Problem solve Get help with specific problems with your technologies, process and projects.

Enabling the Basic Security Module (BSM)

This tip illustrates how and why you should enable the Basic Security Module (BSM).

Enabling the Basic Security Module (BSM)

This tip comes from Solaris 8 Essential Reference by John P. Mulligan, published by New Riders.

The Solaris Basic Security Module (BSM) is enabled or disabled on a BSM system by using two scripts in the /etc/security directory. The BSM increases the security of a system in many respects.

Enable BSM /etc/security/bsmconv
Disable BSM /etc/security/bsmunconv

Executing bsmconv with no options or arguments will enable the BSM on the host machine as well as any diskless clients being served by the host machine. It is important to reboot after enabling the BSM.

The BSM must be enabled to use any of the Solaris auditing facilities.

Diskless clients can enable the BSM by running bsmconv on the server system and specifying the exported root directory.

Example Task
bsmconv Enable the BSM on the local host and all diskless clients supported by the host
bsmconv /export/ root/host3 Enable the BSM on the diskless client called host3

Click here to learn more about Solaris 8 Essential Reference.

Did you like this tip? Hate it? Send us an email to let us know your thoughts.

This was last published in July 2001

Dig Deeper on Alternative operating system security



Find more PRO+ content and other member only offers, here.

Start the conversation

Send me notifications when other members comment.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Please create a username to comment.







  • CIO Trends #6: Nordics

    In this e-guide, read how the High North and Baltic Sea collaboration is about to undergo a serious and redefining makeover to ...

  • CIO Trends #6: Middle East

    In this e-guide we look at the role of information technology as the Arabian Gulf commits billions of dollars to building more ...

  • CIO Trends #6: Benelux

    In this e-guide, read about the Netherlands' coalition government's four year plan which includes the term 'cyber' no fewer than ...