Security Guide
Collapsed About This Book

Standalone System Security
Collapsed Installing and Configuring a Secure System
Expanded Users, Roles, and Passwords
The Root Account
Administrative Roles
User Accounts
Set Up Anonymous FTP with a Secure User Account
System Special User Accounts
Access Control Lists
Passwords
User Authentication
Disk Quota System Overview
Collapsed Auditing
Collapsed LDAP Exploitation of the Security Subsystem
Collapsed PKCS #11
Collapsed X.509 Certificate Authentication Service and Public Key Infrastructure
Collapsed Pluggable Authentication Module
Collapsed OpenSSH Software Tools

Network and Internet Security
Collapsed TCP/IP Security
Collapsed Network Services
Collapsed Internet Protocol (IP) Security
Collapsed Network Information Services (NIS) and NIS+ Security
Collapsed Network File System (NFS) Security
Collapsed Enterprise Identity Mapping

Appendixes
Appendix A. Security Checklist
Collapsed Appendix B. Security Resources
Appendix C. Summary of Common AIX System Services
Appendix D. Summary of Network Service Options
Collapsed Appendix E. Notices
Index