D
- -D option
- auditreduce command,
How to Merge Audit Files From the Audit Trail
- ppriv command,
How to Determine Which Privileges a Program Requires
- d_passwd file
- creating,
How to Create a Dial-Up Password
- description,
Dial-Up Logins
- disabling dial-up logins temporarily,
How to Temporarily Disable Dial-Up Logins
- -d option
- auditreduce command,
How to Select Audit Events From the Audit Trail
- getfacl command,
How to Display ACL Entries for a File
- praudit command,
praudit Command
- setfacl command,
How to Delete ACL Entries From a File
- daemons
- auditd,
auditd Daemon
- kcfd,
Administrative Commands in the Oracle Solaris Cryptographic Framework
- keyserv,
How to Restart the Secure RPC Keyserver
- nscd (name service cache daemon)
How to Create and Assign a Role by Using the GUI
Commands That Manage RBAC
- rpc.nispasswd,
How to Specify a New Password Algorithm for an NIS+ Domain
- running with privileges,
Administrative Differences on a System With Privileges
- ssh-agent,
How to Reduce Password Prompts in Solaris Secure Shell
- sshd,
A Typical Solaris Secure Shell Session
- table of Kerberos,
Kerberos Daemons
- vold,
How to Authorize Users to Allocate a Device
- Data Encryption Standard, See DES encryption
- data forwarding, Solaris Secure Shell,
Command Execution and Data Forwarding in Solaris Secure Shell
- databases
- audit_user,
audit_user Database
- auth_attr,
auth_attr Database
- backing up and propagating KDC,
Backing Up and Propagating the Kerberos Database
- creating KDC,
How to Manually Configure a Master KDC
- cred for Secure RPC
Diffie-Hellman Authentication and Secure RPC
How to Set Up a Diffie-Hellman Key for an NIS+ Host
- exec_attr,
exec_attr Database
- KDC propagation,
Which Database Propagation System to Use
- NFS secret keys,
Implementation of Diffie-Hellman Authentication
- prof_attr,
prof_attr Database
- publickey for Secure RPC,
Diffie-Hellman Authentication and Secure RPC
- RBAC,
Databases That Support RBAC
- user_attr,
user_attr Database
- with privilege information,
Files With Privilege Information
- dd command, generating secret keys,
How to Generate a Symmetric Key by Using the dd Command
- deallocate command
- allocate error state
Allocate Error State
Allocate Error State
- authorizations for,
Device Allocation Commands
- authorizations required,
Commands That Require Authorizations
- description,
Device Allocation Commands
- device-clean scripts and,
Device-Clean Scripts
- using,
How to Deallocate a Device
- deallocating
- devices,
How to Deallocate a Device
- forcibly,
Forcibly Deallocating a Device
- microphone,
How to Deallocate a Device
- debugging, privileges,
How to Determine Which Privileges a Program Requires
- debugging sequence number,
sequence Token
- decrypt command
- description,
User-Level Commands in the Oracle Solaris Cryptographic Framework
- syntax,
How to Encrypt and Decrypt a File
- decrypting
- conversation keys for Secure RPC,
Implementation of Diffie-Hellman Authentication
- files,
How to Encrypt and Decrypt a File
- NFS secret keys,
Implementation of Diffie-Hellman Authentication
- secret keys,
Implementation of Diffie-Hellman Authentication
- default/login file, description,
Solaris Secure Shell Files
- default_realm section
- krb5.conf file
How to Manually Configure a Master KDC
How to Configure a KDC to Use an LDAP Data Server
- defaultpriv keyword, user_attr database,
Files With Privilege Information
- defaults
- ACL entries for directories
ACL Entries for UFS Directories
ACL Entries for UFS Directories
- audit_startup script,
audit_startup Script
- praudit output format
praudit Command
praudit Command
- privilege settings in policy.conf file,
Files With Privilege Information
- system-wide auditing,
Audit Classes
- system-wide in policy.conf file,
Password Encryption
- umask value,
Default umask Value
- delegating, RBAC authorizations,
Delegation Authority in Authorizations
- delete_entry command, ktutil command,
How to Temporarily Disable Authentication for a Service on a Host
- deleting
- ACL entries
Commands for Administering UFS ACLs
How to Delete ACL Entries From a File
- archived audit files,
How to Prevent Audit Trail Overflow
- audit files,
How to Merge Audit Files From the Audit Trail
- host's service,
How to Temporarily Disable Authentication for a Service on a Host
- not_terminated audit files,
How to Clean Up a not_terminated Audit File
- policies (Kerberos),
How to Delete a Kerberos Policy
- principal (Kerberos),
How to Delete a Kerberos Principal
