Securing Users and Processes in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

R

–R option
dhcpconfig commandindex iconRequiring a User to Type Password Before Administering DHCP
rolemod commandindex iconChanging the root User Into the root Role
useradd command
index iconRights Administration Commands
index iconCreating a Login for a Trusted User
index iconCreating a Login for a Trusted User
usermod command
index iconCaching Authentication for Ease of Role Use
index iconAdding a Role to a User
index iconCreating and Assigning a Role to Administer Cryptographic Services
–r option
logins commandindex iconListing Roles
ppriv command
index iconCommands for Handling Privileges
index iconProtecting Directories on Your System From Application Processes
index iconUsers Locking Down the Applications That They Run
removing
basic privileges from a rights profileindex iconRemoving a Basic Privilege From a Rights Profile
basic privilege from application
index iconUsers Locking Down the Applications That They Run
index iconHow to Lock Down the MySQL Service
basic privilege from rights profileindex iconRemoving a Basic Privilege From a Rights Profile
basic privilege from yourselfindex iconRemoving a Basic Privilege From Yourself
limit privilege from userindex iconRemoving Privileges From a User's Limit Set
role assignmentsindex iconHow to Change the root Role Into a User
users' rightsindex iconRestricting Users' Rights
replacing
keyword values
index iconRequiring a User to Type Password Before Administering DHCP
index iconModifying a Role's Rights
root role with root userindex iconHow to Change the root Role Into a User
root user with root roleindex iconChanging the root User Into the root Role
superuser with rolesindex iconFollowing Your Chosen Rights Model
resource controls
privileges, andindex iconPrivileges and Resource Management
project.max-locked-memoryindex iconPrivileges and Resource Management
zone.max-locked-memoryindex iconPrivileges and Resource Management
restricted files
enabling read access toindex iconEnabling a Trusted User to Read Extended Accounting Files
enabling write access to
index iconCloning and Enhancing the Network IPsec Management Rights Profile
index iconEditing a System File
restricting
access to computer by time and dayindex iconBasics of User and Process Rights
database privilegesindex iconHow to Lock Down the MySQL Service
editor of guest userindex iconPreventing Guests From Spawning Editor Subprocesses
guest access to systemindex iconAssigning the Editor Restrictions Rights Profile to All Users
port privilegesindex iconHow to Apply Extended Privilege Policy to a Port
rights in a rights profile
index iconCreating a Sun Ray Users Rights Profile
index iconRemoving a Basic Privilege From a Rights Profile
web server privilegesindex iconHow to Assign Specific Privileges to the Apache Web Server
restrictive security policy
components ofindex iconBasics of User and Process Rights
creatingindex iconRestricting Users' Rights
enforcingindex iconLocking Down Resources by Using Extended Privileges
rights  See alsoindex iconauthorizations, privileges, rights profiles, roles
access_times keywordindex iconBasics of User and Process Rights
access_tz keywordindex iconBasics of User and Process Rights
adding privileged usersindex iconCreating a User Who Can Administer DHCP
administration commandsindex iconCommands That Manage Authorizations, Rights Profiles, and Roles
assigningindex iconExpanding Users' Rights
authenticated rights profilesindex iconRequiring a User to Type Password Before Administering DHCP
to restrict usersindex iconRestricting Users' Rights
to usersindex iconAssigning Rights to Users
auditing use ofindex iconAuditing Administrative Actions
authorization databaseindex iconauth_attr Database
authorizationsindex iconMore About User Authorizations
basic conceptsindex iconBasics of User and Process Rights
changing role passwords
index iconChanging a Role Password
index iconCreating a Role
checking for
index iconApplications That Check UIDs and GIDs
index iconRights Verification
checking scripts or programs for authorizationsindex iconChecking for Authorizations in a Script or Program
commands forindex iconCommands for Administering Rights
commands for managingindex iconCommands That Manage Authorizations, Rights Profiles, and Roles
compared to superuser modelindex iconUser and Process Rights Provide an Alternative to the Superuser Model
configuring
index iconRestricting Users' Rights
index iconExpanding Users' Rights
considerations when directly assigningindex iconConsiderations When Assigning Rights
creating authorizationsindex iconHow to Create an Authorization
creating rights profilesindex iconCreating Rights Profiles and Authorizations
