<Insert Picture Here> Oracle Solaris 11 Security

Size: px
Start display at page:

Download "<Insert Picture Here> Oracle Solaris 11 Security"

Transcription

1

2 <Insert Picture Here> Oracle Solaris 11 Security Glenn Faden Solaris Security Oracle Corporation

3 Security in Oracle Solaris 11 Built-in, flexible, transparent, hardware assisted Authentication SSH X.509 Certificate support, Kerberos PKINIT (X.509). Kerberos data in LDAP. Root login disabled by default. Role auth via user password, Authentication caching. Audit Auditing on by default, audit policy in SMF, Secure remote audit trail. Delegation Fine-grained user/password/rbac management CLI with LDAP support. Sudo with auditing. Data Security ZFS filesystem, swap, dump and zvol encryption, NFSv4/NT style ACLs, Multilevel security with file labeling. IPsec/IKE policy per zone. Per Zone NFS server and Kerberos Realm. Cryptography Transparent Hardware Encryption for Solaris, Java. OpenSSL 4x faster. Trusted Platform Module (TPM) keystore, file integrity scanner. Signed binaries & packages, Oracle Key Manager appliance integration

4 Advanced Protection Oracle Solaris Security Integrated with all the other Solaris features Zones, ZFS, SMF, Networking, Automated Install, IPS, many others Install and boot secure by default The layered defense in depth give the highest levels of containment Protect protect data and the access to it Prevent contain user and application actions Manage manage and log security settings Assure providing an enterprise platform to deploy application securely with confidence

5 Tailored Security for Applications Defense in Depth Audited and delegated administration Restricted zone access Service management Immutable Zones: read-only file systems Data link and IP-layer protection Hardware accelerated crypto operations OpenSSL 5x faster than IBM Encrypted ZFS for data protection Remote key management ZFS encryption on T4 is 3x faster than Intel

6 Security in Oracle Solaris 11 Authentication SSH X.509 Certificate support, Kerberos PKINIT (X.509). Kerberos data in LDAP. Root login disabled by default. Role auth via user password, Authentication caching. Audit Auditing on by default, audit policy in SMF, Secure remote audit trail. Delegation Fine-grained user/password/rbac management CLI with LDAP support. Sudo with auditing. Data Security ZFS filesystem, swap, dump and zvol encryption, NFSv4/NT style ACLs, Multilevel security with file labeling. IPsec/IKE policy per zone. Per Zone NFS server and Kerberos Realm. Cryptography Transparent Hardware Encryption for Solaris, Java. OpenSSL 4x faster. Trusted Platform Module (TPM) keystore, file integrity scanner. Signed binaries & packages, Oracle Key Manager appliance integration

7 Authentication Kerberos Server/Client Kerberized applications Hardware cryptographic acceleration LDAP Server/Client Active Directory client PAM Local authentication SSH PKI Support

8 Role Assumption Root is a role by default: LiveCD and Text Installer Choice with AI install Initial root password matches that of initial user but is expired and needs to be changed on first su(1m) Role authentication policy is configurable to require either user's or role's password usermod -K roleauth=user root /bin/login no longer setuid Started with privilege from console-login, in.telnetd, in.rlogind, etc. when needed.

9 Configuring pam_tty_tickets The following /etc/pam.conf changes the defaults so that tickets are valid for 10 minutes and from any tty on the system. su auth required pam_unix_cred.so.1 su auth sufficient pam_tty_tickets.so.1 anytty timeout=10 su auth requisite pam_authtok_get_so.1 su auth required pam_dhkeys.so.1 su auth required pam_unix_auth.so.1

10 Security in Oracle Solaris 11 Authentication SSH X.509 Certificate support, Kerberos PKINIT (X.509). Kerberos data in LDAP. Root login disabled by default. Role auth via user password, Authentication caching. Audit Auditing on by default, audit policy in SMF, Secure remote audit trail. Delegation Fine-grained user/password/rbac management CLI with LDAP support. Sudo with auditing. Data Security ZFS filesystem, swap, dump and zvol encryption, NFSv4/NT style ACLs, Multilevel security with file labeling. IPsec/IKE policy per zone. Per Zone NFS server and Kerberos Realm. Cryptography Transparent Hardware Encryption for Solaris, Java. OpenSSL 4x faster. Trusted Platform Module (TPM) keystore, file integrity scanner. Signed binaries & packages, Oracle Key Manager appliance integration

11 Auditing and Logging Logging Application defined Syslog format Troubleshoot user/application problems Log policies Auditing Kernel Controlled Low impact Audit by default Secure transmission Evidence quality

12 Auditing No reboot audit Auditing by default without performance penalty No reboot required to enable auditing Audit policy configuration now in SMF More system configuration in SMF means more auditing of system configuration change. e.g.: /etc/default/nfs is now in SMF services Secure Remote Audit trail GSS/Kerberos secured transport Audit Trail Noise reduction Less noise in the audit trail for public files