- rights profiles,
How to Create or Change a Rights Profile
- DenyGroups keyword, sshd_config file,
Keywords in Solaris Secure Shell
- DenyUsers keyword, sshd_config file,
Keywords in Solaris Secure Shell
- DES encryption, kernel provider,
How to List Available Providers
- DES encryption, Secure NFS,
DES Encryption With Secure NFS
- destroying, tickets with kdestroy,
Destroying Kerberos Tickets
- determining
- audit_control flags are correct,
How to Determine That Solaris Auditing Is Running
- audit ID of a user,
How to Modify a User's Preselection Mask
- audit_user flags are correct,
How to Determine That Solaris Auditing Is Running
- auditing is running,
How to Determine That Solaris Auditing Is Running
- c2audit module is loaded,
How to Determine That Solaris Auditing Is Running
- files with setuid permissions,
How to Find Files With Special File Permissions
- if file has ACL,
How to Check if a File Has an ACL
- privileges on a process,
How to Determine the Privileges on a Process
- privileges task map,
Determining Your Privileges (Task Map)
- /dev/arp device, getting IP MIB-II information,
How to Retrieve IP MIB-II Information From a /dev/* Device
- /dev/urandom device,
How to Generate a Symmetric Key by Using the dd Command
- devfsadm command, description,
Device Policy Commands
- device_allocate file
- description,
device_allocate File
- format,
device_allocate File
- sample
How to Change Which Devices Can Be Allocated
device_allocate File
- device allocation
- adding devices,
Managing Device Allocation (Task Map)
- allocatable devices
device_allocate File
device_allocate File
- allocate command,
Device Allocation Commands
- allocate error state,
Allocate Error State
- allocating devices,
How to Allocate a Device
- auditing,
How to Audit Device Allocation
- authorizations for commands,
Device Allocation Commands
- authorizing users to allocate,
How to Authorize Users to Allocate a Device
- changing allocatable devices,
How to Change Which Devices Can Be Allocated
- commands,
Device Allocation Commands
- components of mechanism,
Components of Device Allocation
- configuration file,
device_maps File
- deallocate command,
Device Allocation Commands
- device-clean scripts and,
Device-Clean Scripts
- using,
How to Deallocate a Device
deallocating devices,
How to Deallocate a Device
- device_allocate file,
device_allocate File
- device-clean scripts
- audio devices,
Device-Clean Scripts
- CD-ROM drives,
Device-Clean Scripts
- description,
Device-Clean Scripts
- diskette drives,
Device-Clean Scripts
- options,
Device-Clean Scripts
- tape drives
device_allocate File
Device-Clean Scripts
- writing new scripts,
Device-Clean Scripts
device_maps file,
device_maps File
- disabling,
How to Disable the Audit Service
- enabling
How to Make a Device Allocatable
How to Make a Device Allocatable
- examples,
How to Allocate a Device
- forcibly allocating devices,
Forcibly Allocating a Device
- forcibly deallocating devices,
Forcibly Deallocating a Device
- making device allocatable,
How to Make a Device Allocatable
- managing devices,
Managing Device Allocation (Task Map)
- mounting devices,
How to Mount an Allocated Device
- not requiring authorization,
How to Change Which Devices Can Be Allocated
- preventing,
How to Change Which Devices Can Be Allocated
- requiring authorization,
How to Change Which Devices Can Be Allocated
- task map,
Managing Device Allocation (Task Map)
- troubleshooting
How to Allocate a Device
How to Mount an Allocated Device
- troubleshooting permissions,
How to View Allocation Information About a Device
- unmounting allocated device,
How to Deallocate a Device
- user procedures,
Allocating Devices (Task Map)
- using,
Allocating Devices (Task Map)
- using allocate command,
How to Allocate a Device
- viewing information,
How to View Allocation Information About a Device
- device-clean scripts
- and object reuse,
Device-Clean Scripts
- audio devices,
Device-Clean Scripts
- CD-ROM drives,
Device-Clean Scripts
- description,
Device-Clean Scripts
- diskette drives,
Device-Clean Scripts
- options,
Device-Clean Scripts
- tape drives
device_allocate File
device_allocate File
Device-Clean Scripts
- writing new scripts,
Device-Clean Scripts
- device management, See device policy
- device_maps file
- description,
device_maps File
- format,
device_maps File
- sample entries,
device_maps File
- device policy
- add_drv command,
Device Policy Commands
- auditing changes,
How to Audit Changes in Device Policy
- changing,
