System Administration Guide: Security Services

Managing RBAC (Task Map)

The following task map points to procedures for customizing role-based access control (RBAC) after RBAC has been initially implemented.



For Instructions 

Change the role password 

An authorized user or role changes the password of another role. 

How to Change the Password of a Role

Modify the properties of a role 

Modifies the capabilities (privileges, privileged commands, profiles, or authorizations) of a role. 

How to Change the Properties of a Role

Create or change rights profiles 

Creates a rights profile. Or modifies the authorizations, privileged commands, or supplementary rights profiles in a rights profile. 

How to Create or Change a Rights Profile

Change a user's administrative capabilities 

Adds a role, a rights profile, an authorization, or privileges to an ordinary user. 

How to Change the RBAC Properties of a User

Secure legacy applications 

Turns on the set ID permissions for legacy applications. Scripts can contain commands with set IDs. Legacy applications can check for authorizations, if appropriate. 

How to Add RBAC Properties to Legacy Applications

These procedures manage the elements that are used in RBAC. For user management procedures, refer to Chapter 5, Managing User Accounts and Groups (Tasks), in System Administration Guide: Basic Administration.