JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
System Administration Guide: Security Services     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Controlling Access to Devices (Tasks)

5.  Using the Basic Audit Reporting Tool (Tasks)

6.  Controlling Access to Files (Tasks)

7.  Using the Automated Security Enhancement Tool (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Role-Based Access Control (Reference)

11.  Privileges (Tasks)

12.  Privileges (Reference)

Part IV Cryptographic Services

13.  Oracle Solaris Cryptographic Framework (Overview)

14.  Oracle Solaris Cryptographic Framework (Tasks)

15.  Oracle Solaris Key Management Framework

Part V Authentication Services and Secure Communication

16.  Using Authentication Services (Tasks)

17.  Using PAM

18.  Using SASL

19.  Using Oracle Solaris Secure Shell (Tasks)

20.  Oracle Solaris Secure Shell (Reference)

Part VI Kerberos Service

21.  Introduction to the Kerberos Service

22.  Planning for the Kerberos Service

23.  Configuring the Kerberos Service (Tasks)

24.  Kerberos Error Messages and Troubleshooting

25.  Administering Kerberos Principals and Policies (Tasks)

26.  Using Kerberos Applications (Tasks)

27.  The Kerberos Service (Reference)

Part VII Oracle Solaris Auditing

28.  Oracle Solaris Auditing (Overview)

29.  Planning for Oracle Solaris Auditing

30.  Managing Oracle Solaris Auditing (Tasks)

31.  Oracle Solaris Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Y

Z

D

-D option
auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
ppriv command, index iconHow to Determine Which Privileges a Program Requires
d_passwd file
creating, index iconHow to Create a Dial-Up Password
description, index iconDial-Up Logins
disabling dial-up logins temporarily, index iconHow to Temporarily Disable Dial-Up Logins
-d option
auditreduce command, index iconHow to Select Audit Events From the Audit Trail
getfacl command, index iconHow to Display ACL Entries for a File
praudit command, index iconpraudit Command
setfacl command, index iconHow to Delete ACL Entries From a File
daemons
auditd, index iconauditd Daemon
kcfd, index iconAdministrative Commands in the Oracle Solaris Cryptographic Framework
keyserv, index iconHow to Restart the Secure RPC Keyserver
nscd (name service cache daemon)
index iconHow to Create and Assign a Role by Using the GUI
index iconCommands That Manage RBAC
rpc.nispasswd, index iconHow to Specify a New Password Algorithm for an NIS+ Domain
running with privileges, index iconAdministrative Differences on a System With Privileges
ssh-agent, index iconHow to Reduce Password Prompts in Secure Shell
sshd, index iconA Typical Secure Shell Session
table of Kerberos, index iconKerberos Daemons
vold, index iconHow to Authorize Users to Allocate a Device
Data Encryption Standard, See DES encryption
data forwarding, Secure Shell, index iconCommand Execution and Data Forwarding in Secure Shell
databases
audit_user, index iconaudit_user Database
auth_attr, index iconauth_attr Database
backing up and propagating KDC, index iconBacking Up and Propagating the Kerberos Database
creating KDC, index iconHow to Manually Configure a Master KDC
cred for Secure RPC
index iconDiffie-Hellman Authentication and Secure RPC
index iconHow to Set Up a Diffie-Hellman Key for an NIS+ Host
exec_attr, index iconexec_attr Database
KDC propagation, index iconWhich Database Propagation System to Use
NFS secret keys, index iconImplementation of Diffie-Hellman Authentication
prof_attr, index iconprof_attr Database
publickey for Secure RPC, index iconDiffie-Hellman Authentication and Secure RPC
RBAC, index iconDatabases That Support RBAC
user_attr, index iconuser_attr Database
with privilege information, index iconFiles With Privilege Information
dd command, generating secret keys, index iconHow to Generate a Symmetric Key by Using the dd Command
deallocate command
allocate error state
index iconAllocate Error State
index iconAllocate Error State
authorizations for, index iconDevice Allocation Commands
authorizations required, index iconCommands That Require Authorizations
description, index iconDevice Allocation Commands
device-clean scripts and, index iconDevice-Clean Scripts
using, index iconHow to Deallocate a Device
deallocating
devices, index iconHow to Deallocate a Device
forcibly, index iconForcibly Deallocating a Device
