System Administration Guide: Security Services is part of a multivolume set that covers a significant part of the Solaris system administration information. This book assumes that you have already installed the SunOS 5.9 operating system, and you have set up any networking software that you plan to use. The SunOS 5.9 operating system is part of the Solaris 9 product family, which also includes many features, such as the Solaris Common Desktop Environment (CDE).
Note - The Solaris operating environment runs on two types of hardware, or platforms--SPARC and IA. The Solaris operating environment runs on both 64-bit and 32-bit address spaces. The information in this document pertains to both platforms and address spaces unless called out in a special chapter, section, note, bullet, figure, table, example, or code example.
Who Should Use This Book
This book is intended for anyone who is responsible for administering one or more systems that run the Solaris 9 release. To use this book, you should have one to two years of UNIX® system administration experience. Attending training courses in UNIX system administration might be helpful.
How the System Administration Volumes Are Organized
Here is a list of the topics that are covered by the volumes of the System Administration Guides.
System Administration Guide: Basic Administration
User accounts and groups, server and client support, shutting down and booting a system, removable media, managing software (packages and patches), disks and devices, file systems, and backing up and restoring data
System Administration Guide: Advanced Administration
Printing services, terminals and modems, system resources (disk quotas, accounting, and crontabs), system processes, and troubleshooting Solaris software problems
System Administration Guide: IP Services
TCP/IP networks, IPv4 and IPv6, DHCP, IP Security, Mobile IP, and IP Network Multipathing
System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP)
DNS, NIS, and LDAP naming and directory services
System Administration Guide: Naming and Directory Services (FNS and NIS+)
FNS and NIS+ naming and directory services
System Administration Guide: Resource Management and Network Services
Resource management, remote file systems, mail, SLP, and PPP
System Administration Guide: Security Services
Auditing, PAM, RBAC, and SEAM
This is a list of related documentation that is referred to in this book.
Carasik, Anne. UNIX Secure Shell. McGraw Hill, 1999.
Cheswick, William R. and Steven M. Bellovin. Firewalls and Internet Security. Addison Wesley, 1994.
Accessing Sun Documentation Online
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table describes the typographic changes that are used in this book.
Table P-1 Typographic Conventions
Typeface or Symbol
|The names of commands, files, and directories; on-screen computer output|
Edit your .login file.
Use ls -a to list all files.
machine_name% you have mail.
|What you type, contrasted with on-screen computer output|
|Command-line placeholder: replace with a real name or value|
To delete a file, type rm filename.
Book titles, new words, or terms, or words to be emphasized.
Read Chapter 6 in User's Guide.
These are called class options.
You must be root to do this.
Shell Prompts in Command Examples
The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.
Table P-2 Shell Prompts
|C shell prompt||machine_name%|
|C shell superuser prompt||machine_name#|
|Bourne shell and Korn shell prompt||$|
|Bourne shell and Korn shell superuser prompt||#|