System Administration Guide: Security Services
    
R
 
 -R option
  bart create ( Index Term Link ) ( Index Term Link )
  ssh command ( Index Term Link )
 
 random numbers
  dd command ( Index Term Link )
  pktool command ( Index Term Link )
 
 raw praudit output format ( Index Term Link )
 
 RBAC
  adding custom roles ( Index Term Link )
  adding new rights profile ( Index Term Link )
  adding roles ( Index Term Link )
  adding roles from command line ( Index Term Link )
  administration commands ( Index Term Link )
  audit profiles ( Index Term Link )
  auditing roles ( Index Term Link )
  authorization database ( Index Term Link )
  authorizations ( Index Term Link )
  basic concepts ( Index Term Link )
  changing role passwords ( Index Term Link )
  changing user properties
   from command line ( Index Term Link )
  checking scripts or programs for authorizations ( Index Term Link )
  commands for managing ( Index Term Link )
  compared to superuser model ( Index Term Link )
  configuring ( Index Term Link )
  database relationships ( Index Term Link )
  databases ( Index Term Link )
  editing rights profiles ( Index Term Link )
  elements ( Index Term Link )
  modifying roles ( Index Term Link )
  modifying users ( Index Term Link )
  name services and ( Index Term Link )
  planning ( Index Term Link )
  profile shells ( Index Term Link )
  rights profile database ( Index Term Link )
  rights profiles ( Index Term Link )
  securing scripts ( Index Term Link )
  using privileged applications ( Index Term Link )
 
 RC4, See ARCFOUR kernel provider
 
 rcp command
  Kerberos and ( Index Term Link ) ( Index Term Link )
 
 rdist command, Kerberos and ( Index Term Link )
 
 read_kt command ( Index Term Link ) ( Index Term Link )
 
 read permissions, symbolic mode ( Index Term Link )
 
 readable audit record format
  converting audit records to ( Index Term Link ) ( Index Term Link )
 
 realms (Kerberos)
  configuration decisions ( Index Term Link )
  configuring cross-realm authentication ( Index Term Link )
  contents of ( Index Term Link )
  direct ( Index Term Link )
  hierarchical ( Index Term Link )
  hierarchical or nonhierarchical ( Index Term Link )
  hierarchy ( Index Term Link )
  in principal names ( Index Term Link )
  mapping host names onto ( Index Term Link )
  names ( Index Term Link )
  number of ( Index Term Link )
  requesting tickets for specific ( Index Term Link )
  servers and ( Index Term Link )
 
 reauth_timeout option, SASL and ( Index Term Link )
 
 redirecting arrow (>), preventing redirection ( Index Term Link )
 
 reducing
  audit files ( Index Term Link ) ( Index Term Link )
  storage-space requirements for audit files ( Index Term Link )
 
 refreshing, cryptographic services ( Index Term Link )
 
 registering providers, cryptographic framework ( Index Term Link )
 
 rem_drv command, description ( Index Term Link )
 
 remote logins
  authentication ( Index Term Link )
  authorization ( Index Term Link )
  preventing superuser from ( Index Term Link )
  security and ( Index Term Link )
 
 RemoteForward keyword, ssh_config file ( Index Term Link )
 
 removing
  ACL entries ( Index Term Link )
  audit events from audit_event file ( Index Term Link )
  cryptographic providers ( Index Term Link ) ( Index Term Link )
  device policy ( Index Term Link )
  plugins from KMF ( Index Term Link )
  policy from device ( Index Term Link )
  principals with ktremove command ( Index Term Link )
  privileges from basic set ( Index Term Link )
  privileges from limit set ( Index Term Link )
  service principal from keytab file ( Index Term Link )
  software providers
   permanently ( Index Term Link ) ( Index Term Link )
   temporarily ( Index Term Link )
 
 renewable ticket, definition ( Index Term Link )
 
 replacing, superuser with roles ( Index Term Link )
 
 replayed transactions ( Index Term Link )
 
 reporting tool, See bart compare
 
 reports, BART ( Index Term Link )
 
 required control flag, PAM ( Index Term Link )
 
 requisite control flag, PAM ( Index Term Link )
 
 resource controls
  privileges, and ( Index Term Link )
  project.max-locked-memory ( Index Term Link )
  zone.max-locked-memory ( Index Term Link )
 
 restarting
  audit daemon ( Index Term Link )
  cryptographic services ( Index Term Link )
  ssh service ( Index Term Link )
  sshd daemon ( Index Term Link )
 
 restoring, cryptographic providers ( Index Term Link )
 
 restricted shell (rsh) ( Index Term Link )
 
 restricting
  remote superuser access ( Index Term Link )
  superuser task map ( Index Term Link )
  user privileges ( Index Term Link )
 
 restricting access for KDC servers ( Index Term Link )
 
