Table of Contents

 

1 Security features..............................................................................................................

9

1.1

File access policies.............................................................................................................................

9

 

1.1.1 File lock access controls.............................................................................................................

9

 

1.1.2 Identity-based access controls.................................................................................................

10

1.2

Capabilities......................................................................................................................................

10

 

1.2.1 mem...........................................................................................................................................

10

 

1.2.2 wmd...........................................................................................................................................

10

 

1.2.3 dlkm........................................................................................................................................

10

 

1.2.4 api...........................................................................................................................................

11

2 Product overview..........................................................................................................

13

2.1

WLI architecture..............................................................................................................................

13

 

2.1.1 Commands..............................................................................................................................

14

 

2.1.1.1 Application API...............................................................................................................

14

 

2.1.1.2 Applications....................................................................................................................

15

 

2.1.1.3 Stackable file system module..........................................................................................

15

 

2.1.1.4 Policy enforcement manager...........................................................................................

15

 

2.1.1.5 File systems.....................................................................................................................

16

2.2

WLI database...................................................................................................................................

16

2.3

WLI metadata files..........................................................................................................................

16

 

2.3.1 .$WLI_FSPARMS$..................................................................................................................

17

 

2.3.2 .$WLI_POLICY$.....................................................................................................................

17

 

2.3.3 .$WLI_SIGNATURE$..............................................................................................................

17

3 Key usage.....................................................................................................................

19

3.1 Generating keys...............................................................................................................................

19

3.2

User keys.........................................................................................................................................

20

3.3

Administrator keys..........................................................................................................................

20

4 Installing, removing, and upgrading..........................................................................

21

4.1

Installation requirements................................................................................................................

21

4.2

Installing WLI..................................................................................................................................

21

4.3

Removing WLI................................................................................................................................

22

4.4

Upgrading WLI...............................................................................................................................

23

5 Configuring...................................................................................................................

25

5.1

Authorizing the recovery key..........................................................................................................

25

5.2

Authorizing administrator keys......................................................................................................

25

5.3

Signing DLKMs...............................................................................................................................

26

5.4 Backing up the WLI database..........................................................................................................

26

5.5 Rebooting to restricted mode............................................................................................................

27

6 Enhancing security with WLI.......................................................................................

29

6.1 Signing an executable binary..........................................................................................................

29

6.2

Creating a FLAC policy...................................................................................................................

29

6.3

Creating an IBAC policy..................................................................................................................

30

6.4

Removing a file access policy..........................................................................................................

30

Table of Contents

3