JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Oracle Solaris Secure Shell (Tasks)

20.  Oracle Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Oracle Solaris Auditing (Tasks)

31.  Oracle Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

P

p_minfree attribute, audit_warn condition, index iconaudit_warn Script
-p option
aset command, index iconHow to Run ASET Periodically
bart create, index iconHow to Compare Manifests for the Same System Over Time
bsmrecord command, index iconHow to Display Audit Record Formats
cryptoadm command
index iconHow to Prevent the Use of a User-Level Mechanism
index iconHow to Prevent the Use of a Kernel Software Provider
logins command, index iconHow to Display Users Without Passwords
packages, Secure Shell, index iconSecure Shell Packages and Initialization
packet transfers
firewall security, index iconFirewall Systems
packet smashing, index iconEncryption and Firewall Systems
PAM
adding a module, index iconHow to Add a PAM Module
configuration file
control flags, index iconHow PAM Stacking Works
introduction, index iconPAM Configuration (Reference)
Kerberos and, index iconKerberos Files
stacking diagrams, index iconHow PAM Stacking Works
stacking example, index iconPAM Stacking Example
stacking explained, index iconHow PAM Stacking Works
syntax, index iconPAM Configuration File Syntax
/etc/syslog.conf file, index iconHow to Log PAM Error Reports
framework, index iconIntroduction to the PAM Framework
Kerberos and
index iconKerberos Components
index iconKerberos Components in the Solaris 8 Release
overview, index iconPAM (Overview)
planning, index iconPlanning for Your PAM Implementation
task map, index iconPAM (Tasks)
pam.conf file, See PAM configuration file
pam_roles command, description, index iconCommands That Manage RBAC
PAMAuthenticationViaKBDInt keyword, sshd_config file, index iconKeywords in Secure Shell
panels, table of SEAM Tool, index iconSEAM Tool Panel Descriptions
passphrases
changing for Secure Shell, index iconHow to Change the Passphrase for a Secure Shell Private Key
encrypt command, index iconHow to Encrypt and Decrypt a File
example, index iconHow to Log In to a Remote Host With Secure Shell
generating in KMF, index iconHow to Generate a Passphrase by Using the pktool setpin Command
mac command, index iconHow to Compute a MAC of a File
storing safely, index iconHow to Encrypt and Decrypt a File
using for MAC, index iconHow to Compute a MAC of a File
using in Secure Shell
index iconHow to Generate a Public/Private Key Pair for Use With Secure Shell
index iconHow to Reduce Password Prompts in Secure Shell
PASSREQ in Secure Shell, index iconSecure Shell and Login Environment Variables
passwd command
and kpasswd command, index iconChanging Your Password
and naming services, index iconManaging Password Information
changing password of role, index iconHow to Change the Password of a Role
passwd file
and /etc/d_passwd file, index iconDial-Up Logins
ASET checks, index iconUser and Group Checks
password authentication, Secure Shell, index iconOracle Solaris Secure Shell Authentication
PasswordAuthentication keyword, Secure Shell, index iconKeywords in Secure Shell
passwords
authentication in Secure Shell, index iconOracle Solaris Secure Shell Authentication
changing role password, index iconHow to Change the Password of a Role
changing with kpasswd command, index iconChanging Your Password
changing with passwd -r command, index iconManaging Password Information
changing with passwd command, index iconChanging Your Password
creating for dial-up, index iconHow to Create a Dial-Up Password
dial-up passwords
disabling temporarily, index iconHow to Temporarily Disable Dial-Up Logins
/etc/d_passwd file, index iconDial-Up Logins
disabling dial-up temporarily, index iconHow to Temporarily Disable Dial-Up Logins
displaying users with no passwords, index iconHow to Display Users Without Passwords
eliminating in Secure Shell, index iconHow to Reduce Password Prompts in Secure Shell
eliminating in Secure Shell in CDE, index iconHow to Set Up the ssh-agent Command to Run Automatically in CDE
encryption algorithms, index iconPassword Encryption
finding users with no passwords, index iconHow to Display Users Without Passwords
