JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Oracle Solaris Secure Shell (Tasks)

20.  Oracle Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Oracle Solaris Auditing (Tasks)

31.  Oracle Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

A

-A option, auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
-a option
bsmrecord command, index iconHow to Display Audit Record Formats
digest command, index iconHow to Compute a Digest of a File
encrypt command, index iconHow to Encrypt and Decrypt a File
getfacl command, index iconHow to Display ACL Entries for a File
Kerberized commands, index iconOverview of Kerberized Commands
mac command, index iconHow to Compute a MAC of a File
smrole command, index iconHow to Create a Role From the Command Line
absolute mode
changing file permissions
index iconFile Permission Modes
index iconHow to Change File Permissions in Absolute Mode
changing special file permissions, index iconHow to Change Special File Permissions in Absolute Mode
description, index iconFile Permission Modes
setting special permissions, index iconFile Permission Modes
access
control lists
See ACL
getting to server
with Kerberos, index iconGaining Access to a Service Using Kerberos
granting to your account
index iconGranting Access to Your Account
index iconGranting Access to Your Account
login authentication with Secure Shell, index iconHow to Reduce Password Prompts in Secure Shell
obtaining for a specific service, index iconObtaining Access to a Specific Service
restricting for
devices
index iconControlling Access to Devices
index iconConfiguring Device Policy
system hardware, index iconControlling Access to System Hardware
restricting for KDC servers, index iconHow to Restrict Access to KDC Servers
root access
displaying attempts on console, index iconHow to Restrict and Monitor Superuser Logins
monitoring su command attempts
index iconLimiting and Monitoring Superuser
index iconHow to Monitor Who Is Using the su Command
preventing login (RBAC), index iconHow to Make root User Into a Role
restricting
index iconRestricting root Access to Shared Files
index iconHow to Restrict and Monitor Superuser Logins
Secure RPC authentication, index iconOverview of Secure RPC
security
ACLs, index iconUsing Access Control Lists
controlling system usage, index iconControlling Access to Machine Resources
devices, index iconConfiguring Device Policy
file access restriction, index iconRestricting Access to Data in Files
firewall setup
index iconFirewall Systems
index iconFirewall Systems
login access restrictions
index iconMaintaining Login Control
index iconMaintaining Login Control
login authentication, index iconHow to Reduce Password Prompts in Secure Shell
login control, index iconMaintaining Login Control
monitoring system usage
index iconMonitoring Use of Machine Resources
index iconMonitoring File Integrity
network control, index iconControlling Network Access
NFS client-server, index iconImplementation of Diffie-Hellman Authentication
PATH variable setting, index iconSetting the PATH Variable
peripheral devices, index iconControlling Access to Devices
physical security, index iconMaintaining Physical Security
remote systems, index iconOracle Solaris Secure Shell (Overview)
reporting problems, index iconReporting Security Problems
root login tracking, index iconLimiting and Monitoring Superuser
saving failed logins, index iconHow to Monitor Failed Login Attempts
setuid programs, index iconRestricting setuid Executable Files
system hardware, index iconControlling Access to System Hardware
UFS ACLs, index iconUsing Access Control Lists to Protect UFS Files
sharing files, index iconSharing Files Across Machines
access control list
See ACL
Access Control Lists (ACLs), See ACL
ACL
changing entries, index iconHow to Change ACL Entries on a File
checking entries
index iconHow to Check if a File Has an ACL
index iconHow to Check if a File Has an ACL
commands, index iconCommands for Administering UFS ACLs
copying ACL entries, index iconHow to Copy an ACL
default entries for directories
index iconACL Entries for UFS Directories
index iconACL Entries for UFS Directories
deleting entries
index iconCommands for Administering UFS ACLs
index iconHow to Delete ACL Entries From a File
description
index iconUsing Access Control Lists
index iconUsing Access Control Lists to Protect UFS Files
directory entries
index iconACL Entries for UFS Directories
index iconACL Entries for UFS Directories
displaying entries
index iconCommands for Administering UFS ACLs
index iconHow to Display ACL Entries for a File