microphone, index iconHow to Deallocate a Device
debugging, privileges, index iconHow to Determine Which Privileges a Program Requires
debugging sequence number, index iconsequence Token
decrypt command
description, index iconUser-Level Commands in the Oracle Solaris Cryptographic Framework
syntax, index iconHow to Encrypt and Decrypt a File
decrypting
conversation keys for Secure RPC, index iconImplementation of Diffie-Hellman Authentication
files, index iconHow to Encrypt and Decrypt a File
NFS secret keys, index iconImplementation of Diffie-Hellman Authentication
secret keys, index iconImplementation of Diffie-Hellman Authentication
default/login file, description, index iconSecure Shell Files
default_realm section
krb5.conf file
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
defaultpriv keyword, user_attr database, index iconFiles With Privilege Information
defaults
ACL entries for directories
index iconACL Entries for UFS Directories
index iconACL Entries for UFS Directories
audit_startup script, index iconaudit_startup Script
praudit output format
index iconpraudit Command
index iconpraudit Command
privilege settings in policy.conf file, index iconFiles With Privilege Information
system-wide auditing, index iconAudit Classes
system-wide in policy.conf file, index iconPassword Encryption
umask value, index iconDefault umask Value
delegating, RBAC authorizations, index iconDelegation Authority in Authorizations
delete_entry command, ktutil command, index iconHow to Temporarily Disable Authentication for a Service on a Host
deleting
ACL entries
index iconCommands for Administering UFS ACLs
index iconHow to Delete ACL Entries From a File
archived audit files, index iconHow to Prevent Audit Trail Overflow
audit files, index iconHow to Merge Audit Files From the Audit Trail
host's service, index iconHow to Temporarily Disable Authentication for a Service on a Host
not_terminated audit files, index iconHow to Clean Up a not_terminated Audit File
policies (Kerberos), index iconHow to Delete a Kerberos Policy
principal (Kerberos), index iconHow to Delete a Kerberos Principal
rights profiles, index iconHow to Create or Change a Rights Profile
DenyGroups keyword, sshd_config file, index iconKeywords in Secure Shell
DenyUsers keyword, sshd_config file, index iconKeywords in Secure Shell
DES encryption, kernel provider, index iconHow to List Available Providers
DES encryption, Secure NFS, index iconDES Encryption With Secure NFS
destroying, tickets with kdestroy, index iconDestroying Kerberos Tickets
determining
audit_control flags are correct, index iconHow to Determine That Oracle Solaris Auditing Is Running
audit ID of a user, index iconHow to Modify a User's Preselection Mask
audit_user flags are correct, index iconHow to Determine That Oracle Solaris Auditing Is Running
auditing is running, index iconHow to Determine That Oracle Solaris Auditing Is Running
c2audit module is loaded, index iconHow to Determine That Oracle Solaris Auditing Is Running
files with setuid permissions, index iconHow to Find Files With Special File Permissions
if file has ACL, index iconHow to Check if a File Has an ACL
privileges on a process, index iconHow to Determine the Privileges on a Process
privileges task map, index iconDetermining Your Privileges (Task Map)
/dev/arp device, getting IP MIB-II information, index iconHow to Retrieve IP MIB-II Information From a /dev/* Device
/dev/urandom device, index iconHow to Generate a Symmetric Key by Using the dd Command
devfsadm command, description, index iconDevice Policy Commands
device_allocate file
description, index icondevice_allocate File
format, index icondevice_allocate File
sample
index iconHow to Change Which Devices Can Be Allocated
index icondevice_allocate File
device allocation
adding devices, index iconManaging Device Allocation (Task Map)
allocatable devices
index icondevice_allocate File
index icondevice_allocate File
allocate command, index iconDevice Allocation Commands
allocate error state, index iconAllocate Error State
allocating devices, index iconHow to Allocate a Device
auditing, index iconHow to Audit Device Allocation
authorizations for commands, index iconDevice Allocation Commands
authorizing users to allocate, index iconHow to Authorize Users to Allocate a Device
changing allocatable devices, index iconHow to Change Which Devices Can Be Allocated
