JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Administration: Security Services     Oracle Solaris 11 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Virus Scanning Service (Tasks)

5.  Controlling Access to Devices (Tasks)

6.  Using the Basic Audit Reporting Tool (Tasks)

7.  Controlling Access to Files (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Security Attributes in Oracle Solaris (Reference)

Part IV Cryptographic Services

11.  Cryptographic Framework (Overview)

12.  Cryptographic Framework (Tasks)

13.  Key Management Framework

Part V Authentication Services and Secure Communication

14.  Network Services Authentication (Tasks)

15.  Using PAM

16.  Using SASL

17.  Using Secure Shell (Tasks)

18.  Secure Shell (Reference)

Part VI Kerberos Service

19.  Introduction to the Kerberos Service

20.  Planning for the Kerberos Service

21.  Configuring the Kerberos Service (Tasks)

22.  Kerberos Error Messages and Troubleshooting

23.  Administering Kerberos Principals and Policies (Tasks)

24.  Using Kerberos Applications (Tasks)

25.  The Kerberos Service (Reference)

Part VII Auditing in Oracle Solaris

26.  Auditing (Overview)

27.  Planning for Auditing

28.  Managing Auditing (Tasks)

29.  Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Z

A

-A option, auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
-a option
auditrecord command, index iconHow to Display Audit Record Definitions
digest command, index iconHow to Compute a Digest of a File
encrypt command, index iconHow to Encrypt and Decrypt a File
Kerberized commands, index iconOverview of Kerberized Commands
mac command, index iconHow to Compute a MAC of a File
absolute mode
changing file permissions
index iconFile Permission Modes
index iconHow to Change File Permissions in Absolute Mode
changing special file permissions, index iconHow to Change Special File Permissions in Absolute Mode
description, index iconFile Permission Modes
setting special permissions, index iconFile Permission Modes
access
control lists
See ACL
getting to server
with Kerberos, index iconGaining Access to a Service Using Kerberos
granting to your account
index iconGranting Access to Your Account
index iconGranting Access to Your Account
login authentication with Secure Shell, index iconHow to Reduce Password Prompts in Secure Shell
obtaining for a specific service, index iconObtaining Access to a Specific Service
restricting for
devices
index iconControlling Access to Devices
index iconConfiguring Device Policy (Tasks)
system hardware, index iconControlling Access to System Hardware (Tasks)
restricting for KDC servers, index iconHow to Restrict Access to KDC Servers
root access
displaying attempts on console, index iconHow to Restrict and Monitor Superuser Logins
monitoring su command attempts
index iconLimiting and Monitoring Superuser
index iconHow to Monitor Who Is Using the su Command
restricting
index iconRestricting root Access to Shared Files
index iconHow to Restrict and Monitor Superuser Logins
Secure RPC authentication, index iconOverview of Secure RPC
security
ACLs, index iconUsing Access Control Lists
controlling system usage, index iconControlling Access to Machine Resources
devices, index iconConfiguring Device Policy (Tasks)
file access restriction, index iconRestricting Access to Data in Files
firewall setup
index iconFirewall Systems
index iconFirewall Systems
login access restrictions
index iconMaintaining Login Control
index iconMaintaining Login Control
login authentication, index iconHow to Reduce Password Prompts in Secure Shell
login control, index iconMaintaining Login Control
monitoring system usage
index iconMonitoring Use of Machine Resources
index iconMonitoring File Integrity
network control, index iconControlling Network Access
NFS client-server, index iconImplementation of Diffie-Hellman Authentication
PATH variable setting, index iconSetting the PATH Variable
peripheral devices, index iconControlling Access to Devices
physical security, index iconMaintaining Physical Security
remote systems, index iconSecure Shell (Overview)
reporting problems, index iconReporting Security Problems
root login tracking, index iconLimiting and Monitoring Superuser
saving failed logins, index iconHow to Monitor Failed Login Attempts
setuid programs, index iconRestricting setuid Executable Files
system hardware, index iconControlling Access to System Hardware (Tasks)
UFS ACLs, index iconUsing Access Control Lists to Protect UFS Files
sharing files, index iconSharing Files Across Machines
access control list
See ACL
Access Control Lists (ACLs), See ACL
ACL
description
index iconUsing Access Control Lists
index iconUsing Access Control Lists to Protect UFS Files
format of entries, index iconUsing Access Control Lists to Protect UFS Files
kadm5.acl file
index iconHow to Create a New Kerberos Principal
index iconHow to Duplicate a Kerberos Principal