granting access without revealing, index iconGranting Access to Your Account
hardware access and, index iconHow to Require a Password for Hardware Access
installing third-party encryption module, index iconHow to Install a Password Encryption Module From a Third Party
LDAP, index iconManaging Password Information
specifying new password algorithm, index iconHow to Specify a New Password Algorithm for an LDAP Domain
local, index iconManaging Password Information
login security
index iconMaintaining Login Control
index iconMaintaining Login Control
index iconManaging Password Information
managing, index iconKerberos Password Management
modifying a principal's password, index iconHow to Modify a Kerberos Principal
NIS, index iconManaging Password Information
specifying new password algorithm, index iconHow to Specify a New Password Algorithm for an NIS Domain
NIS+, index iconManaging Password Information
specifying new password algorithm, index iconHow to Specify a New Password Algorithm for an NIS+ Domain
policies and, index iconChanging Your Password
PROM security mode
index iconMaintaining Physical Security
index iconControlling Access to System Hardware
protecting
keystore, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
PKCS #12 file, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
requiring for hardware access, index iconHow to Require a Password for Hardware Access
secret-key decryption for Secure RPC, index iconImplementation of Diffie-Hellman Authentication
specifying algorithm, index iconHow to Specify an Algorithm for Password Encryption
in naming services, index iconHow to Specify a New Password Algorithm for an NIS Domain
locally, index iconChanging the Password Algorithm (Task Map)
suggestions on choosing, index iconAdvice on Choosing a Password
system logins, index iconManaging Password Information
task map, index iconSecuring Logins and Passwords (Task Map)
UNIX and Kerberos, index iconKerberos Password Management
using Blowfish encryption algorithm for, index iconHow to Specify an Algorithm for Password Encryption
using MD5 encryption algorithm for, index iconHow to Specify an Algorithm for Password Encryption
using new algorithm, index iconHow to Specify an Algorithm for Password Encryption
path_attr audit token
index iconAuditing Enhancements in the Solaris 10 Release
index iconpath_attr Token
path audit policy, description, index iconDetermining Audit Policy
path audit token, format, index iconpath Token
PATH environment variable
and security, index iconSetting the PATH Variable
setting, index iconSetting the PATH Variable
PATH in Secure Shell, index iconSecure Shell and Login Environment Variables
PERIODIC_SCHEDULE variable (ASET)
index iconScheduling ASET Execution: PERIODIC_SCHEDULE
index iconPERIODIC_SCHEDULE Environment Variable
permissions
ACLs and, index iconUsing Access Control Lists
ASET handling of
index iconASET Security Levels
index iconSystem Files Permissions Tuning
changing file permissions
absolute mode
index iconFile Permission Modes
index iconHow to Change File Permissions in Absolute Mode
chmod command, index iconCommands for Viewing and Securing Files
symbolic mode
index iconFile Permission Modes
index iconFile Permission Modes
index iconHow to Change File Permissions in Symbolic Mode
index iconHow to Change File Permissions in Symbolic Mode
defaults, index iconDefault umask Value
directory permissions, index iconUNIX File Permissions
file permissions
absolute mode
index iconFile Permission Modes
index iconHow to Change File Permissions in Absolute Mode
changing
index iconFile Permission Modes
index iconHow to Change File Permissions in Symbolic Mode
description, index iconUNIX File Permissions
special permissions
index iconSticky Bit
index iconFile Permission Modes
symbolic mode
index iconFile Permission Modes
index iconFile Permission Modes
index iconHow to Change File Permissions in Symbolic Mode
index iconHow to Change File Permissions in Symbolic Mode
finding files with setuid permissions, index iconHow to Find Files With Special File Permissions
setgid permissions
absolute mode
index iconFile Permission Modes
index iconHow to Change Special File Permissions in Absolute Mode
