User's Manual
 Solaris 9 Security CX-310-301    7   
Using File Listings .................................................................................................................. 40
Using Checksums .................................................................................................................. 40 
Using File Digests .................................................................................................................. 40 
Using the find Command........................................................................................................ 41 
Using Tripwire......................................................................................................................... 42 
Kernel Trust and OpenBoot .......................................................................................................45 
OpenBoot ............................................................................................................................... 45 
File and System Resources Protection....................................................................... 46 
User Account Protection ............................................................................................................ 46 
Checking for Duplicate Accounts ........................................................................................... 46 
Expiring Accounts................................................................................................................... 46 
Restricting root Logins............................................................................................................ 48 
Dormant Accounts.................................................................................................................. 48 
Protecting Passwords ................................................................................................................ 49 
Recommendations for a Good Password .............................................................................. 49 
Users with No Password ........................................................................................................ 50 
Password Aging ..................................................................................................................... 50 
Password Cracking Tools....................................................................................................... 51 
Limitations of Password Authentication ................................................................................. 52 
Non-Login Accounts................................................................................................................... 53 
User Security with SU ................................................................................................................ 53 
Role Based Access Control .......................................................................................................54 
Creating A Profile ................................................................................................................... 55 
Associating Executions with a Profile..................................................................................... 55 
Creating a Role ...................................................................................................................... 55 
Assigning a Role to a User..................................................................................................... 55 
Logging in to a Role ............................................................................................................... 56 
Listing Roles for a User .......................................................................................................... 56 
Listing Profiles for a Role ....................................................................................................... 56 
Permissions................................................................................................................................ 56 
Directories and Files............................................................................................................... 56 










