R
- –R option
- dhcpconfig command
Requiring a User to Type Password Before Administering DHCP
- rolemod command
Changing the root User Into the root Role
- useradd command
Rights Administration Commands
Creating a Login for a Trusted User
Creating a Login for a Trusted User
- usermod command
Caching Authentication for Ease of Role Use
Adding a Role to a User
Creating and Assigning a Role to Administer Cryptographic Services
- –r option
- logins command
Listing Roles
- ppriv command
Commands for Handling Privileges
Protecting Directories on Your System From Application Processes
Users Locking Down the Applications That They Run
- removing
- basic privileges from a rights profile
Removing a Basic Privilege From a Rights Profile
- basic privilege from application
Users Locking Down the Applications That They Run
How to Lock Down the MySQL Service
- basic privilege from rights profile
Removing a Basic Privilege From a Rights Profile
- basic privilege from yourself
Removing a Basic Privilege From Yourself
- limit privilege from user
Removing Privileges From a User's Limit Set
- role assignments
How to Change the root Role Into a User
- users' rights
Restricting Users' Rights
- replacing
- keyword values
Requiring a User to Type Password Before Administering DHCP
Modifying a Role's Rights
- root role with root user
How to Change the root Role Into a User
- root user with root role
Changing the root User Into the root Role
- superuser with roles
Following Your Chosen Rights Model
- resource controls
- privileges, and
Privileges and Resource Management
- project.max-locked-memory
Privileges and Resource Management
- zone.max-locked-memory
Privileges and Resource Management
- restricted files
- enabling read access to
Enabling a Trusted User to Read Extended Accounting Files
- enabling write access to
Cloning and Enhancing the Network IPsec Management Rights Profile
Editing a System File
- restricting
- access to computer by time and day
Basics of User and Process Rights
- database privileges
How to Lock Down the MySQL Service
- editor of guest user
Preventing Guests From Spawning Editor Subprocesses
- guest access to system
Assigning the Editor Restrictions Rights Profile to All Users
- port privileges
How to Apply Extended Privilege Policy to a Port
- rights in a rights profile
Creating a Sun Ray Users Rights Profile
Removing a Basic Privilege From a Rights Profile
- web server privileges
How to Assign Specific Privileges to the Apache Web Server
- restrictive security policy
- components of
Basics of User and Process Rights
- creating
Restricting Users' Rights
- enforcing
Locking Down Resources by Using Extended Privileges
- rights See also
authorizations, privileges, rights profiles, roles- access_times keyword
Basics of User and Process Rights
- access_tz keyword
Basics of User and Process Rights
- adding privileged users
Creating a User Who Can Administer DHCP
- administration commands
Commands That Manage Authorizations, Rights Profiles, and Roles
- assigning
Expanding Users' Rights- authenticated rights profiles
Requiring a User to Type Password Before Administering DHCP
- to restrict users
Restricting Users' Rights
- to users
Assigning Rights to Users
- auditing use of
Auditing Administrative Actions
- authorization database
auth_attr Database
- authorizations
More About User Authorizations
- basic concepts
Basics of User and Process Rights
- changing role passwords
Changing a Role Password
Creating a Role
- checking for
Applications That Check UIDs and GIDs
Rights Verification
- checking scripts or programs for authorizations
Checking for Authorizations in a Script or Program
- commands for
Commands for Administering Rights
- commands for managing
Commands That Manage Authorizations, Rights Profiles, and Roles
- compared to superuser model
User and Process Rights Provide an Alternative to the Superuser Model
- configuring
Restricting Users' Rights
Expanding Users' Rights
- considerations when directly assigning
Considerations When Assigning Rights
- creating authorizations
How to Create an Authorization
- creating rights profiles
Creating Rights Profiles and Authorizations
- databases
Rights Databases
- defaults
Listing Rights and Their Definitions
- elements
Basics of User and Process Rights
- expanding users
Expanding Users' Rights
- gaining administrative
Using Your Assigned Administrative Rights
- listing all
Listing Rights and Their Definitions
- modifying roles
Creating a Role
- naming services and
Rights Databases and the Naming Services
- Network Security rights profile
Example of a User Rights and Process Rights Assignment
- new features in this release
What's New in Rights in Oracle Solaris 11.2
- order of search
Order of Search for Assigned Rights
- planning use of
Following Your Chosen Rights Model
- privileges on commands
Applications That Check for Privileges
- profile shells
Profile Shells and Rights Verification
- reading exacct network files
Enabling a Trusted User to Read Extended Accounting Files
Enabling a Trusted User to Read Extended Accounting Files
- recommended roles
User and Process Rights Provide an Alternative to the Superuser Model
- removing from users
Restricting Users' Rights
- restricting administrator to explicitly assigned
Restricting an Administrator to Explicitly Assigned Rights
- restricting rights
Restricting an Administrator to Explicitly Assigned Rights
- restricting users to specific times of access
Basics of User and Process Rights
- restricting users'
Restricting Users' Rights
- rights profile database
prof_attr Database
- rights profiles
More About Rights Profiles
- search order
Order of Search for Assigned Rights
- securing scripts
Assigning Rights to Applications and Scripts
- security considerations when assigning
Security Considerations When Assigning Rights
- special ID on commands
Applications That Check UIDs and GIDs
- troubleshooting
How to Troubleshoot Rights Assignments
- usability considerations when assigning
Usability Considerations When Assigning Rights
- using user password to assume role
How to Reorder Assigned Rights
Enabling a User to Use Own Password for Role Password
- viewing all
Listing Rights and Their Definitions
- viewing your
Listing Rights and Their Definitions
