U
- -U option
- allocate command, Device Allocation Commands
- list_devices command, Device Allocation Commands
- uauth audit token
- Auditing Enhancements in the Solaris 10 Release
- uauth Token
- UDP
- addresses, iport Token
- port forwarding and, How to Configure Port Forwarding in Secure Shell
- Secure Shell and, How to Configure Port Forwarding in Secure Shell
- using for remote audit logs, Audit Logs
- uid_aliases file (ASET)
- The uid_aliases File
- Specifying an Aliases File: UID_ALIASES
- UID_ALIASES variable (ASET)
- The uid_aliases File
- Specifying an Aliases File: UID_ALIASES
- UID_ALIASES Environment Variable
- umask value
- and file creation, Default umask Value
- typical settings, Default umask Value
- umount command, with security attributes, How to Authorize Users to Allocate a Device
- uninstalling, cryptographic providers, How to Prevent the Use of a User-Level Mechanism
- UNIX file permissions, See files, permissions
- unmounting, allocated devices, How to Deallocate a Device
- update_drv command
- description, Device Policy Commands
- using, How to Change the Device Policy on an Existing Device
- updating, audit service, How to Update the Audit Service
- upriv audit token, upriv Token
- URL for online help, Graphical Kerberos Tool, Online Help URL in the Graphical Kerberos Administration Tool
- use_authid option, SASL and, SASL Options
- UseLogin keyword, sshd_config file, Keywords in Secure Shell
- UseOpenSSLEngine keyword, Secure Shell, Keywords in Secure Shell
- UsePrivilegedPort keyword, Secure Shell, Keywords in Secure Shell
- user accounts
- See also users
- ASET check, User and Group Checks
- displaying login status
- How to Display a User's Login Status
- How to Display a User's Login Status
- User Accounts tool, description, How to Change the RBAC Properties of a User
- user ACL entries
- default entries for directories, ACL Entries for UFS Directories
- description, ACL Entries for UFS Files
- setting, How to Add ACL Entries to a File
- user administration audit class, Definitions of Audit Classes
- user_attr database
- defaultpriv keyword, Files With Privilege Information
- description
- Databases That Support RBAC
- user_attr Database
- limitpriv keyword, Files With Privilege Information
- privs keyword, Files With Privilege Information
- RBAC relationships, RBAC Database Relationships
- user audit fields, audit_user database, audit_user Database
- user classes of files, File and Directory Ownership
- user database (RBAC), See user_attr database
- user ID
- audit ID and
- What Is Auditing?
- Proscess Audit Characteristics
- in NFS services, How to Create a Credential Table
- user ID numbers (UIDs), special accounts and, Special System Accounts
- User keyword, ssh_config file, Keywords in Secure Shell
- user principal, description, Kerberos Principals
- user procedures
- allocating devices, Allocating Devices (Task Map)
- assuming a role
- Configuring RBAC
- Using Roles (Task Map)
- chkey command, How to Set Up a Diffie-Hellman Key for an NIS User
- computing digest of a file, How to Compute a Digest of a File
- computing MAC of a file, How to Compute a MAC of a File
- creating self-signed certificate, How to Create a Certificate by Using the pktool gencert Command
- decrypting files, How to Encrypt and Decrypt a File
- encrypting files, Protecting Files With the Oracle Solaris Cryptographic Framework (Task Map)
- encrypting NIS user's private key, How to Set Up a Diffie-Hellman Key for an NIS User
- exporting certificates, How to Export a Certificate and Private Key in PKCS #12 Format
- generating a symmetric key
- using the dd command, How to Generate a Symmetric Key by Using the dd Command
- using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore, How to Generate a Passphrase by Using the pktool setpin Command
- importing certificates, How to Import a Certificate Into Your Keystore
- protecting files, Protecting Files With UNIX Permissions (Task Map)
- using ACLs, Protecting UFS Files With ACLs (Task Map)
- using an assigned role
- Configuring RBAC
- Using Roles (Task Map)
- using pktool command, Using the Key Management Framework (Task Map)
- using Secure Shell, Using Oracle Solaris Secure Shell (Task Map)
- user rights management, See privileges
- user scripts, configuring for ssh-agent daemon in CDE, How to Set Up the ssh-agent Command to Run Automatically in CDE
- useradd command
- adding local user, How to Make root User Into a Role
- description, Commands That Manage RBAC
- userdel command, description, Commands That Manage RBAC
- UserKnownHostsFile keyword, ssh_config file, Keywords in Secure Shell
- UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
- usermod command
- changing user's RBAC properties, How to Change the RBAC Properties of a User
- description, Commands That Manage RBAC
- using to assign role, How to Assign a Role to a Local User
- users
- adding local user, How to Make root User Into a Role
- allocating devices, How to Allocate a Device
- assigning allocate authorization to, How to Authorize Users to Allocate a Device
- assigning privileges to, How to Assign Privileges to a User or Role
- assigning RBAC defaults, policy.conf File
- auditing all of their commands, How to Audit All Commands by Users
- basic privilege set, How Privileges Are Implemented
- changing properties from command line, How to Change the RBAC Properties of a User
- computing digest of files, How to Compute a Digest of a File
- computing MAC of files, How to Compute a MAC of a File
