JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Oracle Solaris Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Solaris Secure Shell (Tasks)

20.  Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Solaris Auditing (Tasks)

31.  Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

U

-U option
allocate command, Device Allocation Commands
list_devices command, Device Allocation Commands
uauth audit token
Solaris Auditing Enhancements in the Solaris 10 Release
uauth Token
UDP
addresses, iport Token
port forwarding and, How to Configure Port Forwarding in Solaris Secure Shell
Solaris Secure Shell and, How to Configure Port Forwarding in Solaris Secure Shell
using for remote audit logs, Audit Logs
uid_aliases file (ASET)
The uid_aliases File
Specifying an Aliases File: UID_ALIASES
UID_ALIASES variable (ASET)
The uid_aliases File
Specifying an Aliases File: UID_ALIASES
UID_ALIASES Environment Variable
umask value
and file creation, Default umask Value
typical settings, Default umask Value
umount command, with security attributes, How to Authorize Users to Allocate a Device
uninstalling, cryptographic providers, How to Prevent the Use of a User-Level Mechanism
UNIX file permissions, See files, permissions
unmounting, allocated devices, How to Deallocate a Device
update_drv command
description, Device Policy Commands
using, How to Change the Device Policy on an Existing Device
updating, audit service, How to Update the Audit Service
upriv audit token, upriv Token
URL for online help, Graphical Kerberos Tool, Online Help URL in the Graphical Kerberos Administration Tool
use_authid option, SASL and, SASL Options
UseLogin keyword, sshd_config file, Keywords in Solaris Secure Shell
UseOpenSSLEngine keyword, Solaris Secure Shell, Keywords in Solaris Secure Shell
UsePrivilegedPort keyword, Solaris Secure Shell, Keywords in Solaris Secure Shell
user accounts
See also users
ASET check, User and Group Checks
displaying login status
How to Display a User's Login Status
How to Display a User's Login Status
User Accounts tool, description, How to Change the RBAC Properties of a User
user ACL entries
default entries for directories, ACL Entries for UFS Directories
description, ACL Entries for UFS Files
setting, How to Add ACL Entries to a File
user administration audit class, Definitions of Audit Classes
user_attr database
defaultpriv keyword, Files With Privilege Information
description
Databases That Support RBAC
user_attr Database
limitpriv keyword, Files With Privilege Information
privs keyword, Files With Privilege Information
RBAC relationships, RBAC Database Relationships
user audit fields, audit_user database, audit_user Database
user classes of files, File and Directory Ownership
user database (RBAC), See user_attr database
user ID
audit ID and
What Is Auditing?
Proscess Audit Characteristics
in NFS services, How to Create a Credential Table
User keyword, ssh_config file, Keywords in Solaris Secure Shell
user principal, description, Kerberos Principals
user procedures
allocating devices, Allocating Devices (Task Map)
assuming a role
Configuring RBAC
Using Roles (Task Map)
chkey command, How to Set Up a Diffie-Hellman Key for an NIS User
computing digest of a file, How to Compute a Digest of a File
computing MAC of a file, How to Compute a MAC of a File
creating self-signed certificate, How to Create a Certificate by Using the pktool gencert Command
decrypting files, How to Encrypt and Decrypt a File
encrypting files, Protecting Files With the Oracle Solaris Cryptographic Framework (Task Map)
encrypting NIS user's private key, How to Set Up a Diffie-Hellman Key for an NIS User
exporting certificates, How to Export a Certificate and Private Key in PKCS #12 Format
generating a symmetric key
using the dd command, How to Generate a Symmetric Key by Using the dd Command
using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore, How to Generate a Passphrase by Using the pktool setpin Command
importing certificates, How to Import a Certificate Into Your Keystore
protecting files, Protecting Files With UNIX Permissions (Task Map)
using ACLs, Protecting UFS Files With ACLs (Task Map)
using an assigned role
Configuring RBAC
Using Roles (Task Map)
using pktool command, Using the Key Management Framework (Task Map)
using Solaris Secure Shell, Using Solaris Secure Shell (Task Map)
user scripts, configuring for ssh-agent daemon in CDE, How to Set Up the ssh-agent Command to Run Automatically in CDE
useradd command
adding local user, How to Make root User Into a Role
description, Commands That Manage RBAC
userdel command, description, Commands That Manage RBAC
UserKnownHostsFile keyword, ssh_config file, Keywords in Solaris Secure Shell
UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
usermod command
changing user's RBAC properties, How to Change the RBAC Properties of a User
description, Commands That Manage RBAC
using to assign role, How to Assign a Role to a Local User
users
adding local user, How to Make root User Into a Role
allocating devices, How to Allocate a Device
assigning allocate authorization to, How to Authorize Users to Allocate a Device
assigning privileges to, How to Assign Privileges to a User or Role
assigning RBAC defaults, policy.conf File
auditing all of their commands, How to Audit All Commands by Users
basic privilege set, How Privileges Are Implemented
changing properties from command line, How to Change the RBAC Properties of a User