index iconHow to Modify the Kerberos Administration Privileges
restrictions on copying entries, index iconUsing Access Control Lists to Protect UFS Files
acl audit token, format, index iconacl Token
active audit policy, temporary audit policy, index iconHow to Change Audit Policy
add_drv command, description, index iconDevice Policy Commands
adding
administration principals (Kerberos)
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
allocatable device, index iconHow to Enable Device Allocation
audit classes
index iconHow to Add an Audit Class
index iconHow to Add an Audit Class
audit file systems, index iconHow to Create ZFS File Systems for Audit Files
audit policy, index iconHow to Change Audit Policy
auditing
of individual users
index iconHow to Configure a User's Audit Characteristics
index iconHow to Lessen the Volume of Audit Records That Are Produced
of roles, index iconHow to Audit Roles
of zones, index iconPlanning Auditing (Tasks)
cryptomgt role, index iconHow to Assign a Role
DH authentication to mounted file systems, index iconAdministering Authentication With Secure RPC (Tasks)
hardware provider mechanisms and features, index iconHow to Disable Hardware Provider Mechanisms and Features
library plugin, index iconHow to Add a Software Provider
new rights profile, index iconHow to Create or Change a Rights Profile
PAM modules, index iconHow to Add a PAM Module
plugins
auditing
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure syslog Audit Logs
Cryptographic Framework, index iconHow to Add a Software Provider
KMF, index iconHow to Manage Third-Party Plugins in KMF
privileged users, index iconHow to Change the RBAC Properties of a User
privileges
directly to role, index iconHow to Change the Security Attributes of a Role
directly to user, index iconHow to Change the RBAC Properties of a User
to command, index iconHow to Create or Change a Rights Profile
RBAC properties
to legacy applications, index iconHow to Add RBAC Properties to Legacy Applications
roles, index iconHow to Create a Role
security attributes
to legacy applications, index iconHow to Add RBAC Properties to Legacy Applications
to roles, index iconHow to Change the Security Attributes of a Role
to users, index iconHow to Change the RBAC Properties of a User
security-related role, index iconHow to Assign a Role
security to devices
index iconHow to Change the Device Policy on an Existing Device
index iconManaging Device Allocation (Tasks)
security to system hardware, index iconHow to Require a Password for Hardware Access
service principal to keytab file (Kerberos), index iconHow to Add a Kerberos Service Principal to a Keytab File
software provider, index iconHow to Add a Software Provider
temporary audit policy, index iconHow to Change Audit Policy
user-level software provider, index iconHow to Add a Software Provider
admin_server section
krb5.conf file
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
administering
auditing
audit -s command
index iconHow to Refresh the Audit Service
index iconHow to Enable the Audit Service
audit -t command, index iconHow to Disable the Audit Service
audit classes, index iconAudit Classes and Preselection
audit events, index iconAudit Events
audit files, index iconHow to View the Contents of Binary Audit Files
audit records, index iconAudit Records and Audit Tokens
audit_remote plugin, index iconHow to Send Audit Files to a Remote Repository
audit_syslog plugin, index iconHow to Configure syslog Audit Logs
audit trail overflow prevention, index iconHow to Prevent Audit Trail Overflow
auditconfig command
index iconConfiguring the Audit Service (Task Map)
index iconHow to Preselect Audit Classes
auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
configuring, index iconConfiguring the Audit Service (Task Map)
cost control, index iconControlling Auditing Costs
description, index iconHow Is Auditing Configured?
disabling, index iconHow to Disable the Audit Service
efficiency, index iconAuditing Efficiently
enabling, index iconHow to Enable the Audit Service
plugins, index iconHow to Send Audit Files to a Remote Repository
policy, index iconHow to Change Audit Policy
praudit command, index iconHow to View the Contents of Binary Audit Files
queue controls, index iconHow to Change Audit Queue Controls
reducing space requirements, index iconCost of Storage of Audit Data
refreshing, index iconHow to Refresh the Audit Service
rights profiles required, index iconRights Profiles for Administering Auditing
task map, index iconManaging Auditing (Task Map)
in zones
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
zones, index iconConfiguring the Audit Service in Zones (Tasks)
auditing in zones, index iconHow to Plan Auditing in Zones
Cryptographic Framework and zones, index iconCryptographic Services and Zones
Cryptographic Framework commands, index iconAdministrative Commands in the Cryptographic Framework
