R
- -R option
- bart create
- How to Create a Manifest
- How to Compare Manifests for the Same System Over Time
- ssh command, How to Use Port Forwarding in Secure Shell
- -r option
- bart create, How to Compare Manifests for the Same System Over Time
- passwd command, Managing Password Information
- praudit command, praudit Command
- random numbers
- dd command, How to Generate a Symmetric Key by Using the dd Command
- pktool command, How to Generate a Symmetric Key by Using the pktool Command
- raw praudit output format, praudit Command
- RBAC
- adding custom roles, How to Create a Role From the Command Line
- adding new rights profile, How to Create or Change a Rights Profile
- adding roles, How to Create and Assign a Role by Using the GUI
- adding roles from command line, How to Create a Role From the Command Line
- administration commands, Commands That Manage RBAC
- audit profiles, Rights Profiles for Administering Auditing
- auditing roles, How to Audit Roles
- authorization database, auth_attr Database
- authorizations, RBAC Authorizations
- basic concepts, Oracle Solaris RBAC Elements and Basic Concepts
- changing role passwords, How to Change the Password of a Role
- changing user properties
- from command line, How to Change the RBAC Properties of a User
checking scripts or programs for authorizations, How to Add RBAC Properties to Legacy Applications
- commands for managing, Commands That Manage RBAC
- compared to superuser model, RBAC: An Alternative to the Superuser Model
- configuring, Configuring RBAC
- database relationships, RBAC Database Relationships
- databases, Databases That Support RBAC
- editing rights profiles, How to Create or Change a Rights Profile
- elements, Oracle Solaris RBAC Elements and Basic Concepts
- modifying roles, How to Change the Properties of a Role
- modifying users, How to Change the RBAC Properties of a User
- naming services and, RBAC Databases and the Naming Services
- planning, How to Plan Your RBAC Implementation
- profile shells, Profile Shells and RBAC
- rights profile database, prof_attr Database
- rights profiles, RBAC Rights Profiles
- securing scripts, How to Add RBAC Properties to Legacy Applications
- using privileged applications, How to Assume a Role in the Solaris Management Console
- RC4, See ARCFOUR kernel provider
- rcp command
- Kerberos and
- Overview of Kerberized Commands
- Kerberos Commands
- rdist command, Kerberos and, Kerberos Commands
- read_kt command
- How to Display the Keylist (Principals) in a Keytab File
- How to Temporarily Disable Authentication for a Service on a Host
- read permissions, symbolic mode, File Permission Modes
- readable audit record format
- converting audit records to
- How to View the Contents of Binary Audit Files
- praudit Command
- realms (Kerberos)
- configuration decisions, Planning Kerberos Realms
- configuring cross-realm authentication, Configuring Cross-Realm Authentication
- contents of, Kerberos Servers
- direct, How to Establish Direct Cross-Realm Authentication
- hierarchical, How to Establish Hierarchical Cross-Realm Authentication
- hierarchical or nonhierarchical, Kerberos Realms
- hierarchy, Realm Hierarchy
- in principal names, Kerberos Principals
- mapping host names onto, Mapping Host Names Onto Realms
- names, Realm Names
- number of, Number of Realms
- requesting tickets for specific, Overview of Kerberized Commands
- servers and, Kerberos Servers
- reauth_timeout option, SASL and, SASL Options
- redirecting arrow (>), preventing redirection, Assigning a Restricted Shell to Users
- reducing
- audit files
- How to Merge Audit Files From the Audit Trail
- auditreduce Command
- storage-space requirements for audit files, Auditing Efficiently
- refreshing, cryptographic services, How to Refresh or Restart All Cryptographic Services
- registering providers, cryptographic framework, Plugins to the Oracle Solaris Cryptographic Framework
- rem_drv command, description, Device Policy Commands
- remote logins
- authentication, Authentication and Authorization for Remote Access
- authorization, Authentication and Authorization for Remote Access
- preventing superuser from, How to Restrict and Monitor Superuser Logins
- security and, Implementation of Diffie-Hellman Authentication
- RemoteForward keyword, ssh_config file, Keywords in Secure Shell
- removing
- ACL entries, How to Delete ACL Entries From a File
- audit events from audit_event file, How to Prevent the Auditing of Certain Events
- cryptographic providers
- How to Prevent the Use of a User-Level Mechanism
- How to Prevent the Use of a Kernel Software Provider
- device policy, How to Change the Device Policy on an Existing Device
- policy from device, How to Change the Device Policy on an Existing Device
- principals with ktremove command, How to Remove a Service Principal From a Keytab File
- privileges from basic set, How to Limit a User's or Role's Privileges
- privileges from limit set, How to Limit a User's or Role's Privileges
- service principal from keytab file, How to Remove a Service Principal From a Keytab File
- software providers
- permanently
- How to Prevent the Use of a Kernel Software Provider
- How to Prevent the Use of a Kernel Software Provider
- temporarily, How to Prevent the Use of a Kernel Software Provider
- renewable ticket, definition, Types of Tickets
- replacing, superuser with roles, How to Plan Your RBAC Implementation
- replayed transactions, Implementation of Diffie-Hellman Authentication
- reporting tool, See bart compare
- reports
- ASET
- ASET Reports
- Examining ASET Report Files
- Collecting ASET Reports
- BART, Basic Audit Reporting Tool (Overview)
- comparing (ASET), Comparing ASET Report Files
- directory (ASET), ASET Reports
- required control flag, PAM, How PAM Stacking Works
- requisite control flag, PAM, How PAM Stacking Works
- resource controls
- privileges, and
- What's New in RBAC?
