Thursday May 27, 2010
Tuesday May 25, 2010
By Brian Leonard on May 25, 2010
Of all the components of Solaris' Role Based Access Control (RBAC), roles are the easiest the implement. When I explain the concept of roles to people, they immediately get it.
OpenSolaris comes with a couple of roles pre-configured, most notably root.
This has led to some frustration for newcomers to OpenSolaris as they
don't understand why they can't log into their system as root.
But, as there is most likely no person in your organization named 'root', why do you wnat a user account on your system for a person that doesn't exist? Who is this root user and who's accountable for what they do on the system? Over time the password for the root user account always seems to proliferate. The principle of least privilege, another RBAC concept that I'm not addressing here, is meant to limit the need to hand out root access, but even in the absence of that, wouldn't it be nice to know who's doing what as root on your system?[Read More]
Friday Dec 05, 2008
- The Technical Details: April 29 Oracle Solaris 11.2 Launch
- Next OTN Virtual Sysadmin Day: January 28th, 2014
- Building a "developer cloud" with Oracle Solaris 11
- Security Experts Spill the Beans on Oracle Solaris 11.1
- Oracle Solaris 11.1: Compliance Reporting with SCAP
- Oracle Solaris 10 1/13: Improved Secure File Copy Performance
- Oracle Solaris 11 pkg fix
- Oracle Solaris 11.1
- Using Ops Center to Provision Solaris using a Card-Based NIC
- Oracle Solaris Live Chat This Wednesday (June 27, 8-11A PT)