JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Oracle Solaris Secure Shell (Tasks)

20.  Oracle Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Oracle Solaris Auditing (Tasks)

31.  Oracle Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

U

-U option
allocate command, index iconDevice Allocation Commands
list_devices command, index iconDevice Allocation Commands
uauth audit token
index iconAuditing Enhancements in the Solaris 10 Release
index iconuauth Token
UDP
addresses, index iconiport Token
port forwarding and, index iconHow to Configure Port Forwarding in Secure Shell
Secure Shell and, index iconHow to Configure Port Forwarding in Secure Shell
using for remote audit logs, index iconAudit Logs
uid_aliases file (ASET)
index iconThe uid_aliases File
index iconSpecifying an Aliases File: UID_ALIASES
UID_ALIASES variable (ASET)
index iconThe uid_aliases File
index iconSpecifying an Aliases File: UID_ALIASES
index iconUID_ALIASES Environment Variable
umask value
and file creation, index iconDefault umask Value
typical settings, index iconDefault umask Value
umount command, with security attributes, index iconHow to Authorize Users to Allocate a Device
uninstalling, cryptographic providers, index iconHow to Prevent the Use of a User-Level Mechanism
UNIX file permissions, See files, permissions
unmounting, allocated devices, index iconHow to Deallocate a Device
update_drv command
description, index iconDevice Policy Commands
using, index iconHow to Change the Device Policy on an Existing Device
updating, audit service, index iconHow to Update the Audit Service
upriv audit token, index iconupriv Token
URL for online help, Graphical Kerberos Tool, index iconOnline Help URL in the Graphical Kerberos Administration Tool
use_authid option, SASL and, index iconSASL Options
UseLogin keyword, sshd_config file, index iconKeywords in Secure Shell
UseOpenSSLEngine keyword, Secure Shell, index iconKeywords in Secure Shell
UsePrivilegedPort keyword, Secure Shell, index iconKeywords in Secure Shell
user accounts
See also users
ASET check, index iconUser and Group Checks
displaying login status
index iconHow to Display a User's Login Status
index iconHow to Display a User's Login Status
User Accounts tool, description, index iconHow to Change the RBAC Properties of a User
user ACL entries
default entries for directories, index iconACL Entries for UFS Directories
description, index iconACL Entries for UFS Files
setting, index iconHow to Add ACL Entries to a File
user administration audit class, index iconDefinitions of Audit Classes
user_attr database
defaultpriv keyword, index iconFiles With Privilege Information
description
index iconDatabases That Support RBAC
index iconuser_attr Database
limitpriv keyword, index iconFiles With Privilege Information
privs keyword, index iconFiles With Privilege Information
RBAC relationships, index iconRBAC Database Relationships
user audit fields, audit_user database, index iconaudit_user Database
user classes of files, index iconFile and Directory Ownership
user database (RBAC), See user_attr database
user ID
audit ID and
index iconWhat Is Auditing?