- Privileges and System Resources
- project.max-locked-memory
- What's New in RBAC?
- Privileges and System Resources
- zone.max-locked-memory
- What's New in RBAC?
- Privileges and System Resources
- restarting
- audit daemon, How to Update the Audit Service
- cryptographic services, How to Refresh or Restart All Cryptographic Services
- ssh service, How to Configure Port Forwarding in Secure Shell
- sshd daemon, How to Configure Port Forwarding in Secure Shell
- restoring, cryptographic providers, How to Prevent the Use of a Kernel Software Provider
- restricted shell (rsh), Assigning a Restricted Shell to Users
- restricting
- remote superuser access, How to Restrict and Monitor Superuser Logins
- superuser task map, Monitoring and Restricting Superuser (Task Map)
- user privileges, How to Limit a User's or Role's Privileges
- restricting access for KDC servers, How to Restrict Access to KDC Servers
- RETRIES in Secure Shell, Secure Shell and Login Environment Variables
- return audit token, format, return Token
- rewoffl option
- mt command
- tape device cleanup and, Device-Clean Scripts
- .rhosts file, description, Secure Shell Files
- RhostsAuthentication keyword, Secure Shell, Keywords in Secure Shell
- RhostsRSAAuthentication keyword, Secure Shell, Keywords in Secure Shell
- right, See rights profiles
- rights profiles
- All
- Contents of Rights Profiles
- All Rights Profile
- assigning to trusted users
- RBAC: An Alternative to the Superuser Model
- How to Create a Role From the Command Line
- for audit service, Rights Profiles for Administering Auditing
- Basic Solaris User
- Contents of Rights Profiles
- Basic Solaris User Rights Profile
- changing contents of, How to Create or Change a Rights Profile
- changing from command line, How to Create or Change a Rights Profile
- contents of typical, Contents of Rights Profiles
- creating
- in Solaris Management Console, How to Create or Change a Rights Profile
- on command line, How to Create or Change a Rights Profile
creating roles for, How to Create and Assign a Role by Using the GUI
- databases
- See prof_attr database and exec_attr database
description
- Oracle Solaris RBAC Elements and Basic Concepts
- RBAC Rights Profiles
- major rights profiles descriptions, Contents of Rights Profiles
- methods of creating, How to Create or Change a Rights Profile
- modifying, How to Create or Change a Rights Profile
- Operator
- Contents of Rights Profiles
- Operator Rights Profile
- ordering, Order of Rights Profiles
- preventing privilege escalation
- RBAC: An Alternative to the Superuser Model
- How to Create a Role From the Command Line
- Printer Management
- Contents of Rights Profiles
- Printer Management Rights Profile
- System Administrator
- Contents of Rights Profiles
- System Administrator Rights Profile
- troubleshooting, How to Create or Change a Rights Profile
- using the System Administrator profile, How to Require a Password for Hardware Access
- viewing contents, Viewing the Contents of Rights Profiles
- Rights tool, description, How to Create or Change a Rights Profile
- rlogin command
- Kerberos and
- Overview of Kerberized Commands
- Kerberos Commands
- rlogind daemon, Kerberos and, Kerberos Daemons
- role-based access control, See RBAC
- roleadd command
- description, Commands That Manage RBAC
- using, How to Create a Role From the Command Line
- roledel command, description, Commands That Manage RBAC
- rolemod command
- changing properties of role, How to Change the Properties of a Role
- description, Commands That Manage RBAC
- roles
- adding custom roles, How to Create a Role From the Command Line
- adding for particular profiles, How to Create and Assign a Role by Using the GUI
- adding from command line, How to Create a Role From the Command Line
- assigning privileges to, How to Assign Privileges to a User or Role
- assigning with usermod command, How to Assign a Role to a Local User
- assuming
- How to Assume a Role in a Terminal Window
- How to Assume a Role in the Solaris Management Console
- assuming after login, RBAC Roles
- assuming in a terminal window
- Profile Shells and RBAC
- How to Assume a Role in a Terminal Window