commands, index iconDevice Allocation Commands
components of mechanism, index iconComponents of Device Allocation
configuration file, index icondevice_maps File
deallocate command, index iconDevice Allocation Commands
device-clean scripts and, index iconDevice-Clean Scripts
using, index iconHow to Deallocate a Device
deallocating devices, index iconHow to Deallocate a Device
device_allocate file, index icondevice_allocate File
device-clean scripts
audio devices, index iconDevice-Clean Scripts
CD-ROM drives, index iconDevice-Clean Scripts
description, index iconDevice-Clean Scripts
diskette drives, index iconDevice-Clean Scripts
options, index iconDevice-Clean Scripts
tape drives
index icondevice_allocate File
index iconDevice-Clean Scripts
writing new scripts, index iconDevice-Clean Scripts
device_maps file, index icondevice_maps File
disabling, index iconHow to Disable the Audit Service
enabling
index iconHow to Make a Device Allocatable
index iconHow to Make a Device Allocatable
examples, index iconHow to Allocate a Device
forcibly allocating devices, index iconForcibly Allocating a Device
forcibly deallocating devices, index iconForcibly Deallocating a Device
making device allocatable, index iconHow to Make a Device Allocatable
managing devices, index iconManaging Device Allocation (Task Map)
mounting devices, index iconHow to Mount an Allocated Device
not requiring authorization, index iconHow to Change Which Devices Can Be Allocated
preventing, index iconHow to Change Which Devices Can Be Allocated
requiring authorization, index iconHow to Change Which Devices Can Be Allocated
task map, index iconManaging Device Allocation (Task Map)
troubleshooting
index iconHow to Allocate a Device
index iconHow to Mount an Allocated Device
troubleshooting permissions, index iconHow to View Allocation Information About a Device
unmounting allocated device, index iconHow to Deallocate a Device
user procedures, index iconAllocating Devices (Task Map)
using, index iconAllocating Devices (Task Map)
using allocate command, index iconHow to Allocate a Device
viewing information, index iconHow to View Allocation Information About a Device
device-clean scripts
and object reuse, index iconDevice-Clean Scripts
audio devices, index iconDevice-Clean Scripts
CD-ROM drives, index iconDevice-Clean Scripts
description, index iconDevice-Clean Scripts
diskette drives, index iconDevice-Clean Scripts
options, index iconDevice-Clean Scripts
tape drives
index icondevice_allocate File
index icondevice_allocate File
index iconDevice-Clean Scripts
writing new scripts, index iconDevice-Clean Scripts
device management, See device policy
device_maps file
description, index icondevice_maps File
format, index icondevice_maps File
sample entries, index icondevice_maps File
device policy
add_drv command, index iconDevice Policy Commands
auditing changes, index iconHow to Audit Changes in Device Policy
changing, index iconHow to Change the Device Policy on an Existing Device
commands, index iconDevice Policy Commands
configuring, index iconConfiguring Device Policy
kernel protection, index iconDevice Protection (Reference)
managing devices, index iconConfiguring Device Policy (Task Map)
overview
index iconControlling Access to Devices
index iconDevice Policy (Overview)
removing from device, index iconHow to Change the Device Policy on an Existing Device
task map, index iconConfiguring Device Policy (Task Map)
update_drv command
index iconHow to Change the Device Policy on an Existing Device
index iconDevice Policy Commands
viewing, index iconHow to View Device Policy
Device Security (RBAC), creating role, index iconHow to Create and Assign a Role by Using the GUI
devices
adding device policy, index iconHow to Change the Device Policy on an Existing Device
allocating for use, index iconAllocating Devices (Task Map)
auditing allocation of, index iconHow to Audit Device Allocation
auditing policy changes, index iconHow to Audit Changes in Device Policy
authorizing users to allocate, index iconHow to Authorize Users to Allocate a Device
changing device policy, index iconHow to Change the Device Policy on an Existing Device
changing which are allocatable, index iconHow to Change Which Devices Can Be Allocated
deallocating a device, index iconHow to Deallocate a Device
/dev/urandom device, index iconHow to Generate a Symmetric Key by Using the dd Command
