| | | | |
| D |
| |
| | -D option |
| | | auditreduce command ( ) |
| | | ppriv command ( ) |
| |
| | d_passwd file |
| | | creating ( ) |
| | | description ( ) |
| | | disabling dial-up logins temporarily ( ) |
| |
| | daemons |
| | | auditd ( ) |
| | | kcfd ( ) |
| | | keyserv ( ) |
| | | nscd (name service cache daemon) ( ) ( ) |
| | | rpc.nispasswd ( ) |
| | | running with privileges ( ) |
| | | ssh-agent ( ) |
| | | sshd ( ) |
| | | table of Kerberos ( ) |
| | | vold ( ) |
| |
| | Data Encryption Standard, See DES encryption |
| |
| | data forwarding, Solaris Secure Shell ( ) |
| |
| | databases |
| | | audit_user ( ) |
| | | auth_attr ( ) |
| | | backing up and propagating KDC ( ) |
| | | creating KDC ( ) |
| | | cred for Secure RPC ( ) ( ) |
| | | exec_attr ( ) |
| | | KDC propagation ( ) |
| | | NFS secret keys ( ) |
| | | prof_attr ( ) |
| | | publickey for Secure RPC ( ) |
| | | RBAC ( ) |
| | | user_attr ( ) |
| | | with privilege information ( ) |
| |
| | dd command, generating secret keys ( ) |
| |
| | deallocate command |
| | | allocate error state ( ) ( ) |
| | | authorizations for ( ) |
| | | authorizations required ( ) |
| | | description ( ) |
| | | device-clean scripts and ( ) |
| | | using ( ) |
| |
| | deallocating |
| | | devices ( ) |
| | | forcibly ( ) |
| | | microphone ( ) |
| |
| | debugging, privileges ( ) |
| |
| | debugging sequence number ( ) |
| |
| | decrypt command |
| | | description ( ) |
| | | syntax ( ) |
| |
| | decrypting |
| | | conversation keys for Secure RPC ( ) |
| | | files ( ) |
| | | NFS secret keys ( ) |
| | | secret keys ( ) |
| |
| | default/login file, description ( ) |
| |
| | default_realm section |
| | | krb5.conf file ( ) ( ) |
| |
| | defaultpriv keyword, user_attr database ( ) |
| |
| | defaults |
| | | ACL entries for directories ( ) ( ) |
| | | praudit output format ( ) ( ) |
| | | privilege settings in policy.conf file ( ) |
| | | system-wide auditing ( ) |
| | | system-wide in policy.conf file ( ) |
| | | umask value ( ) |
| |
| | delegating, RBAC authorizations ( ) |
| |
| | delete_entry command, ktutil command ( ) |
| |
| | deleting |
| | | ACL entries ( ) ( ) |
| | | archived audit files ( ) |
| | | audit files ( ) |
| | | host's service ( ) |
| | | not_terminated audit files ( ) |
| | | policies (Kerberos) ( ) |
| | | principal (Kerberos) ( ) |
| | | rights profiles ( ) |
| |
| | DenyGroups keyword, sshd_config file ( ) |
| |
| | DenyUsers keyword, sshd_config file ( ) |
| |
| | DES encryption |
| | | kernel provider ( ) |
| | | Secure NFS ( ) |
| |
| | destroying, tickets with kdestroy ( ) |
| |
| | determining |
| | | audit_control flags are correct ( ) |
| | | audit ID of a user ( ) |
| | | audit_user flags are correct ( ) |
| | | auditing is running ( ) |
| | | c2audit module is loaded ( ) |
| | | files with setuid permissions ( ) |
| | | if file has ACL ( ) |
| | | privileges on a process ( ) |
| | | privileges task map ( ) |
| |
| | /dev/arp device, getting IP MIB-II information ( ) |
| |
| | /dev/urandom device ( ) |
| |
| | devfsadm command, description ( ) |
| |
| | device_allocate file |
| | | description ( ) |
| | | format ( ) |
| | | sample ( ) ( ) |
| |
| | device allocation |
| | | adding devices ( ) |
| | | allocatable devices ( ) ( ) |
