| | | | |
| R |
| |
| | -R option |
| | | bart create ( ) ( ) |
| | | ssh command ( ) |
| |
| | random numbers |
| | | dd command ( ) |
| | | pktool command ( ) |
| |
| | raw praudit output format ( ) |
| |
| | RBAC |
| | | adding custom roles ( ) |
| | | adding new rights profile ( ) |
| | | adding roles ( ) |
| | | adding roles from command line ( ) |
| | | administration commands ( ) |
| | | audit profiles ( ) |
| | | auditing roles ( ) |
| | | authorization database ( ) |
| | | authorizations ( ) |
| | | basic concepts ( ) |
| | | changing role passwords ( ) |
| | | changing user properties |
| | | | from command line ( ) |
| | | checking scripts or programs for authorizations ( ) |
| | | commands for managing ( ) |
| | | compared to superuser model ( ) |
| | | configuring ( ) |
| | | database relationships ( ) |
| | | databases ( ) |
| | | editing rights profiles ( ) |
| | | elements ( ) |
| | | modifying roles ( ) |
| | | modifying users ( ) |
| | | name services and ( ) |
| | | planning ( ) |
| | | profile shells ( ) |
| | | rights profile database ( ) |
| | | rights profiles ( ) |
| | | securing scripts ( ) |
| | | using privileged applications ( ) |
| |
| | RC4, See ARCFOUR kernel provider |
| |
| | rcp command |
| | | Kerberos and ( ) ( ) |
| |
| | rdist command, Kerberos and ( ) |
| |
| | read_kt command ( ) ( ) |
| |
| | read permissions, symbolic mode ( ) |
| |
| | readable audit record format |
| | | converting audit records to ( ) ( ) |
| |
| | realms (Kerberos) |
| | | configuration decisions ( ) |
| | | configuring cross-realm authentication ( ) |
| | | contents of ( ) |
| | | direct ( ) |
| | | hierarchical ( ) |
| | | hierarchical or nonhierarchical ( ) |
| | | hierarchy ( ) |
| | | in principal names ( ) |
| | | mapping host names onto ( ) |
| | | names ( ) |
| | | number of ( ) |
| | | requesting tickets for specific ( ) |
| | | servers and ( ) |
| |
| | reauth_timeout option, SASL and ( ) |
| |
| | redirecting arrow (>), preventing redirection ( ) |
| |
| | reducing |
| | | audit files ( ) ( ) |
| | | storage-space requirements for audit files ( ) |
| |
| | refreshing, cryptographic services ( ) |
| |
| | registering providers, cryptographic framework ( ) |
| |
| | rem_drv command, description ( ) |
| |
| | remote logins |
| | | authentication ( ) |
| | | authorization ( ) |
| | | preventing superuser from ( ) |
| | | security and ( ) |
| |
| | RemoteForward keyword, ssh_config file ( ) |
| |
| | removing |
| | | ACL entries ( ) |
| | | audit events from audit_event file ( ) |
| | | cryptographic providers ( ) ( ) |
| | | device policy ( ) |
| | | plugins from KMF ( ) |
| | | policy from device ( ) |
| | | principals with ktremove command ( ) |
| | | privileges from basic set ( ) |
| | | privileges from limit set ( ) |
| | | service principal from keytab file ( ) |
| | | software providers |
| | | | permanently ( ) ( ) |
| | | | temporarily ( ) |
| |
| | renewable ticket, definition ( ) |
| |
| | replacing, superuser with roles ( ) |
| |
| | replayed transactions ( ) |
| |
| | reporting tool, See bart compare |
| |
| | reports, BART ( ) |
| |
| | required control flag, PAM ( ) |
| |
| | requisite control flag, PAM ( ) |
| |
| | resource controls |
| | | privileges, and ( ) |
| | | project.max-locked-memory ( ) |
| | | zone.max-locked-memory ( ) |
| |
| | restarting |
| | | audit daemon ( ) |
| | | cryptographic services ( ) |
| | | ssh service ( ) |
| | | sshd daemon ( ) |
| |
| | restoring, cryptographic providers ( ) |
| |
| | restricted shell (rsh) ( ) |
| |
| | restricting |
| | | remote superuser access ( ) |
| | | superuser task map ( ) |
| | | user privileges ( ) |
| |
| | restricting access for KDC servers ( ) |
| |
| | RETRIES in Solaris Secure Shell ( ) |
| |
| | return audit token, format ( ) |
| |
| | rewoffl option |