device allocation
See device allocation
forcibly allocating, index iconForcibly Allocating a Device
forcibly deallocating, index iconForcibly Deallocating a Device
getting IP MIB-II information, index iconHow to Retrieve IP MIB-II Information From a /dev/* Device
listing, index iconHow to View Device Policy
listing device names, index iconHow to View Allocation Information About a Device
login access control, index iconRemote Logins
making allocatable, index iconHow to Make a Device Allocatable
managing, index iconConfiguring Device Policy (Task Map)
managing allocation of, index iconManaging Device Allocation (Task Map)
mounting allocated devices, index iconHow to Mount an Allocated Device
not requiring authorization for use, index iconHow to Change Which Devices Can Be Allocated
policy commands, index iconDevice Policy Commands
preventing use of all, index iconHow to Change Which Devices Can Be Allocated
preventing use of some, index iconHow to Change Which Devices Can Be Allocated
privilege model and, index iconPrivileges and Devices
protecting by device allocation, index iconControlling Access to Devices
protecting in the kernel, index iconControlling Access to Devices
removing policy, index iconHow to Change the Device Policy on an Existing Device
security, index iconControlling Access to Devices
superuser model and, index iconPrivileges and Devices
unmounting allocated device, index iconHow to Deallocate a Device
viewing allocation information, index iconHow to View Allocation Information About a Device
viewing device policy, index iconHow to View Device Policy
zones and, index iconControlling Access to Devices
dfstab file
security modes, index iconHow to Set Up a Secure NFS Environment With Multiple Kerberos Security Modes
sharing files, index iconSharing Files Across Machines
DH authentication
configuring in NIS, index iconHow to Set Up a Diffie-Hellman Key for an NIS Host
configuring in NIS+, index iconHow to Set Up a Diffie-Hellman Key for an NIS+ Host
description, index iconDiffie-Hellman Authentication and Secure RPC
for NIS+ client, index iconHow to Set Up a Diffie-Hellman Key for an NIS+ Host
for NIS client, index iconHow to Set Up a Diffie-Hellman Key for an NIS Host
mounting files with, index iconHow to Share NFS Files With Diffie-Hellman Authentication
sharing files with, index iconHow to Share NFS Files With Diffie-Hellman Authentication
DHCP Management (RBAC), creating role, index iconHow to Create and Assign a Role by Using the GUI
dial-up passwords
creating, index iconHow to Create a Dial-Up Password
disabling, index iconDial-Up Logins
disabling temporarily, index iconHow to Temporarily Disable Dial-Up Logins
/etc/d_passwd file, index iconDial-Up Logins
security, index iconDial-Up Logins
dialups file, creating, index iconHow to Create a Dial-Up Password
Diffie-Hellman authentication, See DH authentication
digest command
description, index iconUser-Level Commands in the Oracle Solaris Cryptographic Framework
example, index iconHow to Compute a Digest of a File
syntax, index iconHow to Compute a Digest of a File
digestmd5.so.1 plug-in, SASL and, index iconSASL Plug-ins
digests
computing for file, index iconHow to Compute a Digest of a File
of files
index iconHow to Compute a Digest of a File
index iconHow to Compute a Digest of a File
dir line, audit_control file, index iconaudit_control File
direct realms, index iconHow to Establish Direct Cross-Realm Authentication
directories
See also files
ACL entries
index iconACL Entries for UFS Directories
index iconACL Entries for UFS Directories
audit_control file definitions, index iconaudit_control File
audit directories full
index iconauditd Daemon
index iconaudit_warn Script
auditd daemon pointer
index iconauditd Daemon
index iconauditd Daemon
checklist task setting (ASET)
index iconSpecifying Directories for System Files Checks Task: CKLISTPATH
index iconCKLISTPATH_level Environment Variables
displaying files and related information
index iconCommands for Viewing and Securing Files
index iconHow to Display File Information
master files (ASET), index iconASET Master Files
mounting audit directories, index iconAudit Trail
permissions
defaults, index iconDefault umask Value
description, index iconUNIX File Permissions
public directories, index iconSticky Bit
reports (ASET), index iconASET Reports