format of entries, index iconUsing Access Control Lists to Protect UFS Files
kadm5.acl file
index iconHow to Create a New Kerberos Principal
index iconHow to Duplicate a Kerberos Principal
index iconHow to Modify the Kerberos Administration Privileges
modifying entries, index iconHow to Change ACL Entries on a File
restrictions on copying entries, index iconUsing Access Control Lists to Protect UFS Files
setting entries, index iconHow to Add ACL Entries to a File
setting on a file, index iconHow to Add ACL Entries to a File
task map, index iconProtecting UFS Files With ACLs (Task Map)
user procedures, index iconProtecting UFS Files With ACLs (Task Map)
valid file entries, index iconACL Entries for UFS Files
acl audit token, format, index iconacl Token
add_drv command, description, index iconDevice Policy Commands
adding
ACL entries, index iconHow to Add ACL Entries to a File
administration principals (Kerberos)
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
allocatable device, index iconHow to Make a Device Allocatable
attributes to a rights profile, index iconHow to Create or Change a Rights Profile
audit classes
index iconHow to Add an Audit Class
index iconHow to Add an Audit Class
audit directories, index iconHow to Create Partitions for Audit Files
audit policy, index iconHow to Configure Audit Policy
auditing of roles, index iconHow to Audit Roles
auditing of zones, index iconPlanning Oracle Solaris Auditing (Tasks)
cryptomgt role, index iconHow to Assign a Role to a Local User
custom roles (RBAC), index iconHow to Create a Role From the Command Line
customized role, index iconHow to Create a Role From the Command Line
DH authentication to mounted file systems, index iconAdministering Authentication With Secure RPC (Tasks)
dial-up passwords, index iconHow to Create a Dial-Up Password
hardware provider mechanisms and features, index iconHow to Disable Hardware Provider Mechanisms and Features
keys for DH authentication, index iconHow to Set Up a Diffie-Hellman Key for an NIS+ Host
library plugin, index iconHow to Add a Software Provider
local user, index iconHow to Make root User Into a Role
new rights profile, index iconHow to Create or Change a Rights Profile
Operator role, index iconHow to Create and Assign a Role by Using the GUI
PAM modules, index iconHow to Add a PAM Module
password encryption module, index iconHow to Install a Password Encryption Module From a Third Party
plugins
cryptographic framework, index iconHow to Add a Software Provider
privileges
directly to user or role, index iconHow to Assign Privileges to a User or Role
to command, index iconHow to Add Privileges to a Command
RBAC properties to legacy applications, index iconHow to Add RBAC Properties to Legacy Applications
rights profiles with Solaris Management Console, index iconHow to Create or Change a Rights Profile
roles
for particular profiles, index iconHow to Create and Assign a Role by Using the GUI
from command line, index iconHow to Create a Role From the Command Line
to a user, index iconHow to Create and Assign a Role by Using the GUI
with limited scope, index iconHow to Create and Assign a Role by Using the GUI
security attributes to legacy applications, index iconHow to Add RBAC Properties to Legacy Applications
security-related role, index iconHow to Assign a Role to a Local User
security-related roles, index iconHow to Create and Assign a Role by Using the GUI
security to devices
index iconHow to Change the Device Policy on an Existing Device
index iconManaging Device Allocation
security to system hardware, index iconHow to Require a Password for Hardware Access
service principal to keytab file (Kerberos), index iconHow to Add a Kerberos Service Principal to a Keytab File
software provider, index iconHow to Add a Software Provider
System Administrator role, index iconHow to Create and Assign a Role by Using the GUI
user-level software provider, index iconHow to Add a Software Provider
admin_server section
krb5.conf file
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
administering
ACLs, index iconProtecting UFS Files With ACLs (Task Map)
auditing
audit classes
index iconAudit Classes and Preselection
index iconAudit Classes
index iconDefinitions of Audit Classes
audit events, index iconAudit Events
audit files, index iconHow to View the Contents of Binary Audit Files
audit records, index iconAudit Records and Audit Tokens
audit trail overflow prevention, index iconHow to Prevent Audit Trail Overflow
auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
cost control, index iconControlling Auditing Costs
description, index iconWhat Is Auditing?
