This chapter covered two important advanced security components of Solaris 9: Access Control Lists and role-based access control.
ACLs are used to supplement the standard UNIX security structure. You learned what an ACL entry looks like, how to create and manage ACLs with the setfacl command, and how to view ACLs with the getfacl command.
Role-based access control enables you to create roles and to assign specialized rights and authorizations to users or roles. Proper use of RBAC will enable you to delegate administrative tasks within your company while maintaining tight security. Roles are managed with the roleadd, rolemod, and roledel commands.
This HTML Help has been published using the chm2web software. |