13 Security in Oracle Solaris 11 Authentication SSH X.509 Certificate support, Kerberos PKINIT (X.509). Kerberos data in LDAP. Root login disabled by default. Role auth via user password, Authentication caching. Audit Auditing on by default, audit policy in SMF, Secure remote audit trail. Delegation Fine-grained user/password/rbac management CLI with LDAP support. Sudo with auditing. Data Security ZFS filesystem, swap, dump and zvol encryption, NFSv4/NT style ACLs, Multilevel security with file labeling. IPsec/IKE policy per zone. Per Zone NFS server and Kerberos Realm. Cryptography Transparent Hardware Encryption for Solaris, Java. OpenSSL 4x faster. Trusted Platform Module (TPM) keystore, file integrity scanner. Signed binaries & packages, Oracle Key Manager appliance integration

14 Rights Management DTrace Debugging

15 Delegation and Qualification Authorized users and roles may delegate their rights to others Authorizations of the form solaris.foo.delegate convey the right to delegate objects in the foo class Can't delegate what you don't have Authorizations of the form solaris.foo.assign convey the right to assign any object in the foo class Authorizations appended with / apply to specific instances of elements in an object class solaris.zone.manage/foobar solaris.group.manage/staff

16 RBAC and Group Management Solaris Management Console is gone New and updated CLIs userattr, profiles, user{add,mod,del}, role{add,mod,del}, group{add,mod,del} User Management profile can be granted to normal users and/or roles Sufficient for creating accounts with default attributes Sufficient for creating groups and managing them Requisite for delegation of user's RBAC attributes Fine-grained delegation is implemented for authorizations, groups, labels, profiles, privileges, projects, and roles

17 Managing Profiles The profiles(1) CLI has been reimplemented with using zonecfg(1m) as a model Both local and LDAP repositories Interactive and command line modes Interactive Auto-completion of all entries Context-sensitive help Bash-like editing Command line mode Accepts multiple subcommands, separated by semicolon Can fully enumerate any or all profiles and their contents

18 Upgrading and Customizing Databases RBAC entries delivered via pkg(1m) are read-only Maintained in subdirectories as separate files Replaced when packages are updated Name Service caches entries for efficient enumeration Legacy files contain only user customizations profiles(1) CLI supports cloning and appending to facilitate customization

19 Modifying customized assignments Editing by hand is not supported Use CLIs to assign, prepend, and remove values to/from lists For user and role commands -K key[+ -]=value[,value...] -K auths+=solaris.zones.login/myzone -P [+ -]profile[,profile...] For group commands -U [+ -]user[,user...] For profiles Use set, add, and remove subcommands

20 LDAP support Scope option added to RBAC and TX CLIs -S ldap files Default for modifications is files Default for lookups is follow name switch Default LDAP attributes are used Client machine must be initialized with admin credential # useradd jdoe -S ldap

21 sudo Integration sudo generates Solaris audit events sudo uses Solaris basic privilege, proc_exec, to implement NOEXEC restriction Initial Solaris users is automatically added to /etc/sudoers file sudo-like features added to su(1m) New PAM module, pam_tty_tickets, implements timerestricted authentication caching New role authentication option to authenticate via user's password instead of role's password

22 RBAC in the kernel pfexec(1) is now In-kernel No longer a setuid program All standard shells (including bash, tcsh, zsh) now available as profile shells A new process flag specifies that all execs are subject to RBAC policy ppriv shows: flags = PRIV_PFEXEC Inherited by all child processes unless the real uid changes exec(2) retrieves the process attributes via door call to a daemon process Transparent to programs, scripts, etc.

23 Solaris 11 RBAC Execution Flow exec pfbash bash Kernel fork/exec symlink pfexec Exec fails Set RBAC flag door call pfexecd Query RBAC attributes door return No door call Yes Is RBAC allowed? pfexecd Return RBAC attributes Exec fails Userland Yes Is RBAC flag set? door return nscd Lookup via name service Is DAC allowed? Execution starts No Yes Apply attributes No

24 Security in Oracle Solaris 11 Authentication SSH X.509 Certificate support, Kerberos PKINIT (X.509). Kerberos data in LDAP. Root login disabled by default. Role auth via user password, Authentication caching. Audit Auditing on by default, audit policy in SMF, Secure remote audit trail. Delegation Fine-grained user/password/rbac management CLI with LDAP support. Sudo with auditing. Data Security ZFS filesystem, swap, dump and zvol encryption, NFSv4/NT style ACLs, Multilevel security with file labeling. IPsec/IKE policy per zone. Per Zone NFS server and Kerberos Realm. Cryptography Transparent Hardware Encryption for Solaris, Java. OpenSSL 4x faster. Trusted Platform Module (TPM) keystore, file integrity scanner. Signed binaries & packages, Oracle Key Manager appliance integration

