6.5.1 Roles (SM.1)
Section 5.13 provides details on various commands that support the notion of an administrator and a normal
user.
6.5.2 Access control configuration and management (SM.2)
Sections 5.1.1 and 5.1.2.1 provide details on the system calls of the file system that are used to set attributes
on objects to configure access control.
6.5.3 Management of user, group and authentication data (SM.3)
Sections 5.11.2 and 5.13 provide details on various commands used to manage authentication databases.
6.5.4 Management of audit configuration (SM.4)
Sections 5.15.1 and 5.15.2 describe utilities used to upload audit configuration parameters to the SLES kernel
and utilities used by trusted processes to attach and detach from the audit subsystem.
6.5.5 Reliable time stamps (SM.5)
Sections 3.1.1, 3.2.1, 3.3.1, and 3.4.1 describe the use of hardware clocks, by eServer hardware, to maintain
reliable time stamps.
6.6 Secure communications
Sections 5.12.1 and 5.12.2 describe secure communications protocols supported by SLES.
6.6.1 Secure protocols (SC.1)
Section 5.12.2 describes the Secure Shell (SSH) protocol. Section 5.12.1 describes the Secure Socket Layer
(SSL) protocol. Section 5.12.1.3 describes cipher suites and cryptographic algorithms supported by SLES.
6.7 TSF protection
Chapter 4 provides details on TSF protection.
6.7.1 TSF invocation guarantees (TP.1)
Section 4.2 provides details of the TSF structure. Section 4.2 also provides a mechanism to separate TSF
software from non-TSF software.
6.7.2 Kernel (TP.2)
Section 4.2.1 provides details on the SLES kernel.
6.7.3 Kernel modules (TP.3)
Section 4.2.1.2 provides details on kernel modules on the SLES system.
220