Sun Microsystems, Inc.
spacer |
black dot
     Contents   Next 


System Administration Guide: Security Services is part of a multivolume set that covers a significant part of the Solaris™ system administration information. This book assumes that you have already installed the SunOS™ 5.9 operating system, and you have set up any networking software that you plan to use. The SunOS 5.9 operating system is part of the Solaris 9 product family, which also includes many features, such as the Solaris Common Desktop Environment (CDE).

Note - The Solaris operating environment runs on two types of hardware, or platforms--SPARC™ and IA. The Solaris operating environment runs on both 64-bit and 32-bit address spaces. The information in this document pertains to both platforms and address spaces unless called out in a special chapter, section, note, bullet, figure, table, example, or code example.

Who Should Use This Book

This book is intended for anyone who is responsible for administering one or more systems that run the Solaris 9 release. To use this book, you should have one to two years of UNIX® system administration experience. Attending training courses in UNIX system administration might be helpful.

How the System Administration Volumes Are Organized

Here is a list of the topics that are covered by the volumes of the System Administration Guides.

Book Title


System Administration Guide: Basic Administration

User accounts and groups, server and client support, shutting down and booting a system, removable media, managing software (packages and patches), disks and devices, file systems, and backing up and restoring data

System Administration Guide: Advanced Administration

Printing services, terminals and modems, system resources (disk quotas, accounting, and crontabs), system processes, and troubleshooting Solaris software problems

System Administration Guide: IP Services

TCP/IP networks, IPv4 and IPv6, DHCP, IP Security, Mobile IP, and IP Network Multipathing

System Administration Guide: Naming and Directory Services (DNS, NIS, and LDAP)

DNS, NIS, and LDAP naming and directory services

System Administration Guide: Naming and Directory Services (FNS and NIS+)

FNS and NIS+ naming and directory services

System Administration Guide: Resource Management and Network Services

Resource management, remote file systems, mail, SLP, and PPP

System Administration Guide: Security Services

Auditing, PAM, RBAC, and SEAM

Related Books

This is a list of related documentation that is referred to in this book.

  • Carasik, Anne. UNIX Secure Shell. McGraw Hill, 1999.

  • Cheswick, William R. and Steven M. Bellovin. Firewalls and Internet Security. Addison Wesley, 1994.

Accessing Sun Documentation Online

The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the archive or search for a specific book title or subject. The URL is

Typographic Conventions

The following table describes the typographic changes that are used in this book.

Table P-1 Typographic Conventions

Typeface or Symbol




The names of commands, files, and directories; on-screen computer output 

Edit your .login file.

Use ls -a to list all files.

machine_name% you have mail.


What you type, contrasted with on-screen computer output 

machine_name% su



Command-line placeholder: replace with a real name or value 

To delete a file, type rm filename.


Book titles, new words, or terms, or words to be emphasized.

Read Chapter 6 in User's Guide.

These are called class options.

You must be root to do this.

Shell Prompts in Command Examples

The following table shows the default system prompt and superuser prompt for the C shell, Bourne shell, and Korn shell.

Table P-2 Shell Prompts



C shell prompt machine_name%
C shell superuser prompt machine_name#
Bourne shell and Korn shell prompt $
Bourne shell and Korn shell superuser prompt #
     Contents   Next