25 Application Sandboxing Restricting access to files, networks, and applications Stop profile facilitates specification of limited sets of commands and authorizations New basic privileges for locking down processes file_read Read objects in the file system file_write Write objects in the file system net_access Open TCP/UDP/SDP/SCTP network endpoint Privileges for setuid-to-root executables are specified in new Forced Privilege profile

26 Data in Motion Protection Solaris defaults to ONLY SSH remotely accessible SSH & Kerberos easier to manage centrally using X.509 certificate based authentication YOUR Certificate Authorities as Trust Anchors Kerberos protection for NFSv3 & NFSv4 traffic Active Directory/Kerberos authentication for CIFS/SMB network shares Zero-configuration of Kerberos client via DNS New kdcmgr (1) for Key Distribution Center

27 Data in Motion Protection Zone file system security boundary now applies to NFS server as well. Each zone can serve a separate NFSv4 domain Each zone can be in a separate Kerberos Realm Per Zone IPsec policy Kernel SSL/TLS proxy Allows keeping private keys outside of the zone Hardware crypto acceleration on SPARC and Intel CPUs reduces overhead of encrypting network traffic SSH, IPsec/IKE, Kerberos, OpenSSL, KSSL

28 Immutable Zones Read only Zone Root Filesystem Flexible Strict Fixed None Oracle Solaris 11 Per zone configuration option Prevention against malicious and accidental change of the bootenvironment Extensible to other zone file systems Provides varying levels of strictness So that some things can be written # zonecfg -z ozone set file-mac-policy=fixed-configuration

29 Labeled Security Only enterprise OS that Need-toknow Internal Use Public Multilevel Desktop Services (Global Zone) Solaris Kernel net net net includes multilevel functionality as a bundled feature net Full support of Trusted Extensions included in standard Solaris license Zones architecture makes labeling completely transparent to applications

30 Security in Oracle Solaris 11 Built-in, flexible, transparent, hardware assisted Authentication SSH X.509 Certificate support, Kerberos PKINIT (X.509). Kerberos data in LDAP. Root login disabled by default. Role auth via user password, Authentication caching. Audit Auditing on by default, audit policy in SMF, Secure remote audit trail. Delegation Fine-grained user/password/rbac management CLI with LDAP support. Sudo with auditing. Data Security ZFS filesystem, swap, dump and zvol encryption, NFSv4/NT style ACLs, Multilevel security with file labeling. IPsec/IKE policy per zone. Per Zone NFS server and Kerberos Realm. Cryptography Transparent Hardware Encryption for Solaris, Java. OpenSSL 4x faster. Trusted Platform Module (TPM) keystore, file integrity scanner. Signed binaries & packages, Oracle Key Manager appliance integration

31 Cryptographic Security The framework for cryptography is standardized and extensible. Your current cryptographic choices and any future technology can easily plug in and just work. Standards-based framework Same API, software or hardware NSA Suite B algorithms Extensible for future technologies

32 System Integrity Protection Network package installation over HTTPS Protect sensitive package content in transit Solaris 11 packages are cryptographically signed You can add additional signatures System policy to require and verify signatures YOU choose who you trust per system image ELF binaries are still cryptographically signed Know they came from Oracle RE process For non packaged files bart(1m) provides a passive manifest comparison system using cryptographic hashes

33 Support for Cryptographic Hardware Performance Improvements for SPARC and Intel Many of these have been backported to S10 Updates. T1-T3 systems access hardware crypto via ncp/n2cp/n2rng modules T4 systems implement unprivileged instruction access, so no special hardware drivers are required (that is, no n2cp) Intel Westmere systems (AES-NI) also have unprivileged instruction access. Also, successors: Sandybridge, Ivybridge, etc.

34 Data at Rest Protection Encryption for UFS & other legacy filesystems via lofi driver. ZFS data set encryption (file system & ZVOL) Comprehensive wrapping key management Delegation: key use vs key change vs key location/type Local or Centralised Integrated with Oracle Key Manager via pkcs11_kms 3rd Party key management integration zfs(1m) key subcommand is scriptable Keys from any location policy on server side Data encryption key change at clone or on demand Oracle DB Transparent Data Encryption hardware acceleration on SPARC T3,T4 and Intel AES-NI

35 lofi encryption Encryption of lofi block devices Use Cryptographic Framework to automatically benefit from hardware acceleration. Can be used for encrypted swap lofiadm(1m) can use PKCS#11 for key storage: Softtoken, TPM, and Oracle Key Management System lofi devices can't be compressed & encrypted Example: # pktool genkey keytype=aes keylen=128 token=kms label=mykey Enter PIN for KMS: # lofiadm -c aes-128-cbc -T :::mykey -a /tmp/lofi Enter PIN KMS: /dev/lofi/1

36 ZFS Encryption Example: Using an external memory stick as the key source for an encrypted dataset # pktool genkey keystore=file outkey=/media/rmdisk0/mykey \ keytype=aes keylen=256 # zfs create encryption=aes-256-ccm \ -o keysource=raw,file:///media/rmdisk0/mykey tank/home/bob

37 Encrypted Home Directories User home directories are created as ZFS datasets Conditionally based on filesystem type of parent directory Initial encryption key inherited from parent dataset New PAM module, pam_zfs_key, supports mounting encrypted home directories with user's password User is granted ZFS permission to create home directory snapshots

38 For More Information / Try Out Today Product overview and download oracle.com/solaris Oracle Technology Network oracle.com/technetwork/server-storage/solaris11 System administrators community facebook.com/oraclesolaris Oracle Solaris Insider 38

39

Oracle EXAM - 1Z Upgrade to Oracle Solaris 11 System Administrator. Buy Full Product.

