Documentation
>
Security Guide
>
◀
▶
Part II. Local Security
Contents
8. Configuring Security Settings with YaST
8.1.
Security Overview
8.2.
Predefined Security Configurations
8.3.
Password Settings
8.4. Boot Settings
8.5. Login Settings
8.6. User Addition
8.7. Miscellaneous Settings
9. PolicyKit
9.1. Available Policies and Supported Applications
9.2. Authorization Types
9.3. Modifying and Setting Privileges
10. Access Control Lists in Linux
10.1. Traditional File Permissions
10.2. Advantages of ACLs
10.3. Definitions
10.4. Handling ACLs
10.5. ACL Support in Applications
10.6. For More Information
11. Encrypting Partitions and Files
11.1. Setting Up an Encrypted File System with YaST
11.2. Using Encrypted Home Directories
11.3. Using vi to Encrypt Single ASCII Text Files
12. Certificate Store
12.1. Activating Certificate Store
12.2. Importing Certificates
13. Intrusion Detection with AIDE
13.1. Why Using AIDE?
13.2. Setting Up an AIDE Database
13.3. Local AIDE Checks
13.4. System Independent Checking
13.5. For More Information