U
- -U option
- allocate command,
Device Allocation Commands
- list_devices command,
Device Allocation Commands
- uauth audit token
Solaris Auditing Enhancements in the Solaris 10 Release
uauth Token
- UDP
- addresses,
iport Token
- port forwarding and,
How to Configure Port Forwarding in Solaris Secure Shell
- Solaris Secure Shell and,
How to Configure Port Forwarding in Solaris Secure Shell
- using for remote audit logs,
Audit Logs
- uid_aliases file (ASET)
The uid_aliases File
Specifying an Aliases File: UID_ALIASES
- UID_ALIASES variable (ASET)
The uid_aliases File
Specifying an Aliases File: UID_ALIASES
UID_ALIASES Environment Variable
- umask value
- and file creation,
Default umask Value
- typical settings,
Default umask Value
- umount command, with security attributes,
How to Authorize Users to Allocate a Device
- uninstalling, cryptographic providers,
How to Prevent the Use of a User-Level Mechanism
- UNIX file permissions, See files, permissions
- unmounting, allocated devices,
How to Deallocate a Device
- update_drv command
- description,
Device Policy Commands
- using,
How to Change the Device Policy on an Existing Device
- updating, audit service,
How to Update the Audit Service
- upriv audit token,
upriv Token
- URL for online help, Graphical Kerberos Tool,
Online Help URL in the Graphical Kerberos Administration Tool
- use_authid option, SASL and,
SASL Options
- UseLogin keyword, sshd_config file,
Keywords in Solaris Secure Shell
- UseOpenSSLEngine keyword, Solaris Secure Shell,
Keywords in Solaris Secure Shell
- UsePrivilegedPort keyword, Solaris Secure Shell,
Keywords in Solaris Secure Shell
- user accounts
- See also users
- ASET check,
User and Group Checks
- displaying login status
How to Display a User's Login Status
How to Display a User's Login Status
- User Accounts tool, description,
How to Change the RBAC Properties of a User
- user ACL entries
- default entries for directories,
ACL Entries for UFS Directories
- description,
ACL Entries for UFS Files
- setting,
How to Add ACL Entries to a File
- user administration audit class,
Definitions of Audit Classes
- user_attr database
- defaultpriv keyword,
Files With Privilege Information
- description
Databases That Support RBAC
user_attr Database
- limitpriv keyword,
Files With Privilege Information
- privs keyword,
Files With Privilege Information
- RBAC relationships,
RBAC Database Relationships
- user audit fields, audit_user database,
audit_user Database
- user classes of files,
File and Directory Ownership
- user database (RBAC), See user_attr database
- user ID
- audit ID and
What Is Auditing?
Proscess Audit Characteristics
- in NFS services,
How to Create a Credential Table
- User keyword, ssh_config file,
Keywords in Solaris Secure Shell
- user principal, description,
Kerberos Principals
- user procedures
- allocating devices,
Allocating Devices (Task Map)
- assuming a role
Configuring RBAC
Using Roles (Task Map)
- chkey command,
How to Set Up a Diffie-Hellman Key for an NIS User
- computing digest of a file,
How to Compute a Digest of a File
- computing MAC of a file,
How to Compute a MAC of a File
- creating self-signed certificate,
How to Create a Certificate by Using the pktool gencert Command
- decrypting files,
How to Encrypt and Decrypt a File
- encrypting files,
Protecting Files With the Oracle Solaris Cryptographic Framework (Task Map)
- encrypting NIS user's private key,
How to Set Up a Diffie-Hellman Key for an NIS User
- exporting certificates,
How to Export a Certificate and Private Key in PKCS #12 Format
- generating a symmetric key
- using the dd command,
How to Generate a Symmetric Key by Using the dd Command
- using the pktool command,
How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore,
How to Generate a Passphrase by Using the pktool setpin Command
- importing certificates,
How to Import a Certificate Into Your Keystore
- protecting files,
Protecting Files With UNIX Permissions (Task Map)
- using ACLs,
Protecting UFS Files With ACLs (Task Map)
- using an assigned role
Configuring RBAC
Using Roles (Task Map)
- using pktool command,
Using the Key Management Framework (Task Map)
- using Solaris Secure Shell,
Using Solaris Secure Shell (Task Map)
- user scripts, configuring for ssh-agent daemon in CDE,
How to Set Up the ssh-agent Command to Run Automatically in CDE
- useradd command
- adding local user,
How to Make root User Into a Role
- description,
Commands That Manage RBAC
- userdel command, description,
Commands That Manage RBAC
- UserKnownHostsFile keyword, ssh_config file,
Keywords in Solaris Secure Shell
- UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
- usermod command
- changing user's RBAC properties,
How to Change the RBAC Properties of a User
- description,
Commands That Manage RBAC
- using to assign role,
How to Assign a Role to a Local User
- users
- adding local user,
How to Make root User Into a Role
- allocating devices,
How to Allocate a Device
- assigning allocate authorization to,
How to Authorize Users to Allocate a Device
- assigning privileges to,
How to Assign Privileges to a User or Role
- assigning RBAC defaults,
policy.conf File
- auditing all of their commands,
How to Audit All Commands by Users
- basic privilege set,
How Privileges Are Implemented
- changing properties from command line,
How to Change the RBAC Properties of a User
- computing digest of files,
How to Compute a Digest of a File
- computing MAC of files,
How to Compute a MAC of a File
- creating local user,
How to Make root User Into a Role