working directory (ASET)
index iconASETDIR Environment Variable
index iconHow to Run ASET Interactively
disabling
abort sequence, index iconHow to Disable a System's Abort Sequence
audit policy, index iconHow to Configure Audit Policy
audit service, index iconHow to Disable the Audit Service
cryptographic mechanisms, index iconHow to Prevent the Use of a User-Level Mechanism
device allocation, index iconHow to Disable the Audit Service
dial-up logins temporarily, index iconHow to Temporarily Disable Dial-Up Logins
dial-up passwords, index iconHow to Temporarily Disable Dial-Up Logins
executable stacks, index iconHow to Disable Programs From Using Executable Stacks
executables that compromise security, index iconPreventing Executable Files From Compromising Security
hardware mechanisms, index iconHow to Disable Hardware Provider Mechanisms and Features
keyboard abort, index iconHow to Disable a System's Abort Sequence
keyboard shutdown, index iconHow to Disable a System's Abort Sequence
logging of executable stack messages, index iconHow to Disable Programs From Using Executable Stacks
logins temporarily, index iconHow to Temporarily Disable User Logins
programs from using executable stacks, index iconHow to Disable Programs From Using Executable Stacks
remote root access, index iconHow to Restrict and Monitor Superuser Logins
service on a host (Kerberos), index iconHow to Temporarily Disable Authentication for a Service on a Host
system abort sequence, index iconHow to Disable a System's Abort Sequence
user logins, index iconHow to Temporarily Disable User Logins
disk partitioning, for binary audit files, index iconHow to Create Partitions for Audit Files
disk-space requirements, index iconCost of Storage of Audit Data
diskette drives
allocating, index iconHow to Mount an Allocated Device
device-clean scripts, index iconDevice-Clean Scripts
displaying
ACL entries
index iconCommands for Administering UFS ACLs
index iconHow to Check if a File Has an ACL
index iconHow to Display ACL Entries for a File
allocatable devices, index iconHow to View Allocation Information About a Device
ASET task status
index iconASET Task List
index iconExample of an ASET Execution Log File
audit policies, index iconHow to Configure Audit Policy
audit record formats, index iconHow to Display Audit Record Formats
audit records, index iconHow to View the Contents of Binary Audit Files
audit records in XML format, index iconHow to View the Contents of Binary Audit Files
device policy, index iconHow to View Device Policy
file information, index iconHow to Display File Information
files and related information, index iconCommands for Viewing and Securing Files
format of audit records, index iconHow to Display Audit Record Formats
providers in the cryptographic framework, index iconHow to List Available Providers
roles you can assume
index iconHow to Assume a Role in a Terminal Window
index iconCommands That Manage RBAC
root access attempts, index iconHow to Restrict and Monitor Superuser Logins
selected audit records, index iconHow to Merge Audit Files From the Audit Trail
su command attempts, index iconHow to Restrict and Monitor Superuser Logins
sublist of principals (Kerberos), index iconHow to View the List of Kerberos Principals
user's login status
index iconHow to Display a User's Login Status
index iconHow to Display a User's Login Status
users with no passwords, index iconHow to Display Users Without Passwords
dminfo command, index icondevice_maps File
DNS, Kerberos and, index iconClient and Service Principal Names
domain_realm section
krb5.conf file
index iconMapping Host Names Onto Realms
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
dot (.)
authorization name separator, index iconAuthorization Naming Conventions
displaying hidden files, index iconHow to Display File Information
path variable entry, index iconSetting the PATH Variable
double dollar sign ($$), parent shell process number, index iconHow to Determine the Privileges on a Process
DSAAuthentication keyword, See PubkeyAuthentication keyword
DTD for praudit command, index iconpraudit Command
.dtprofile script, use in Secure Shell, index iconHow to Set Up the ssh-agent Command to Run Automatically in CDE
duplicating, principals (Kerberos), index iconHow to Duplicate a Kerberos Principal
DynamicForward keyword, ssh_config file, index iconKeywords in Secure Shell