Securing Users and Processes in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

U

–u option
auths commandindex iconListing Authorizations
roleadd commandindex iconCreating and Assigning a Role to Administer Cryptographic Services
usermod commandindex iconCreating and Assigning a Role to Administer Cryptographic Services
–U option
list_devices commandindex iconCommands and Associated Authorizations
user procedures
assuming a roleindex iconAssuming an ARMOR Role
protecting own files from application accessindex iconUsers Locking Down the Applications That They Run
using an assigned roleindex iconAssuming an ARMOR Role
using extended privilegesindex iconUsers Locking Down the Applications That They Run
user_attr database
index iconuser_attr Database
index iconRights Databases
useradd command
authorizations required forindex iconCommands and Associated Authorizations
descriptionindex iconRights Administration Commands
example of usingindex iconCreating a Login for a Trusted User
userattr command
descriptionindex iconRights Administration Commands
use
index iconHow to Troubleshoot Rights Assignments
index iconPreventing the root Role From Being Used to Maintain a System
index iconRemoving Privileges From a User's Limit Set
userdel command
authorizations required forindex iconCommands and Associated Authorizations
descriptionindex iconRights Administration Commands
usermod command
authorizations required forindex iconCommands and Associated Authorizations
descriptionindex iconRights Administration Commands
using to assign roleindex iconCreating a Role
users
assigning
authenticated rights profilesindex iconRequiring a User to Type Password Before Administering DHCP
privileges toindex iconAssigning Privileges Directly to a User
rightsindex iconAssigning Rights to Users
rights defaultsindex iconpolicy.conf File
rights profilesindex iconCreating a User Who Can Administer DHCP
authenticating to rights profile
index iconAssigning Rights Profiles in a Specific Order
index iconModifying a Rights Profile to Enable a User to Use Own Password for Role Password
authenticating to role
index iconHow to Reorder Assigned Rights
index iconEnabling a User to Use Own Password for Role Password
basic privilege setindex iconHow Privileges Are Implemented
creating root userindex iconHow to Change the root Role Into a User
creating with useradd commandindex iconCreating a Role
determining hosts where attributes are validindex iconListing Qualified Attributes
determining if running a profile shellindex iconDetermining Whether You Are Using a Profile Shell
determining own privileged commandsindex iconListing Privileges
expanding rightsindex iconExpanding Users' Rights
guest restrictionsindex iconPreventing Guests From Spawning Editor Subprocesses
initial inheritable privilegesindex iconHow Privileges Are Implemented
protecting their files from access by applicationsindex iconUsers Locking Down the Applications That They Run
protecting their files from web application accessindex iconUsers Locking Down the Applications That They Run
removing rightsindex iconRestricting Users' Rights
troubleshooting running privileged commandsindex iconHow to Troubleshoot Rights Assignments
using rights profile
index iconAssigning Rights Profiles in a Specific Order
index iconModifying a Rights Profile to Enable a User to Use Own Password for Role Password
using
truss commandindex iconUsing the truss Command to Examine Privilege Use
auths commandindex iconHow to Create an Authorization
getent command
index iconListing Privileges
index iconListing the Contents of the Rights Profiles Database
index iconListing the Content of the Authorizations Database
index iconChanging the root User Into the root Role
ipadm set-prop commandindex iconHow to Lock Down the MySQL Service
ppriv command
index iconListing the Privileges in Your Current Shell
index iconListing the Privileges in Your Current Shell
profiles command
index iconModifying a Rights Profile to Enable a User to Use Own Password for Role Password
index iconCreating and Assigning a Role to Administer Cryptographic Services
rights defaultsindex iconListing Rights and Their Definitions
rolemod commandindex iconAssigning Privileges Directly to a Role
roles commandindex iconListing Your Assigned Roles
sudo commandindex iconDeciding Which Rights Model to Use for Administration
svccfg command
index iconHow to Troubleshoot Rights Assignments
index iconHow to Lock Down the MySQL Service
index iconHow to Apply Extended Privilege Policy to a Port
usermod commandindex iconAssigning Privileges Directly to a User
your assigned administrative rightsindex iconUsing Your Assigned Administrative Rights