description, index iconsetgid Permission
symbolic mode, index iconFile Permission Modes
setuid permissions
absolute mode
index iconFile Permission Modes
index iconHow to Change Special File Permissions in Absolute Mode
description, index iconsetuid Permission
security risks, index iconsetuid Permission
symbolic mode, index iconFile Permission Modes
special file permissions
index iconSpecial File Permissions (setuid, setgid and Sticky Bit)
index iconSticky Bit
index iconFile Permission Modes
sticky bit, index iconSticky Bit
tune files (ASET)
index iconTune Files
index iconModifying the Tune Files
index iconModifying the Tune Files
UFS ACLs and, index iconUsing Access Control Lists to Protect UFS Files
umask value, index iconDefault umask Value
user classes and, index iconFile and Directory Ownership
PermitEmptyPasswords keyword, sshd_config file, index iconKeywords in Secure Shell
PermitRootLogin keyword, sshd_config file, index iconKeywords in Secure Shell
permitted privilege set, index iconHow Privileges Are Implemented
PermitUserEnvironment keyword, sshd_config file, index iconKeywords in Secure Shell
perzone audit policy
description, index iconDetermining Audit Policy
setting, index iconHow to Configure Audit Policy
using
index iconHow to Plan Auditing in Zones
index iconHow to Configure Per-Zone Auditing
index iconAuditing and Oracle Solaris Zones
when to use, index iconAuditing on a System With Oracle Solaris Zones
pfcsh command, description, index iconProfile Shells and RBAC
pfexec command, description, index iconCommands That Manage RBAC
pfksh command, description, index iconProfile Shells and RBAC
pfsh command, description, index iconProfile Shells and RBAC
physical security, description, index iconMaintaining Physical Security
PidFile keyword, Secure Shell, index iconKeywords in Secure Shell
PKCS #11 library
adding provider library, index iconHow to Add a Software Provider
in Oracle Solaris Cryptographic Framework, index iconOracle Solaris Cryptographic Framework
PKCS #11 softtokens, managing keystore, index iconKMF Keystore Management
PKCS #12 files, protecting, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
pkcs11_kernel.so user-level provider, index iconHow to List Available Providers
pkcs11_softtoken.so user-level provider, index iconHow to List Available Providers
pkgadd command
installing third-party providers, index iconHow to Add a Software Provider
installing third-party software, index iconHow to Install a Password Encryption Module From a Third Party
PKI
managed by KMF, index iconManaging Public Key Technologies
policy managed by KMF, index iconKMF Policy Management
pktool command
creating self-signed certificate, index iconHow to Create a Certificate by Using the pktool gencert Command
export subcommand, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
gencert subcommand, index iconHow to Create a Certificate by Using the pktool gencert Command
generating secret keys, index iconHow to Generate a Symmetric Key by Using the pktool Command
import subcommand, index iconHow to Import a Certificate Into Your Keystore
list subcommand, index iconHow to Create a Certificate by Using the pktool gencert Command
managing PKI objects, index iconManaging Public Key Technologies
setpin subcommand, index iconHow to Generate a Passphrase by Using the pktool setpin Command
plain.so.1 plug-in, SASL and, index iconSASL Plug-ins
planning
auditing, index iconPlanning Oracle Solaris Auditing (Tasks)
auditing in zones, index iconHow to Plan Auditing in Zones
auditing task map, index iconPlanning Oracle Solaris Auditing (Task Map)
Kerberos
client and service principal names, index iconClient and Service Principal Names
clock synchronization, index iconClock Synchronization Within a Realm
configuration decisions, index iconPlanning for the Kerberos Service
database propagation, index iconWhich Database Propagation System to Use
number of realms, index iconNumber of Realms
ports, index iconPorts for the KDC and Admin Services
realm hierarchy, index iconRealm Hierarchy
realm names, index iconRealm Names
realms, index iconPlanning Kerberos Realms
slave KDCs, index iconThe Number of Slave KDCs
PAM, index iconPlanning for Your PAM Implementation
