Planning For Security; General Security Issues; Comparing The Linux And The Novell Trustee File Security Models - Novell OPEN ENTERPRISE SERVER 2 SP2 - PLANING AND IMPLEMENTATION GUIDE 11-10-2009 Implementation Manual

Planning and implementation guide
Table of Contents

Advertisement

Governmental export and import compliance: It has cryptographic interfaces that are
exportable from the U.S. and importable into other countries with government-imposed
constraints on the export, import, and use of products that contain embedded cryptographic
mechanisms.
Secure and tamper-resistant architecture: The architecture uses digital signatures to implement
a self-verification process so that consuming services are assured that NICI has not been
modified or tampered with when it is initialized.
Never Delete the NICI Configuration Files
In the early days of NICI development, some NICI problems could be solved only by deleting the
NICI configuration files and starting over. The issues that required this were solved years ago, but as
is often the case, the practice persists, and some administrators attempt to use this as a remedy when
they encounter a NICI problem.
No one should ever delete the
member of the NICI development team. And in that rare case, they should be sure to
files
before doing so. Failure to do this makes restoring NICI impossible.
More Information
For more information on how to use NICI, see the
Infrastructure (NICI) 2.7.5 Administration

21.1.4 General Security Issues

In addition to the information explained and referenced in this section, the OES online
documentation contains links to
oes2/security.html#b1349evx).

21.2 Planning for Security

This section discusses the following topics. For additional planning topics, see the
in the OES online
documentation.
Section 21.2.1, "Comparing the Linux and the Novell Trustee File Security Models," on
page 219
Section 21.2.2, "User Restrictions: Some OES 2 Limitations," on page 221
21.2.1 Comparing the Linux and the Novell Trustee File
Security Models
The Novell Trustee and Linux (POSIX) security models are quite different, as presented in
1.
NICI configuration files
Novell International Cryptographic
Guide.
"General Security Issues" (http://www.novell.com/documentation/
unless they are directly told to do so by a
back up the
Security section
Table 21-
Security 219

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the OPEN ENTERPRISE SERVER 2 SP2 - PLANING AND IMPLEMENTATION GUIDE 11-10-2009 and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

Open enterprise server 2 sp2

Table of Contents