Securing Users and Processes in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

P

–P option
rolemod command
index iconRestricting an Administrator to Explicitly Assigned Rights
index iconReplacing a Local Role's Assigned Profiles
useradd commandindex iconCreating a User Who Can Administer DHCP
–p option
add_drv commandindex iconCommands for Handling Privileges
ipadm set-prop commandindex iconHow to Lock Down the MySQL Service
profiles command
index iconViewing the Contents of Rights Profiles
index iconListing Rights Profiles
index iconCloning and Removing Selected Rights From a Rights Profile
index iconHow to Create a Rights Profile
index iconHow to Assign Specific Privileges to the Apache Web Server
index iconHow to Lock Down the MySQL Service
index iconPreventing Guests From Spawning Editor Subprocesses
index iconEnabling a Non-root Account to Read a root-Owned File
index iconModifying a Rights Profile to Enable a User to Use Own Password for Role Password
–P option
roleadd commandindex iconCaching Authentication for Ease of Role Use
rolemod commandindex iconAssigning Rights Profiles in a Specific Order
–p option
update_drv commandindex iconCommands for Handling Privileges
packages
ARMORindex iconUsing ARMOR Roles
MySQLindex iconHow to Lock Down the MySQL Service
PAM
adding su stack to configuration fileindex iconCaching Authentication for Ease of Role Use
modulesindex iconCaching Authentication for Ease of Role Use
stack to cache authenticationindex iconCaching Authentication for Ease of Role Use
time-sensitive user access
index iconuser_attr Database
index iconBasics of User and Process Rights
pam_roles moduleindex iconRights Administration Commands
pam_tty_tickets moduleindex iconCaching Authentication for Ease of Role Use
pam_unix_account moduleindex iconRights Administration Commands
passwd command
changing password of role
index iconChanging a Role Password
index iconCreating a Role
passwords
changing role password
index iconChanging a Role Password
index iconCreating a Role
using user's to assume role
index iconHow to Reorder Assigned Rights
index iconEnabling a User to Use Own Password for Role Password
Perl scripts
for extended accountingindex iconEnabling a Trusted User to Read Extended Accounting Files
permissive security policy
components ofindex iconBasics of User and Process Rights
creatingindex iconExpanding Users' Rights
permitted privilege setindex iconHow Privileges Are Implemented
pfbash commandindex iconRights Administration Commands
pfedit command
index iconRights Administration Commands
index iconEditing a System File
pfexec command
index iconRights Administration Commands
index iconUsing Your Assigned Administrative Rights
planning
ARMOR role useindex iconFollowing Your Chosen Rights Model
rights model useindex iconFollowing Your Chosen Rights Model
use of rightsindex iconFollowing Your Chosen Rights Model
plus sign ()
keyword modifierindex iconModifying a Role's Rights
policy.conf file
descriptionindex iconpolicy.conf File
keywords
for authenticated rights profilesindex iconpolicy.conf File
for authorizationsindex iconpolicy.conf File
for privileges
index iconFiles That Contain Privilege Information
index iconpolicy.conf File
for rights profilesindex iconpolicy.conf File
for workstation ownerindex iconpolicy.conf File
ports
protecting with extended privilegesindex iconHow to Apply Extended Privilege Policy to a Port
powers  Seeindex iconrights
ppriv command
index iconCommands for Handling Privileges
index iconListing the Privileges in Your Current Shell
index iconListing Privileges
predefined roles
ARMOR standard
index iconUsing ARMOR Roles
index iconUser and Process Rights Provide an Alternative to the Superuser Model
planning use ofindex iconFollowing Your Chosen Rights Model
principle of least privilegeindex iconPrivileges Protecting Kernel Processes
Printer Management rights profileindex iconRights Profiles Reference
priv.debug entry
syslog.conf fileindex iconFiles That Contain Privilege Information
PRIV_DEFAULT keyword
policy.conf fileindex iconpolicy.conf File
PRIV_LIMIT keyword
policy.conf file
index iconFiles That Contain Privilege Information
index iconpolicy.conf File
PRIV_PFEXEC flagindex iconDetermining Whether You Are Using a Profile Shell
PRIV_PROC_LOCK_MEMORY privilegeindex iconPrivileges and Resource Management
PRIV_XPOLICY flagindex iconHow to Lock Down the MySQL Service
privilege checkingindex iconApplications That Check for Privileges
privilege sets
adding privileges to
index iconAssigning Privileges Directly to a User
index iconAssigning Privileges Directly to a Role
index iconExpanding a User or Role's Privileges
basic
index iconHow to Troubleshoot Rights Assignments
index iconListing the Basic Privileges and Their Definitions
index iconHow Privileges Are Implemented
effectiveindex iconHow Privileges Are Implemented
inheritableindex iconHow Privileges Are Implemented
limit
index iconHow to Troubleshoot Rights Assignments
index iconHow Privileges Are Implemented
listing
index iconListing Privileges That Are Used in Privilege Assignment
index iconHow Privileges Are Implemented
permittedindex iconHow Privileges Are Implemented
removing privileges from
index iconCreating a Sun Ray Users Rights Profile