 RETRIES in Solaris Secure Shell ( Index Term Link )
 
 return audit token, format ( Index Term Link )
 
 rewoffl option
  mt command
   tape device cleanup and ( Index Term Link )
 
 .rhosts file, description ( Index Term Link )
 
 RhostsAuthentication keyword, Solaris Secure Shell ( Index Term Link )
 
 RhostsRSAAuthentication keyword, Solaris Secure Shell ( Index Term Link )
 
 right, See rights profiles
 
 rights profiles
  for audit service ( Index Term Link )
  changing contents of ( Index Term Link )
  changing from command line ( Index Term Link )
  contents of typical ( Index Term Link )
  creating
   in Solaris Management Console ( Index Term Link )
   on command line ( Index Term Link )
  creating roles for ( Index Term Link )
  databases
   See prof_attr database and exec_attr database
  description ( Index Term Link ) ( Index Term Link )
  major rights profiles descriptions ( Index Term Link )
  methods of creating ( Index Term Link )
  modifying ( Index Term Link )
  ordering ( Index Term Link )
  troubleshooting ( Index Term Link )
  using the System Administrator profile ( Index Term Link )
  viewing contents ( Index Term Link )
 
 Rights tool, description ( Index Term Link )
 
 rlogin command
  Kerberos and ( Index Term Link ) ( Index Term Link )
 
 rlogind daemon, Kerberos and ( Index Term Link )
 
 role-based access control, See RBAC
 
 roleadd command
  description ( Index Term Link )
  using ( Index Term Link )
 
 roledel command, description ( Index Term Link )
 
 rolemod command
  changing properties of role ( Index Term Link )
  description ( Index Term Link )
 
 roles
  adding custom roles ( Index Term Link )
  adding for particular profiles ( Index Term Link )
  adding from command line ( Index Term Link )
  assigning privileges to ( Index Term Link )
  assigning with usermod command ( Index Term Link )
  assuming ( Index Term Link ) ( Index Term Link )
  assuming after login ( Index Term Link )
  assuming in a terminal window ( Index Term Link ) ( Index Term Link )
  assuming in Solaris Management Console ( Index Term Link )
  assuming Primary Administrator role ( Index Term Link )
  assuming root role ( Index Term Link )
  assuming System Administrator role ( Index Term Link )
  auditing ( Index Term Link )
  changing password of ( Index Term Link )
  changing properties of ( Index Term Link )
  creating
   Crypto Management role ( Index Term Link )
   Custom Operator role ( Index Term Link )
   Device Security role ( Index Term Link )
   DHCP Management role ( Index Term Link )
   for particular profiles ( Index Term Link )
   Network Security role ( Index Term Link )
   on command line ( Index Term Link )
   Operator role ( Index Term Link )
   role with limited scope ( Index Term Link )
   root role ( Index Term Link )
   security-related roles ( Index Term Link )
   System Administrator role ( Index Term Link )
  description ( Index Term Link )
  determining directly assigned privileges ( Index Term Link )
  determining role's privileged commands ( Index Term Link )
  listing local roles ( Index Term Link ) ( Index Term Link )
  making root user into role ( Index Term Link )
  modifying ( Index Term Link )
  modifying assignment to a user ( Index Term Link )
  recommended roles ( Index Term Link )
  summary ( Index Term Link )
  troubleshooting ( Index Term Link )
  use in RBAC ( Index Term Link )
  using an assigned role ( Index Term Link ) ( Index Term Link )
  using to access the hardware ( Index Term Link )
 
 roles command
  description ( Index Term Link )
  using ( Index Term Link )
 
 root principal, adding to host's keytab ( Index Term Link )
 
 root role (RBAC)
  assuming role ( Index Term Link )
  changing back into root user ( Index Term Link )
  troubleshooting ( Index Term Link )
 
 root user
  changing from root role ( Index Term Link )
  changing to root role ( Index Term Link )
  displaying access attempts on console ( Index Term Link )
  login account
   description ( Index Term Link )
  monitoring su command attempts ( Index Term Link ) ( Index Term Link )
  replacing in RBAC ( Index Term Link )
  restricting access ( Index Term Link )
  restricting remote access ( Index Term Link ) ( Index Term Link )
  tracking logins ( Index Term Link )
 
 RPCSEC_GSS API, Kerberos and ( Index Term Link )
 
 RSA kernel provider ( Index Term Link )
 
 RSAAuthentication keyword, Solaris Secure Shell ( Index Term Link )
 
 rsh command
  Kerberos and ( Index Term Link ) ( Index Term Link )
 
 rsh command (restricted shell) ( Index Term Link )
 
 rshd daemon, Kerberos and ( Index Term Link )
 
 rstchown system variable ( Index Term Link )
 
 rules file (BART) ( Index Term Link )
 
 rules file attributes, See keywords
 
 rules file format (BART) ( Index Term Link )
 
 rules file specification language, See quoting syntax