![IBM Novell 10 SP1 EAL4 Design Manual Download Page 183](http://html1.mh-extra.com/html/ibm/novell-10-sp1-eal4/novell-10-sp1-eal4_design-manual_4190246183.webp)
5.11 Identification and authentication
Identification is when a user possesses an identity to a system in the form of a login ID. Identification
establishes user accountability and access restrictions for actions on the system. Authentication is verification
that the user’s claimed identity is valid, and is implemented through a user password at login time.
All discretionary access-control decisions made by the kernel are based on the process’s user ID established at
login time and all mandatory access control decisions made by the kernel are based on the process domain
established through login, which make the authentication process a critical component of a system.
The TOE implements identification and authentication through a set of trusted programs and protected
databases. These trusted programs use an authentication infrastructure called the Pluggable Authentication
Module (PAM). PAM allows different trusted programs to follow a consistent authentication policy. PAM
171
Figure 5-83: eServer 326 SLES boot sequence
Summary of Contents for Novell 10 SP1 EAL4
Page 1: ...SUSE Linux Enterprise Server 10 SP1 EAL4 High Level Design Version 1 2 1...
Page 23: ...11...
Page 29: ...17...
Page 43: ...31...
Page 54: ...42 Figure 5 8 New data blocks are allocated and initialized for an ext3 field...
Page 117: ...105 Figure 5 48 Page Address Translation and access control...
Page 125: ...113 Figure 5 54 31 bit Dynamic Address Translation with page table protection...
Page 126: ...114 Figure 5 55 64 bit Dynamic Address Translation with page table protection...
Page 172: ...160 Figure 5 79 System x SLES boot sequence...
Page 214: ...202...