Cryptographic Framework task map, index iconAdministering the Cryptographic Framework (Tasks)
device allocation, index iconManaging Device Allocation (Task Map)
device policy, index iconConfiguring Device Policy (Task Map)
file permissions
index iconProtecting Files (Tasks)
index iconProtecting Files With UNIX Permissions (Task Map)
Kerberos
keytabs, index iconAdministering Keytab Files
policies, index iconAdministering Kerberos Policies
principals, index iconAdministering Kerberos Principals
metaslot, index iconAdministrative Commands in the Cryptographic Framework
NFS client-server file security, index iconImplementation of Diffie-Hellman Authentication
password algorithms, index iconChanging the Default Algorithm for Password Encryption (Tasks)
privileges, index iconManaging Privileges (Task Map)
RBAC properties, index iconHow to Create or Change a Rights Profile
remote logins with Secure Shell, index iconHow to Generate a Public/Private Key Pair for Use With Secure Shell
rights profiles, index iconHow to Create or Change a Rights Profile
of a user, index iconHow to Enable a User to Use Own Password to Assume a Role
role password, index iconHow to Change the Password of a Role
roles to replace superuser, index iconHow to Plan Your RBAC Implementation
Secure RPC task map, index iconAdministering Secure RPC (Task Map)
Secure Shell
clients, index iconClient Configuration in Secure Shell
overview, index iconA Typical Secure Shell Session
servers, index iconServer Configuration in Secure Shell
task map, index iconConfiguring Secure Shell (Task Map)
security properties
of a legacy application, index iconHow to Add RBAC Properties to Legacy Applications
of a rights profile, index iconHow to Create or Change a Rights Profile
of a role
index iconHow to Change the Password of a Role
index iconHow to Change the Security Attributes of a Role
index iconHow to Enable a User to Use Own Password to Assume a Role
of a user, index iconHow to Change the RBAC Properties of a User
user password to assume role, index iconHow to Enable a User to Use Own Password to Assume a Role
user password to use rights profile, index iconHow to Enable a User to Use Own Password to Assume a Role
without privileges, index iconAdministrative Differences on a System With Privileges
administrators
restricting rights, index iconHow to Restrict an Administrator to Explicitly Assigned Rights
restricting users' rights, index iconHow to Restrict a User to Desktop Applications
AES kernel provider, index iconHow to List Available Providers
aes128-cbc encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
aes128-ctr encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
agent daemon, Secure Shell, index iconHow to Reduce Password Prompts in Secure Shell
ahlt audit policy
description, index iconUnderstanding Audit Policy
setting, index iconHow to Change Audit Policy
with cnt policy, index iconAudit Policies for Asynchronous and Synchronous Events
algorithms
definition in Cryptographic Framework, index iconTerminology in the Cryptographic Framework
file encryption, index iconHow to Encrypt and Decrypt a File
listing in the Cryptographic Framework, index iconHow to List Available Providers
passphrase protection in ssh-keygen, index iconSecure Shell and the OpenSSH Project
password
configuration, index iconHow to Specify an Algorithm for Password Encryption
password encryption
index iconPassword Encryption
index iconChanging the Default Algorithm for Password Encryption (Tasks)
All (RBAC), rights profile, index iconRights Profiles
all audit class, caution for using, index iconAudit Classes
allocate command
allocate error state, index iconAllocate Error State
authorizations required
index iconDevice Allocation Commands
index iconSelected Commands That Require Authorizations
tape drive, index iconHow to Allocate a Device
user authorization, index iconHow to Authorize Users to Allocate a Device
using, index iconHow to Allocate a Device
allocate error state, index iconAllocate Error State
allocating devices
by users, index iconHow to Allocate a Device
forcibly, index iconForcibly Allocating a Device
troubleshooting, index iconHow to Allocate a Device
AllowGroups keyword, sshd_config file, index iconKeywords in Secure Shell
AllowTcpForwarding keyword
changing, index iconHow to Configure Port Forwarding in Secure Shell
sshd_config file, index iconKeywords in Secure Shell
AllowUsers keyword, sshd_config file, index iconKeywords in Secure Shell
ALTSHELL in Secure Shell, index iconSecure Shell and Login Environment Variables
always-audit classes, process preselection mask, index iconProcess Audit Characteristics
antivirus software, See virus scanning
appending arrow (>>), preventing appending, index iconAssigning a Restricted Shell to Users
application server, configuring, index iconConfiguring Kerberos Network Application Servers
arcfour encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
