6.5.1Roles (SM.1)

Section 5.13 provides details on various commands that support the notion of an administrator and a normal user.

6.5.2Access control configuration and management (SM.2)

Sections 5.1.1 and 5.1.2.1 provide details on the system calls of the file system that are used to set attributes on objects to configure access control.

6.5.3Management of user, group and authentication data (SM.3)

Sections 5.11.2 and 5.13 provide details on various commands used to manage authentication databases.

6.5.4Management of audit configuration (SM.4)

Sections 5.15.1 and 5.15.2 describe utilities used to upload audit configuration parameters to the SLES kernel and utilities used by trusted processes to attach and detach from the audit subsystem.

6.5.5Reliable time stamps (SM.5)

Sections 3.1.1, 3.2.1, 3.3.1, and 3.4.1 describe the use of hardware clocks, by eServer hardware, to maintain reliable time stamps.

6.6Secure communications

Sections 5.12.1 and 5.12.2 describe secure communications protocols supported by SLES.

6.6.1Secure protocols (SC.1)

Section 5.12.2 describes the Secure Shell (SSH) protocol. Section 5.12.1 describes the Secure Socket Layer (SSL) protocol. Section 5.12.1.3 describes cipher suites and cryptographic algorithms supported by SLES.

6.7TSF protection

Chapter 4 provides details on TSF protection.

6.7.1TSF invocation guarantees (TP.1)

Section 4.2 provides details of the TSF structure. Section 4.2 also provides a mechanism to separate TSF software from non-TSF software.

6.7.2Kernel (TP.2)

Section 4.2.1 provides details on the SLES kernel.

6.7.3Kernel modules (TP.3)

Section 4.2.1.2 provides details on kernel modules on the SLES system.

220

Page 232
Image 232
IBM 10 SP1 EAL4 manual Secure communications, TSF protection