R
- –R option
- dhcpconfig commandRequiring a User to Type Password Before Administering DHCP
- rolemod commandChanging the root User Into the root Role
- useradd command
- Rights Administration Commands
- Creating a Login for a Trusted User
- Creating a Login for a Trusted User
- usermod command
- Caching Authentication for Ease of Role Use
- Adding a Role to a User
- Creating and Assigning a Role to Administer Cryptographic Services
- –r option
- logins commandListing Roles
- ppriv command
- Commands for Handling Privileges
- Protecting Directories on Your System From Application Processes
- Users Locking Down the Applications That They Run
- removing
- basic privileges from a rights profileRemoving a Basic Privilege From a Rights Profile
- basic privilege from application
- Users Locking Down the Applications That They Run
- How to Lock Down the MySQL Service
- basic privilege from rights profileRemoving a Basic Privilege From a Rights Profile
- basic privilege from yourselfRemoving a Basic Privilege From Yourself
- limit privilege from userRemoving Privileges From a User's Limit Set
- role assignmentsHow to Change the root Role Into a User
- users' rightsRestricting Users' Rights
- replacing
- keyword values
- Requiring a User to Type Password Before Administering DHCP
- Modifying a Role's Rights
- root role with root userHow to Change the root Role Into a User
- root user with root roleChanging the root User Into the root Role
- superuser with rolesFollowing Your Chosen Rights Model
- resource controls
- privileges, andPrivileges and Resource Management
- project.max-locked-memoryPrivileges and Resource Management
- zone.max-locked-memoryPrivileges and Resource Management
- restricted files
- enabling read access toEnabling a Trusted User to Read Extended Accounting Files
- enabling write access to
- Cloning and Enhancing the Network IPsec Management Rights Profile
- Editing a System File
- restricting
- access to computer by time and dayBasics of User and Process Rights
- database privilegesHow to Lock Down the MySQL Service
- editor of guest userPreventing Guests From Spawning Editor Subprocesses
- guest access to systemAssigning the Editor Restrictions Rights Profile to All Users
- port privilegesHow to Apply Extended Privilege Policy to a Port
- rights in a rights profile
- Creating a Sun Ray Users Rights Profile
- Removing a Basic Privilege From a Rights Profile
- web server privilegesHow to Assign Specific Privileges to the Apache Web Server
- restrictive security policy
- components ofBasics of User and Process Rights
- creatingRestricting Users' Rights
- enforcingLocking Down Resources by Using Extended Privileges
- rights See alsoauthorizations, privileges, rights profiles, roles
- access_times keywordBasics of User and Process Rights
- access_tz keywordBasics of User and Process Rights
- adding privileged usersCreating a User Who Can Administer DHCP
- administration commandsCommands That Manage Authorizations, Rights Profiles, and Roles
- assigningExpanding Users' Rights
- authenticated rights profilesRequiring a User to Type Password Before Administering DHCP
- to restrict usersRestricting Users' Rights
- to usersAssigning Rights to Users
- auditing use ofAuditing Administrative Actions
- authorization databaseauth_attr Database
- authorizationsMore About User Authorizations
- basic conceptsBasics of User and Process Rights
- changing role passwords
- Changing a Role Password
- Creating a Role
- checking for
- Applications That Check UIDs and GIDs
- Rights Verification
- checking scripts or programs for authorizationsChecking for Authorizations in a Script or Program
- commands forCommands for Administering Rights
- commands for managingCommands That Manage Authorizations, Rights Profiles, and Roles
- compared to superuser modelUser and Process Rights Provide an Alternative to the Superuser Model
- configuring
- Restricting Users' Rights
- Expanding Users' Rights
- considerations when directly assigningConsiderations When Assigning Rights
- creating authorizationsHow to Create an Authorization
- creating rights profilesCreating Rights Profiles and Authorizations
- databasesRights Databases
- defaultsListing Rights and Their Definitions
- elementsBasics of User and Process Rights
- expanding usersExpanding Users' Rights
- gaining administrativeUsing Your Assigned Administrative Rights
- listing allListing Rights and Their Definitions
- modifying rolesCreating a Role
- naming services andRights Databases and the Naming Services
- Network Security rights profileExample of a User Rights and Process Rights Assignment
- new features in this releaseWhat's New in Rights in Oracle Solaris 11.2
- order of searchOrder of Search for Assigned Rights
- planning use ofFollowing Your Chosen Rights Model
- privileges on commandsApplications That Check for Privileges
- profile shellsProfile Shells and Rights Verification
- reading exacct network files
- Enabling a Trusted User to Read Extended Accounting Files
- Enabling a Trusted User to Read Extended Accounting Files
- recommended rolesUser and Process Rights Provide an Alternative to the Superuser Model
- removing from usersRestricting Users' Rights
- restricting administrator to explicitly assignedRestricting an Administrator to Explicitly Assigned Rights
- restricting rightsRestricting an Administrator to Explicitly Assigned Rights
- restricting users to specific times of accessBasics of User and Process Rights
- restricting users'Restricting Users' Rights
- rights profile databaseprof_attr Database
- rights profilesMore About Rights Profiles
- search orderOrder of Search for Assigned Rights
- securing scriptsAssigning Rights to Applications and Scripts
- security considerations when assigningSecurity Considerations When Assigning Rights
- special ID on commandsApplications That Check UIDs and GIDs
- troubleshootingHow to Troubleshoot Rights Assignments
- usability considerations when assigningUsability Considerations When Assigning Rights
- using user password to assume role
- How to Reorder Assigned Rights
- Enabling a User to Use Own Password for Role Password
- viewing allListing Rights and Their Definitions
- viewing yourListing Rights and Their Definitions
