oracle home
Securing Users and Processes in Oracle
®
Solaris 11.2
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
» ...
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Securing Users and Processes in ...
»
Index U
Updated: July 2014
Securing Users and Processes in Oracle
®
Solaris 11.2
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 About Using Rights to Control Users and Processes
What's New in Rights in Oracle Solaris 11.2
User Rights Management
User and Process Rights Provide an Alternative to the Superuser Model
Basics of User and Process Rights
More About User Rights
More About User Authorizations
More About Rights Profiles
More About Roles
Process Rights Management
Privileges Protecting Kernel Processes
Privilege Descriptions
Administrative Differences on a System With Privileges
More About Privileges
How Privileges Are Implemented
How Privileges Are Used
How Processes Get Privileges
Privileges and Devices
Privileges and Resource Management
Legacy Applications and the Use of Privileges
Debugging Use of Privilege
Privilege Assignment
Assigning Privileges to Users and Processes
Expanding a User or Role's Privileges
Restricting Privileges for a User or Role
Assigning Privileges to a Script
Using Extended Privilege Policy to Restrict Privilege Use
Privilege Escalation and User Rights
Privilege Escalation and Kernel Privileges
Rights Verification
Profile Shells and Rights Verification
Name Service Scope and Rights Verification
Order of Search for Assigned Rights
Applications That Check for Rights
Applications That Check UIDs and GIDs
Applications That Check for Privileges
Applications That Check Authorizations
Considerations When Assigning Rights
Security Considerations When Assigning Rights
Usability Considerations When Assigning Rights
Chapter 2 Planning Your Administrative Rights Configuration
Deciding Which Rights Model to Use for Administration
Following Your Chosen Rights Model
Chapter 3 Assigning Rights in Oracle Solaris
Assigning Rights to Users
Who Can Assign Rights
Assigning Rights to Users and Roles
Creating a Role
Creating a Login for a Trusted User
Modifying a User's Rights
Modifying a Role's Rights
Enabling Users to Use Own Password for Role Password
Changing a Role Password
Deleting a Role
Expanding Users' Rights
Restricting Users' Rights
Chapter 4 Assigning Rights to Applications, Scripts, and Resources
Limiting Applications, Scripts, and Resources to Specific Rights
Assigning Rights to Applications and Scripts
How to Run a Shell Script With Privileged Commands
Locking Down Resources by Using Extended Privileges
How to Apply Extended Privilege Policy to a Port
How to Lock Down the MySQL Service
How to Assign Specific Privileges to the Apache Web Server
How to Determine Which Privileges the Apache Web Server Is Using
Users Locking Down the Applications That They Run
Chapter 5 Managing the Use of Rights
Managing the Use of Rights
Using Your Assigned Administrative Rights
Auditing Administrative Actions
Creating Rights Profiles and Authorizations
How to Create a Rights Profile
How to Clone and Modify a System Rights Profile
How to Create an Authorization
Changing Whether root Is a User or a Role
How to Change the root Role Into a User
Chapter 6 Listing Rights in Oracle Solaris
Listing Rights and Their Definitions
Listing Authorizations
Listing Rights Profiles
Listing Roles
Listing Privileges
Listing Qualified Attributes
Chapter 7 Troubleshooting Rights in Oracle Solaris
Troubleshooting Rights
How to Troubleshoot Rights Assignments
How to Reorder Assigned Rights
How to Determine Which Privileges a Program Requires
Chapter 8 Reference for Oracle Solaris Rights
Rights Profiles Reference
Viewing the Contents of Rights Profiles
Authorizations Reference
Authorization Naming Conventions
Delegation Authority in Authorizations
Rights Databases
Rights Databases and the Naming Services
user_attr Database
auth_attr Database
prof_attr Database
exec_attr Database
policy.conf File
Commands for Administering Rights
Commands That Manage Authorizations, Rights Profiles, and Roles
Selected Commands That Require Authorizations
Privileges Reference
Commands for Handling Privileges
Files That Contain Privilege Information
