General Security Issues; Planning For Security; Comparing The Linux And The Novell Trustee File Security Models - Novell OPEN ENTERPRISE SERVER - PLANNING AND IMPLEMENTATION GUIDE 12-2010 Implementation Manual

Planning and implementation guide
Hide thumbs Also See for OPEN ENTERPRISE SERVER - PLANNING AND IMPLEMENTATION GUIDE 12-2010:
Table of Contents

Advertisement

No one should ever delete the
member of the NICI development team. And in that rare case, they should be sure to
files
before doing so. Failure to do this makes restoring NICI impossible.
More Information
For more information on how to use NICI, see the
Infrastructure (NICI) 2.7.6 Administration

21.1.4 General Security Issues

In addition to the information explained and referenced in this section, the OES online
documentation contains links to
oes2/security.html#b1349evx).

21.2 Planning for Security

This section discusses the following topics. For additional planning topics, see the
in the OES online
documentation.
Section 21.2.1, "Comparing the Linux and the Novell Trustee File Security Models," on
page 221
Section 21.2.2, "User Restrictions: Some OES 2 Limitations," on page 223
21.2.1 Comparing the Linux and the Novell Trustee File
Security Models
The Novell Trustee and Linux (POSIX) security models are quite different, as presented in
1.
Table 21-1
POSIX vs. NSS/NCP File Security Models
Feature
POSIX / Linux
Administrative
Permissions are individually controlled and
principles
managed for each file and subdirectory.
Because of the nature of the POSIX
security model, users usually have read
rights to most of the system.
To make directories and files private,
permissions must be removed.
For more information on making existing
directories private, see
"Providing a Private Work Directory," on
page
NICI configuration files
Novell International Cryptographic
Guide.
"General Security Issues" (http://www.novell.com/documentation/
Section 17.4.2,
194.
unless they are directly told to do so by a
Novell Trustee Model on OES 2
Trustee assignments are made to
directories and files and flow
down from directories to
everything below unless
specifically reassigned.
back up the
Security section
Table 21-
Security 221

Advertisement

Table of Contents
loading

This manual is also suitable for:

Open enterprise server 2 sp3

Table of Contents