databasesindex iconRights Databases
defaultsindex iconListing Rights and Their Definitions
elementsindex iconBasics of User and Process Rights
expanding usersindex iconExpanding Users' Rights
gaining administrativeindex iconUsing Your Assigned Administrative Rights
listing allindex iconListing Rights and Their Definitions
modifying rolesindex iconCreating a Role
naming services andindex iconRights Databases and the Naming Services
Network Security rights profileindex iconExample of a User Rights and Process Rights Assignment
new features in this releaseindex iconWhat's New in Rights in Oracle Solaris 11.2
order of searchindex iconOrder of Search for Assigned Rights
planning use ofindex iconFollowing Your Chosen Rights Model
privileges on commandsindex iconApplications That Check for Privileges
profile shellsindex iconProfile Shells and Rights Verification
reading exacct network files
index iconEnabling a Trusted User to Read Extended Accounting Files
index iconEnabling a Trusted User to Read Extended Accounting Files
recommended rolesindex iconUser and Process Rights Provide an Alternative to the Superuser Model
removing from usersindex iconRestricting Users' Rights
restricting administrator to explicitly assignedindex iconRestricting an Administrator to Explicitly Assigned Rights
restricting rightsindex iconRestricting an Administrator to Explicitly Assigned Rights
restricting users to specific times of accessindex iconBasics of User and Process Rights
restricting users'index iconRestricting Users' Rights
rights profile databaseindex iconprof_attr Database
rights profilesindex iconMore About Rights Profiles
search orderindex iconOrder of Search for Assigned Rights
securing scriptsindex iconAssigning Rights to Applications and Scripts
security considerations when assigningindex iconSecurity Considerations When Assigning Rights
special ID on commandsindex iconApplications That Check UIDs and GIDs
troubleshootingindex iconHow to Troubleshoot Rights Assignments
usability considerations when assigningindex iconUsability Considerations When Assigning Rights
using user password to assume role
index iconHow to Reorder Assigned Rights
index iconEnabling a User to Use Own Password for Role Password
viewing allindex iconListing Rights and Their Definitions
viewing yourindex iconListing Rights and Their Definitions
rights management  Seeindex iconprivileges, rights
rights profiles
adding privileges to commandindex iconCreating a Rights Profile That Includes Privileged Commands
adding solaris.admin.edit authorizationindex iconCloning and Enhancing the Network IPsec Management Rights Profile
Allindex iconRights Profiles Reference
assigning
to usersindex iconCreating a User Who Can Administer DHCP
assigning to trusted usersindex iconDistribution of Rights
authenticating with user's password
index iconAssigning Rights Profiles in a Specific Order
index iconModifying a Rights Profile to Enable a User to Use Own Password for Role Password
Basic Solaris Userindex iconRights Profiles Reference
changing contents ofindex iconCreating Rights Profiles and Authorizations
cloning contents ofindex iconHow to Clone and Modify a System Rights Profile
compared to rolesindex iconMore About Roles
Console User
index iconRights Profiles Reference
index iconOrder of Search for Assigned Rights
contents of typicalindex iconRights Profiles Reference
creatingindex iconHow to Create a Rights Profile
creating for Sun Ray usersindex iconCreating a Sun Ray Users Rights Profile
databases  Seeindex iconexec_attr database, prof_attr database
description
index iconMore About Rights Profiles
index iconBasics of User and Process Rights
Extended Accounting Net Managementindex iconEnabling a Trusted User to Read Extended Accounting Files
first in listindex iconAdding a Rights Profile as the Role's First Rights Profile
major rights profiles descriptionsindex iconRights Profiles Reference
modifyingindex iconCreating Rights Profiles and Authorizations
Network IPsec Managementindex iconCloning and Enhancing the Network IPsec Management Rights Profile
Object Access Managementindex iconHow Processes Get Privileges
Operatorindex iconRights Profiles Reference
order of searchindex iconOrder of Search for Assigned Rights
preventing privilege escalation
index iconPrivilege Escalation and User Rights
index iconDistribution of Rights
Printer Managementindex iconRights Profiles Reference
removing authorizationsindex iconCloning and Removing Selected Rights From a Rights Profile
restricting basic privilegesindex iconRemoving a Basic Privilege From a Rights Profile
restricting rights of all users of a systemindex iconModifying a System to Limit the Rights Available to Its Users