- assuming in Solaris Management Console, How to Assume a Role in the Solaris Management Console
- assuming Primary Administrator role, How to Assume a Role in a Terminal Window
- assuming root role, How to Assume a Role in a Terminal Window
- assuming System Administrator role, How to Assume a Role in a Terminal Window
- auditing, How to Audit Roles
- changing password of, How to Change the Password of a Role
- changing properties of, How to Change the Properties of a Role
- creating
- Crypto Management role, How to Assign a Role to a Local User
- Custom Operator role, How to Create a Role From the Command Line
- Device Security role, How to Create and Assign a Role by Using the GUI
- DHCP Management role, How to Create and Assign a Role by Using the GUI
- for particular profiles, How to Create and Assign a Role by Using the GUI
- Network Security role, How to Create and Assign a Role by Using the GUI
- on command line, How to Create a Role From the Command Line
- Operator role, How to Create and Assign a Role by Using the GUI
- role with limited scope, How to Create and Assign a Role by Using the GUI
- root role, How to Make root User Into a Role
- security-related roles, How to Create and Assign a Role by Using the GUI
- System Administrator role, How to Create and Assign a Role by Using the GUI
description, RBAC Roles
- determining directly assigned privileges, How to Determine the Privileges That You Have Been Directly Assigned
- determining role's privileged commands, How to Determine the Privileged Commands That a Role Can Run
- listing local roles
- How to Assume a Role in a Terminal Window
- Commands That Manage RBAC
- making root user into role, How to Make root User Into a Role
- modifying, How to Change the Properties of a Role
- modifying assignment to a user, How to Create and Assign a Role by Using the GUI
- recommended roles, RBAC: An Alternative to the Superuser Model
- summary, Oracle Solaris RBAC Elements and Basic Concepts
- troubleshooting, How to Create and Assign a Role by Using the GUI
- use in RBAC, RBAC: An Alternative to the Superuser Model
- using an assigned role
- How to Assume a Role in a Terminal Window
- How to Assume a Role in the Solaris Management Console
- using to access the hardware, How to Require a Password for Hardware Access
- roles command
- description, Commands That Manage RBAC
- using, How to Assume a Role in a Terminal Window
- root account, description, Special System Accounts
- root principal, adding to host's keytab, Administering Keytab Files
- root role
- provided role, RBAC: An Alternative to the Superuser Model
- recommended role, RBAC: An Alternative to the Superuser Model
- root role (RBAC)
- assuming role, How to Assume a Role in a Terminal Window
- changing back into root user, How to Make root User Into a Role
- troubleshooting, How to Make root User Into a Role
- root user
- changing from root role, How to Make root User Into a Role
- changing to root role, How to Make root User Into a Role
- displaying access attempts on console, How to Restrict and Monitor Superuser Logins
- monitoring su command attempts
- Limiting and Monitoring Superuser
- How to Monitor Who Is Using the su Command
- replacing in RBAC, RBAC Roles
- restricting access, Restricting root Access to Shared Files
- restricting remote access
- How to Restrict and Monitor Superuser Logins
- How to Restrict and Monitor Superuser Logins
- tracking logins, Limiting and Monitoring Superuser
- RPCSEC_GSS API, Kerberos and, SEAM 1.0 Components
- RSA kernel provider, How to List Available Providers
- RSAAuthentication keyword, Secure Shell, Keywords in Secure Shell
- rsh command
- Kerberos and
- Overview of Kerberized Commands
- Kerberos Commands
- rsh command (restricted shell), Assigning a Restricted Shell to Users
- rshd daemon, Kerberos and, Kerberos Daemons
- rstchown system variable, How to Change the Owner of a Local File
- rules file (BART), BART Rules File
- rules file attributes, See keywords
- rules file format (BART), BART Rules File Format
- rules file specification language, See quoting syntax
- Running ASET task map, Running ASET (Task Map)