efficiency, index iconAuditing Efficiently
process preselection mask, index iconaudit Command
reducing storage-space requirements, index iconCost of Storage of Audit Data
task map, index iconOracle Solaris Auditing (Task Map)
in zones
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
auditing in zones, index iconHow to Plan Auditing in Zones
cryptographic framework and zones, index iconCryptographic Services and Zones
cryptographic framework commands, index iconAdministrative Commands in the Oracle Solaris Cryptographic Framework
cryptographic framework task map, index iconAdministering the Cryptographic Framework (Tasks)
device allocation, index iconManaging Device Allocation (Task Map)
device policy, index iconConfiguring Device Policy (Task Map)
dial-up logins, index iconHow to Create a Dial-Up Password
file permissions
index iconProtecting Files (Task Map)
index iconProtecting Files With UNIX Permissions (Task Map)
Kerberos
keytabs, index iconAdministering Keytab Files
policies, index iconAdministering Kerberos Policies
principals, index iconAdministering Kerberos Principals
metaslot, index iconAdministrative Commands in the Oracle Solaris Cryptographic Framework
NFS client-server file security, index iconImplementation of Diffie-Hellman Authentication
password algorithms, index iconChanging the Password Algorithm (Task Map)
privileges, index iconManaging Privileges (Task Map)
properties of a role, index iconHow to Change the Properties of a Role
RBAC properties, index iconHow to Create or Change a Rights Profile
remote logins with Secure Shell, index iconHow to Generate a Public/Private Key Pair for Use With Secure Shell
rights profiles, index iconHow to Create or Change a Rights Profile
role password, index iconHow to Change the Password of a Role
roles, index iconHow to Create and Assign a Role by Using the GUI
roles to replace superuser, index iconHow to Plan Your RBAC Implementation
Secure RPC task map, index iconAdministering Secure RPC (Task Map)
Secure Shell
clients, index iconClient Configuration in Secure Shell
overview, index iconA Typical Secure Shell Session
servers, index iconServer Configuration in Secure Shell
task map, index iconConfiguring Oracle Solaris Secure Shell (Task Map)
without privileges, index iconAdministrative Differences on a System With Privileges
administrative (old) audit class, index iconDefinitions of Audit Classes
administrative audit class, index iconDefinitions of Audit Classes
AES kernel provider, index iconHow to List Available Providers
aes128-cbc encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
aes128-ctr encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
agent daemon, Secure Shell, index iconHow to Reduce Password Prompts in Secure Shell
ahlt audit policy
description, index iconDetermining Audit Policy
setting, index iconHow to Configure Audit Policy
algorithms
definition in cryptographic framework, index iconTerminology in the Oracle Solaris Cryptographic Framework
file encryption, index iconHow to Encrypt and Decrypt a File
listing in the cryptographic framework, index iconHow to List Available Providers
password
configuration, index iconHow to Specify an Algorithm for Password Encryption
password encryption, index iconPassword Encryption
all, in user audit fields, index iconaudit_user Database
All (RBAC), rights profile, index iconAll Rights Profile
all audit class
caution for using, index iconAudit Class Syntax
description, index iconDefinitions of Audit Classes
allhard string, audit_warn script, index iconaudit_warn Script
allocate command
allocate error state, index iconAllocate Error State
authorizations for, index iconDevice Allocation Commands
authorizations required, index iconCommands That Require Authorizations
description, index iconDevice Allocation Commands
tape drive, index iconHow to Allocate a Device
user authorization, index iconHow to Authorize Users to Allocate a Device
using, index iconHow to Allocate a Device
allocate error state, index iconAllocate Error State
allocating devices
by users, index iconHow to Allocate a Device
forcibly, index iconForcibly Allocating a Device
task map, index iconAllocating Devices (Task Map)
troubleshooting, index iconHow to Allocate a Device
AllowGroups keyword, sshd_config file, index iconKeywords in Secure Shell
AllowTcpForwarding keyword
changing, index iconHow to Configure Port Forwarding in Secure Shell
sshd_config file, index iconKeywords in Secure Shell
AllowUsers keyword, sshd_config file, index iconKeywords in Secure Shell
allsoft string, audit_warn script, index iconaudit_warn Script
ALTSHELL in Secure Shell, index iconSecure Shell and Login Environment Variables
always-audit classes
audit_user database, index iconaudit_user Database
process preselection mask, index iconProscess Audit Characteristics
analysis, praudit command, index iconpraudit Command
appending arrow (>>), preventing appending, index iconAssigning a Restricted Shell to Users
application audit class, index iconDefinitions of Audit Classes
application server, configuring, index iconConfiguring Kerberos Network Application Servers
arbitrary audit token
format, index iconarbitrary Token (Obsolete)
item size field, index iconarbitrary Token (Obsolete)
print format field, index iconarbitrary Token (Obsolete)