- creating local user, How to Make root User Into a Role
- deallocating devices, How to Deallocate a Device
- determining directly assigned privileges, How to Determine the Privileges That You Have Been Directly Assigned
- determining own privileged commands, How to Determine the Privileged Commands That You Can Run
- disabling login, How to Temporarily Disable User Logins
- displaying login status, How to Display a User's Login Status
- encrypting files, How to Encrypt and Decrypt a File
- generating a symmetric key, How to Generate a Symmetric Key by Using the pktool Command
- having no passwords, How to Display Users Without Passwords
- initial inheritable privileges, How Privileges Are Implemented
- modifying audit preselection mask of, How to Change a User's Audit Characteristics
- modifying properties (RBAC), How to Change the RBAC Properties of a User
- mounting allocated devices, How to Mount an Allocated Device
- restricting basic privileges, How to Limit a User's or Role's Privileges
- troubleshooting running privileged commands, How to Determine the Privileged Commands That You Can Run
- unmounting allocated devices, How to Deallocate a Device
- UseRsh keyword, ssh_config file, Keywords in Secure Shell
- using
- ACLs, How to Add ACL Entries to a File
- allocate command, How to Allocate a Device
- ASET, Running ASET (Task Map)
- BART, Using BART (Tasks)
- cryptoadm command, Administering the Cryptographic Framework (Tasks)
- cryptographic framework task map, Using the Cryptographic Framework (Task Map)
- dd command, How to Generate a Symmetric Key by Using the dd Command
- deallocate command, How to Deallocate a Device
- device allocation
- Allocating Devices (Task Map)
- How to Allocate a Device
- digest command, How to Compute a Digest of a File
- encrypt command, How to Encrypt and Decrypt a File
- file permissions, Protecting Files (Task Map)
- mac command, How to Compute a MAC of a File
- mount command, How to Mount an Allocated Device
- new password algorithm, How to Specify an Algorithm for Password Encryption
- pktool command, How to Generate a Symmetric Key by Using the pktool Command
- ppriv command
- How to Determine the Privileges on a Process
- How to Determine the Privileges on a Process
- privileges, Determining Your Assigned Privileges
- privileges task map, Determining Your Privileges (Task Map)
- RBAC task map, Using RBAC (Task Map)
- roles, Using Roles
- roles task map, Using Roles (Task Map)
- Secure Shell task map, Using Oracle Solaris Secure Shell (Task Map)
- smrole command, How to Assign Privileges to a User or Role
- ssh-add command, How to Reduce Password Prompts in Secure Shell
- ssh-agent daemon, How to Reduce Password Prompts in Secure Shell
- truss command, How to Determine Which Privileges a Program Requires
- umount command, How to Deallocate a Device
- usermod command, How to Assign Privileges to a User or Role
- Using the Key Management Framework (Task Map), Using the Key Management Framework (Task Map)
- /usr/aset/asetenv file
- ASET Environment File (asetenv)
- Modifying the Environment File (asetenv)
- /usr/aset directory, Automated Security Enhancement Tool (ASET)
- /usr/aset/masters/tune files
- description, Tune Files
- modifying, Modifying the Tune Files
- rules, Tune File Examples
- /usr/aset/masters/uid_aliases file, The uid_aliases File
- /usr/aset/reports directory, structure, ASET Reports
- /usr/aset/reports directory structure, ASET Reports
- /usr/aset/reports/latest directory, ASET Reports
- /usr/bin/ftp command, Kerberos and, Kerberos Commands
- /usr/bin/kdestroy command, Kerberos and, Kerberos Commands
- /usr/bin/kinit command, Kerberos and, Kerberos Commands
- /usr/bin/klist command, Kerberos and, Kerberos Commands
- /usr/bin/kpasswd command, Kerberos and, Kerberos Commands
- /usr/bin/ktutil command, Kerberos and, Kerberos Commands
- /usr/bin/rcp command, Kerberos and, Kerberos Commands
- /usr/bin/rdist command, Kerberos and, Kerberos Commands
- /usr/bin/rlogin command, Kerberos and, Kerberos Commands
- /usr/bin/rsh command, Kerberos and, Kerberos Commands
- /usr/bin/telnet command, Kerberos and, Kerberos Commands
- /usr/lib/kprop command, description, Kerberos Commands
- /usr/lib/krb5/kadmind daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/kpropd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/krb5kdc daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/ktkt_warnd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/libsasl.so library, overview, SASL (Overview)
- /usr/sbin/gkadmin command, description, Kerberos Commands
- /usr/sbin/gsscred command, description, Kerberos Commands
- /usr/sbin/in.ftpd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.rlogind daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.rshd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.telnetd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/kadmin command, description, Kerberos Commands
- /usr/sbin/kadmin.local command, description, Kerberos Commands
- /usr/sbin/kclient command, description, Kerberos Commands
- /usr/sbin/kdb5_ldap_util command, description, Kerberos Commands
- /usr/sbin/kdb5_util command, description, Kerberos Commands
- /usr/sbin/kgcmgr command, description, Kerberos Commands
- /usr/sbin/kproplog command, description, Kerberos Commands
- /usr/share/lib/xml directory, praudit Command
- usrgrp.rpt file
- description
- User and Group Checks
- Format of ASET Report Files
- example, Format of ASET Report Files
- uucico command, login program, How to Create a Dial-Up Password