Oracle EXAM - 1Z Upgrade to Oracle Solaris 11 System Administrator. Buy Full Product. Oracle EXAM - 1Z0-820 Upgrade to Oracle Solaris 11 System Administrator Buy Full Product http://www.examskey.com/1z0-820.html Examskey Oracle 1Z0-820 exam demo product is here for you to test the quality

More information

RBAC in Solaris 10. Darren J Moffat Staff Engineer, Networking & Security Sun Microsystems, Inc. 7 th October 2004

RBAC in Solaris 10. Darren J Moffat Staff Engineer, Networking & Security Sun Microsystems, Inc. 7 th October 2004 RBAC in Solaris 10 Darren J Moffat Staff Engineer, Networking & Security Sun Microsystems, Inc. 7 th October 2004 Agenda Least Privilege / RBAC in Solaris 10 SMF - Service Management Framework Zones (N1

More information

Sun Certified System Administrator for the Solaris 10 OS Bootcamp

Sun Certified System Administrator for the Solaris 10 OS Bootcamp Sun Certified System Administrator for the Solaris 10 OS Bootcamp Student Guide - Volume 3 SA-997 Rev A (SA-202-S10-C.2) D63735GC10 Edition 1.0 D64505 Copyright 2008, 2010, Oracle and/or its affiliates.

More information

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem

Why secure the OS? Operating System Security. Privilege levels in 80X86 processors. The basis of protection: Seperation. Privilege levels - A problem Why secure the OS? Operating System Security Works directly on the hardware but can be adapted during runtime Data and process are directly visible Application security can be circumvented from lower layers

More information

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus

Unit 2: Manage Files Graphically with Nautilus Objective: Manage files graphically and access remote systems with Nautilus Linux system administrator-i Unit 1: Get Started with the GNOME Graphical Desktop Objective: Get started with GNOME and edit text files with gedit Unit 2: Manage Files Graphically with Nautilus Objective:

More information

Oracle Exam 1z0-820 Upgrade to Oracle Solaris 11 System Administrator Version: 7.0 [ Total Questions: 133 ]

Oracle Exam 1z0-820 Upgrade to Oracle Solaris 11 System Administrator Version: 7.0 [ Total Questions: 133 ] s@lm@n Oracle Exam 1z0-820 Upgrade to Oracle Solaris 11 System Administrator Version: 7.0 [ Total Questions: 133 ] Question No : 1 Which modification needs to be made to the Service Management Facility

More information

Best Practices for keeping your Oracle Solaris workloads secure CON6298

Best Practices for keeping your Oracle Solaris workloads secure CON6298 Best Practices for keeping your Oracle Solaris workloads secure CON6298 Darren J Moffat Senior Principal Engineer Oracle Solaris Engineering October, 2017 Safe Harbor Statement The following is intended

More information

Why You Will Benefit From Thinking About, And Planning For Oracle Solaris 11

Why You Will Benefit From Thinking About, And Planning For Oracle Solaris 11 Why You Will Benefit From Thinking About, And Planning For Oracle Solaris 11 Isaac Rozenfeld Oracle Solaris Product Customer ation Experience isaac.rozenfeld@oracle.com 3/11/2011

More information

IPS Packaging for Oracle Solaris 11

IPS Packaging for Oracle Solaris 11 IPS Packaging for Oracle Solaris 11 Click to edit the title text formatclick to edit Master title style Wenlong Zhang Senior Sales Consultant 2 Copyright 2011, Oracle and/or its affiliates. All rights

More information

An Overview of Security in the FreeBSD Kernel. Brought to you by. Dr. Marshall Kirk McKusick

An Overview of Security in the FreeBSD Kernel. Brought to you by. Dr. Marshall Kirk McKusick An Overview of Security in the FreeBSD Kernel Brought to you by Dr. Marshall Kirk McKusick 2013 BSDCan Conference May 17, 2013 University of Ottawa Ottawa, Canada Copyright 2013 Marshall Kirk McKusick.