index iconProscess Audit Characteristics
in NFS services, index iconHow to Create a Credential Table
user ID numbers (UIDs), special accounts and, index iconSpecial System Accounts
User keyword, ssh_config file, index iconKeywords in Secure Shell
user principal, description, index iconKerberos Principals
user procedures
allocating devices, index iconAllocating Devices (Task Map)
assuming a role
index iconConfiguring RBAC
index iconUsing Roles (Task Map)
chkey command, index iconHow to Set Up a Diffie-Hellman Key for an NIS User
computing digest of a file, index iconHow to Compute a Digest of a File
computing MAC of a file, index iconHow to Compute a MAC of a File
creating self-signed certificate, index iconHow to Create a Certificate by Using the pktool gencert Command
decrypting files, index iconHow to Encrypt and Decrypt a File
encrypting files, index iconProtecting Files With the Oracle Solaris Cryptographic Framework (Task Map)
encrypting NIS user's private key, index iconHow to Set Up a Diffie-Hellman Key for an NIS User
exporting certificates, index iconHow to Export a Certificate and Private Key in PKCS #12 Format
generating a symmetric key
using the dd command, index iconHow to Generate a Symmetric Key by Using the dd Command
using the pktool command, index iconHow to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore, index iconHow to Generate a Passphrase by Using the pktool setpin Command
importing certificates, index iconHow to Import a Certificate Into Your Keystore
protecting files, index iconProtecting Files With UNIX Permissions (Task Map)
using ACLs, index iconProtecting UFS Files With ACLs (Task Map)
using an assigned role
index iconConfiguring RBAC
index iconUsing Roles (Task Map)
using pktool command, index iconUsing the Key Management Framework (Task Map)
using Secure Shell, index iconUsing Oracle Solaris Secure Shell (Task Map)
user rights management, See privileges
user scripts, configuring for ssh-agent daemon in CDE, index iconHow to Set Up the ssh-agent Command to Run Automatically in CDE
useradd command
adding local user, index iconHow to Make root User Into a Role
description, index iconCommands That Manage RBAC
userdel command, description, index iconCommands That Manage RBAC
UserKnownHostsFile keyword, ssh_config file, index iconKeywords in Secure Shell
UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
usermod command
changing user's RBAC properties, index iconHow to Change the RBAC Properties of a User
description, index iconCommands That Manage RBAC
using to assign role, index iconHow to Assign a Role to a Local User
users
adding local user, index iconHow to Make root User Into a Role
allocating devices, index iconHow to Allocate a Device
assigning allocate authorization to, index iconHow to Authorize Users to Allocate a Device
assigning privileges to, index iconHow to Assign Privileges to a User or Role
assigning RBAC defaults, index iconpolicy.conf File
auditing all of their commands, index iconHow to Audit All Commands by Users
basic privilege set, index iconHow Privileges Are Implemented
changing properties from command line, index iconHow to Change the RBAC Properties of a User
computing digest of files, index iconHow to Compute a Digest of a File
computing MAC of files, index iconHow to Compute a MAC of a File
creating local user, index iconHow to Make root User Into a Role
deallocating devices, index iconHow to Deallocate a Device
determining directly assigned privileges, index iconHow to Determine the Privileges That You Have Been Directly Assigned
determining own privileged commands, index iconHow to Determine the Privileged Commands That You Can Run
disabling login, index iconHow to Temporarily Disable User Logins
displaying login status, index iconHow to Display a User's Login Status
encrypting files, index iconHow to Encrypt and Decrypt a File
generating a symmetric key, index iconHow to Generate a Symmetric Key by Using the pktool Command
having no passwords, index iconHow to Display Users Without Passwords
initial inheritable privileges, index iconHow Privileges Are Implemented
modifying audit preselection mask of, index iconHow to Change a User's Audit Characteristics
modifying properties (RBAC), index iconHow to Change the RBAC Properties of a User
mounting allocated devices, index iconHow to Mount an Allocated Device
restricting basic privileges, index iconHow to Limit a User's or Role's Privileges
troubleshooting running privileged commands, index iconHow to Determine the Privileged Commands That You Can Run
unmounting allocated devices, index iconHow to Deallocate a Device
UseRsh keyword, ssh_config file, index iconKeywords in Secure Shell
using
ACLs, index iconHow to Add ACL Entries to a File
allocate command, index iconHow to Allocate a Device