Privileged Actions in the Audit Record
Security Glossary
Index
Index Numbers and Symbols
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index Q
Index R
Index S
Index T
Index U
Index V
Index W
Index X
Index Z
Language:
English
U
–u
option
auths
command
Listing Authorizations
roleadd
command
Creating and Assigning a Role to Administer Cryptographic Services
usermod
command
Creating and Assigning a Role to Administer Cryptographic Services
–U
option
list_devices
command
Commands and Associated Authorizations
user procedures
assuming a role
Assuming an ARMOR Role
protecting own files from application access
Users Locking Down the Applications That They Run
using an assigned role
Assuming an ARMOR Role
using extended privileges
Users Locking Down the Applications That They Run
user_attr
database
user_attr Database
Rights Databases
useradd
command
authorizations required for
Commands and Associated Authorizations
description
Rights Administration Commands
example of using
Creating a Login for a Trusted User
userattr
command
description
Rights Administration Commands
use
How to Troubleshoot Rights Assignments
Preventing the root Role From Being Used to Maintain a System
Removing Privileges From a User's Limit Set
userdel
command
authorizations required for
Commands and Associated Authorizations
description
Rights Administration Commands
usermod
command
authorizations required for
Commands and Associated Authorizations
description
Rights Administration Commands
using to assign role
Creating a Role
users
assigning
authenticated rights profiles
Requiring a User to Type Password Before Administering DHCP
privileges to
Assigning Privileges Directly to a User
rights
Assigning Rights to Users
rights defaults
policy.conf File
rights profiles
Creating a User Who Can Administer DHCP
authenticating to rights profile
Assigning Rights Profiles in a Specific Order
Modifying a Rights Profile to Enable a User to Use Own Password for Role Password
authenticating to role
How to Reorder Assigned Rights
Enabling a User to Use Own Password for Role Password
basic privilege set
How Privileges Are Implemented
creating
root
user
How to Change the root Role Into a User
creating with
useradd
command
Creating a Role
determining hosts where attributes are valid
Listing Qualified Attributes
determining if running a profile shell
Determining Whether You Are Using a Profile Shell
determining own privileged commands
Listing Privileges
expanding rights
Expanding Users' Rights
guest restrictions
Preventing Guests From Spawning Editor Subprocesses
initial inheritable privileges
How Privileges Are Implemented
protecting their files from access by applications
Users Locking Down the Applications That They Run
protecting their files from web application access
Users Locking Down the Applications That They Run
removing rights
Restricting Users' Rights
troubleshooting running privileged commands
How to Troubleshoot Rights Assignments
using rights profile
Assigning Rights Profiles in a Specific Order
Modifying a Rights Profile to Enable a User to Use Own Password for Role Password
using
truss
command
Using the truss Command to Examine Privilege Use
auths
command
How to Create an Authorization
getent
command
Listing Privileges
Listing the Contents of the Rights Profiles Database
Listing the Content of the Authorizations Database
Changing the root User Into the root Role
ipadm set-prop
command
How to Lock Down the MySQL Service
ppriv
command
Listing the Privileges in Your Current Shell
Listing the Privileges in Your Current Shell
profiles
command
Modifying a Rights Profile to Enable a User to Use Own Password for Role Password
Creating and Assigning a Role to Administer Cryptographic Services
rights defaults
Listing Rights and Their Definitions
rolemod
command
Assigning Privileges Directly to a Role
roles
command
Listing Your Assigned Roles
sudo
command
Deciding Which Rights Model to Use for Administration
svccfg
command
How to Troubleshoot Rights Assignments
How to Lock Down the MySQL Service
How to Apply Extended Privilege Policy to a Port
usermod
command
Assigning Privileges Directly to a User
your assigned administrative rights
Using Your Assigned Administrative Rights
Previous
Next