Solaris Security Features—An Overview

In the previous chapter, you learned about implementing security at the system level. You learned how to monitor incorrect logins, set up permissions to secure file systems, secure OpenBoot PROM, monitor logged-in users, recover lost passwords, and so on. In addition to these security features, you can implement various advanced security features for the Solaris 9 environment, such as securing networks by encrypting data over the network by using various encryption algorithms, implementing RBAC, Kerberos, and Secure Shell (SSH).

This chapter provides information on the various security protocols, mechanisms, and products that are available for Solaris 9. Although the list of technologies covered in this chapter ...

Get Special Edition Using® Solaris™ 9 now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.