More information

Encrypted Local, NAS iscsi/fcoe Storage with ZFS

Encrypted Local, NAS iscsi/fcoe Storage with ZFS Encrypted Local, NAS iscsi/fcoe Storage with ZFS OpenSolaris ZFS Crypto Project Darren Moffat James Hughes Anthony Scarpino Sun Microsystems Inc. ZFS Elevator Pitch To create a reliable storage system

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

"Charting the Course... RHCE Rapid Track Course. Course Summary

Charting the Course... RHCE Rapid Track Course. Course Summary Course Summary Description This course is carefully designed to match the topics found in the Red Hat RH299 exam prep course but also features the added benefit of an entire extra day of comprehensive

More information

RedHat Certified Engineer

RedHat Certified Engineer RedHat Certified Engineer Red Hat Certified Engineer (RHCE) is a performance-based test that measures actual competency on live systems. Called the "crown jewel of Linux certifications," RHCE proves an

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Xcalar Installation Guide

Xcalar Installation Guide Xcalar Installation Guide Publication date: 2018-03-16 www.xcalar.com Copyright 2018 Xcalar, Inc. All rights reserved. Table of Contents Xcalar installation overview 5 Audience 5 Overview of the Xcalar

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1Z0-881 Title : Oracle Solaris 10 Security Administrator Certified Expert Exam Vendors : Oracle Version

More information

Oracle Corporation 1

Oracle Corporation 1 1 Solaris 11 for Developers Webinar Series Simplify your Development with Zones, ZFS and Crossbow (TCP/IP) Eric Reid, Stefan Schneider Oracle Systems ISV Engineering 2 Solaris 11 for Developers Webinar

More information

FreeBSD Advanced Security Features

FreeBSD Advanced Security Features FreeBSD Advanced Security Features Robert N. M. Watson Security Research Computer Laboratory University of Cambridge 19 May, 2007 Introduction Welcome! Introduction to some of the advanced security features

More information

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN

Create and Apply Clientless SSL VPN Policies for Accessing. Connection Profile Attributes for Clientless SSL VPN Create and Apply Clientless SSL VPN Policies for Accessing Resources, page 1 Connection Profile Attributes for Clientless SSL VPN, page 1 Group Policy and User Attributes for Clientless SSL VPN, page 3

More information

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2

FIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2 Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level

More information

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved.

Venafi Platform. Architecture 1 Architecture Basic. Professional Services Venafi. All Rights Reserved. Venafi Platform Architecture 1 Architecture Basic Professional Services 2018 Venafi. All Rights Reserved. Goals 1 2 3 4 5 Architecture Basics: An overview of Venafi Platform. Required Infrastructure: Services

More information

2 SCANNING, PROBING, AND MAPPING VULNERABILITIES

2 SCANNING, PROBING, AND MAPPING VULNERABILITIES GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range

More information

1Z Oracle Solaris 11 System Administration Exam Summary Syllabus Questions

1Z Oracle Solaris 11 System Administration Exam Summary Syllabus Questions 1Z0-821 Oracle Solaris 11 System Administration Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-821 Exam on Oracle Solaris 11 System Administration... 2 Oracle 1Z0-821 Certification

More information

Using the MyProxy Online Credential Repository

Using the MyProxy Online Credential Repository Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois jbasney@ncsa.uiuc.edu What is MyProxy? Independent Globus Toolkit add-on

More information

Network Security: Kerberos. Tuomas Aura

Network Security: Kerberos. Tuomas Aura Network Security: Kerberos Tuomas Aura Kerberos authentication Outline Kerberos in Windows domains 2 Kerberos authentication 3 Kerberos Shared-key protocol for user login authentication Uses passwords

More information

Linux Administration

Linux Administration Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals

More information

This course is for those wanting to learn basic to intermediate topics in Solaris 10 system administration.

This course is for those wanting to learn basic to intermediate topics in Solaris 10 system administration. Course Summary Description This course teaches basic to intermediate topics in Solaris 10 system administration. The operating system will be Oracle Solaris 10 (SunOS 5.10 Release 1/13 U11). Objectives

More information

Kerberos & HPC Batch systems. Matthieu Hautreux (CEA/DAM/DIF)

Kerberos & HPC Batch systems. Matthieu Hautreux (CEA/DAM/DIF) Kerberos & HPC Batch systems Matthieu Hautreux (CEA/DAM/DIF) matthieu.hautreux@cea.fr Outline Kerberos authentication HPC site environment Kerberos & HPC systems AUKS From HPC site to HPC Grid environment

More information

<Insert Picture Here> Getting Started with Solaris

<Insert Picture Here> Getting Started with Solaris Getting Started with Solaris W Brian Leonard Principal Software Engineer Program Agenda About Installation Java Desktop System Where is Everything? Users, Profiles

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.3 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Document version: 2.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC.