| | | allocate command ( ) |
| | | allocate error state ( ) |
| | | allocating devices ( ) |
| | | auditing ( ) |
| | | authorizations for commands ( ) |
| | | authorizing users to allocate ( ) |
| | | changing allocatable devices ( ) |
| | | commands ( ) |
| | | components of mechanism ( ) |
| | | configuration file ( ) |
| | | deallocate command ( ) |
| | | | device-clean scripts and ( ) |
| | | | using ( ) |
| | | deallocating devices ( ) |
| | | device_allocate file ( ) |
| | | device-clean scripts |
| | | | audio devices ( ) |
| | | | CD-ROM drives ( ) |
| | | | description ( ) |
| | | | diskette drives ( ) |
| | | | options ( ) |
| | | | tape drives ( ) ( ) |
| | | | writing new scripts ( ) |
| | | device_maps file ( ) |
| | | disabling ( ) |
| | | enabling ( ) ( ) |
| | | examples ( ) |
| | | forcibly allocating devices ( ) |
| | | forcibly deallocating devices ( ) |
| | | making device allocatable ( ) |
| | | managing devices ( ) |
| | | mounting devices ( ) |
| | | not requiring authorization ( ) |
| | | preventing ( ) |
| | | requiring authorization ( ) |
| | | task map ( ) |
| | | troubleshooting ( ) ( ) |
| | | troubleshooting permissions ( ) |
| | | unmounting allocated device ( ) |
| | | user procedures ( ) |
| | | using ( ) |
| | | using allocate command ( ) |
| | | viewing information ( ) |
| |
| | device-clean scripts |
| | | and object reuse ( ) |
| | | audio devices ( ) |
| | | CD-ROM drives ( ) |
| | | description ( ) |
| | | diskette drives ( ) |
| | | options ( ) |
| | | tape drives ( ) ( ) ( ) |
| | | writing new scripts ( ) |
| |
| | device management, See device policy |
| |
| | device_maps file |
| | | description ( ) |
| | | format ( ) |
| | | sample entries ( ) |
| |
| | device policy |
| | | add_drv command ( ) |
| | | auditing changes ( ) |
| | | changing ( ) |
| | | commands ( ) |
| | | configuring ( ) |
| | | kernel protection ( ) |
| | | managing devices ( ) |
| | | overview ( ) ( ) |
| | | removing from device ( ) |
| | | task map ( ) |
| | | update_drv command ( ) ( ) |
| | | viewing ( ) |
| |
| | Device Security (RBAC), creating role ( ) |
| |
| | devices |
| | | adding device policy ( ) |
| | | allocating for use ( ) |
| | | auditing allocation of ( ) |
| | | auditing policy changes ( ) |
| | | authorizing users to allocate ( ) |
| | | changing device policy ( ) |
| | | changing which are allocatable ( ) |
| | | deallocating a device ( ) |
| | | /dev/urandom device ( ) |
| | | device allocation |
| | | | See device allocation | |
| | | forcibly allocating ( ) |
| | | forcibly deallocating ( ) |
| | | getting IP MIB-II information ( ) |
| | | listing ( ) |
| | | listing device names ( ) |
| | | login access control ( ) |
| | | making allocatable ( ) |
| | | managing ( ) |
| | | managing allocation of ( ) |
| | | mounting allocated devices ( ) |
| | | not requiring authorization for use ( ) |
| | | policy commands ( ) |
| | | preventing use of all ( ) |
| | | preventing use of some ( ) |
| | | privilege model and ( ) |
| | | protecting by device allocation ( ) |
| | | protecting in the kernel ( ) |
| | | removing policy ( ) |
| | | security ( ) |
| | | superuser model and ( ) |
| | | unmounting allocated device ( ) |
| | | viewing allocation information ( ) |
| | | viewing device policy ( ) |
| | | zones and ( ) |
