Table of Contents |
| |
1 Security features | 9 | |
1.1 | File access policies | 9 |
| 1.1.1 File lock access controls | 9 |
| 1.1.2 | 10 |
1.2 | Capabilities | 10 |
| 1.2.1 mem | 10 |
| 1.2.2 wmd | 10 |
| 1.2.3 dlkm | 10 |
| 1.2.4 api | 11 |
2 Product overview | 13 | |
2.1 | WLI architecture | 13 |
| 2.1.1 Commands | 14 |
| 2.1.1.1 Application API | 14 |
| 2.1.1.2 Applications | 15 |
| 2.1.1.3 Stackable file system module | 15 |
| 2.1.1.4 Policy enforcement manager | 15 |
| 2.1.1.5 File systems | 16 |
2.2 | WLI database | 16 |
2.3 | WLI metadata files | 16 |
| 2.3.1 .$WLI_FSPARMS$ | 17 |
| 2.3.2 .$WLI_POLICY$ | 17 |
| 2.3.3 .$WLI_SIGNATURE$ | 17 |
3 Key usage | 19 | |
3.1 Generating keys | 19 | |
3.2 | User keys | 20 |
3.3 | Administrator keys | 20 |
4 Installing, removing, and upgrading | 21 | |
4.1 | Installation requirements | 21 |
4.2 | Installing WLI | 21 |
4.3 | Removing WLI | 22 |
4.4 | Upgrading WLI | 23 |
5 Configuring | 25 | |
5.1 | Authorizing the recovery key | 25 |
5.2 | Authorizing administrator keys | 25 |
5.3 | Signing DLKMs | 26 |
5.4 Backing up the WLI database | 26 | |
5.5 Rebooting to restricted mode | 27 | |
6 Enhancing security with WLI | 29 | |
6.1 Signing an executable binary | 29 | |
6.2 | Creating a FLAC policy | 29 |
6.3 | Creating an IBAC policy | 30 |
6.4 | Removing a file access policy | 30 |
Table of Contents | 3 |