| | | mt command |
| | | | tape device cleanup and ( ) |
| |
| | .rhosts file, description ( ) |
| |
| | RhostsAuthentication keyword, Solaris Secure Shell ( ) |
| |
| | RhostsRSAAuthentication keyword, Solaris Secure Shell ( ) |
| |
| | right, See rights profiles |
| |
| | rights profiles |
| | | for audit service ( ) |
| | | changing contents of ( ) |
| | | changing from command line ( ) |
| | | contents of typical ( ) |
| | | creating |
| | | | in Solaris Management Console ( ) |
| | | | on command line ( ) |
| | | creating roles for ( ) |
| | | databases |
| | | | See prof_attr database and exec_attr database | |
| | | description ( ) ( ) |
| | | major rights profiles descriptions ( ) |
| | | methods of creating ( ) |
| | | modifying ( ) |
| | | ordering ( ) |
| | | troubleshooting ( ) |
| | | using the System Administrator profile ( ) |
| | | viewing contents ( ) |
| |
| | Rights tool, description ( ) |
| |
| | rlogin command |
| | | Kerberos and ( ) ( ) |
| |
| | rlogind daemon, Kerberos and ( ) |
| |
| | role-based access control, See RBAC |
| |
| | roleadd command |
| | | description ( ) |
| | | using ( ) |
| |
| | roledel command, description ( ) |
| |
| | rolemod command |
| | | changing properties of role ( ) |
| | | description ( ) |
| |
| | roles |
| | | adding custom roles ( ) |
| | | adding for particular profiles ( ) |
| | | adding from command line ( ) |
| | | assigning privileges to ( ) |
| | | assigning with usermod command ( ) |
| | | assuming ( ) ( ) |
| | | assuming after login ( ) |
| | | assuming in a terminal window ( ) ( ) |
| | | assuming in Solaris Management Console ( ) |
| | | assuming Primary Administrator role ( ) |
| | | assuming root role ( ) |
| | | assuming System Administrator role ( ) |
| | | auditing ( ) |
| | | changing password of ( ) |
| | | changing properties of ( ) |
| | | creating |
| | | | Crypto Management role ( ) |
| | | | Custom Operator role ( ) |
| | | | Device Security role ( ) |
| | | | DHCP Management role ( ) |
| | | | for particular profiles ( ) |
| | | | Network Security role ( ) |
| | | | on command line ( ) |
| | | | Operator role ( ) |
| | | | role with limited scope ( ) |
| | | | root role ( ) |
| | | | security-related roles ( ) |
| | | | System Administrator role ( ) |
| | | description ( ) |
| | | determining directly assigned privileges ( ) |
| | | determining role's privileged commands ( ) |
| | | listing local roles ( ) ( ) |
| | | making root user into role ( ) |
| | | modifying ( ) |
| | | modifying assignment to a user ( ) |
| | | recommended roles ( ) |
| | | summary ( ) |
| | | troubleshooting ( ) |
| | | use in RBAC ( ) |
| | | using an assigned role ( ) ( ) |
| | | using to access the hardware ( ) |
| |
| | roles command |
| | | description ( ) |
| | | using ( ) |
| |
| | root principal, adding to host's keytab ( ) |
| |
| | root role (RBAC) |
| | | assuming role ( ) |
| | | changing back into root user ( ) |
| | | troubleshooting ( ) |
| |
| | root user |
| | | changing from root role ( ) |
| | | changing to root role ( ) |
| | | displaying access attempts on console ( ) |
| | | login account |
| | | | description ( ) |
| | | monitoring su command attempts ( ) ( ) |
| | | replacing in RBAC ( ) |
| | | restricting access ( ) |
| | | restricting remote access ( ) ( ) |
| | | tracking logins ( ) |
| |
| | RPCSEC_GSS API, Kerberos and ( ) |
| |
| | RSA kernel provider ( ) |
| |
| | RSAAuthentication keyword, Solaris Secure Shell ( ) |
| |
| | rsh command |
| | | Kerberos and ( ) ( ) |
| |
| | rsh command (restricted shell) ( ) |
| |
| | rshd daemon, Kerberos and ( ) |
| |
| | rstchown system variable ( ) |
| |
| | rules file (BART) ( ) |
| |
| | rules file attributes, See keywords |
| |
| | rules file format (BART) ( ) |
| |
| | rules file specification language, See quoting syntax |