RBAC, index iconHow to Plan Your RBAC Implementation
pluggable authentication module, See PAM
plugin line
audit_control file, index iconaudit_control File
p_* attributes, index iconHow to Configure syslog Audit Logs
qsize attribute, index iconHow to Configure syslog Audit Logs
plugin_list option, SASL and, index iconSASL Options
plugins
cryptographic framework, index iconOracle Solaris Cryptographic Framework
in audit service, index iconHow to Configure syslog Audit Logs
loaded by auditd daemon, index iconauditd Daemon
SASL and, index iconSASL Plug-ins
plus sign (+)
ACL entry, index iconHow to Check if a File Has an ACL
audit class prefix, index iconAudit Class Syntax
entry in sulog file, index iconHow to Monitor Who Is Using the su Command
file permissions symbol, index iconFile Permission Modes
policies
administering
index iconAdministering Kerberos Principals and Policies (Tasks)
index iconAdministering Kerberos Policies
creating (Kerberos), index iconHow to Create a New Kerberos Principal
creating new (Kerberos), index iconHow to Create a New Kerberos Policy
deleting, index iconHow to Delete a Kerberos Policy
for auditing, index iconDetermining Audit Policy
modifying, index iconHow to Modify a Kerberos Policy
on devices, index iconHow to View Device Policy
overview, index iconSecurity Policy
passwords and, index iconChanging Your Password
SEAM Tool panels for, index iconSEAM Tool Panel Descriptions
specifying password algorithm, index iconChanging the Password Algorithm (Task Map)
task map for administering, index iconAdministering Kerberos Policies (Task Map)
viewing attributes, index iconHow to View a Kerberos Policy's Attributes
viewing list of, index iconHow to View the List of Kerberos Policies
policy
definition in cryptographic framework, index iconTerminology in the Oracle Solaris Cryptographic Framework
definition in Oracle Solaris, index iconSecurity Policy
policy.conf file
adding password encryption module, index iconHow to Install a Password Encryption Module From a Third Party
Basic Solaris User rights profile, index iconBasic Solaris User Rights Profile
description
index iconpolicy.conf File
index iconCommands That Manage RBAC
keywords
for password algorithms, index iconPassword Encryption
for privileges
index iconpolicy.conf File
index iconFiles With Privilege Information
for RBAC authorizations, index iconpolicy.conf File
for rights profiles, index iconpolicy.conf File
specifying encryption algorithms in, index iconHow to Specify an Algorithm for Password Encryption
specifying password algorithm
in naming services, index iconHow to Specify a New Password Algorithm for an NIS Domain
specifying password algorithms, index iconHow to Specify an Algorithm for Password Encryption
port forwarding
configuring in Secure Shell, index iconHow to Configure Port Forwarding in Secure Shell
Secure Shell
index iconHow to Use Port Forwarding in Secure Shell
index iconHow to Use Port Forwarding in Secure Shell
Port keyword, Secure Shell, index iconKeywords in Secure Shell
ports, for Kerberos KDC, index iconPorts for the KDC and Admin Services
postdated ticket
definition, index iconTypes of Tickets
description, index iconHow the Kerberos Service Works
postsigterm string, audit_warn script, index iconaudit_warn Script
pound sign (#)
device_allocate file, index icondevice_allocate File
device_maps file, index icondevice_maps File
ppriv command
for debugging, index iconHow to Determine Which Privileges a Program Requires
listing privileges, index iconHow to Determine the Privileges on a Process
praudit command
converting audit records to readable format
index iconHow to View the Contents of Binary Audit Files
index iconpraudit Command
DTD for -x option, index iconpraudit Command
options, index iconpraudit Command
output formats, index iconpraudit Command
piping auditreduce output to, index iconHow to View the Contents of Binary Audit Files
use in a script, index iconpraudit Command
viewing audit records, index iconHow to View the Contents of Binary Audit Files
with no options, index iconpraudit Command
XML format, index iconHow to View the Contents of Binary Audit Files
PreferredAuthentications keyword, ssh_config file, index iconKeywords in Secure Shell