arcfour encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
ARCFOUR kernel provider, index iconHow to List Available Providers
Archive tape drive device-clean script, index icondevice_allocate File
archiving, audit files, index iconHow to Prevent Audit Trail Overflow
arg audit token, format, index iconarg Token
arge audit policy
and exec_env token, index iconexec_env Token
description, index iconDetermining Audit Policy
arge audit policy, setting, index iconHow to Audit All Commands by Users
argv audit policy
and exec_args token, index iconexec_args Token
description, index iconDetermining Audit Policy
argv audit policy, setting, index iconHow to Audit All Commands by Users
ASET
aliases file
description, index iconThe uid_aliases File
examples, index iconAliases File Examples
UID_ALIASES variable, index iconSpecifying an Aliases File: UID_ALIASES
aset command
interactive version, index iconHow to Run ASET Interactively
-p option, index iconHow to Run ASET Periodically
starting, index iconAutomated Security Enhancement Tool (ASET)
aset.restore command, index iconRestoring System Files Modified by ASET
ASETDIR variable, index iconASETDIR Environment Variable
asetenv file
index iconASET Environment File (asetenv)
index iconModifying the Environment File (asetenv)
ASETSECLEVEL variable, index iconASETSECLEVEL Environment Variable
CKLISTPATH_level variable, index iconCKLISTPATH_level Environment Variables
collecting reports, index iconHow to Collect ASET Reports on a Server
configuring
index iconConfiguring ASET
index iconModifying the Tune Files
description
index iconUsing the Automated Security Enhancement Tool
index iconAutomated Security Enhancement Tool (ASET)
environment file, index iconASET Environment File (asetenv)
environment variables, index iconASET Environment Variables
error messages, index iconTroubleshooting ASET Problems
execution log, index iconASET Execution Log
master files
index iconSystem Files Checks
index iconASET Master Files
index iconThe Checklist Files
NFS services and, index iconNetwork Operation With the NFS System
PERIODIC_SCHEDULE variable
index iconScheduling ASET Execution: PERIODIC_SCHEDULE
index iconPERIODIC_SCHEDULE Environment Variable
restoring original system state, index iconRestoring System Files Modified by ASET
running ASET periodically, index iconHow to Run ASET Periodically
running interactively, index iconHow to Run ASET Interactively
running periodically, index iconHow to Run ASET Periodically
scheduling ASET execution
index iconScheduling ASET Execution: PERIODIC_SCHEDULE
index iconPERIODIC_SCHEDULE Environment Variable
stopping from running periodically, index iconHow to Stop Running ASET Periodically
task map, index iconRunning ASET (Task Map)
TASKS variable
index iconChoosing Which Tasks to Run: TASKS
index iconTASKS Environment Variable
troubleshooting, index iconTroubleshooting ASET Problems
tune file examples, index iconTune File Examples
tune files
index iconTune Files
index iconModifying the Tune Files
uid_aliases file, index iconThe uid_aliases File
UID_ALIASES variable
index iconThe uid_aliases File
index iconSpecifying an Aliases File: UID_ALIASES
index iconUID_ALIASES Environment Variable
working directory, index iconASETDIR Environment Variable
YPCHECK variable
index iconExtending Checks to NIS+ Tables: YPCHECK
index iconYPCHECK Environment Variable
assigning
privileges to commands in a rights profile, index iconHow to Add Privileges to a Command
privileges to commands in a script, index iconHow to Run a Shell Script With Privileged Commands
privileges to user or role, index iconHow to Assign Privileges to a User or Role
role to a user
index iconHow to Create and Assign a Role by Using the GUI
index iconHow to Create and Assign a Role by Using the GUI
role to a user locally, index iconHow to Assign a Role to a Local User
assuming role
how to
index iconConfiguring RBAC
index iconUsing Roles (Task Map)
in a terminal window, index iconHow to Assume a Role in a Terminal Window
in Solaris Management Console, index iconHow to Assume a Role in the Solaris Management Console
Primary Administrator, index iconHow to Assume a Role in a Terminal Window
root, index iconHow to Assume a Role in a Terminal Window
System Administrator, index iconHow to Assume a Role in a Terminal Window
asterisk (*)
checking for in RBAC authorizations, index iconHow to Add RBAC Properties to Legacy Applications
device_allocate file
index icondevice_allocate File
index icondevice_allocate File
wildcard character
in ASET
index iconPERIODIC_SCHEDULE Environment Variable
index iconTune File Examples
in RBAC authorizations
index iconAuthorization Naming Conventions
index iconuser_attr Database
at command, authorizations required, index iconCommands That Require Authorizations
at sign (@), device_allocate file, index icondevice_allocate File
atq command, authorizations required, index iconCommands That Require Authorizations
attribute audit token, index iconattribute Token
attributes, keyword in BART, index iconRules File Attributes
audio devices, security, index iconDevice-Clean Scripts
audit administration audit class, index iconDefinitions of Audit Classes
audit characteristics
audit ID, index iconProscess Audit Characteristics
