Use the following table to determine the documentation to consult about setting up and using RBAC. Specific steps that you follow to set up and use RBAC with Sun Cluster are presented later in this chapter.
To |
Refer to |
---|---|
Learn more about RBAC |
“Role-Based Access Control (Overview)” in System Administration Guide: Security Services |
Set up, manage elements of, and use RBAC |
“Role-Based Access Control (Tasks)” in System Administration Guide: Security Services |
Learn more about RBAC elements and tools |
“Role-Based Access Control (Reference)” in System Administration Guide: Security Services |