Roles (Sm); Access Control Configuration And Management (Sm); Management Of User, Group And Authentication Data (Sm); Management Of Audit Configuration (Sm) - IBM Novell 10 SP1 EAL4 Design Manual

Suse linux enterprise server high-level design
Table of Contents

Advertisement

6.5.1
Roles (SM.1)
Section 5.13 provides details on various commands that support the notion of an administrator and a normal
user.
6.5.2
Access control configuration and management (SM.2)
Sections 5.1.1 and 5.1.2.1 provide details on the system calls of the file system that are used to set attributes
on objects to configure access control.
6.5.3
Management of user, group and authentication data (SM.3)
Sections 5.11.2 and 5.13 provide details on various commands used to manage authentication databases.
6.5.4
Management of audit configuration (SM.4)
Sections 5.15.1 and 5.15.2 describe utilities used to upload audit configuration parameters to the SLES kernel
and utilities used by trusted processes to attach and detach from the audit subsystem.
6.5.5
Reliable time stamps (SM.5)
Sections 3.1.1, 3.2.1, 3.3.1, and 3.4.1 describe the use of hardware clocks, by eServer hardware, to maintain
reliable time stamps.
6.6

Secure communications

Sections 5.12.1 and 5.12.2 describe secure communications protocols supported by SLES.
6.6.1
Secure protocols (SC.1)
Section 5.12.2 describes the Secure Shell (SSH) protocol. Section 5.12.1 describes the Secure Socket Layer
(SSL) protocol. Section 5.12.1.3 describes cipher suites and cryptographic algorithms supported by SLES.
6.7

TSF protection

Chapter 4 provides details on TSF protection.
6.7.1
TSF invocation guarantees (TP.1)
Section 4.2 provides details of the TSF structure. Section 4.2 also provides a mechanism to separate TSF
software from non-TSF software.
6.7.2
Kernel (TP.2)
Section 4.2.1 provides details on the SLES kernel.
6.7.3
Kernel modules (TP.3)
Section 4.2.1.2 provides details on kernel modules on the SLES system.
220

Advertisement

Table of Contents
loading

Table of Contents