ARCFOUR kernel provider, index iconHow to List Available Providers
Archive tape drive device-clean script, index icondevice_allocate File
archiving, audit files, index iconHow to Prevent Audit Trail Overflow
arge audit policy
and exec_env token, index iconexec_env Token
description, index iconUnderstanding Audit Policy
setting, index iconHow to Audit All Commands by Users
argument audit token, format, index iconargument Token
argv audit policy
and exec_args token, index iconexec_args Token
description, index iconUnderstanding Audit Policy
setting, index iconHow to Audit All Commands by Users
assigning
privileges to commands in a rights profile, index iconHow to Create or Change a Rights Profile
privileges to commands in a script, index iconHow to Run a Shell Script With Privileged Commands
privileges to role, index iconHow to Change the Security Attributes of a Role
privileges to user, index iconHow to Change the RBAC Properties of a User
rights profile
to a role, index iconHow to Change the Security Attributes of a Role
role to a user locally, index iconHow to Assign a Role
assuming role
how to, index iconCustomizing RBAC for Your Site (Tasks)
in a terminal window, index iconHow to Assume a Role
root, index iconHow to Assume a Role
asterisk (*)
checking for in RBAC authorizations, index iconHow to Add RBAC Properties to Legacy Applications
device_allocate file
index icondevice_allocate File
index icondevice_allocate File
wildcard character
in RBAC authorizations, index iconAuthorization Naming Conventions
asynchronous audit events
index iconAudit Policies for Asynchronous and Synchronous Events
index iconAudit Policies for Asynchronous and Synchronous Events
at command, authorizations required, index iconSelected Commands That Require Authorizations
at sign (@), device_allocate file, index icondevice_allocate File
atq command, authorizations required, index iconSelected Commands That Require Authorizations
attribute audit token, index iconattribute Token
attributes, keyword in BART, index iconRules File Attributes
audio devices, security, index iconDevice-Clean Scripts
audit -s command
index iconHow to Refresh the Audit Service
index iconHow to Refresh the Audit Service
index iconHow to Enable the Audit Service
audit -t command, index iconHow to Disable the Audit Service
audit_binfile plugin, index iconAudit Plugin Modules
getting attributes
index iconHow to Assign Audit Space for the Audit Trail
index iconHow to Assign Audit Space for the Audit Trail
index iconHow to Assign Audit Space for the Audit Trail
limiting audit file size, index iconHow to Assign Audit Space for the Audit Trail
removing queue size, index iconHow to Assign Audit Space for the Audit Trail
setting attributes, index iconHow to Assign Audit Space for the Audit Trail
setting free space warning, index iconHow to Assign Audit Space for the Audit Trail
audit characteristics
audit user ID, index iconProcess Audit Characteristics
processes, index iconProcess Audit Characteristics
session ID, index iconProcess Audit Characteristics
terminal ID, index iconProcess Audit Characteristics
user process preselection mask, index iconProcess Audit Characteristics
audit_class file
adding a class, index iconHow to Add an Audit Class
troubleshooting, index iconHow to Add an Audit Class
audit classes
adding, index iconHow to Add an Audit Class
configuration, index iconAudit Classes
description
index iconAudit Terminology and Concepts
index iconAudit Events
displaying defaults, index iconHow to Display Audit Service Defaults
exceptions to system-wide settings, index iconAudit Classes and Preselection
mapping events, index iconAudit Classes and Preselection
modifying default, index iconHow to Add an Audit Class
overview, index iconAudit Classes and Preselection
post-selection, index iconAudit Terminology and Concepts
prefixes, index iconAudit Class Syntax
preselecting
effect on public objects, index iconAudit Terminology and Concepts
for failure
index iconHow to Configure a User's Audit Characteristics
index iconHow to Configure syslog Audit Logs
index iconHow to Configure syslog Audit Logs
for success
index iconHow to Configure a User's Audit Characteristics
index iconHow to Configure syslog Audit Logs
index iconHow to Configure syslog Audit Logs
for success and failure, index iconHow to Preselect Audit Classes
preselection, index iconAudit Terminology and Concepts
process preselection mask, index iconProcess Audit Characteristics
replacing, index iconHow to Preselect Audit Classes
syntax
index iconAudit Classes
index iconAudit Class Syntax
user exceptions, index iconHow to Configure a User's Audit Characteristics
audit command
disabling audit service, index iconHow to Disable the Audit Service
options, index iconAudit Service Man Pages
refreshing audit service, index iconHow to Refresh the Audit Service
Audit Configuration rights profile, index iconRights Profiles for Administering Auditing
