1. Manuals
  2. Brands
  3. Computer Equipment
  4. Server
  5. IBM
  6. Computer Equipment
  7. Server

IBM 10 SP1 EAL4 - page 232

1 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246
Download on canonical page 246 pages, 2.94 Mb
6.5.1 Roles (SM.1)
Section 5.13 provides details on various commands that support the notion of an administrator and a normal
user.
6.5.2 Access control configuration and management (SM.2)
Sections 5.1.1 and 5.1.2.1 provide details on the system calls of the file system that are used to set attributes
on objects to configure access control.
6.5.3 Management of user, group and authentication data (SM.3)
Sections 5.11.2 and 5.13 provide details on various commands used to manage authentication databases.
6.5.4 Management of audit configuration (SM.4)
Sections 5.15.1 and 5.15.2 describe utilities used to upload audit configuration parameters to the SLES kernel
and utilities used by trusted processes to attach and detach from the audit subsystem.
6.5.5 Reliable time stamps (SM.5)
Sections 3.1.1, 3.2.1, 3.3.1, and 3.4.1 describe the use of hardware clocks, by eServer hardware, to maintain
reliable time stamps.
6.6 Secure communications
Sections 5.12.1 and 5.12.2 describe secure communications protocols supported by SLES.
6.6.1 Secure protocols (SC.1)
Section 5.12.2 describes the Secure Shell (SSH) protocol. Section 5.12.1 describes the Secure Socket Layer
(SSL) protocol. Section 5.12.1.3 describes cipher suites and cryptographic algorithms supported by SLES.
6.7 TSF protection
Chapter 4 provides details on TSF protection.
6.7.1 TSF invocation guarantees (TP.1)
Section 4.2 provides details of the TSF structure. Section 4.2 also provides a mechanism to separate TSF
software from non-TSF software.
6.7.2 Kernel (TP.2)
Section 4.2.1 provides details on the SLES kernel.
6.7.3 Kernel modules (TP.3)
Section 4.2.1.2 provides details on kernel modules on the SLES system.
220
MENU

Models

Contents