Securing Users and Processes in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

C

–c option
roleadd commandindex iconCreating a Role
capabilities  Seeindex iconrights
cdrw command
authorizations required forindex iconCommands and Associated Authorizations
changing
password of role
index iconChanging a Role Password
index iconCreating a Role
rights
of a portindex iconHow to Apply Extended Privilege Policy to a Port
of a scriptindex iconHow to Run a Shell Script With Privileged Commands
of a web serverindex iconHow to Assign Specific Privileges to the Apache Web Server
of an applicationindex iconAssigning Rights to Applications and Scripts
of an editorindex iconPreventing Guests From Spawning Editor Subprocesses
of Firefoxindex iconUsers Locking Down the Applications That They Run
of roleindex iconCreating a Role
to MySQL databaseindex iconHow to Lock Down the MySQL Service
rights profile contentsindex iconCreating Rights Profiles and Authorizations
root role into userindex iconChanging Whether root Is a User or a Role
cloning
rights profile contentsindex iconHow to Clone and Modify a System Rights Profile
commands
determining user's privileged commandsindex iconListing Privileges
determining user's qualified attributesindex iconListing Qualified Attributes
for administering privilegesindex iconCommands for Handling Privileges
rights administration commandsindex iconCommands That Manage Authorizations, Rights Profiles, and Roles
that assign privilegesindex iconAssigning Privileges to Users and Processes
that check for privilegesindex iconApplications That Check for Privileges
components
rights management, ofindex iconBasics of User and Process Rights
configuration files
policy.conf fileindex iconRights Administration Commands
syslog.conf fileindex iconFiles That Contain Privilege Information
with privilege informationindex iconFiles That Contain Privilege Information
configuring
authorizationsindex iconHow to Create an Authorization
privileged usersindex iconCreating a User Who Can Administer DHCP
protected databaseindex iconHow to Lock Down the MySQL Service
protected portindex iconHow to Apply Extended Privilege Policy to a Port
protected web serverindex iconHow to Assign Specific Privileges to the Apache Web Server
protection of user files from applicationsindex iconUsers Locking Down the Applications That They Run
restricted usersindex iconRestricting Users' Rights
rights
index iconRestricting Users' Rights
index iconExpanding Users' Rights
index iconFollowing Your Chosen Rights Model
rights profilesindex iconCreating Rights Profiles and Authorizations
roles
index iconCreating a Role
index iconAssigning Rights to Users
root role as userindex iconChanging Whether root Is a User or a Role
trusted usersindex iconCreating a Role
Console User rights profileindex iconRights Profiles Reference
CONSOLE_USER keyword
policy.conf fileindex iconpolicy.conf File
creating
ARMOR rolesindex iconUsing ARMOR Roles
authorizationindex iconHow to Create an Authorization
privileged usersindex iconCreating a User Who Can Administer DHCP
rights profilesindex iconCreating Rights Profiles and Authorizations
rolesindex iconAssigning Rights to Users
root userindex iconHow to Change the root Role Into a User
crontab files
authorizations required forindex iconCommands and Associated Authorizations
Crypto Management rights profile
using in a roleindex iconCreating and Assigning a Role to Administer Cryptographic Services
Cryptographic Framework
administering with roleindex iconCreating and Assigning a Role to Administer Cryptographic Services
curly braces ({})
extended privileges syntax
index iconHow to Lock Down the MySQL Service
index iconHow to Apply Extended Privilege Policy to a Port
index iconEnabling a Non-root Account to Read a root-Owned File
index iconEnabling a Trusted User to Read Extended Accounting Files