process preselection mask, index iconaudit Command
processes, index iconProscess Audit Characteristics
session ID, index iconProscess Audit Characteristics
terminal ID, index iconProscess Audit Characteristics
user process preselection mask, index iconProscess Audit Characteristics
audit_class file
adding a class, index iconHow to Add an Audit Class
description, index iconaudit_class File
troubleshooting, index iconHow to Add an Audit Class
audit class preselection, effect on public objects, index iconAudit Terminology and Concepts
audit classes
adding, index iconHow to Add an Audit Class
definitions, index iconDefinitions of Audit Classes
description
index iconAudit Terminology and Concepts
index iconAudit Events
entries in audit_control file, index iconaudit_control File
exceptions in audit_user database, index iconaudit_user Database
exceptions to system-wide settings, index iconAudit Classes and Preselection
mapping events, index iconAudit Classes and Preselection
modifying default, index iconHow to Add an Audit Class
overview, index iconAudit Classes and Preselection
prefixes, index iconAudit Class Syntax
preselecting, index iconHow to Modify the audit_control File
preselection, index iconAudit Terminology and Concepts
process preselection mask, index iconProscess Audit Characteristics
setting system-wide, index iconAudit Classes
syntax
index iconAudit Class Syntax
index iconAudit Class Syntax
system-wide, index iconaudit_control File
audit command
description, index iconaudit Command
preselection mask for existing processes (-s option), index iconHow to Update the Audit Service
rereading audit files (-s option), index iconauditd Daemon
resetting directory pointer (-n option), index iconauditd Daemon
updating audit service, index iconHow to Update the Audit Service
verifying syntax of audit_control file (-v option), index iconHow to Modify the audit_control File
audit configuration file, See audit_control file
audit_control file
audit daemon rereading after editing, index iconHow to Update the Audit Service
changing kernel mask for nonattributable events, index iconHow to Update the Audit Service
configuring, index iconHow to Modify the audit_control File
description, index iconaudit_control File
entries, index iconaudit_control File
entries and zones, index iconAuditing and Oracle Solaris Zones
examples, index iconaudit_control File
exceptions to flags in audit_user database, index iconaudit_user Database
flags line
process preselection mask, index iconProscess Audit Characteristics
minfree warning, index iconaudit_warn Script
plugin line, index iconHow to Configure syslog Audit Logs
prefixes in flags line, index iconAudit Class Syntax
syntax problem, index iconaudit_warn Script
system-wide audit, index iconAudit Classes and Preselection
verifying classes, index iconHow to Determine That Oracle Solaris Auditing Is Running
verifying syntax, index iconHow to Modify the audit_control File
Audit Control rights profile, index iconRights Profiles for Administering Auditing
audit daemon, See auditd daemon
audit directory
creating, index iconHow to Create Partitions for Audit Files
description, index iconAudit Terminology and Concepts
partitioning for, index iconHow to Create Partitions for Audit Files
sample structure, index iconauditreduce Command
audit_event file
changing class membership, index iconHow to Change an Audit Event's Class Membership
description, index iconAudit Events
removing events safely, index iconHow to Prevent the Auditing of Certain Events
audit events
audit_event file, index iconAudit Events
changing class membership, index iconHow to Change an Audit Event's Class Membership
description, index iconAudit Events
mapping to classes, index iconAudit Classes and Preselection
selecting from audit trail, index iconHow to Select Audit Events From the Audit Trail
selecting from audit trail in zones, index iconAuditing and Oracle Solaris Zones
summary, index iconAudit Terminology and Concepts
viewing from binary files, index iconHow to View the Contents of Binary Audit Files
audit files
auditreduce command, index iconauditreduce Command
combining
index iconHow to Merge Audit Files From the Audit Trail
index iconauditreduce Command
configuring, index iconConfiguring Audit Files (Tasks)
copying messages to single file, index iconHow to Select Audit Events From the Audit Trail
limiting size of, index iconHow to Limit the Size of Binary Audit Files
managing, index iconHow to Prevent Audit Trail Overflow
minimum free space for file systems, index iconaudit_control File
names
index iconBinary Audit File Names
index iconBinary Audit File Timestamps
order for opening, index iconaudit_control File
partitioning disk for, index iconHow to Create Partitions for Audit Files
printing, index iconHow to View the Contents of Binary Audit Files
reducing
index iconHow to Merge Audit Files From the Audit Trail
index iconauditreduce Command
reducing storage-space requirements
index iconCost of Storage of Audit Data
index iconAuditing Efficiently
switching to new file, index iconauditd Daemon
time stamps
index iconBinary Audit File Timestamps
index iconBinary Audit File Timestamps
audit ID
mechanism, index iconProscess Audit Characteristics
overview, index iconWhat Is Auditing?
