services

11.  Cryptographic Framework (Overview)

12.  Cryptographic Framework (Tasks)

13.  Key Management Framework

Part V Authentication Services and Secure Communication

14.  Using Pluggable Authentication Modules

15.  Using Secure Shell

16.  Secure Shell (Reference)

17.  Using Simple Authentication and Security Layer

18.  Network Services Authentication (Tasks)

Part VI Kerberos Service

19.  Introduction to the Kerberos Service

20.  Planning for the Kerberos Service

21.  Configuring the Kerberos Service (Tasks)

22.  Kerberos Error Messages and Troubleshooting

23.  Administering Kerberos Principals and Policies (Tasks)

24.  Using Kerberos Applications (Tasks)

25.  The Kerberos Service (Reference)

Part VII Auditing in Oracle Solaris

26.  Auditing (Overview)

27.  Planning for Auditing

28.  Managing Auditing (Tasks)

29.  Auditing (Reference)

Glossary

Index

Securing Logins and Passwords (Tasks)

You can limit remote logins, require users to have passwords, and require the root account to have a complex password. You can also display a security message to users, monitor failed access attempts, and disable logins temporarily.

Securing Logins and Passwords (Task Map)

The following task map points to procedures that monitor user logins and that disable user logins.

Task
Description
For Instructions
Inform users of site security at login.
Displays a text message on the login screen with site security information.
Change the root password.
Ensures that the root account complies with password requirements.
Display a user's login status.
Lists extensive information about a user's login account, such as full name and password aging information.
Find users who do not have passwords.
Finds only those users whose accounts do not require a password.
Disable logins temporarily.
Denies user logins to a machine as part of system shutdown or routine maintenance.

How to Change the root Password

When you change the root password, you must comply with the password requirements that apply to all users of the system.

Before You Begin

You must assume the root role. For more information, see How to Use Your Assigned Administrative Rights.

How to Display a User's Login Status

Before You Begin

You must assume the root role. For more information, see How to Use Your Assigned Administrative Rights.

Example 3-1 Displaying a User's Login Status

In the following example, the login status for the user jdoe is displayed.

# logins -x -l jdoe
jdoe       500     staff           10   Jaylee Jaye Doe
                   /home/jdoe
                   /bin/bash
                   PS 010103 10 7 -1
jdoe

Identifies the user's login name.

500

Identifies the user ID (UID).

staff

Identifies the user's primary group.

10

Identifies the group ID (GID).

Jaylee Jaye Doe

Identifies the comment.

/home/jdoe

Identifies the user's home directory.

/bin/bash

Identifies the login shell.

PS 010170 10 7 -1

Specifies the password aging information:

  • Last date that the password was changed

  • Number of days that are required between changes

  • Number of days before a change is required

  • Warning period

How to Display Users Without Passwords

Before You Begin

You must assume the root role. For more information, see How to Use Your Assigned Administrative Rights.

Example 3-2 Displaying Accounts Without Passwords

In the following example, the user pmorph and the role roletop do not have passwords.

# logins -p
pmorph          501     other           1       Polly Morph
roletop         211     admin           1       Role Top
# 

How to Temporarily Disable User Logins

Temporarily disable user logins during system shutdown or routine maintenance. root logins are not affected. For more information, see the nologin(4) man page.

Before You Begin

You must become an administrator who is assigned the solaris.admin.edit/etc/nologin authorization. By default, the root role has this authorization. For more information, see How to Use Your Assigned Administrative Rights.

  1. Create the /etc/nologin file in a text editor.
    # pfedit /etc/nologin

    For an example of using the solaris.admin.edit/etc/nologin authorization, see Example 3-3.

  2. Include a message about system availability.
  3. Close and save the file.

Example 3-3 Disabling User Logins

In this example, a user is authorized to write the notification of system unavailability.

% pfedit /etc/nologin
***No logins permitted.***

***The system will be unavailable until 12 noon.***

About Failed Logins

To monitor all failed login attempts to the system, refer to the audit trail that is generated by the auditing service. For more information , see Part VII, Auditing in Oracle Solaris.