Use the following table to determine the documentation to consult about setting up and using RBAC. Specific steps that you follow to set up and use RBAC with Sun Cluster software are provided later in this chapter.
Task |
Instructions |
---|---|
Learn more about RBAC |
Chapter 8, Using Roles and Privileges (Overview), in System Administration Guide: Security Services |
Set up, manage elements, and use RBAC | |
Learn more about RBAC elements and tools |
Chapter 10, Role-Based Access Control (Reference), in System Administration Guide: Security Services |