auditing a role, index iconHow to Audit Roles
configuring audit policy, index iconHow to Change Audit Policy
displaying auditing defaults, index iconHow to Display Audit Service Defaults
preselecting audit classes, index iconHow to Preselect Audit Classes
Audit Control rights profile, index iconRights Profiles for Administering Auditing
disabling audit service, index iconHow to Disable the Audit Service
enabling audit service, index iconHow to Enable the Audit Service
refreshing audit service, index iconHow to Refresh the Audit Service
audit directory, creating file systems for, index iconHow to Create ZFS File Systems for Audit Files
audit_event file
changing class membership, index iconHow to Change an Audit Event's Class Membership
description, index iconAudit Events
removing events safely, index iconHow to Prevent the Auditing of Specific Events
audit event-to-class mappings, changing, index iconHow to Change an Audit Event's Class Membership
audit events
asynchronous, index iconAudit Policies for Asynchronous and Synchronous Events
audit_event file, index iconAudit Events
changing class membership, index iconHow to Change an Audit Event's Class Membership
description, index iconAudit Events
mapping to classes, index iconAudit Classes and Preselection
removing from audit_event file, index iconHow to Prevent the Auditing of Specific Events
selecting from audit trail, index iconHow to Select Audit Events From the Audit Trail
selecting from audit trail in zones, index iconAuditing and Oracle Solaris Zones
summary, index iconAudit Terminology and Concepts
synchronous, index iconAudit Policies for Asynchronous and Synchronous Events
viewing from binary files, index iconHow to View the Contents of Binary Audit Files
audit file system, description, index iconAudit Terminology and Concepts
audit files
combining, index iconHow to Merge Audit Files From the Audit Trail
compressing on disk, index iconHow to Compress Audit Files on a Dedicated File System
copying messages to single file, index iconHow to Select Audit Events From the Audit Trail
creating summary files
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
effects of Coordinated Universal Time (UTC), index iconHow to Merge Audit Files From the Audit Trail
limiting size of, index iconHow to Limit the Size of Binary Audit Files
managing, index iconHow to Prevent Audit Trail Overflow
printing, index iconHow to View the Contents of Binary Audit Files
reading with praudit, index iconHow to View the Contents of Binary Audit Files
reducing, index iconHow to Merge Audit Files From the Audit Trail
reducing space requirements, index iconCost of Storage of Audit Data
reducing storage-space requirements, index iconAuditing Efficiently
setting aside disk space for, index iconHow to Create ZFS File Systems for Audit Files
time stamps, index iconConventions for Binary Audit File Names
ZFS file systems
index iconHow to Create ZFS File Systems for Audit Files
index iconHow to Compress Audit Files on a Dedicated File System
audit flags, summary, index iconAudit Terminology and Concepts
audit_flags keyword, index iconHow to Display Audit Service Defaults
specifying user exceptions to audit preselection, index iconHow to Configure a User's Audit Characteristics
use, index iconAudit Class Syntax
using caret (^) prefix, index iconHow to Configure a User's Audit Characteristics
audit logs
See also audit files
comparing binary and text summaries, index iconAudit Logs
configuring, index iconConfiguring Audit Logs (Tasks)
configuring text summary audit logs, index iconHow to Configure syslog Audit Logs
modes, index iconAudit Logs
audit.notice entry, syslog.conf file, index iconHow to Configure syslog Audit Logs
audit plugins
audit_binfile plugin
index iconHow to Change Audit Queue Controls
index iconHow to Assign Audit Space for the Audit Trail
audit_remote plugin, index iconHow to Send Audit Files to a Remote Repository
audit_syslog plugin, index iconHow to Configure syslog Audit Logs
description, index iconAudit Terminology and Concepts
qsize attribute, index iconHow to Change Audit Queue Controls
summary
index iconAudit Service Man Pages
index iconAudit Plugins
audit policy
audit tokens from, index iconAudit Policy
defaults, index iconUnderstanding Audit Policy
description, index iconAudit Terminology and Concepts
displaying defaults, index iconHow to Display Audit Service Defaults
effects of, index iconUnderstanding Audit Policy
public, index iconUnderstanding Audit Policy
setting, index iconHow to Change Audit Policy
setting ahlt, index iconHow to Change Audit Policy
setting arge, index iconHow to Audit All Commands by Users
setting argv, index iconHow to Audit All Commands by Users
setting in global zone
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
setting perzone, index iconHow to Change Audit Policy
that does not affect tokens, index iconAudit Policy