ASET, index iconRunning ASET (Task Map)
BART, index iconUsing BART (Tasks)
cryptoadm command, index iconAdministering the Cryptographic Framework (Tasks)
cryptographic framework task map, index iconUsing the Cryptographic Framework (Task Map)
dd command, index iconHow to Generate a Symmetric Key by Using the dd Command
deallocate command, index iconHow to Deallocate a Device
device allocation
index iconAllocating Devices (Task Map)
index iconHow to Allocate a Device
digest command, index iconHow to Compute a Digest of a File
encrypt command, index iconHow to Encrypt and Decrypt a File
file permissions, index iconProtecting Files (Task Map)
mac command, index iconHow to Compute a MAC of a File
mount command, index iconHow to Mount an Allocated Device
new password algorithm, index iconHow to Specify an Algorithm for Password Encryption
pktool command, index iconHow to Generate a Symmetric Key by Using the pktool Command
ppriv command
index iconHow to Determine the Privileges on a Process
index iconHow to Determine the Privileges on a Process
privileges, index iconDetermining Your Assigned Privileges
privileges task map, index iconDetermining Your Privileges (Task Map)
RBAC task map, index iconUsing RBAC (Task Map)
roles, index iconUsing Roles
roles task map, index iconUsing Roles (Task Map)
Secure Shell task map, index iconUsing Oracle Solaris Secure Shell (Task Map)
smrole command, index iconHow to Assign Privileges to a User or Role
ssh-add command, index iconHow to Reduce Password Prompts in Secure Shell
ssh-agent daemon, index iconHow to Reduce Password Prompts in Secure Shell
truss command, index iconHow to Determine Which Privileges a Program Requires
umount command, index iconHow to Deallocate a Device
usermod command, index iconHow to Assign Privileges to a User or Role
Using the Key Management Framework (Task Map), index iconUsing the Key Management Framework (Task Map)
/usr/aset/asetenv file
index iconASET Environment File (asetenv)
index iconModifying the Environment File (asetenv)
/usr/aset directory, index iconAutomated Security Enhancement Tool (ASET)
/usr/aset/masters/tune files
description, index iconTune Files
modifying, index iconModifying the Tune Files
rules, index iconTune File Examples
/usr/aset/masters/uid_aliases file, index iconThe uid_aliases File
/usr/aset/reports directory, structure, index iconASET Reports
/usr/aset/reports directory structure, index iconASET Reports
/usr/aset/reports/latest directory, index iconASET Reports
/usr/bin/ftp command, Kerberos and, index iconKerberos Commands
/usr/bin/kdestroy command, Kerberos and, index iconKerberos Commands
/usr/bin/kinit command, Kerberos and, index iconKerberos Commands
/usr/bin/klist command, Kerberos and, index iconKerberos Commands
/usr/bin/kpasswd command, Kerberos and, index iconKerberos Commands
/usr/bin/ktutil command, Kerberos and, index iconKerberos Commands
/usr/bin/rcp command, Kerberos and, index iconKerberos Commands
/usr/bin/rdist command, Kerberos and, index iconKerberos Commands
/usr/bin/rlogin command, Kerberos and, index iconKerberos Commands
/usr/bin/rsh command, Kerberos and, index iconKerberos Commands
/usr/bin/telnet command, Kerberos and, index iconKerberos Commands
/usr/lib/kprop command, description, index iconKerberos Commands
/usr/lib/krb5/kadmind daemon, Kerberos and, index iconKerberos Daemons
/usr/lib/krb5/kpropd daemon, Kerberos and, index iconKerberos Daemons
/usr/lib/krb5/krb5kdc daemon, Kerberos and, index iconKerberos Daemons
/usr/lib/krb5/ktkt_warnd daemon, Kerberos and, index iconKerberos Daemons
/usr/lib/libsasl.so library, overview, index iconSASL (Overview)
/usr/sbin/gkadmin command, description, index iconKerberos Commands
/usr/sbin/gsscred command, description, index iconKerberos Commands
/usr/sbin/in.ftpd daemon, Kerberos and, index iconKerberos Daemons
/usr/sbin/in.rlogind daemon, Kerberos and, index iconKerberos Daemons
/usr/sbin/in.rshd daemon, Kerberos and, index iconKerberos Daemons
/usr/sbin/in.telnetd daemon, Kerberos and, index iconKerberos Daemons
/usr/sbin/kadmin command, description, index iconKerberos Commands
/usr/sbin/kadmin.local command, description, index iconKerberos Commands
/usr/sbin/kclient command, description, index iconKerberos Commands
/usr/sbin/kdb5_ldap_util command, description, index iconKerberos Commands
/usr/sbin/kdb5_util command, description, index iconKerberos Commands
/usr/sbin/kgcmgr command, description, index iconKerberos Commands
/usr/sbin/kproplog command, description, index iconKerberos Commands
/usr/share/lib/xml directory, index iconpraudit Command
usrgrp.rpt file
description
index iconUser and Group Checks
index iconFormat of ASET Report Files
example, index iconFormat of ASET Report Files
uucico command, login program, index iconHow to Create a Dial-Up Password