More information

DoD Common Access Card Authentication. Feature Description

DoD Common Access Card Authentication. Feature Description DoD Common Access Card Authentication Feature Description UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies

More information

Securing ArcGIS Services

Securing ArcGIS Services Federal GIS Conference 2014 February 10 11, 2014 Washington DC Securing ArcGIS Services James Cardona Agenda Security in the context of ArcGIS for Server Background concepts Access Securing web services

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

vsphere Security Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vsphere Security Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 Modified on 21 JUN 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

70-411: Administrating Windows Server 2012

70-411: Administrating Windows Server 2012 70-411: Administrating Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer a Windows Server 2012 infrastructure in an enterprise environment. Course

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

SSSD. Client side identity management. LinuxDays 2012 Jakub Hrozek

SSSD. Client side identity management. LinuxDays 2012 Jakub Hrozek SSSD Client side identity management LinuxDays 2012 Jakub Hrozek 20. října 2012 1 User login in Linux 2 Centralized user databases 3 SSSD Section 1 User login in Linux User login in Linux User login in

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Securing VMware NSX MAY 2014

Securing VMware NSX MAY 2014 Securing VMware NSX MAY 2014 Securing VMware NSX Table of Contents Executive Summary... 2 NSX Traffic [Control, Management, and Data]... 3 NSX Manager:... 5 NSX Controllers:... 8 NSX Edge Gateway:... 9

More information

ipad in Business Security Overview

ipad in Business Security Overview ipad in Business Security Overview ipad can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods for

More information

Alliance Key Manager A Solution Brief for Partners & Integrators

Alliance Key Manager A Solution Brief for Partners & Integrators Alliance Key Manager A Solution Brief for Partners & Integrators Key Management Enterprise Encryption Key Management This paper is designed to help technical managers, product managers, and developers

More information

What's New in FreeNAS 9.3. Dru Lavigne Documentation Lead, ixsystems SCALE, February 21, 2015

What's New in FreeNAS 9.3. Dru Lavigne Documentation Lead, ixsystems SCALE, February 21, 2015 What's New in FreeNAS 9.3 Dru Lavigne Documentation Lead, ixsystems SCALE, February 21, 2015 What is FreeNAS? Open source NAS (network attached storage) based on FreeBSD (nanobsd) and released under a

More information

Remote power and console management in large datacenters

Remote power and console management in large datacenters Remote power and console management in large datacenters A Horváth IT department, CERN, CH-1211 Genève 23, Switzerland E-mail: Andras.Horvath@cern.ch Abstract. Today s datacenters are often built of a

More information

Nicolas Williams Staff Engineer Sun Microsystems, Inc.

Nicolas Williams Staff Engineer Sun Microsystems, Inc. Deploying Secure NFS Nicolas Williams Staff Engineer Sun Microsystems, Inc. nicolas.williams@sun.com Page 1 of Secure NFS Background A Brief History Protocol In the beginning, no security AUTH_SYS, AUTH_NONE

More information

Sangfor adesk v5.1 Feature List

Sangfor adesk v5.1 Feature List Sangfor adesk v5.1 Feature List Category Feature Description Terminal and Operation System Terminal Thin Client PC, ipad, iphone, Android smartphone (above version 2.5) OS Windows 7 (32 bit & 64 bit),

More information

/****************************************************************************\ DAS Release for Solaris, Linux, and Windows

/****************************************************************************\ DAS Release for Solaris, Linux, and Windows /****************************************************************************\ DAS Release 3.0.0 for Solaris, Linux, and Windows Copyright 1991-2012 Information Security Corp. All rights reserved. This

More information

Exam Questions 1Z0-881

Exam Questions 1Z0-881 Exam Questions 1Z0-881 Oracle Solaris 10 Security Administrator Certified Expert Exam https://www.2passeasy.com/dumps/1z0-881/ 1.A security administrator has a requirement to deploy the Solaris Security

More information

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Data encryption & security. An overview

Data encryption & security. An overview Data encryption & security An overview Agenda Make sure the data cannot be accessed without permission Physical security Network security Data security Give (some) people (some) access for some time Authentication

More information

Overview of the Cisco NCS Command-Line Interface

Overview of the Cisco NCS Command-Line Interface CHAPTER 1 Overview of the Cisco NCS -Line Interface This chapter provides an overview of how to access the Cisco Prime Network Control System (NCS) command-line interface (CLI), the different command modes,

More information

Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8

Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 8 The following is intended to outline our general product direction. It

More information

Cross-realm trusts with FreeIPA v3

Cross-realm trusts with FreeIPA v3 Cross-realm trusts with FreeIPA v3 Alexander Bokovoy, Andreas Scheider Alexander Bokovoy about:me Member of Samba Team since 2003 Principal Software Engineer, Red Hat FreeIPA project Andreas Schneider

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2

F5 BIG-IQ Centralized Management: Local Traffic & Network. Version 5.2 F5 BIG-IQ Centralized Management: Local Traffic & Network Version 5.2 Table of Contents Table of Contents BIG-IQ Local Traffic & Network: Overview... 5 What is Local Traffic & Network?... 5 Understanding

More information

BIG-IQ Centralized Management: ADC. Version 5.0

BIG-IQ Centralized Management: ADC. Version 5.0 BIG-IQ Centralized Management: ADC Version 5.0 Table of Contents Table of Contents BIG-IQ Application Delivery Controller: Overview...5 What is Application Delivery Controller?...5 Managing Device Resources...7

More information

Logging into the Firepower System

Logging into the Firepower System The following topics describe how to log into the Firepower System: Firepower System User Accounts, on page 1 User Interfaces in Firepower Management Center Deployments, on page 3 Logging Into the Firepower

More information

Oracle Solaris 11.4 Beta Secure. Simple. Cloud-Ready.