- rights management See
privileges, rights
- rights profiles
- adding privileges to command
Creating a Rights Profile That Includes Privileged Commands
- adding solaris.admin.edit authorization
Cloning and Enhancing the Network IPsec Management Rights Profile
- All
Rights Profiles Reference
- assigning
- to users
Creating a User Who Can Administer DHCP
- assigning to trusted users
Distribution of Rights
- authenticating with user's password
Assigning Rights Profiles in a Specific Order
Modifying a Rights Profile to Enable a User to Use Own Password for Role Password
- Basic Solaris User
Rights Profiles Reference
- changing contents of
Creating Rights Profiles and Authorizations
- cloning contents of
How to Clone and Modify a System Rights Profile
- compared to roles
More About Roles
- Console User
Rights Profiles Reference
Order of Search for Assigned Rights
- contents of typical
Rights Profiles Reference
- creating
How to Create a Rights Profile
- creating for Sun Ray users
Creating a Sun Ray Users Rights Profile
- databases See
exec_attr database, prof_attr database
- description
More About Rights Profiles
Basics of User and Process Rights
- Extended Accounting Net Management
Enabling a Trusted User to Read Extended Accounting Files
- first in list
Adding a Rights Profile as the Role's First Rights Profile
- major rights profiles descriptions
Rights Profiles Reference
- modifying
Creating Rights Profiles and Authorizations
- Network IPsec Management
Cloning and Enhancing the Network IPsec Management Rights Profile
- Object Access Management
How Processes Get Privileges
- Operator
Rights Profiles Reference
- order of search
Order of Search for Assigned Rights
- preventing privilege escalation
Privilege Escalation and User Rights
Distribution of Rights
- Printer Management
Rights Profiles Reference
- removing authorizations
Cloning and Removing Selected Rights From a Rights Profile
- restricting basic privileges
Removing a Basic Privilege From a Rights Profile
- restricting rights of all users of a system
Modifying a System to Limit the Rights Available to Its Users
- Stop
Rights Profiles Reference
Order of Search for Assigned Rights
- System Administrator
Rights Profiles Reference
- troubleshooting
How to Troubleshoot Rights Assignments
- viewing contents
Viewing the Contents of Rights Profiles
- VSCAN Management
Cloning and Removing Selected Rights From a Rights Profile
- role-based access control (RBAC) See
rights
- roleadd command
- authorizations required for
Commands and Associated Authorizations
- description
Rights Administration Commands
Rights Administration Commands
- example of using
Creating and Assigning a Role to Administer Cryptographic Services
- roleauth keyword
- example of using
Changing the Value of roleauth for a Role in the LDAP Repository
Enabling a User to Use Own Password for Role Password
Enabling Users to Use Own Password for Role Password
- passwords for roles
How to Reorder Assigned Rights
Enabling a User to Use Own Password for Role Password
- use
Caching Authentication for Ease of Role Use
- roledel command
- authorizations required for
Commands and Associated Authorizations
- example of using
Deleting a Role
- rolemod command
- authorizations required for
Commands and Associated Authorizations
- changing rights of role
Replacing a Local Role's Assigned Profiles
- description
Rights Administration Commands
- example of using
Enabling a User to Use Own Password for Role Password
Enabling Users to Use Own Password for Role Password
- passwords for roles
How to Reorder Assigned Rights
Enabling a User to Use Own Password for Role Password
- roles
- ARMOR
User and Process Rights Provide an Alternative to the Superuser Model
- assigning
- privileges to
Assigning Privileges Directly to a Role
- rights
Assigning Rights to Users
- with usermod command
Creating a Role
- assuming
- after login
More About Roles
- ARMOR
Assuming an ARMOR Role
- in a terminal window
Assuming an ARMOR Role
Profile Shells and Rights Verification
- root role
Assuming the root Role
- to use assigned rights
Using Your Assigned Administrative Rights
- auditing
Auditing Administrative Actions
- authenticating with user's password
How to Reorder Assigned Rights
Enabling a User to Use Own Password for Role Password
- changing password of
Changing a Role Password
Creating a Role
- changing properties of
Creating a Role
- compared to rights profiles
More About Roles
- creating
Assigning Rights to Users
- creating ARMOR
Using ARMOR Roles
- deleting
Deleting a Role
- description
More About Roles
- determining directly assigned privileges
Adding to a Role's Basic Privileges
- determining role's privileged commands
Determining the Privileged Commands of a Role
- listing local roles
Rights Administration Commands
Assuming an ARMOR Role
- making root role into user
Changing Whether root Is a User or a Role
- modifying
Creating a Role
- planning predefined
Following Your Chosen Rights Model
- predefined
Using ARMOR Roles
User and Process Rights Provide an Alternative to the Superuser Model
- removing assignment from users
How to Change the root Role Into a User
- separation of duty
Using Two Roles to Configure Auditing
Creating Roles for Separation of Duty
- summary
Basics of User and Process Rights
- use in user rights assignment
User and Process Rights Provide an Alternative to the Superuser Model
- using an assigned role
Assuming an ARMOR Role
- using user password
Modifying a Rights Profile to Enable a User to Use Own Password for Role Password
Example of a User Rights and Process Rights Assignment
- roles command
- description
Rights Administration Commands
- using
Assuming an ARMOR Role
- roles keyword
- listing
Listing Roles
- root role
- assuming role
Assuming the root Role
- changing from root user
Changing the root User Into the root Role
- changing to root user
Changing Whether root Is a User or a Role
- created at installation
Distribution of Rights
- description
Distribution of Rights
- secure remote login
Changing Whether root Is a User or a Role
- troubleshooting
Preventing the root Role From Being Used to Maintain a System
- root user
- changing into root role
Changing the root User Into the root Role
- replacing in rights model
More About Roles