L
- -L option, ssh command, How to Use Port Forwarding in Solaris Secure Shell
- -l option
- digest command, How to Compute a Digest of a File
- encrypt command, How to Generate a Symmetric Key by Using the dd Command
- mac command, How to Compute a MAC of a File
- praudit command, praudit Command
- LDAP, configuring master KDC using, How to Configure a KDC to Use an LDAP Data Server
- LDAP naming service
- passwords, Managing Password Information
- specifying password algorithm, How to Specify a New Password Algorithm for an LDAP Domain
- least privilege, principle of, Privileges Protect Kernel Processes
- libraries, user-level providers, How to List Available Providers
- lifetime of ticket, in Kerberos, Ticket Lifetimes
- limit privilege set, How Privileges Are Implemented
- limiting
- audit file size, How to Limit the Size of Binary Audit Files
- use of privileges by user or role, How to Limit a User's or Role's Privileges
- limitpriv keyword
- prof_attr database, Files With Privilege Information
- user_attr database, Files With Privilege Information
- list command
- How to Display the Keylist (Principals) in a Keytab File
- How to Temporarily Disable Authentication for a Service on a Host
- list_devices command
- authorizations required
- Device Allocation Commands
- Commands That Require Authorizations
- description, Device Allocation Commands
- list plugin subcommand, kmcfg command, How to Manage Third-Party Plugins in KMF
- list privilege, SEAM Tool and, Using the SEAM Tool With Limited Kerberos Administration Privileges
- list subcommand, pktool command, How to Create a Certificate by Using the pktool gencert Command
- ListenAddress keyword, sshd_config file, Keywords in Solaris Secure Shell
- listing
- available providers in cryptographic framework, How to List Available Providers
- contents of keystore, How to Create a Certificate by Using the pktool gencert Command
- cryptographic framework providers, How to List Hardware Providers
- device policy, How to View Device Policy
- hardware providers, How to List Hardware Providers
- providers in the cryptographic framework, How to List Available Providers
- roles you can assume
- How to Assume a Role
- Commands That Manage RBAC
- users with no passwords, How to Display Users Without Passwords
- LocalForward keyword, ssh_config file, Keywords in Solaris Secure Shell
- log files
- audit records
- Audit Logs
- How to View the Contents of Binary Audit Files
- BART
- programmatic output, BART Output
- verbose output, BART Output
configuring for audit service, How to Configure syslog Audit Logs
- examining audit records, auditreduce Command
- failed login attempts, How to Monitor All Failed Login Attempts
- monitoring su command, How to Monitor Who Is Using the su Command
- syslog audit records, syslog.conf File
- /var/adm/messages, How to Determine That Oracle Solaris Auditing Is Running
- /var/log/syslog, How to Determine That Oracle Solaris Auditing Is Running
- log_level option, SASL and, SASL Options
- logadm command, archiving text summary audit files, How to Prevent Audit Trail Overflow
- logging, ftp file transfers, How to Audit FTP and SFTP File Transfers
- logging in
- and AUTH_DH, Implementation of Diffie-Hellman Authentication
- auditing logins, How to Audit Logins From Other Operating Systems
- disabling temporarily, How to Temporarily Disable User Logins
- displaying user's login status
- How to Display a User's Login Status
- How to Display a User's Login Status
- log of failed logins, How to Monitor All Failed Login Attempts
- monitoring failures, How to Monitor Failed Login Attempts
- root login
- account, Special System Logins
- restricting to console, How to Restrict and Monitor Superuser Logins
- tracking, Limiting and Monitoring Superuser
security
- access control on devices, Remote Logins
- access restrictions
- Maintaining Login Control
- Maintaining Login Control
- saving failed attempts, How to Monitor Failed Login Attempts
- system access control, Maintaining Login Control
- tracking root login, Limiting and Monitoring Superuser
system logins, Special System Logins
- task map, Securing Logins and Passwords (Task Map)
- users' basic privilege set, How Privileges Are Implemented
- with Solaris Secure Shell, How to Log In to a Remote Host With Solaris Secure Shell
- login environment variables, Solaris Secure Shell and, Solaris Secure Shell and Login Environment Variables
- login file
- login default settings, How to Monitor All Failed Login Attempts
- restricting remote root access, How to Restrict and Monitor Superuser Logins
- login pr logout audit class, Definitions of Audit Classes
- LoginGraceTime keyword, sshd_config file, Keywords in Solaris Secure Shell
- loginlog file, saving failed login attempts, How to Monitor Failed Login Attempts
- logins command
- displaying user's login status
- How to Display a User's Login Status
- How to Display a User's Login Status
- displaying users with no passwords, How to Display Users Without Passwords
- syntax, How to Display a User's Login Status
- LogLevel keyword, Solaris Secure Shell, Keywords in Solaris Secure Shell
- LookupClientHostnames keyword, sshd_config file, Keywords in Solaris Secure Shell
- -lspolicy option, auditconfig command, How to Change Audit Policy