Oracle Solaris 11.4 Beta Secure. Simple. Cloud-Ready. Oracle Solaris 11.4 Beta Secure. Simple. Cloud-Ready. Oracle Solaris is optimized to secure your data, simplify the system and application lifecycle, and streamline your cloud journey while protecting

More information

Getting Started with OpenSolaris An Introduction for Technical Evaluators

Getting Started with OpenSolaris An Introduction for Technical Evaluators Getting Started with OpenSolaris 2009.06 - An Introduction for Technical Evaluators 3 days starting 25 January at Guillemot Park, Camberley, Surrey To book please make direct contact with Sarah Clayton

More information

10 Active Directory Misconfigurations That Lead to Total Compromise Austin, TX 201 W 5th St.

10 Active Directory Misconfigurations That Lead to Total Compromise Austin, TX 201 W 5th St. 10 Active Directory Misconfigurations That Lead to Total Compromise hello@javelin-networks.com +1-888-867-5179 Austin, TX 201 W 5th St. 1. Group Policy Preferences Visible Passwords Group Policy Preferences

More information

Data Security and Privacy. Unix Discretionary Access Control

Data Security and Privacy. Unix Discretionary Access Control Data Security and Privacy Unix Discretionary Access Control 1 Readings for This Lecture Wikipedia Filesystem Permissions Other readings UNIX File and Directory Permissions and Modes http://www.hccfl.edu/pollock/aunix1/filepermissions.htm

More information

XenApp 5 Security Standards and Deployment Scenarios

XenApp 5 Security Standards and Deployment Scenarios XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards

More information

W11 Hyper-V security. Jesper Krogh.

W11 Hyper-V security. Jesper Krogh. W11 Hyper-V security Jesper Krogh jesper_krogh@dell.com Jesper Krogh Speaker intro Senior Solution architect at Dell Responsible for Microsoft offerings and solutions within Denmark Specialities witin:

More information

SnapCenter Software 4.0 Concepts Guide

SnapCenter Software 4.0 Concepts Guide SnapCenter Software 4.0 Concepts Guide May 2018 215-12925_D0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter architecture...

More information

Server : Manage and Administer 3 1 x

Server : Manage and Administer 3 1 x Server : Manage and Administer 3 1 x Revised 2016/05/17 TestOut Server Pro: Manage and Administer English 3.1.x Videos: 56 (4:25:22) Demonstrations: 87 (10:14:13) Simulations: 63 Written Lessons: 72 Section

More information

Lecture 08: Networking services: there s no place like

Lecture 08: Networking services: there s no place like Lecture 08: services: there s no place like 127.0.0.1 Hands-on Unix system administration DeCal 2012-10-15 1 / 22 About Common records Other records 2 / 22 About About Common records Other records Domain

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.2 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Documentation version: 2.7.2 Legal Notice Copyright 2016 Veritas Technologies

More information

Oracle 1Z Oracle Solaris 11 System Administration.

Oracle 1Z Oracle Solaris 11 System Administration. Oracle Oracle Solaris 11 System Administration http://killexams.com/exam-detail/ QUESTION: 147 Review the boot environments displayed on your system: Which option describes the solaris-1 BE? A. It is active

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Oracle Enterprise Manager 12c

Oracle Enterprise Manager 12c Oracle Enterprise Manager 12c CON8243 - Enterprise Manager 12c Security Cookbook: Best Practices for Large Datacenters Maureen Byrne Product Management, Oracle Marleen Gebraad, Rabobank Nagaraj Krishnappa

More information

"Charting the Course... Enterprise Linux Security Administration Course Summary

Charting the Course... Enterprise Linux Security Administration Course Summary Course Summary Description This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range of general security techniques such as user/group policies,

More information

BlackBerry Dynamics Security White Paper. Version 1.6

BlackBerry Dynamics Security White Paper. Version 1.6 BlackBerry Dynamics Security White Paper Version 1.6 Page 2 of 36 Overview...4 Components... 4 What's New... 5 Security Features... 6 How Data Is Protected... 6 On-Device Data... 6 In-Transit Data... 7

More information

VMware AirWatch Content Gateway Guide For Linux

VMware AirWatch Content Gateway Guide For Linux VMware AirWatch Content Gateway Guide For Linux AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Kerberos and Active Directory symmetric cryptography in practice COSC412

Kerberos and Active Directory symmetric cryptography in practice COSC412 Kerberos and Active Directory symmetric cryptography in practice COSC412 Learning objectives Understand the function of Kerberos Explain how symmetric cryptography supports the operation of Kerberos Summarise