How to Change the Device Policy on an Existing Device
- commands,
Device Policy Commands
- configuring,
Configuring Device Policy
- kernel protection,
Device Protection (Reference)
- managing devices,
Configuring Device Policy (Task Map)
- overview
Controlling Access to Devices
Device Policy (Overview)
- removing from device,
How to Change the Device Policy on an Existing Device
- task map,
Configuring Device Policy (Task Map)
- update_drv command
How to Change the Device Policy on an Existing Device
Device Policy Commands
- viewing,
How to View Device Policy
- Device Security (RBAC), creating role,
How to Create and Assign a Role by Using the GUI
- devices
- adding device policy,
How to Change the Device Policy on an Existing Device
- allocating for use,
Allocating Devices (Task Map)
- auditing allocation of,
How to Audit Device Allocation
- auditing policy changes,
How to Audit Changes in Device Policy
- authorizing users to allocate,
How to Authorize Users to Allocate a Device
- changing device policy,
How to Change the Device Policy on an Existing Device
- changing which are allocatable,
How to Change Which Devices Can Be Allocated
- deallocating a device,
How to Deallocate a Device
- /dev/urandom device,
How to Generate a Symmetric Key by Using the dd Command
- device allocation
- See device allocation
forcibly allocating,
Forcibly Allocating a Device
- forcibly deallocating,
Forcibly Deallocating a Device
- getting IP MIB-II information,
How to Retrieve IP MIB-II Information From a /dev/* Device
- listing,
How to View Device Policy
- listing device names,
How to View Allocation Information About a Device
- login access control,
Remote Logins
- making allocatable,
How to Make a Device Allocatable
- managing,
Configuring Device Policy (Task Map)
- managing allocation of,
Managing Device Allocation (Task Map)
- mounting allocated devices,
How to Mount an Allocated Device
- not requiring authorization for use,
How to Change Which Devices Can Be Allocated
- policy commands,
Device Policy Commands
- preventing use of all,
How to Change Which Devices Can Be Allocated
- preventing use of some,
How to Change Which Devices Can Be Allocated
- privilege model and,
Privileges and Devices
- protecting by device allocation,
Controlling Access to Devices
- protecting in the kernel,
Controlling Access to Devices
- removing policy,
How to Change the Device Policy on an Existing Device
- security,
Controlling Access to Devices
- superuser model and,
Privileges and Devices
- unmounting allocated device,
How to Deallocate a Device
- viewing allocation information,
How to View Allocation Information About a Device
- viewing device policy,
How to View Device Policy
- zones and,
Controlling Access to Devices
- dfstab file
- security modes,
How to Set Up a Secure NFS Environment With Multiple Kerberos Security Modes
- sharing files,
Sharing Files Across Machines
- DH authentication
- configuring in NIS,
How to Set Up a Diffie-Hellman Key for an NIS Host
- configuring in NIS+,
How to Set Up a Diffie-Hellman Key for an NIS+ Host
- description,
Diffie-Hellman Authentication and Secure RPC
- for NIS+ client,
How to Set Up a Diffie-Hellman Key for an NIS+ Host
- for NIS client,
How to Set Up a Diffie-Hellman Key for an NIS Host
- mounting files with,
How to Share NFS Files With Diffie-Hellman Authentication
- sharing files with,
How to Share NFS Files With Diffie-Hellman Authentication
- DHCP Management (RBAC), creating role,
How to Create and Assign a Role by Using the GUI
- dial-up passwords
- creating,
How to Create a Dial-Up Password
- disabling,
Dial-Up Logins
- disabling temporarily,
How to Temporarily Disable Dial-Up Logins
- /etc/d_passwd file,
Dial-Up Logins
- security,
Dial-Up Logins
- dialups file, creating,
How to Create a Dial-Up Password
- Diffie-Hellman authentication, See DH authentication
- digest command
- description,
User-Level Commands in the Oracle Solaris Cryptographic Framework
- example,
How to Compute a Digest of a File
- syntax,
How to Compute a Digest of a File
- digestmd5.so.1 plug-in, SASL and,
SASL Plug-ins
- digests
- computing for file,
How to Compute a Digest of a File
- of files
How to Compute a Digest of a File
How to Compute a Digest of a File
- dir line, audit_control file,
audit_control File
- direct realms,
How to Establish Direct Cross-Realm Authentication
- directories
- See also files
- ACL entries
ACL Entries for UFS Directories
ACL Entries for UFS Directories
- audit_control file definitions,
audit_control File
- audit directories full
