Document Information 
Preface 
Part I Security Overview 
1.  Security Services (Overview) 
Part II System, File, and Device Security 
2.  Managing Machine Security (Overview) 
3.  Controlling Access to Systems (Tasks) 
4.  Virus Scanning Service (Tasks) 
5.  Controlling Access to Devices (Tasks) 
6.  Using the Basic Audit Reporting Tool (Tasks) 
7.  Controlling Access to Files (Tasks) 
Part III Roles, Rights Profiles, and Privileges 
8.  Using Roles and Privileges (Overview) 
9.  Using Role-Based Access Control (Tasks) 
10.  Role-Based Access Control (Reference) 
11.  Privileges (Tasks) 
12.  Privileges (Reference) 
Part IV Solaris Cryptographic Services 
13.  Solaris Cryptographic Framework (Overview) 
14.  Solaris Cryptographic Framework (Tasks) 
15.  Solaris Key Management Framework 
Part V Authentication Services and Secure Communication 
16.  Using Authentication Services (Tasks) 
17.  Using PAM 
18.  Using SASL 
19.  Using Solaris Secure Shell (Tasks) 
20.  Solaris Secure Shell (Reference) 
Part VI Kerberos Service 
21.  Introduction to the Kerberos Service 
22.  Planning for the Kerberos Service 
23.  Configuring the Kerberos Service (Tasks) 
24.  Kerberos Error Messages and Troubleshooting 
25.  Administering Kerberos Principals and Policies (Tasks) 
26.  Using Kerberos Applications (Tasks) 
27.  The Kerberos Service (Reference) 
Part VII Solaris Auditing 
28.  Solaris Auditing (Overview) 
29.  Planning for Solaris Auditing 
30.  Managing Solaris Auditing (Tasks) 
31.  Solaris Auditing (Reference) 
Audit Commands 
Files Used in the Auditing Service 
Rights Profiles for Administering Auditing 
Auditing and Solaris Zones 
Audit Classes 
Audit Policy 
Audit Trail 
Conventions for Binary Audit File Names 
Audit Record Structure 
Audit Token Formats 
Glossary 
Index 
 | 
      
	       	 
             
Process Audit Characteristics
The following audit characteristics are set at initial login: 
Process preselection mask – A combination of the audit classes from the audit_control file and the audit_user database. When a user logs in, the login process combines the preselected classes to establish the process preselection mask for the user's processes. The process preselection mask specifies whether events in each audit class are to generate audit records. The following algorithm describes how the system obtains the user's process preselection mask: (flags line + always-audit-classes) - never-audit-classes Add the audit classes from the flags line in the audit_control file to the classes from the always-audit-classes field in the user's entry in the audit_user database. Then, subtract from the total the classes from the user's never-audit-classes field.  
Audit ID – A process acquires an audit ID when the user logs in. The audit ID is inherited by all child processes that were started by the user's initial process. The audit ID helps enforce accountability. Even after a user becomes root, the audit ID remains the same. The audit ID that is saved in each audit record always allows you to trace actions back to the original user who had logged in.  
Audit Session ID – The audit session ID is assigned at login. The session ID is inherited by all child processes.  
Terminal ID (port ID, machine ID) – The terminal ID consists of the host name and the Internet address, followed by a unique number that identifies the physical device on which the user logged in. Most often, the login is through the console. The number that corresponds to the console device is 0.  
          
       |