audit logs
See also audit files
comparing binary and textual, index iconAudit Logs
configuring textual audit logs, index iconHow to Configure syslog Audit Logs
in text, index iconaudit_control File
modes, index iconAudit Logs
audit messages, copying to single file, index iconHow to Select Audit Events From the Audit Trail
audit.notice entry, syslog.conf file, index iconHow to Configure syslog Audit Logs
audit plugins, summary, index iconAudit Plugins
audit policy
audit tokens from, index iconAudit Policy
defaults, index iconDetermining Audit Policy
description, index iconAudit Terminology and Concepts
effects of, index iconDetermining Audit Policy
public, index iconDetermining Audit Policy
setting, index iconHow to Configure Audit Policy
setting ahlt, index iconHow to Configure Audit Policy
setting arge, index iconHow to Audit All Commands by Users
setting argv, index iconHow to Audit All Commands by Users
setting in global zone
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
setting perzone, index iconHow to Configure Audit Policy
that does not affect tokens, index iconAudit Policy
tokens added by, index iconAudit Policy
updating dynamically, index iconHow to Update the Audit Service
audit prerequisite, correctly configured hosts database, index iconHow to Enable the Audit Service
audit preselection mask
modifying for existing users, index iconHow to Modify a User's Preselection Mask
modifying for individual users, index iconHow to Change a User's Audit Characteristics
audit records
audit directories full
index iconauditd Daemon
index iconaudit_warn Script
converting to readable format
index iconHow to View the Contents of Binary Audit Files
index iconpraudit Command
index iconpraudit Command
description, index iconAudit Terminology and Concepts
displaying, index iconHow to View the Contents of Binary Audit Files
displaying formats of
procedure, index iconHow to Display Audit Record Formats
summary, index iconbsmrecord Command
displaying formats of a program, index iconHow to Display Audit Record Formats
displaying formats of an audit class, index iconHow to Display Audit Record Formats
displaying in XML format, index iconHow to View the Contents of Binary Audit Files
events that generate, index iconHow Does Auditing Work?
format, index iconAudit Record Structure
formatting example, index iconHow to Display Audit Record Formats
merging, index iconHow to Merge Audit Files From the Audit Trail
overview, index iconAudit Records and Audit Tokens
reducing audit files, index iconHow to Merge Audit Files From the Audit Trail
sequence of tokens, index iconAudit Record Structure
syslog.conf file, index iconHow Does Auditing Work?
/var/adm/auditlog file, index iconHow to Configure syslog Audit Logs
Audit Review rights profile, index iconRights Profiles for Administering Auditing
audit session ID, index iconProscess Audit Characteristics
audit_startup script
configuring, index iconHow to Configure Audit Policy
description, index iconaudit_startup Script
audit threshold, index iconaudit_control File
audit tokens
See also individual audit token names
added by audit policy, index iconAudit Policy
audit record format, index iconAudit Record Structure
description
index iconAudit Terminology and Concepts
index iconAudit Records and Audit Tokens
format, index iconAudit Token Formats
list of, index iconAudit Token Formats
new in current release, index iconAuditing Enhancements in the Solaris 10 Release
audit trail
analysis costs, index iconCost of Analysis of Audit Data
analysis with praudit command, index iconpraudit Command
cleaning up not terminated files, index iconHow to Clean Up a not_terminated Audit File
creating
auditd daemon's role, index iconauditd Daemon
description, index iconAudit Terminology and Concepts
effect of audit policy on, index iconDetermining Audit Policy
events included, index iconAudit Classes and Preselection
merging all files, index iconauditreduce Command
monitoring in real time, index iconAuditing Efficiently
no public objects, index iconAudit Terminology and Concepts
overview, index iconHow Does Auditing Work?
