Tuesday Jan 08, 2008

Tips on Using SSH With Sun Cluster Software

A long-time BigAdmin contributor sent in these two tech tips: Using ssh to Access Logical Nodes in a Cluster Environment and Setting Up crlogin to Work via SSH Using Sun Cluster 3.0/3.1 Software. The first tip shows how to avoid problems when using SSH on a logical node, or when using automatic authentication. The second offers steps for using SSH with crlogin, which makes it easier to administer multiple servers or clusters.

Wednesday Dec 05, 2007

Solaris Trusted Extensions Technical FAQ

This FAQ answers technical questions about Solaris Trusted Extensions. Topics span NFS protocols, remote login to a labeled zone, and much more.

Sunday Dec 02, 2007

Open Source Parameter Guide and Security Documentation

Did you know that the Solaris Tunable Parameters Reference Manual is open source?
Download the latest
XML source files and HTML. [The SOLTUNEPARAMREF directory contains the guide.]

The Solaris Trusted Extensions and security administration documentation is also open source.
Download the latest
XML source files and HTML. [Directories beginning with TR contain the Trusted docs, the SYSADV6 directory contains the security services administration guide.]

Friday Nov 23, 2007

Sun and Trend Micro and Securing the Web

Sun's vision is to enable participation on the network, and to help
ensure this can happen with less risk of attack, Sun teams with
innovative, industry-leading software vendors such as Trend Micro.
>>More

Tuesday Sep 25, 2007

User Authentication on the Solaris OS Part 3: PAM Conversation Functions

In this article,  learn to use the conversation functions of the PAM (Pluggable Authentication Modules) API and examine a sample program.  This is the third installment in Rich Teer's series on User Authentication.

Wednesday Jul 18, 2007

User Authentication on the Solaris OS: Part 1

Rich Teer, Open Solaris Governing Board member, begins an interesting series on User Authentication.

In this short series of articles, you'll see how to write programs that use passwords and other methods to authenticate the user. In Part I, he discusses the principles and illustrates them with an example that works only with password-based authentication.
 

About

<script LANGUAGE="JavaScript"> window.location="http://blogs.oracle.com/otn/"; </script>

Search

Archives
« April 2014
SunMonTueWedThuFriSat
  
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
   
       
Today