More information

Oracle Solaris Remote Lab A Solaris 11 Adoption Tool

Oracle Solaris Remote Lab A Solaris 11 Adoption Tool Oracle Solaris 11 Developer Webinar Series Oracle Solaris Remote Lab A Solaris 11 Adoption Tool Ron Larson Dale Layfield Oracle Systems ISV Engineering The following is intended to outline our general

More information

How to Set Up VPN Certificates

How to Set Up VPN Certificates For the VPN service, you can use either self-signed certificates or certificates that are generated by an external CA. In this article: Before You Begin Before you set up VPN certificates, verify that

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Securing Linux Systems Before Deployment

Securing Linux Systems Before Deployment Securing Linux Systems Before Deployment Richard Williams Senior Support Services Specialist Symark Why secure Linux systems? Your Linux enterprise installation is growing Assets on Linux systems are becoming

More information

Security in Bomgar Remote Support

Security in Bomgar Remote Support Security in Bomgar Remote Support 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Radius, LDAP, Radius, Kerberos used in Authenticating Users

Radius, LDAP, Radius, Kerberos used in Authenticating Users CSCD 303 Lecture 5 Fall 2018 Radius, LDAP, Radius, Kerberos used in Authenticating Users Kerberos Authentication and Authorization Previously Said that identification, authentication and authorization

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Privilege Separation

Privilege Separation What (ideas of Provos, Friedl, Honeyman) A generic approach to limit the scope of programming bugs Basic principle: reduce the amount of code that runs with special privilege without affecting or limiting

More information

MOC 20411B: Administering Windows Server Course Overview

MOC 20411B: Administering Windows Server Course Overview MOC 20411B: Administering Windows Server 2012 Course Overview This course is part two in a series of three courses that provides the skills and knowledge necessary to implement a core Windows Server 2012

More information

Operating system security models

Operating system security models Operating system security models Unix security model Windows security model MEELIS ROOS 1 General Unix model Everything is a file under a virtual root diretory Files Directories Sockets Devices... Objects

More information

Venafi Server Agent Agent Overview

Venafi Server Agent Agent Overview Venafi Server Agent Agent Overview Venafi Server Agent Agent Intro Agent Architecture Agent Grouping Agent Prerequisites Agent Registration Process What is Venafi Agent? The Venafi Agent is a client/server

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

This course provides students with the knowledge and skills to administer Windows Server 2012.

This course provides students with the knowledge and skills to administer Windows Server 2012. MOC 20411C: Administering Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer Windows Server 2012. Course Introduction Course Introduction 6m Module

More information

Securing VMware NSX-T J U N E 2018

Securing VMware NSX-T J U N E 2018 Securing VMware NSX-T J U N E 2018 Securing VMware NSX Table of Contents Executive Summary...2 NSX-T Traffic [Control, Management, and Data]...3 NSX Manager:...7 NSX Controllers:...9 NSX Edge:...10 NSX-T

More information

OpenSolaris Crypto Framework

OpenSolaris Crypto Framework OpenSolaris Crypto Framework Wolfgang Ley Technology Consultant Sun Microsystems OpenSolaris Crypto Framework Overview Motivation Glossary User-Level Crypto Framework (ucf) Consumers and Providers Kernel-Level

More information

VMware Horizon Workspace Security Features WHITE PAPER

VMware Horizon Workspace Security Features WHITE PAPER VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon

More information

Oracle 1Z Upgrade to Oracle Solaris 11 System(R) Administrator.

Oracle 1Z Upgrade to Oracle Solaris 11 System(R) Administrator. Oracle 1Z0-820 Upgrade to Oracle Solaris 11 System(R) Administrator http://killexams.com/exam-detail/1z0-820 QUESTION: 71 A change in your company s security policy now requires an audit trial of all administrators

More information

Oracle Solaris Virtualization: From DevOps to Enterprise

Oracle Solaris Virtualization: From DevOps to Enterprise Oracle Solaris Virtualization: From DevOps to Enterprise Duncan Hardie Principal Product Manager Oracle Solaris 17 th November 2015 Oracle Confidential Internal/Restricted/Highly Restricted Safe Harbor

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include:

AppSense DataNow. Release Notes (Version 4.0) Components in this Release. These release notes include: AppSense DataNow Release Notes (Version 4.0) These release notes include: Components in this Release Important Upgrade Information New Features Bugs Fixed Known Issues and Limitations Supported Operating

More information

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7

Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Critical Analysis and last hour guide for RHCSA/RHCE Enterprise 7 Disclaimer: I haven t gone through RHCSA/RHCE EL 7. I am preparing for upgrade of my RHCE certificate from RHCE EL4 to RHCE EL7. I don

More information

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT

ArcGIS Enterprise Security: An Introduction. Randall Williams Esri PSIRT ArcGIS Enterprise Security: An Introduction Randall Williams Esri PSIRT Agenda ArcGIS Enterprise Security for *BEGINNING to INTERMIDIATE* users ArcGIS Enterprise Security Model Portal for ArcGIS Authentication

More information

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information