preventing overflow, index iconHow to Prevent Audit Trail Overflow
selecting events from, index iconHow to Select Audit Events From the Audit Trail
viewing events from, index iconHow to View the Contents of Binary Audit Files
viewing events from different zones, index iconAuditing and Oracle Solaris Zones
audit_user database
exception to system-wide audit classes, index iconAudit Classes and Preselection
prefixes for classes, index iconAudit Class Syntax
process preselection mask, index iconProscess Audit Characteristics
specifying user exceptions, index iconHow to Change a User's Audit Characteristics
user audit fields, index iconaudit_user Database
audit_user file, verifying classes, index iconHow to Determine That Oracle Solaris Auditing Is Running
audit_warn script
auditd daemon execution of, index iconauditd Daemon
conditions invoking, index iconaudit_warn Script
configuring, index iconHow to Configure the audit_warn Email Alias
description, index iconaudit_warn Script
strings, index iconaudit_warn Script
auditconfig command
audit classes as arguments
index iconAudit Classes and Preselection
index iconAudit Classes
description, index iconauditconfig Command
prefixes for classes, index iconAudit Class Syntax
setting audit policy
index iconHow to Configure Audit Policy
index iconHow to Audit All Commands by Users
auditd daemon
audit trail creation
index iconauditd Daemon
index iconAudit Trail
audit_warn script
description
index iconaudit_warn Script
index iconaudit_warn Script
execution of, index iconauditd Daemon
functions, index iconauditd Daemon
order audit files are opened
index iconaudit_control File
index iconaudit_control File
plugins loaded by, index iconauditd Daemon
rereading information for the kernel, index iconHow to Update the Audit Service
rereading the audit_control file
index iconHow to Update the Audit Service
index iconHow to Update the Audit Service
auditing
all commands by users, index iconHow to Audit All Commands by Users
changes in current release, index iconAuditing Enhancements in the Solaris 10 Release
changes in device policy, index iconHow to Audit Changes in Device Policy
configuring identically for all zones, index iconHow to Configure All Zones Identically for Auditing
configuring in global zone
index iconHow to Plan Auditing in Zones
index iconHow to Configure Audit Policy
configuring per-zone, index iconHow to Configure Per-Zone Auditing
device allocation, index iconHow to Audit Device Allocation
disabling, index iconHow to Disable the Audit Service
enabling, index iconHow to Enable the Audit Service
finding changes to specific files, index iconHow to Find Audit Records of Changes to Specific Files
hosts database prerequisite, index iconHow to Enable the Audit Service
logins, index iconHow to Audit Logins From Other OSes
planning, index iconPlanning Oracle Solaris Auditing (Tasks)
planning in zones
index iconHow to Plan Auditing in Zones
index iconHow to Plan Auditing in Zones
preselection definition, index iconAudit Terminology and Concepts
privileges and, index iconPrivileges and Auditing
rights profiles for, index iconRights Profiles for Administering Auditing
roles, index iconHow to Audit Roles
sftp file transfers, index iconHow to Audit FTP and SFTP File Transfers
troubleshooting, index iconTroubleshooting Oracle Solaris Auditing (Task Map)
troubleshooting praudit command, index iconHow to View the Contents of Binary Audit Files
updating information, index iconHow to Update the Audit Service
zones and
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
auditlog file, text audit records, index iconHow to Configure syslog Audit Logs
auditreduce command, index iconauditreduce Command
-c option, index iconHow to Select Audit Events From the Audit Trail
cleaning up audit files, index iconHow to Clean Up a not_terminated Audit File
description, index iconauditreduce Command
examples, index iconHow to Merge Audit Files From the Audit Trail
filtering options, index iconHow to Select Audit Events From the Audit Trail
merging audit records, index iconHow to Merge Audit Files From the Audit Trail
-O option, index iconHow to Merge Audit Files From the Audit Trail
options, index iconauditreduce Command
selecting audit records, index iconHow to Select Audit Events From the Audit Trail
timestamp use, index iconBinary Audit File Timestamps
trailer tokens, and, index icontrailer Token
using lowercase options, index iconHow to Select Audit Events From the Audit Trail
using uppercase options, index iconHow to Merge Audit Files From the Audit Trail
without options, index iconauditreduce Command
auth_attr database
description, index iconauth_attr Database
summary, index iconDatabases That Support RBAC
AUTH_DES authentication, See AUTH_DH authentication
AUTH_DH authentication, and NFS, index iconNFS Services and Secure RPC
authentication
AUTH_DH client-server session, index iconImplementation of Diffie-Hellman Authentication
configuring cross-realm, index iconConfiguring Cross-Realm Authentication
description, index iconAuthentication and Authorization for Remote Access
DH authentication, index iconDiffie-Hellman Authentication and Secure RPC
disabling with -X option, index iconOverview of Kerberized Commands
Kerberos and, index iconWhat Is the Kerberos Service?