tokens added by, index iconAudit Policy
audit preselection mask
modifying for existing users, index iconHow to Update the Preselection Mask of Logged In Users
modifying for individual users, index iconHow to Configure a User's Audit Characteristics
audit queue, events included, index iconAudit Classes and Preselection
audit queue controls
displaying defaults, index iconHow to Display Audit Service Defaults
getting, index iconHow to Change Audit Queue Controls
audit records
converting to readable format, index iconHow to View the Contents of Binary Audit Files
copying to single file, index iconHow to Select Audit Events From the Audit Trail
description, index iconAudit Terminology and Concepts
displaying, index iconHow to View the Contents of Binary Audit Files
displaying definitions of
procedure, index iconHow to Display Audit Record Definitions
displaying formats of a program, index iconHow to Display Audit Record Definitions
displaying formats of an audit class, index iconHow to Display Audit Record Definitions
displaying in XML format, index iconHow to View the Contents of Binary Audit Files
event modifiers, index iconheader Token
events that generate, index iconHow Does Auditing Work?
format, index iconAudit Record Structure
formatting example, index iconHow to Display Audit Record Definitions
merging, index iconHow to Merge Audit Files From the Audit Trail
overview, index iconAudit Records and Audit Tokens
reducing audit files, index iconHow to Merge Audit Files From the Audit Trail
sequence of tokens, index iconAudit Record Structure
/var/adm/auditlog file, index iconHow to Configure syslog Audit Logs
audit_remote plugin, index iconAudit Plugin Modules
getting attributes, index iconHow to Send Audit Files to a Remote Repository
setting attributes, index iconHow to Send Audit Files to a Remote Repository
Audit Review rights profile, index iconRights Profiles for Administering Auditing
audit service
See also auditing
audit trail creation, index iconAudit Trail
configuring policy, index iconHow to Change Audit Policy
configuring queue controls, index iconHow to Change Audit Queue Controls
defaults, index iconAudit Service
disabling, index iconHow to Disable the Audit Service
enabling, index iconHow to Enable the Audit Service
policy, index iconUnderstanding Audit Policy
refreshing the kernel, index iconHow to Refresh the Audit Service
troubleshooting, index iconHow to Determine That Auditing Is Running
audit session ID, index iconProcess Audit Characteristics
overview, index iconWhat Is Auditing?
audit_syslog plugin, index iconAudit Plugin Modules
setting attributes, index iconHow to Configure syslog Audit Logs
audit tokens
See also individual audit token names
added by audit policy, index iconAudit Policy
audit record format, index iconAudit Record Structure
description
index iconAudit Terminology and Concepts
index iconAudit Records and Audit Tokens
format, index iconAudit Token Formats
list of, index iconAudit Token Formats
xclient token, index iconxclient Token
audit trail
adding disk space, index iconHow to Assign Audit Space for the Audit Trail
analysis costs, index iconCost of Analysis of Audit Data
cleaning up not terminated files, index iconHow to Clean Up a not_terminated Audit File
creating
summary files
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
description, index iconAudit Terminology and Concepts
effect of audit policy, index iconUnderstanding Audit Policy
monitoring in real time, index iconAuditing Efficiently
no public objects, index iconAudit Terminology and Concepts
overview, index iconHow Does Auditing Work?
preventing overflow, index iconHow to Prevent Audit Trail Overflow
reducing size of
index iconHow to Lessen the Volume of Audit Records That Are Produced
index iconHow to Compress Audit Files on a Dedicated File System
selecting events from, index iconHow to Select Audit Events From the Audit Trail
sending files to remote repository, index iconHow to Send Audit Files to a Remote Repository
viewing events from, index iconHow to View the Contents of Binary Audit Files
viewing events from different zones, index iconAuditing and Oracle Solaris Zones
audit user ID
mechanism, index iconProcess Audit Characteristics
overview, index iconWhat Is Auditing?
audit_warn script
configuring, index iconHow to Configure the audit_warn Email Alias
description, index iconAudit Service Man Pages
auditconfig command
adding audit file systems, index iconHow to Assign Audit Space for the Audit Trail
audit classes as arguments, index iconAudit Classes and Preselection
configuring policy, index iconHow to Change Audit Policy
configuring queue controls, index iconHow to Change Audit Queue Controls
description, index iconAudit Service Man Pages
displaying audit defaults, index iconHow to Display Audit Service Defaults
-getplugin option
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure syslog Audit Logs