prefixes for audit classes, index iconAudit Class Syntax
preselecting, audit classes, index iconHow to Modify the audit_control File
preselection in auditing, index iconAudit Terminology and Concepts
preselection mask (auditing)
description, index iconProscess Audit Characteristics
reducing storage costs, index iconaudit Command
system-wide, index iconaudit_control File
preventing
access to system hardware, index iconSPARC: Controlling Access to System Hardware (Task Map)
audit trail overflow, index iconHow to Prevent Audit Trail Overflow
executables from compromising security, index iconPreventing Executable Files From Compromising Security
kernel software provider use, index iconHow to Prevent the Use of a Kernel Software Provider
use of hardware mechanism, index iconHow to Disable Hardware Provider Mechanisms and Features
primary, in principal names, index iconKerberos Principals
Primary Administrator (RBAC)
assuming role, index iconHow to Assume a Role in a Terminal Window
recommended role, index iconRBAC: An Alternative to the Superuser Model
rights profile contents, index iconPrimary Administrator Rights Profile
primary audit directory, index iconaudit_control File
principal
adding administration
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
adding service principal to keytab
index iconAdministering Keytab Files
index iconHow to Add a Kerberos Service Principal to a Keytab File
administering
index iconAdministering Kerberos Principals and Policies (Tasks)
index iconAdministering Kerberos Principals
automating creation of, index iconAutomating the Creation of New Kerberos Principals
creating, index iconHow to Create a New Kerberos Principal
creating clntconfig
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
creating host
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
deleting, index iconHow to Delete a Kerberos Principal
duplicating, index iconHow to Duplicate a Kerberos Principal
Kerberos, index iconKerberos Principals
modifying, index iconHow to Modify a Kerberos Principal
principal name, index iconKerberos Principals
removing from keytab file, index iconHow to Remove a Service Principal From a Keytab File
removing service principal from keytab, index iconHow to Remove a Service Principal From a Keytab File
SEAM Tool panels for, index iconSEAM Tool Panel Descriptions
service principal, index iconKerberos Principals
setting up defaults, index iconHow to Set Up Defaults for Creating New Kerberos Principals
task map for administering, index iconAdministering Kerberos Principals (Task Map)
user ID comparison, index iconHow to Create a Credential Table
user principal, index iconKerberos Principals
viewing attributes, index iconHow to View a Kerberos Principal's Attributes
viewing list of, index iconHow to View the List of Kerberos Principals
viewing sublist of principals, index iconHow to View the List of Kerberos Principals
principal file, description, index iconKerberos Files
principal.kadm5 file, description, index iconKerberos Files
principal.kadm5.lock file, description, index iconKerberos Files
principal.ok file, description, index iconKerberos Files
principal.ulog file, description, index iconKerberos Files
principle of least privilege, index iconPrivileges Protect Kernel Processes
print format field, arbitrary token, index iconarbitrary Token (Obsolete)
Printer Management (RBAC), contents of rights profile, index iconPrinter Management Rights Profile
printing, audit log, index iconHow to View the Contents of Binary Audit Files
PrintLastLog keyword, ssh_config file, index iconKeywords in Secure Shell
PrintMotd keyword, sshd_config file, index iconKeywords in Secure Shell
priv.debug entry, syslog.conf file, index iconFiles With Privilege Information
PRIV_DEFAULT keyword
policy.conf file
index iconpolicy.conf File
index iconFiles With Privilege Information
PRIV_LIMIT keyword
policy.conf file
index iconpolicy.conf File
index iconFiles With Privilege Information
PRIV_PROC_LOCK_MEMORY privilege
index iconWhat's New in RBAC?
index iconPrivileges and System Resources
privacy
availability, index iconOverview of Kerberized Commands
Kerberos and, index iconWhat Is the Kerberos Service?