| |
| | dfstab file, sharing files ( ) |
| |
| | DH authentication |
| | | configuring in NIS ( ) |
| | | configuring in NIS+ ( ) |
| | | description ( ) |
| | | for NIS+ client ( ) |
| | | for NIS client ( ) |
| | | mounting files with ( ) |
| | | sharing files with ( ) |
| |
| | DHCP Management (RBAC), creating role ( ) |
| |
| | dial-up passwords |
| | | creating ( ) |
| | | disabling ( ) |
| | | disabling temporarily ( ) |
| | | /etc/d_passwd file ( ) |
| | | security ( ) |
| |
| | dialups file, creating ( ) |
| |
| | Diffie-Hellman authentication, See DH authentication |
| |
| | digest command |
| | | description ( ) |
| | | example ( ) |
| | | syntax ( ) |
| |
| | digestmd5.so.1 plug-in, SASL and ( ) |
| |
| | digests |
| | | computing for file ( ) |
| | | of files ( ) ( ) |
| |
| | dir line, audit_control file ( ) |
| |
| | direct realms ( ) |
| |
| | directories |
| | | See also files | |
| | | ACL entries ( ) ( ) |
| | | audit_control file definitions ( ) |
| | | audit directories full ( ) ( ) |
| | | auditd daemon pointer ( ) ( ) |
| | | displaying files and related information ( ) ( ) |
| | | mounting audit directories ( ) |
| | | permissions |
| | | | defaults ( ) |
| | | | description ( ) |
| | | public directories ( ) |
| |
| | disabling |
| | | abort sequence ( ) |
| | | audit policy ( ) |
| | | audit service ( ) |
| | | cryptographic mechanisms ( ) |
| | | device allocation ( ) |
| | | dial-up logins temporarily ( ) |
| | | dial-up passwords ( ) |
| | | executable stacks ( ) |
| | | executables that compromise security ( ) |
| | | hardware mechanisms ( ) |
| | | keyboard abort ( ) |
| | | keyboard shutdown ( ) |
| | | logging of executable stack messages ( ) |
| | | logins temporarily ( ) |
| | | programs from using executable stacks ( ) |
| | | remote root access ( ) |
| | | service on a host (Kerberos) ( ) |
| | | system abort sequence ( ) |
| | | user logins ( ) |
| |
| | disk partitioning, for binary audit files ( ) |
| |
| | disk-space requirements ( ) |
| |
| | diskette drives |
| | | allocating ( ) |
| | | device-clean scripts ( ) |
| |
| | displaying |
| | | ACL entries ( ) ( ) ( ) |
| | | allocatable devices ( ) |
| | | audit policies ( ) |
| | | audit queue parameter values ( ) |
| | | audit record formats ( ) |
| | | audit records ( ) |
| | | audit records in XML format ( ) |
| | | device policy ( ) |
| | | file information ( ) |
| | | files and related information ( ) |
| | | format of audit records ( ) |
| | | providers in the cryptographic framework ( ) |
| | | roles you can assume ( ) ( ) |
| | | root access attempts ( ) |
| | | selected audit records ( ) |
| | | su command attempts ( ) |
| | | sublist of principals (Kerberos) ( ) |
| | | user's login status ( ) ( ) |
| | | users with no passwords ( ) |
| |
| | dminfo command ( ) |
| |
| | DNS, Kerberos and ( ) |
| |
| | domain_realm section |
| | | krb5.conf file ( ) ( ) ( ) |
| |
| | dot (.) |
| | | authorization name separator ( ) |
| | | displaying hidden files ( ) |
| |
| | double dollar sign ($$), parent shell process number ( ) |
| |
| | DSAAuthentication keyword, See PubkeyAuthentication keyword |
| |
| | DTD for praudit command ( ) |
| |
| | duplicating, principals (Kerberos) ( ) |
| |
| | DynamicForward keyword, ssh_config file ( ) |