Trusted IRIX™/CMW Security Administration Guide
Next
Trusted IRIX
™
/CMW Security Administration Guide
Document Number: 007-3299-001
Front Matter
|
List of Figures
|
List of Tables
|
Table of Contents
About This Guide
What This Guide Contains
Conventions Used in This Guide
How to Use This Guide
Additional Resources
1.
Introduction to Trusted IRIX/CMW
Trusted IRIX/CMW Product Overview
Trusted IRIX Security Features
The TSIX Session Manager
Data Import/Export Restrictions
2.
Planning Your Trusted IRIX/CMW System
Planning Your Administrative Accounts
Creating Security Policies
Planning for Users
Planning for MSEN
Planning for MINT
Planning for Auditing
Planning for Networking
Configuration Files
Identifying the System
Installation Notes
System Administration Tools
Deactivating a Trusted System
3.
Administering Login Accounts
User Accounts
User Groups
Performing the Superuser Role
Performing the Site Security Officer Role
Performing the System Administrator Role
Performing the Operator Role
Performing the Auditor Role
4.
Networking With Trusted IRIX/CMW
Theory of TSIX Networking
Trusted Network Preparation and Configuration
The rhost.conf Database
The iflabel(1) Command
Domains of Translation and Interpretation (DOT and DOI)
The inetd Network Service Daemon
Miscellaneous Trusted Network Information
5.
Administering Access Control
Mandatory Access Control
Types of Labels
Working With Labels
Discretionary Access Control
Access Control Lists (ACLs)
Capabilities
6.
Administering the System Audit Trail
Audit Events in Trusted IRIX/CMW
Auditing Unexpected Use of Privilege
7.
Administering Identification and Authentication
Administering Passwords
The Login Process
8.
Trusted IRIX/CMW System Data Files
Home Directory File
Files in the /var Directory Structure
Files in the /dev directory structure
Files in the /etc Directory
Files in the /etc/config Directory
Files in the /etc/mac_label Directory Structure
Files in the /usr Directory Structure
9.
Administering Printing and Tape Devices
Printing Under Trusted IRIX/CMW
Magnetic Tape Backups
10.
Maintaining an Evaluated Configuration
Hardware Configuration
Software Configuration
List of TCB Files and Programs
Administrative Configuration
Index