Security Guide
About This Book
Standalone System Security
Installing and Configuring a Secure System
Users, Roles, and Passwords
Auditing
LDAP Exploitation of the Security Subsystem
PKCS #11
X.509 Certificate Authentication Service and Public Key Infrastructure
Pluggable Authentication Module
OpenSSH Software Tools
Network and Internet Security
TCP/IP Security
Operating System-Specific Security
TCP/IP Command Security
Trusted Processes
Network Trusted Computing Base
Data Security and Information Protection
User Based TCP Port Access Control with Discretionary Access Control for Internet Ports
Network Services
Internet Protocol (IP) Security
Network Information Services (NIS) and NIS+ Security
Network File System (NFS) Security
Enterprise Identity Mapping
Appendixes
Appendix A. Security Checklist
Appendix B. Security Resources
Appendix C. Summary of Common AIX System Services
Appendix D. Summary of Network Service Options
Appendix E. Notices
Index