auditd Daemon
audit_warn Script
- auditd daemon pointer
auditd Daemon
auditd Daemon
- checklist task setting (ASET)
Specifying Directories for System Files Checks Task: CKLISTPATH
CKLISTPATH_level Environment Variables
- displaying files and related information
Commands for Viewing and Securing Files
How to Display File Information
- master files (ASET),
ASET Master Files
- mounting audit directories,
Audit Trail
- permissions
- defaults,
Default umask Value
- description,
UNIX File Permissions
public directories,
Sticky Bit
- reports (ASET),
ASET Reports
- working directory (ASET)
ASETDIR Environment Variable
How to Run ASET Interactively
- disabling
- abort sequence,
How to Disable a System's Abort Sequence
- audit policy,
How to Configure Audit Policy
- audit service,
How to Disable the Audit Service
- cryptographic mechanisms,
How to Prevent the Use of a User-Level Mechanism
- device allocation,
How to Disable the Audit Service
- dial-up logins temporarily,
How to Temporarily Disable Dial-Up Logins
- dial-up passwords,
How to Temporarily Disable Dial-Up Logins
- executable stacks,
How to Disable Programs From Using Executable Stacks
- executables that compromise security,
Preventing Executable Files From Compromising Security
- hardware mechanisms,
How to Disable Hardware Provider Mechanisms and Features
- keyboard abort,
How to Disable a System's Abort Sequence
- keyboard shutdown,
How to Disable a System's Abort Sequence
- logging of executable stack messages,
How to Disable Programs From Using Executable Stacks
- logins temporarily,
How to Temporarily Disable User Logins
- programs from using executable stacks,
How to Disable Programs From Using Executable Stacks
- remote root access,
How to Restrict and Monitor Superuser Logins
- service on a host (Kerberos),
How to Temporarily Disable Authentication for a Service on a Host
- system abort sequence,
How to Disable a System's Abort Sequence
- user logins,
How to Temporarily Disable User Logins
- disk partitioning, for binary audit files,
How to Create Partitions for Audit Files
- disk-space requirements,
Cost of Storage of Audit Data
- diskette drives
- allocating,
How to Mount an Allocated Device
- device-clean scripts,
Device-Clean Scripts
- displaying
- ACL entries
Commands for Administering UFS ACLs
How to Check if a File Has an ACL
How to Display ACL Entries for a File
- allocatable devices,
How to View Allocation Information About a Device
- ASET task status
ASET Task List
Example of an ASET Execution Log File
- audit policies,
How to Configure Audit Policy
- audit record formats,
How to Display Audit Record Formats
- audit records,
How to View the Contents of Binary Audit Files
- audit records in XML format,
How to View the Contents of Binary Audit Files
- device policy,
How to View Device Policy
- file information,
How to Display File Information
- files and related information,
Commands for Viewing and Securing Files
- format of audit records,
How to Display Audit Record Formats
- providers in the cryptographic framework,
How to List Available Providers
- roles you can assume
How to Assume a Role in a Terminal Window
Commands That Manage RBAC
- root access attempts,
How to Restrict and Monitor Superuser Logins
- selected audit records,
How to Merge Audit Files From the Audit Trail
- su command attempts,
How to Restrict and Monitor Superuser Logins
- sublist of principals (Kerberos),
How to View the List of Kerberos Principals
- user's login status
How to Display a User's Login Status
How to Display a User's Login Status
- users with no passwords,
How to Display Users Without Passwords
- dminfo command,
device_maps File
- DNS, Kerberos and,
Client and Service Principal Names
- domain_realm section
- krb5.conf file
Mapping Host Names Onto Realms
How to Manually Configure a Master KDC
How to Configure a KDC to Use an LDAP Data Server
- dot (.)
- authorization name separator,
Authorization Naming Conventions
- displaying hidden files,
How to Display File Information
- path variable entry,
Setting the PATH Variable
- double dollar sign ($$), parent shell process number,
How to Determine the Privileges on a Process
- DSAAuthentication keyword, See PubkeyAuthentication keyword
- DTD for praudit command,
praudit Command
- .dtprofile script, use in Solaris Secure Shell,
How to Set Up the ssh-agent Command to Run Automatically in CDE
- duplicating, principals (Kerberos),
How to Duplicate a Kerberos Principal
- DynamicForward keyword, ssh_config file,
Keywords in Solaris Secure Shell