- deallocating devices,
How to Deallocate a Device
- determining directly assigned privileges,
How to Determine the Privileges That You Have Been Directly Assigned
- determining own privileged commands,
How to Determine the Privileged Commands That You Can Run
- disabling login,
How to Temporarily Disable User Logins
- displaying login status,
How to Display a User's Login Status
- encrypting files,
How to Encrypt and Decrypt a File
- generating a symmetric key,
How to Generate a Symmetric Key by Using the pktool Command
- having no passwords,
How to Display Users Without Passwords
- initial inheritable privileges,
How Privileges Are Implemented
- modifying audit preselection mask of,
How to Change a User's Audit Characteristics
- modifying properties (RBAC),
How to Change the RBAC Properties of a User
- mounting allocated devices,
How to Mount an Allocated Device
- restricting basic privileges,
How to Limit a User's or Role's Privileges
- troubleshooting running privileged commands,
How to Determine the Privileged Commands That You Can Run
- unmounting allocated devices,
How to Deallocate a Device
- UseRsh keyword, ssh_config file,
Keywords in Solaris Secure Shell
- using
- ACLs,
How to Add ACL Entries to a File
- allocate command,
How to Allocate a Device
- ASET,
Running ASET (Task Map)
- BART,
Using BART (Tasks)
- cryptoadm command,
Administering the Cryptographic Framework
- cryptographic framework task map,
Using the Cryptographic Framework (Task Map)
- dd command,
How to Generate a Symmetric Key by Using the dd Command
- deallocate command,
How to Deallocate a Device
- device allocation
Allocating Devices (Task Map)
How to Allocate a Device
- digest command,
How to Compute a Digest of a File
- encrypt command,
How to Encrypt and Decrypt a File
- file permissions,
Protecting Files (Task Map)
- mac command,
How to Compute a MAC of a File
- mount command,
How to Mount an Allocated Device
- new password algorithm,
How to Specify an Algorithm for Password Encryption
- pktool command,
How to Generate a Symmetric Key by Using the pktool Command
- ppriv command
How to Determine the Privileges on a Process
How to Determine the Privileges on a Process
- privileges,
Determining Your Assigned Privileges
- privileges task map,
Determining Your Privileges (Task Map)
- RBAC task map,
Using RBAC (Task Map)
- roles,
Using Roles
- roles task map,
Using Roles (Task Map)
- smrole command,
How to Assign Privileges to a User or Role
- Solaris Secure Shell task map,
Using Solaris Secure Shell (Task Map)
- ssh-add command,
How to Reduce Password Prompts in Solaris Secure Shell
- ssh-agent daemon,
How to Reduce Password Prompts in Solaris Secure Shell
- truss command,
How to Determine Which Privileges a Program Requires
- umount command,
How to Deallocate a Device
- usermod command,
How to Assign Privileges to a User or Role
- Using the Key Management Framework (Task Map),
Using the Key Management Framework (Task Map)
- /usr/aset/asetenv file
ASET Environment File (asetenv)
Modifying the Environment File (asetenv)
- /usr/aset directory,
Automated Security Enhancement Tool (ASET)
- /usr/aset/masters/tune files
- description,
Tune Files
- modifying,
Modifying the Tune Files
- rules,
Tune File Examples
- /usr/aset/masters/uid_aliases file,
The uid_aliases File
- /usr/aset/reports directory, structure,
ASET Reports
- /usr/aset/reports directory structure,
ASET Reports
- /usr/aset/reports/latest directory,
ASET Reports
- /usr/bin/ftp command, Kerberos and,
Kerberos Commands
- /usr/bin/kdestroy command, Kerberos and,
Kerberos Commands
- /usr/bin/kinit command, Kerberos and,
Kerberos Commands
- /usr/bin/klist command, Kerberos and,
Kerberos Commands
- /usr/bin/kpasswd command, Kerberos and,
Kerberos Commands
- /usr/bin/ktutil command, Kerberos and,
Kerberos Commands
- /usr/bin/rcp command, Kerberos and,
Kerberos Commands
- /usr/bin/rdist command, Kerberos and,
Kerberos Commands
- /usr/bin/rlogin command, Kerberos and,
Kerberos Commands
- /usr/bin/rsh command, Kerberos and,
Kerberos Commands
- /usr/bin/telnet command, Kerberos and,
Kerberos Commands
- /usr/lib/kprop command, description,
Kerberos Commands
- /usr/lib/krb5/kadmind daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/krb5/kpropd daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/krb5/krb5kdc daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/krb5/ktkt_warnd daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/libsasl.so library, overview,
SASL (Overview)
- /usr/sbin/gkadmin command, description,
Kerberos Commands
- /usr/sbin/gsscred command, description,
Kerberos Commands
- /usr/sbin/in.ftpd daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/in.rlogind daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/in.rshd daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/in.telnetd daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/kadmin command, description,
Kerberos Commands
- /usr/sbin/kadmin.local command, description,
Kerberos Commands
- /usr/sbin/kclient command, description,
Kerberos Commands
- /usr/sbin/kdb5_ldap_util command, description,
Kerberos Commands
- /usr/sbin/kdb5_util command, description,
Kerberos Commands
- /usr/sbin/kgcmgr command, description,
Kerberos Commands
- /usr/sbin/kproplog command, description,
Kerberos Commands
- /usr/share/lib/xml directory,
praudit Command
- usrgrp.rpt file
- description
User and Group Checks
Format of ASET Report Files
- example,
Format of ASET Report Files
- uucico command, login program,
How to Create a Dial-Up Password