security service, index iconKerberos Security Services
private keys
See also secret keys
definition in Kerberos, index iconAuthentication-Specific Terminology
Secure Shell identity files, index iconSecure Shell Files
private protection level, index iconOverview of Kerberized Commands
privilege audit token
index iconAuditing Enhancements in the Solaris 10 Release
index iconprivilege Token
privilege checking, in applications, index iconApplications That Check for Privileges
privilege sets
adding privileges to, index iconExpanding a User or Role's Privileges
basic, index iconHow Privileges Are Implemented
effective, index iconHow Privileges Are Implemented
inheritable, index iconHow Privileges Are Implemented
limit, index iconHow Privileges Are Implemented
listing, index iconHow Privileges Are Implemented
permitted, index iconHow Privileges Are Implemented
removing privileges from, index iconRestricting a User or Role's Privileges
privileged application
authorization checking, index iconApplications That Check Authorizations
description, index iconOracle Solaris RBAC Elements and Basic Concepts
ID checking, index iconApplications That Check UIDs and GIDs
privilege checking, index iconApplications That Check for Privileges
privileged ports, alternative to Secure RPC, index iconAuthentication and Authorization for Remote Access
privileges
adding to command, index iconHow to Add Privileges to a Command
administering, index iconManaging Privileges (Task Map)
assigning to a command, index iconAssigning Privileges
assigning to a script, index iconAssigning Privileges to a Script
assigning to a user, index iconAssigning Privileges
assigning to user or role, index iconHow to Assign Privileges to a User or Role
auditing and, index iconPrivileges and Auditing
categories, index iconPrivilege Descriptions
commands, index iconAdministrative Commands for Handling Privileges
compared to superuser model, index iconPrivileges (Overview)
debugging
index iconPrivileges and Debugging
index iconHow to Determine Which Privileges a Program Requires
description
index iconOracle Solaris RBAC Elements and Basic Concepts
index iconOracle Solaris RBAC Elements and Basic Concepts
index iconPrivilege Descriptions
determining directly assigned ones, index iconHow to Determine the Privileges That You Have Been Directly Assigned
devices and, index iconPrivileges and Devices
differences from superuser model, index iconAdministrative Differences on a System With Privileges
effects on SEAM Tool, index iconUsing the SEAM Tool With Limited Kerberos Administration Privileges
escalation, index iconPrevention of Privilege Escalation
executing commands with privilege, index iconExpanding a User or Role's Privileges
files, index iconFiles With Privilege Information
finding missing, index iconHow to Determine Which Privileges a Program Requires
how to use, index iconDetermining Your Privileges (Task Map)
implemented in sets, index iconHow Privileges Are Implemented
inherited by processes, index iconHow Processes Get Privileges
limiting use by user or role, index iconHow to Limit a User's or Role's Privileges
listing on a process, index iconHow to Determine the Privileges on a Process
PRIV_PROC_LOCK_MEMORY
index iconWhat's New in RBAC?
index iconPrivileges and System Resources
processes with assigned privileges, index iconHow Processes Get Privileges
programs aware of privileges, index iconHow Processes Get Privileges
protecting kernel processes, index iconPrivileges Protect Kernel Processes
removing from a user, index iconRestricting a User or Role's Privileges
removing from basic set, index iconHow to Limit a User's or Role's Privileges
removing from limit set, index iconHow to Limit a User's or Role's Privileges
task map, index iconManaging and Using Privileges (Task Map)
troubleshooting requirements for, index iconHow to Determine Which Privileges a Program Requires
using in shell script, index iconHow to Run a Shell Script With Privileged Commands
privileges file, description, index iconPrivilege Descriptions
privs keyword, user_attr database, index iconFiles With Privilege Information
PROC privileges, index iconPrivilege Descriptions
process audit characteristics
audit ID, index iconProscess Audit Characteristics
audit session ID, index iconProscess Audit Characteristics
process preselection mask, index iconProscess Audit Characteristics
terminal ID, index iconProscess Audit Characteristics
process audit class, index iconDefinitions of Audit Classes
process audit token, format, index iconprocess Token
process modify audit class, index iconDefinitions of Audit Classes
process preselection mask, description, index iconProscess Audit Characteristics
process privileges, index iconPrivilege Descriptions
process rights management, See privileges
process start audit class, index iconDefinitions of Audit Classes
processing time costs, of audit service, index iconCost of Increased Processing Time of Audit Data
prof_attr database
description, index iconprof_attr Database
summary, index iconDatabases That Support RBAC
.profile file, path variable entry, index iconSetting the PATH Variable
profile shells, description, index iconProfile Shells and RBAC
profiles, See rights profiles
profiles command, description, index iconCommands That Manage RBAC
PROFS_GRANTED keyword, policy.conf file, index iconpolicy.conf File
programs
checking for RBAC authorizations, index iconHow to Add RBAC Properties to Legacy Applications
privilege-aware
index iconHow Privileges Are Implemented
index iconHow Processes Get Privileges
project.max-locked-memory resource control
index iconWhat's New in RBAC?
