pam_apparmorThe YaST module offers a central clearinghouse to configure security-related settings for SUSE Linux Enterprise Desktop. Use it to configure security aspects such as settings for the login procedure and for password creation, for boot permissions, user creation or for default file permissions. Launch it from the YaST Control Center by › . The dialog always starts with the , and other configuration dialogs are available from the right pane.
PolKit (formerly known as PolicyKit) is an application framework that acts
as a negotiator between the unprivileged user session and the privileged
system context. Whenever a process from the user session tries to carry
out an action in the system context, PolKit is queried. Based on its
configuration—specified in a so-called
“policy”—the answer could be “yes”,
“no”, or “needs authentication”. Unlike
classical privilege authorization programs such as sudo, PolKit does not
grant root permissions to an entire session, but only to the action
in question.
POSIX ACLs (access control lists) can be used as an expansion of the traditional permission concept for file system objects. With ACLs, permissions can be defined more flexibly than with the traditional permission concept.
Most users have some confidential data on their computer that third parties should not be able to access. The more you rely on mobile computing and on working in different environments and networks, the more carefully you should handle your data. The encryption of files or entire partitions is recom…
Certificates play an important role in the authentication of companies and individuals. Usually certificates are administered by the application itself. In some cases, it makes sense to share certificates between applications. The certificate store is a common ground for Firefox, Evolution, and NetworkManager. This chapter explains some details.
Securing your systems is a mandatory task for any mission-critical system
administrator. Because it is impossible to always guarantee that the
system is not compromised, it is very important to do extra checks
regularly (for example with cron)
to ensure that the system is still under your control. This is where
AIDE, the Advanced Intrusion Detection
Environment, comes into play.