policy options, index iconHow to Change Audit Policy
preselecting audit classes, index iconHow to Preselect Audit Classes
queue control options, index iconHow to Change Audit Queue Controls
sending files to remote repository, index iconHow to Send Audit Files to a Remote Repository
-setflags option, index iconHow to Preselect Audit Classes
-setnaflags option, index iconHow to Preselect Audit Classes
-setplugin option
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure syslog Audit Logs
setting active audit policy, index iconHow to Change Audit Policy
setting audit_binfile attributes, index iconHow to Assign Audit Space for the Audit Trail
setting audit policy, index iconHow to Audit All Commands by Users
setting audit policy temporarily, index iconHow to Change Audit Policy
setting audit_remote attributes, index iconHow to Send Audit Files to a Remote Repository
setting system-wide audit parameters, index iconAudit Classes and Preselection
viewing default audit preselection, index iconHow to Preselect Audit Classes
auditd daemon
refreshing audit service
index iconHow to Refresh the Audit Service
index iconHow to Refresh the Audit Service
auditing
adding audit flags to a group of users, index iconHow to Configure a User's Audit Characteristics
all commands by users, index iconHow to Audit All Commands by Users
changes in current release, index iconAbout the Audit Service in This Release
changes in device policy, index iconHow to Audit Changes in Device Policy
configuring
all zones, index iconConfiguring the Audit Service (Tasks)
global zone, index iconHow to Change Audit Policy
identically for all zones, index iconHow to Configure All Zones Identically for Auditing
per zone, index iconHow to Configure Per-Zone Auditing
configuring in global zone, index iconHow to Plan Auditing in Zones
defaults, index iconAudit Service
determining if running, index iconHow to Determine That Auditing Is Running
device allocation, index iconHow to Audit Device Allocation
disabling, index iconHow to Disable the Audit Service
enabling, index iconHow to Enable the Audit Service
finding changes to specific files, index iconHow to Find Audit Records of Changes to Specific Files
getting queue controls, index iconHow to Change Audit Queue Controls
logins, index iconHow to Audit Logins From Other Operating Systems
man page summaries, index iconAudit Service Man Pages
planning, index iconPlanning Auditing (Tasks)
planning in zones
index iconHow to Plan Auditing in Zones
index iconHow to Plan Auditing in Zones
plugin modules, index iconAudit Plugin Modules
post-selection definition, index iconAudit Terminology and Concepts
preselection definition, index iconAudit Terminology and Concepts
privileges and, index iconPrivileges and Auditing
removing user-specific audit flags, index iconHow to Configure a User's Audit Characteristics
rights profiles for, index iconRights Profiles for Administering Auditing
roles, index iconHow to Audit Roles
setting queue controls, index iconHow to Change Audit Queue Controls
sftp file transfers, index iconHow to Audit FTP and SFTP File Transfers
troubleshooting, index iconTroubleshooting the Audit Service (Task Map)
troubleshooting praudit command, index iconHow to View the Contents of Binary Audit Files
updating information
index iconHow to Refresh the Audit Service
index iconHow to Refresh the Audit Service
users only, index iconHow to Configure a User's Audit Characteristics
zones and
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
auditing task map, index iconManaging Auditing (Task Map)
auditlog file, text audit records, index iconHow to Configure syslog Audit Logs
auditrecord command
[] (square brackets) in output, index iconAudit Record Analysis
description, index iconAudit Service Man Pages
displaying audit record definitions, index iconHow to Display Audit Record Definitions
example, index iconHow to Display Audit Record Definitions
listing all formats, index iconHow to Display Audit Record Definitions
listing formats of class, index iconHow to Display Audit Record Definitions
listing formats of program, index iconHow to Display Audit Record Definitions
optional tokens ([]), index iconAudit Record Analysis
auditreduce command
-A option, index iconHow to Merge Audit Files From the Audit Trail
-b option, index iconHow to Select Audit Events From the Audit Trail
-C option, index iconHow to Merge Audit Files From the Audit Trail
-c option
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
cleaning up audit files, index iconHow to Clean Up a not_terminated Audit File
-D option, index iconHow to Merge Audit Files From the Audit Trail
-d option, index iconHow to Select Audit Events From the Audit Trail
description, index iconAudit Service Man Pages
-e option, index iconHow to Select Audit Events From the Audit Trail
examples, index iconHow to Merge Audit Files From the Audit Trail