index iconPrivileges and System Resources
PROM security mode, index iconControlling Access to System Hardware
propagation
KDC database, index iconWhich Database Propagation System to Use
Kerberos database, index iconBacking Up and Propagating the Kerberos Database
protecting
BIOS, pointer to, index iconHow to Require a Password for Hardware Access
by using passwords with cryptographic framework, index iconUsing the Key Management Framework (Task Map)
contents of keystore, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
files with cryptographic framework, index iconProtecting Files With the Oracle Solaris Cryptographic Framework (Task Map)
PROM, index iconHow to Require a Password for Hardware Access
system from risky programs, index iconProtecting Against Programs With Security Risk (Task Map)
protecting files
task map, index iconProtecting Files (Task Map)
user procedures, index iconProtecting Files With UNIX Permissions (Task Map)
with ACLs, index iconProtecting UFS Files With ACLs (Task Map)
with ACLs task map, index iconProtecting UFS Files With ACLs (Task Map)
with UFS ACLs, index iconUsing Access Control Lists to Protect UFS Files
with UNIX permissions
index iconUsing UNIX Permissions to Protect Files
index iconProtecting Files With UNIX Permissions (Task Map)
with UNIX permissions task map, index iconProtecting Files With UNIX Permissions (Task Map)
protection level
clear, index iconOverview of Kerberized Commands
private, index iconOverview of Kerberized Commands
safe, index iconOverview of Kerberized Commands
setting in ftp, index iconOverview of Kerberized Commands
Protocol keyword, Secure Shell, index iconKeywords in Secure Shell
providers
adding library, index iconHow to Add a Software Provider
adding software provider, index iconHow to Add a Software Provider
adding user-level software provider, index iconHow to Add a Software Provider
connecting to cryptographic framework, index iconPlugins to the Oracle Solaris Cryptographic Framework
definition as plugins
index iconOracle Solaris Cryptographic Framework
index iconTerminology in the Oracle Solaris Cryptographic Framework
definition in cryptographic framework, index iconTerminology in the Oracle Solaris Cryptographic Framework
disabling hardware mechanisms, index iconHow to Disable Hardware Provider Mechanisms and Features
installing, index iconPlugins to the Oracle Solaris Cryptographic Framework
listing hardware providers, index iconHow to List Hardware Providers
listing in cryptographic framework, index iconHow to List Available Providers
preventing use of kernel software provider, index iconHow to Prevent the Use of a Kernel Software Provider
registering, index iconPlugins to the Oracle Solaris Cryptographic Framework
restoring use of kernel software provider, index iconHow to Prevent the Use of a Kernel Software Provider
signing, index iconPlugins to the Oracle Solaris Cryptographic Framework
proxiable ticket, definition, index iconTypes of Tickets
proxy ticket, definition, index iconTypes of Tickets
ProxyCommand keyword, ssh_config file, index iconKeywords in Secure Shell
pseudo-tty, use in Secure Shell, index iconCommand Execution and Data Forwarding in Secure Shell
PubkeyAuthentication keyword, Secure Shell, index iconKeywords in Secure Shell
public audit policy
description, index iconDetermining Audit Policy
read-only events, index iconDetermining Audit Policy
public directories
auditing, index iconAudit Terminology and Concepts
sticky bit and, index iconSticky Bit
public key authentication, Secure Shell, index iconOracle Solaris Secure Shell Authentication
public key cryptography
AUTH_DH client-server session, index iconImplementation of Diffie-Hellman Authentication
changing NFS public keys and secret keys, index iconImplementation of Diffie-Hellman Authentication
common keys
calculation, index iconImplementation of Diffie-Hellman Authentication
database of public keys for Secure RPC, index iconImplementation of Diffie-Hellman Authentication
generating keys
conversation keys for Secure NFS, index iconImplementation of Diffie-Hellman Authentication
using Diffie-Hellman, index iconImplementation of Diffie-Hellman Authentication
NFS secret keys, index iconImplementation of Diffie-Hellman Authentication
public key technologies, See PKI
public keys
changing passphrase, index iconHow to Change the Passphrase for a Secure Shell Private Key
DH authentication and, index iconDiffie-Hellman Authentication and Secure RPC
generating public-private key pair, index iconHow to Generate a Public/Private Key Pair for Use With Secure Shell
Secure Shell identity files, index iconSecure Shell Files
public objects, auditing, index iconAudit Terminology and Concepts
publickey map, DH authentication, index iconDiffie-Hellman Authentication and Secure RPC
pwcheck_method option, SASL and, index iconSASL Options