Stop
index iconRights Profiles Reference
index iconOrder of Search for Assigned Rights
System Administratorindex iconRights Profiles Reference
troubleshootingindex iconHow to Troubleshoot Rights Assignments
viewing contentsindex iconViewing the Contents of Rights Profiles
VSCAN Managementindex iconCloning and Removing Selected Rights From a Rights Profile
role-based access control (RBAC)  Seeindex iconrights
roleadd command
authorizations required forindex iconCommands and Associated Authorizations
description
index iconRights Administration Commands
index iconRights Administration Commands
example of usingindex iconCreating and Assigning a Role to Administer Cryptographic Services
roleauth keyword
example of using
index iconChanging the Value of roleauth for a Role in the LDAP Repository
index iconEnabling a User to Use Own Password for Role Password
index iconEnabling Users to Use Own Password for Role Password
passwords for roles
index iconHow to Reorder Assigned Rights
index iconEnabling a User to Use Own Password for Role Password
useindex iconCaching Authentication for Ease of Role Use
roledel command
authorizations required forindex iconCommands and Associated Authorizations
example of usingindex iconDeleting a Role
rolemod command
authorizations required forindex iconCommands and Associated Authorizations
changing rights of roleindex iconReplacing a Local Role's Assigned Profiles
descriptionindex iconRights Administration Commands
example of using
index iconEnabling a User to Use Own Password for Role Password
index iconEnabling Users to Use Own Password for Role Password
passwords for roles
index iconHow to Reorder Assigned Rights
index iconEnabling a User to Use Own Password for Role Password
roles
ARMORindex iconUser and Process Rights Provide an Alternative to the Superuser Model
assigning
privileges toindex iconAssigning Privileges Directly to a Role
rightsindex iconAssigning Rights to Users
with usermod commandindex iconCreating a Role
assuming
after loginindex iconMore About Roles
ARMORindex iconAssuming an ARMOR Role
in a terminal window
index iconAssuming an ARMOR Role
index iconProfile Shells and Rights Verification
root roleindex iconAssuming the root Role
to use assigned rightsindex iconUsing Your Assigned Administrative Rights
auditingindex iconAuditing Administrative Actions
authenticating with user's password
index iconHow to Reorder Assigned Rights
index iconEnabling a User to Use Own Password for Role Password
changing password of
index iconChanging a Role Password
index iconCreating a Role
changing properties ofindex iconCreating a Role
compared to rights profilesindex iconMore About Roles
creatingindex iconAssigning Rights to Users
creating ARMORindex iconUsing ARMOR Roles
deletingindex iconDeleting a Role
descriptionindex iconMore About Roles
determining directly assigned privilegesindex iconAdding to a Role's Basic Privileges
determining role's privileged commandsindex iconDetermining the Privileged Commands of a Role
listing local roles
index iconRights Administration Commands
index iconAssuming an ARMOR Role
making root role into userindex iconChanging Whether root Is a User or a Role
modifyingindex iconCreating a Role
planning predefinedindex iconFollowing Your Chosen Rights Model
predefined
index iconUsing ARMOR Roles
index iconUser and Process Rights Provide an Alternative to the Superuser Model
removing assignment from usersindex iconHow to Change the root Role Into a User
separation of duty
index iconUsing Two Roles to Configure Auditing
index iconCreating Roles for Separation of Duty
summaryindex iconBasics of User and Process Rights
use in user rights assignmentindex iconUser and Process Rights Provide an Alternative to the Superuser Model
using an assigned roleindex iconAssuming an ARMOR Role
using user password
index iconModifying a Rights Profile to Enable a User to Use Own Password for Role Password
index iconExample of a User Rights and Process Rights Assignment
roles command
descriptionindex iconRights Administration Commands
usingindex iconAssuming an ARMOR Role
roles keyword
listingindex iconListing Roles
root role
assuming roleindex iconAssuming the root Role
changing from root userindex iconChanging the root User Into the root Role
changing to root userindex iconChanging Whether root Is a User or a Role
created at installationindex iconDistribution of Rights
descriptionindex iconDistribution of Rights
secure remote loginindex iconChanging Whether root Is a User or a Role
troubleshootingindex iconPreventing the root Role From Being Used to Maintain a System
root user
changing into root roleindex iconChanging the root User Into the root Role
replacing in rights modelindex iconMore About Roles