filtering options, index iconHow to Select Audit Events From the Audit Trail
-M option, index iconHow to Merge Audit Files From the Audit Trail
merging audit records, index iconHow to Merge Audit Files From the Audit Trail
-O option
index iconHow to Merge Audit Files From the Audit Trail
index iconHow to Merge Audit Files From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
selecting audit records, index iconHow to Select Audit Events From the Audit Trail
time stamp use, index iconHow to Merge Audit Files From the Audit Trail
trailer tokens, and, index icontrailer Token
using lowercase options, index iconHow to Select Audit Events From the Audit Trail
using uppercase options, index iconHow to Merge Audit Files From the Audit Trail
auditstat command, description, index iconAudit Service Man Pages
auth_attr database
description, index iconauth_attr Database
summary, index iconRBAC Databases
AUTH_DES authentication, See AUTH_DH authentication
AUTH_DH authentication, and NFS, index iconNFS Services and Secure RPC
authentication
AUTH_DH client-server session, index iconImplementation of Diffie-Hellman Authentication
configuring cross-realm, index iconConfiguring Cross-Realm Authentication
description, index iconAuthentication and Authorization for Remote Access
DH authentication, index iconDiffie-Hellman Authentication and Secure RPC
disabling with -X option, index iconOverview of Kerberized Commands
Kerberos and, index iconWhat Is the Kerberos Service?
naming services, index iconOverview of Secure RPC
network security, index iconAuthentication and Authorization for Remote Access
NFS-mounted files
index iconHow to Share NFS Files With Diffie-Hellman Authentication
index iconHow to Share NFS Files With Diffie-Hellman Authentication
overview of Kerberos, index iconHow the Kerberos Authentication System Works
Secure RPC, index iconOverview of Secure RPC
Secure Shell
methods, index iconSecure Shell Authentication
process, index iconAuthentication and Key Exchange in Secure Shell
terminology, index iconAuthentication-Specific Terminology
types, index iconAuthentication and Authorization for Remote Access
use with NFS, index iconNFS Services and Secure RPC
authentication methods
GSS-API credentials in Secure Shell, index iconSecure Shell Authentication
host-based in Secure Shell
index iconSecure Shell Authentication
index iconHow to Set Up Host-Based Authentication for Secure Shell
password in Secure Shell, index iconSecure Shell Authentication
public keys in Secure Shell, index iconSecure Shell Authentication
Secure Shell, index iconSecure Shell Authentication
authenticator
in Kerberos
index iconAuthentication-Specific Terminology
index iconObtaining a Credential for a Server
authlog file, saving failed login attempts, index iconHow to Monitor All Failed Login Attempts
authorizations
device allocation, index iconDevice Allocation Rights Profiles
Kerberos and, index iconWhat Is the Kerberos Service?
troubleshooting, index iconHow to Troubleshoot RBAC and Privilege Assignment
types, index iconAuthentication and Authorization for Remote Access
authorizations (RBAC)
checking for wildcards, index iconHow to Add RBAC Properties to Legacy Applications
checking in privileged application, index iconApplications That Check Authorizations
commands that require authorizations, index iconSelected Commands That Require Authorizations
database
index iconRBAC Databases
index iconauth_attr Database
definition, index iconRBAC Authorizations
delegating, index iconDelegation Authority in Authorizations
description
index iconRBAC Elements and Basic Concepts
index iconAuthorizations
for allocating device, index iconHow to Authorize Users to Allocate a Device
for device allocation, index iconDevice Allocation Commands
granularity, index iconExample of Authorization Granularity
naming convention, index iconAuthorization Naming Conventions
not requiring for device allocation, index iconHow to Change Which Devices Can Be Allocated
solaris.device.allocate
index iconHow to Authorize Users to Allocate a Device
index iconDevice Allocation Commands
solaris.device.revoke, index iconDevice Allocation Commands
authorized_keys file, description, index iconSecure Shell Files
AuthorizedKeysFile keyword, sshd_config file, index iconKeywords in Secure Shell
auths command, description, index iconCommands That Manage RBAC
AUTHS_GRANTED keyword, policy.conf file, index iconpolicy.conf File
auto_transition option, SASL and, index iconSASL Options
automatic login
disabling, index iconOverview of Kerberized Commands
enabling, index iconOverview of Kerberized Commands
automatically configuring
Kerberos
master KDC server, index iconHow to Automatically Configure a Master KDC
slave KDC server, index iconHow to Automatically Configure a Slave KDC
automating principal creation, index iconAutomating the Creation of New Kerberos Principals
auxprop_login option, SASL and, index iconSASL Options