computing digest of files, How to Compute a Digest of a File
computing MAC of files, How to Compute a MAC of a File
creating local user, How to Make root User Into a Role
deallocating devices, How to Deallocate a Device
determining directly assigned privileges, How to Determine the Privileges That You Have Been Directly Assigned
determining own privileged commands, How to Determine the Privileged Commands That You Can Run
disabling login, How to Temporarily Disable User Logins
displaying login status, How to Display a User's Login Status
encrypting files, How to Encrypt and Decrypt a File
generating a symmetric key, How to Generate a Symmetric Key by Using the pktool Command
having no passwords, How to Display Users Without Passwords
initial inheritable privileges, How Privileges Are Implemented
modifying audit preselection mask of, How to Change a User's Audit Characteristics
modifying properties (RBAC), How to Change the RBAC Properties of a User
mounting allocated devices, How to Mount an Allocated Device
restricting basic privileges, How to Limit a User's or Role's Privileges
troubleshooting running privileged commands, How to Determine the Privileged Commands That You Can Run
unmounting allocated devices, How to Deallocate a Device
UseRsh keyword, ssh_config file, Keywords in Solaris Secure Shell
using
ACLs, How to Add ACL Entries to a File
allocate command, How to Allocate a Device
ASET, Running ASET (Task Map)
BART, Using BART (Tasks)
cryptoadm command, Administering the Cryptographic Framework
cryptographic framework task map, Using the Cryptographic Framework (Task Map)
dd command, How to Generate a Symmetric Key by Using the dd Command
deallocate command, How to Deallocate a Device
device allocation
Allocating Devices (Task Map)
How to Allocate a Device
digest command, How to Compute a Digest of a File
encrypt command, How to Encrypt and Decrypt a File
file permissions, Protecting Files (Task Map)
mac command, How to Compute a MAC of a File
mount command, How to Mount an Allocated Device
new password algorithm, How to Specify an Algorithm for Password Encryption
pktool command, How to Generate a Symmetric Key by Using the pktool Command
ppriv command
How to Determine the Privileges on a Process
How to Determine the Privileges on a Process
privileges, Determining Your Assigned Privileges
privileges task map, Determining Your Privileges (Task Map)
RBAC task map, Using RBAC (Task Map)
roles, Using Roles
roles task map, Using Roles (Task Map)
smrole command, How to Assign Privileges to a User or Role
Solaris Secure Shell task map, Using Solaris Secure Shell (Task Map)
ssh-add command, How to Reduce Password Prompts in Solaris Secure Shell
ssh-agent daemon, How to Reduce Password Prompts in Solaris Secure Shell
truss command, How to Determine Which Privileges a Program Requires
umount command, How to Deallocate a Device
usermod command, How to Assign Privileges to a User or Role
Using the Key Management Framework (Task Map), Using the Key Management Framework (Task Map)
/usr/aset/asetenv file
ASET Environment File (asetenv)
Modifying the Environment File (asetenv)
/usr/aset directory, Automated Security Enhancement Tool (ASET)
/usr/aset/masters/tune files
description, Tune Files
modifying, Modifying the Tune Files
rules, Tune File Examples
/usr/aset/masters/uid_aliases file, The uid_aliases File
/usr/aset/reports directory, structure, ASET Reports
/usr/aset/reports directory structure, ASET Reports
/usr/aset/reports/latest directory, ASET Reports
/usr/bin/ftp command, Kerberos and, Kerberos Commands
/usr/bin/kdestroy command, Kerberos and, Kerberos Commands
/usr/bin/kinit command, Kerberos and, Kerberos Commands
/usr/bin/klist command, Kerberos and, Kerberos Commands
/usr/bin/kpasswd command, Kerberos and, Kerberos Commands
/usr/bin/ktutil command, Kerberos and, Kerberos Commands
/usr/bin/rcp command, Kerberos and, Kerberos Commands
/usr/bin/rdist command, Kerberos and, Kerberos Commands
/usr/bin/rlogin command, Kerberos and, Kerberos Commands
/usr/bin/rsh command, Kerberos and, Kerberos Commands
/usr/bin/telnet command, Kerberos and, Kerberos Commands
/usr/lib/kprop command, description, Kerberos Commands
/usr/lib/krb5/kadmind daemon, Kerberos and, Kerberos Daemons
/usr/lib/krb5/kpropd daemon, Kerberos and, Kerberos Daemons
/usr/lib/krb5/krb5kdc daemon, Kerberos and, Kerberos Daemons
/usr/lib/krb5/ktkt_warnd daemon, Kerberos and, Kerberos Daemons
/usr/lib/libsasl.so library, overview, SASL (Overview)
/usr/sbin/gkadmin command, description, Kerberos Commands
/usr/sbin/gsscred command, description, Kerberos Commands
/usr/sbin/in.ftpd daemon, Kerberos and, Kerberos Daemons
/usr/sbin/in.rlogind daemon, Kerberos and, Kerberos Daemons
/usr/sbin/in.rshd daemon, Kerberos and, Kerberos Daemons
/usr/sbin/in.telnetd daemon, Kerberos and, Kerberos Daemons
/usr/sbin/kadmin command, description, Kerberos Commands
/usr/sbin/kadmin.local command, description, Kerberos Commands
/usr/sbin/kclient command, description, Kerberos Commands
/usr/sbin/kdb5_ldap_util command, description, Kerberos Commands
/usr/sbin/kdb5_util command, description, Kerberos Commands
/usr/sbin/kgcmgr command, description, Kerberos Commands
/usr/sbin/kproplog command, description, Kerberos Commands
/usr/share/lib/xml directory, praudit Command
usrgrp.rpt file
description
User and Group Checks
Format of ASET Report Files
example, Format of ASET Report Files
uucico command, login program, How to Create a Dial-Up Password