index iconRemoving a Basic Privilege From Yourself
index iconRemoving a Basic Privilege From a Rights Profile
index iconUsing Extended Privilege Policy to Restrict Privilege Use
index iconRestricting Privileges for a User or Role
privileged application
authorization checkingindex iconApplications That Check Authorizations
checking for security attributesindex iconApplications That Check for Rights
descriptionindex iconBasics of User and Process Rights
ID checkingindex iconApplications That Check UIDs and GIDs
privilege checkingindex iconApplications That Check for Privileges
privileged users  Seeindex icontrusted users
privileges
adding to command in rights profileindex iconCreating a Rights Profile That Includes Privileged Commands
assigning
to a commandindex iconAssigning Privileges to Users and Processes
to a scriptindex iconAssigning Privileges to a Script
to a userindex iconAssigning Privileges to Users and Processes
to Apache Web Serverindex iconHow to Assign Specific Privileges to the Apache Web Server
to MySQL databaseindex iconHow to Lock Down the MySQL Service
to roleindex iconAssigning Privileges Directly to a Role
to userindex iconAssigning Privileges Directly to a User
auditing andindex iconPrivileged Actions in the Audit Record
categoriesindex iconPrivilege Descriptions
checking in applicationsindex iconApplications That Check for Privileges
commandsindex iconCommands for Handling Privileges
compared to authorizations
index iconMore About User Authorizations
index iconBasics of User and Process Rights
compared to superuser modelindex iconProcess Rights Management
debugging
index iconFiles That Contain Privilege Information
index iconDebugging Use of Privilege
description
index iconPrivilege Descriptions
index iconPrivilege Descriptions
index iconBasics of User and Process Rights
devices andindex iconPrivileges and Devices
differences from superuser modelindex iconAdministrative Differences on a System With Privileges
escalation prevention at user levelindex iconPrivilege Escalation and User Rights
escalation prevention in kernelindex iconPrivilege Escalation and Kernel Privileges
expanding user or role'sindex iconExpanding a User or Role's Privileges
extended privilege policy
index iconUsing Extended Privilege Policy to Restrict Privilege Use
index iconExpanding a User or Role's Privileges
filesindex iconFiles That Contain Privilege Information
finding missingindex iconUsing the ppriv Command to Examine Privilege Use in a Profile Shell
implemented in setsindex iconHow Privileges Are Implemented
inherited by processesindex iconHow Processes Get Privileges
legacy applications and
index iconAssigning Security Attributes to a Legacy Application
index iconLegacy Applications and the Use of Privileges
listing on a processindex iconListing the Privileges in Your Current Shell
PRIV_PROC_LOCK_MEMORYindex iconPrivileges and Resource Management
processes with assigned privilegesindex iconHow Processes Get Privileges
programs aware of privilegesindex iconHow Processes Get Privileges
protecting kernel processesindex iconPrivileges Protecting Kernel Processes
removing
basic privilegeindex iconRemoving a Basic Privilege From a Rights Profile
basic privilege from your processindex iconRemoving a Basic Privilege From Yourself
from a rights profileindex iconRemoving a Basic Privilege From a Rights Profile
from a userindex iconRestricting Privileges for a User or Role
from a user's limit setindex iconRemoving Privileges From a User's Limit Set
from yourselfindex iconRemoving a Basic Privilege From Yourself
troubleshooting
lack ofindex iconHow to Determine Which Privileges a Program Requires
user assignmentindex iconHow to Troubleshoot Rights Assignments
using in shell scriptindex iconHow to Run a Shell Script With Privileged Commands
privileges keyword
listingindex iconListing Privileges
PROC privileges
descriptionindex iconPrivilege Descriptions
proc_ownerindex iconPrivileges and Devices
process privilegesindex iconPrivilege Descriptions
process rights management  Seeindex iconprivileges, rights
prof_attr databaseindex iconprof_attr Database
summaryindex iconRights Databases
profile shells
descriptionindex iconProfile Shells and Rights Verification
determining if PRIV_PFEXEC flag is setindex iconDetermining Whether You Are Using a Profile Shell
openingindex iconUsing Your Assigned Administrative Rights
reading exacct network filesindex iconEnabling a Trusted User to Read Extended Accounting Files
restricting rightsindex iconRestricting an Administrator to Explicitly Assigned Rights
profiles  Seeindex iconrights profiles
profiles command
creating rights profilesindex iconHow to Create a Rights Profile
descriptionindex iconRights Administration Commands
listing user's authenticated rights profilesindex iconListing Rights Profiles
listing user's rights profilesindex iconListing Rights and Their Definitions
useindex iconListing Rights Profiles
profiles keyword
descriptionindex iconuser_attr Database
listingindex iconListing Rights Profiles
PROFS_GRANTED keyword
policy.conf fileindex iconpolicy.conf File
programs  Seeindex iconapplications
project.max-locked-memory resource controlindex iconPrivileges and Resource Management