Securing Users and Processes in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

L

–l option
ppriv commandindex iconListing Privileges
profiles command
index iconViewing the Contents of Rights Profiles
index iconListing Rights Profiles
ldapaddent command
listing all qualified security attributesindex iconListing Qualified Attributes
least privilege
principle ofindex iconPrivileges Protecting Kernel Processes
legacy applications and privileges
index iconAssigning Security Attributes to a Legacy Application
index iconLegacy Applications and the Use of Privileges
limit privilege setindex iconHow Privileges Are Implemented
limitpriv keywordindex iconuser_attr Database
list_devices command
authorizations required forindex iconCommands and Associated Authorizations
listing
all rightsindex iconListing Rights and Their Definitions
authorizationsindex iconListing Authorizations
default rights configurationindex iconListing Rights and Their Definitions
privilegesindex iconListing Privileges
qualifiers to security attributesindex iconListing Qualified Attributes
rightsindex iconListing Rights and Their Definitions
rights of initial userindex iconListing Rights and Their Definitions
rights profilesindex iconListing Rights Profiles
rolesindex iconListing Roles
roles you can assume
index iconRights Administration Commands
index iconAssuming an ARMOR Role
your rightsindex iconListing Rights and Their Definitions
lock_after_retries keyword
descriptionindex iconuser_attr Database
logging in
remote root loginindex iconChanging Whether root Is a User or a Role
users' basic privilege setindex iconHow Privileges Are Implemented