Document Information 
Preface 
Part I Security Overview 
1.  Security Services (Overview) 
Part II System, File, and Device Security 
2.  Managing Machine Security (Overview) 
3.  Controlling Access to Systems (Tasks) 
4.  Virus Scanning Service (Tasks) 
5.  Controlling Access to Devices (Tasks) 
6.  Using the Basic Audit Reporting Tool (Tasks) 
7.  Controlling Access to Files (Tasks) 
Part III Roles, Rights Profiles, and Privileges 
8.  Using Roles and Privileges (Overview) 
9.  Using Role-Based Access Control (Tasks) 
10.  Role-Based Access Control (Reference) 
11.  Privileges (Tasks) 
12.  Privileges (Reference) 
Part IV Solaris Cryptographic Services 
13.  Solaris Cryptographic Framework (Overview) 
14.  Solaris Cryptographic Framework (Tasks) 
15.  Solaris Key Management Framework 
Part V Authentication Services and Secure Communication 
16.  Using Authentication Services (Tasks) 
17.  Using PAM 
18.  Using SASL 
19.  Using Solaris Secure Shell (Tasks) 
20.  Solaris Secure Shell (Reference) 
Part VI Kerberos Service 
21.  Introduction to the Kerberos Service 
22.  Planning for the Kerberos Service 
23.  Configuring the Kerberos Service (Tasks) 
Configuring the Kerberos Service (Task Map) 
Configuring Additional Kerberos Services (Task Map) 
Configuring KDC Servers 
Configuring Cross-Realm Authentication 
Configuring Kerberos Network Application Servers 
Configuring Kerberos NFS Servers 
Configuring Kerberos Clients 
Synchronizing Clocks Between KDCs and Kerberos Clients 
Swapping a Master KDC and a Slave KDC 
Administering the Kerberos Database 
Managing a KDC on an LDAP Directory Server 
24.  Kerberos Error Messages and Troubleshooting 
25.  Administering Kerberos Principals and Policies (Tasks) 
26.  Using Kerberos Applications (Tasks) 
27.  The Kerberos Service (Reference) 
Part VII Solaris Auditing 
28.  Solaris Auditing (Overview) 
29.  Planning for Solaris Auditing 
30.  Managing Solaris Auditing (Tasks) 
31.  Solaris Auditing (Reference) 
Glossary 
Index 
 | 
      
	       	 
             
Increasing Security on Kerberos Servers
Follow these steps to increase security on Kerberos application servers and on KDC
servers.  
How to Enable Only Kerberized ApplicationsThis procedure restricts network access to the server that is running telnet,
ftp, rcp, rsh, and rlogin to use Kerberos authenticated transactions only. 
- Change the exec property for the telnet service.
Add the -a user option to the exec property for telnet to restrict access
to those users who can provide valid authentication information. # inetadm -m svc:/network/telnet:default exec="/usr/sbin/in.telnetd -a user"  
- (Optional) If not already configured, change the exec property for the telnet service.
Add the -a option to the exec property for ftp to permit only
Kerberos authenticated connections. # inetadm -m svc:/network/ftp:default exec="/usr/sbin/in.ftpd -a"  
- Disable other services.
The in.rshd and in.rlogind daemons should be disabled. # svcadm disable network/shell
# svcadm disable network/login:rlogin   
How to Restrict Access to KDC ServersBoth master KDC servers and slave KDC servers have copies of the
KDC database stored locally. Restricting access to these servers so that the databases are
secure is important to the overall security of the Kerberos installation. 
- Disable remote services, as needed.
To provide a secure KDC server, all nonessential network services should be disabled
. Depending on your configuration, some of these services may already be disabled.
Check the service status with the svcs command. In most circumstances, the only
services that would need to run would be krb5kdc and krdb5_kprop if
the KDC is a slave or only kadmin if the KDC is a
master. In addition, any services that use loopback tli (ticlts, ticotsord, and
ticots) can be left enabled.  # svcadm disable network/comsat
# svcadm disable network/dtspc/tcp
# svcadm disable network/finger
# svcadm disable network/login:rlogin
# svcadm disable network/rexec
# svcadm disable network/shell
# svcadm disable network/talk
# svcadm disable network/tname
# svcadm disable network/uucp
# svcadm disable network/rpc_100068_2-5/rpc_udp  
- Restrict access to the hardware that supports the KDC.
To restrict physical access, make sure that the KDC server and its monitor
are located in a secure facility. Users should not be able to access
this server in any way.  
- Store KDC database backups on local disks or on the KDC slaves.
Make tape backups of your KDC only if the tapes are stored securely.
Follow the same practice for copies of keytab files. It would be best
to store these files on a local file system that is not
shared with other systems. The storage file system can be on either the
master KDC server or any of the slave KDCs.   
          
       |