[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[X]
[Y]
salt
2nd
SASL (Simple Authentication and Security Layer)
building
configuring
dependencies
name canonicalization
saslauthd
configuring
testing
web sites
sasldb
Schroeder, Michael
Secure European System for Applications in a Multivendor Environment (SESAME)
SecurID token
security
auditing
[See also logging]2nd
KDCs, protecting
Kerberos, protocol issues
and key length
operating system installation
passwords enforcing security standards
policies, enforcing
pre-authentication
root-level attacks
smart cards and
Unix patches, sources
server hostname misconfiguration, troubleshooting
servers Kerberos-enabled packages
Cyrus IMAP
OpenLDAP
OpenSSH
service keys
service name canonicalization
service principals
2nd
Kerberos 4
service tickets
SESAME (Secure European System for Applications in a Multivendor Environment)
session keys
2nd
3rd
encryption type (Kerberos 5)
shared secrets
shell clients, kerberized
Simple and Protected GSSAPI Negotiation Mechanism
[See SPNEGO] Simple Authentication and Security Layer
[See SASL] single-sign-on systems
TGTs and
slave replication, setting up
smart cards
2nd
Kerberos and
social engineering
Solaris Security Toolkit
Song, Dug
SPNEGO (Simple and Protected GSSAPI Negotiation Mechanism)
2nd
SRV DNS Resource Record
sserver (sample server)
SSH
[See OpenSSH] SSL (Secure Sockets Layer)
stacking
stanzas
appdefaults
capaths
domain_realm
libdefaults
logging
realms
string2key function
2nd
symmetric cryptography
system.login.console key (Mac OS X)
|