- rights management Seeprivileges, rights
- rights profiles
- adding privileges to commandCreating a Rights Profile That Includes Privileged Commands
- adding solaris.admin.edit authorizationCloning and Enhancing the Network IPsec Management Rights Profile
- AllRights Profiles Reference
- assigning
- to usersCreating a User Who Can Administer DHCP
- assigning to trusted usersDistribution of Rights
- authenticating with user's password
- Assigning Rights Profiles in a Specific Order
- Modifying a Rights Profile to Enable a User to Use Own Password for Role Password
- Basic Solaris UserRights Profiles Reference
- changing contents ofCreating Rights Profiles and Authorizations
- cloning contents ofHow to Clone and Modify a System Rights Profile
- compared to rolesMore About Roles
- Console User
- Rights Profiles Reference
- Order of Search for Assigned Rights
- contents of typicalRights Profiles Reference
- creatingHow to Create a Rights Profile
- creating for Sun Ray usersCreating a Sun Ray Users Rights Profile
- databases Seeexec_attr database, prof_attr database
- description
- More About Rights Profiles
- Basics of User and Process Rights
- Extended Accounting Net ManagementEnabling a Trusted User to Read Extended Accounting Files
- first in listAdding a Rights Profile as the Role's First Rights Profile
- major rights profiles descriptionsRights Profiles Reference
- modifyingCreating Rights Profiles and Authorizations
- Network IPsec ManagementCloning and Enhancing the Network IPsec Management Rights Profile
- Object Access ManagementHow Processes Get Privileges
- OperatorRights Profiles Reference
- order of searchOrder of Search for Assigned Rights
- preventing privilege escalation
- Privilege Escalation and User Rights
- Distribution of Rights
- Printer ManagementRights Profiles Reference
- removing authorizationsCloning and Removing Selected Rights From a Rights Profile
- restricting basic privilegesRemoving a Basic Privilege From a Rights Profile
- restricting rights of all users of a systemModifying a System to Limit the Rights Available to Its Users
- Stop
- Rights Profiles Reference
- Order of Search for Assigned Rights
- System AdministratorRights Profiles Reference
- troubleshootingHow to Troubleshoot Rights Assignments
- viewing contentsViewing the Contents of Rights Profiles
- VSCAN ManagementCloning and Removing Selected Rights From a Rights Profile
- role-based access control (RBAC) Seerights
- roleadd command
- authorizations required forCommands and Associated Authorizations
- description
- Rights Administration Commands
- Rights Administration Commands
- example of usingCreating and Assigning a Role to Administer Cryptographic Services
- roleauth keyword
- example of using
- Changing the Value of roleauth for a Role in the LDAP Repository
- Enabling a User to Use Own Password for Role Password
- Enabling Users to Use Own Password for Role Password
- passwords for roles
- How to Reorder Assigned Rights
- Enabling a User to Use Own Password for Role Password
- useCaching Authentication for Ease of Role Use
- roledel command
- authorizations required forCommands and Associated Authorizations
- example of usingDeleting a Role
- rolemod command
- authorizations required forCommands and Associated Authorizations
- changing rights of roleReplacing a Local Role's Assigned Profiles
- descriptionRights Administration Commands
- example of using
- Enabling a User to Use Own Password for Role Password
- Enabling Users to Use Own Password for Role Password
- passwords for roles
- How to Reorder Assigned Rights
- Enabling a User to Use Own Password for Role Password
- roles
- ARMORUser and Process Rights Provide an Alternative to the Superuser Model
- assigning
- privileges toAssigning Privileges Directly to a Role
- rightsAssigning Rights to Users
- with usermod commandCreating a Role
- assuming
- after loginMore About Roles
- ARMORAssuming an ARMOR Role
- in a terminal window
- Assuming an ARMOR Role
- Profile Shells and Rights Verification
- root roleAssuming the root Role
- to use assigned rightsUsing Your Assigned Administrative Rights
- auditingAuditing Administrative Actions
- authenticating with user's password
- How to Reorder Assigned Rights
- Enabling a User to Use Own Password for Role Password
- changing password of
- Changing a Role Password
- Creating a Role
- changing properties ofCreating a Role
- compared to rights profilesMore About Roles
- creatingAssigning Rights to Users
- creating ARMORUsing ARMOR Roles
- deletingDeleting a Role
- descriptionMore About Roles
- determining directly assigned privilegesAdding to a Role's Basic Privileges
- determining role's privileged commandsDetermining the Privileged Commands of a Role
- listing local roles
- Rights Administration Commands
- Assuming an ARMOR Role
- making root role into userChanging Whether root Is a User or a Role
- modifyingCreating a Role
- planning predefinedFollowing Your Chosen Rights Model
- predefined
- Using ARMOR Roles
- User and Process Rights Provide an Alternative to the Superuser Model
- removing assignment from usersHow to Change the root Role Into a User
- separation of duty
- Using Two Roles to Configure Auditing
- Creating Roles for Separation of Duty
- summaryBasics of User and Process Rights
- use in user rights assignmentUser and Process Rights Provide an Alternative to the Superuser Model
- using an assigned roleAssuming an ARMOR Role
- using user password
- Modifying a Rights Profile to Enable a User to Use Own Password for Role Password
- Example of a User Rights and Process Rights Assignment
- roles command
- descriptionRights Administration Commands
- usingAssuming an ARMOR Role
- roles keyword
- listingListing Roles
- root role
- assuming roleAssuming the root Role
- changing from root userChanging the root User Into the root Role
- changing to root userChanging Whether root Is a User or a Role
- created at installationDistribution of Rights
- descriptionDistribution of Rights
- secure remote loginChanging Whether root Is a User or a Role
- troubleshootingPreventing the root Role From Being Used to Maintain a System
- root user
- changing into root roleChanging the root User Into the root Role
- replacing in rights modelMore About Roles