naming services, index iconOverview of Secure RPC
network security, index iconAuthentication and Authorization for Remote Access
NFS-mounted files
index iconHow to Share NFS Files With Diffie-Hellman Authentication
index iconHow to Share NFS Files With Diffie-Hellman Authentication
overview of Kerberos, index iconHow the Kerberos Authentication System Works
Secure RPC, index iconOverview of Secure RPC
Secure Shell
methods, index iconOracle Solaris Secure Shell Authentication
process, index iconAuthentication and Key Exchange in Secure Shell
terminology, index iconAuthentication-Specific Terminology
types, index iconAuthentication and Authorization for Remote Access
use with NFS, index iconNFS Services and Secure RPC
authentication methods
GSS-API credentials in Secure Shell, index iconOracle Solaris Secure Shell Authentication
host-based in Secure Shell
index iconOracle Solaris Secure Shell Authentication
index iconHow to Set Up Host-Based Authentication for Secure Shell
keyboard-interactive in Secure Shell, index iconOracle Solaris Secure Shell Authentication
password in Secure Shell, index iconOracle Solaris Secure Shell Authentication
public keys in Secure Shell, index iconOracle Solaris Secure Shell Authentication
Secure Shell, index iconOracle Solaris Secure Shell Authentication
authenticator
in Kerberos
index iconAuthentication-Specific Terminology
index iconObtaining a Credential for a Server
authlog file, saving failed login attempts, index iconHow to Monitor All Failed Login Attempts
authorizations
Kerberos and, index iconWhat Is the Kerberos Service?
types, index iconAuthentication and Authorization for Remote Access
authorizations (RBAC)
checking for wildcards, index iconHow to Add RBAC Properties to Legacy Applications
checking in privileged application, index iconApplications That Check Authorizations
commands that require authorizations, index iconCommands That Require Authorizations
database
index iconDatabases That Support RBAC
index iconauth_attr Database
definition, index iconRBAC Authorizations
delegating, index iconDelegation Authority in Authorizations
description
index iconOracle Solaris RBAC Elements and Basic Concepts
index iconAuthorization Naming and Delegation
for allocating device, index iconHow to Authorize Users to Allocate a Device
for device allocation, index iconDevice Allocation Commands
granularity, index iconExample of Authorization Granularity
naming convention, index iconAuthorization Naming Conventions
not requiring for device allocation, index iconHow to Change Which Devices Can Be Allocated
solaris.device.allocate
index iconHow to Authorize Users to Allocate a Device
index iconDevice Allocation Commands
solaris.device.revoke, index iconDevice Allocation Commands
authorized_keys file, description, index iconSecure Shell Files
AuthorizedKeysFile keyword, sshd_config file, index iconKeywords in Secure Shell
auths command, description, index iconCommands That Manage RBAC
AUTHS_GRANTED keyword, policy.conf file, index iconpolicy.conf File
auto_transition option, SASL and, index iconSASL Options
Automated Security Enhancement Tool, See ASET
automatic login
disabling, index iconOverview of Kerberized Commands
enabling, index iconOverview of Kerberized Commands
automatically enabling auditing, index iconaudit_startup Script
automating principal creation, index iconAutomating the Creation of New Kerberos Principals
auxprop_login option, SASL and, index iconSASL Options