Article Title: Use encryption commands to ensure the security of the Solaris server (figure ). Linux is a technology channel of the IT lab in China. Includes desktop applications, Linux system management, kernel research, embedded systems, open-source, and other basic categories. The security of Solaris server systems is closely related to their encryption systems. The Solaris encryption system (Cryptographic Framework) provides users with encryption services for applications and kernel modules in a seamless and transparent manner. users' applications are rarely noticed and rarely disturbed. The password system includes commands, user program programming interfaces, kernel programming interfaces, and programs that optimize encryption algorithms.
The management command in the Solaris encryption framework: the cryptoadm command. This command manages the running encryption framework. This command is part of the encryption management permission configuration file. You can specify this configuration file to the role used for security management encryption framework. Use the cryptoadm list-1 command.
Figure-1 view available encryption services of the system
Figure-1 shows that the Solaris encryption system provides the following types of encryption algorithms: user-level providers, kernel software providers, and kernel hardware providers. For general users, only user-level encryption mechanisms can be used.
[1] [2] [3] [4] [5] [6] Next page