Securing Users and Processes in Oracle® Solaris 11.2

Exit Print View

Updated: July 2014
 
 

A

–a option
profiles commandindex iconListing Rights Profiles
access
controlling application access to specified directoriesindex iconUsers Locking Down the Applications That They Run
enabling to restricted files
index iconCloning and Enhancing the Network IPsec Management Rights Profile
index iconEditing a System File
index iconEnabling a Trusted User to Read Extended Accounting Files
limiting port privilegesindex iconHow to Apply Extended Privilege Policy to a Port
restricting guest access to systemindex iconAssigning the Editor Restrictions Rights Profile to All Users
access_times keyword
index iconuser_attr Database
index iconBasics of User and Process Rights
access_tz keyword
index iconuser_attr Database
index iconBasics of User and Process Rights
adding
auditing of privileged actionsindex iconAuditing Administrative Actions
authorizations
to rights profileindex iconAdding Authorizations to a Rights Profile
to roleindex iconAssigning Authorizations to a Role
to userindex iconAssigning Authorizations Directly to a User
cryptomgt roleindex iconCreating and Assigning a Role to Administer Cryptographic Services
extended privileges
by usersindex iconUsers Locking Down the Applications That They Run
to a databaseindex iconHow to Lock Down the MySQL Service
to a portindex iconHow to Apply Extended Privilege Policy to a Port
to a web serverindex iconHow to Assign Specific Privileges to the Apache Web Server
new authorizationindex iconHow to Create an Authorization
new rights profileindex iconCreating Rights Profiles and Authorizations
new rights profile from existing oneindex iconHow to Clone and Modify a System Rights Profile
privileges
directly to roleindex iconAssigning Privileges Directly to a Role
directly to userindex iconAssigning Privileges Directly to a User
to command in rights profileindex iconCreating a Rights Profile That Includes Privileged Commands
rights
commands forindex iconCommands for Administering Rights
to legacy applicationsindex iconRunning an Application With Assigned Rights
to rights profileindex iconCreating Rights Profiles and Authorizations
to rolesindex iconCreating a Role
to usersindex iconExpanding Users' Rights
rights profiles to list of profilesindex iconAdding a Rights Profile as the Role's First Rights Profile
rolesindex iconAssigning Rights to Users
security-related roleindex iconCreating and Assigning a Role to Administer Cryptographic Services
set ID
to legacy applicationsindex iconAssigning Security Attributes to a Legacy Application
trusted usersindex iconCreating a User Who Can Administer DHCP
administering
ARMOR rolesindex iconUsing ARMOR Roles
authorizations
index iconHow to Create an Authorization
index iconHow to Create an Authorization
extended privilege policyindex iconLocking Down Resources by Using Extended Privileges
rights
authorizationsindex iconHow to Create an Authorization
commands forindex iconCommands for Administering Rights
instructionsindex iconUsing Your Assigned Administrative Rights
legacy applications
index iconRunning an Application With Assigned Rights
index iconAssigning Security Attributes to a Legacy Application
of a role
index iconEnabling a User to Use Own Password for Role Password
index iconChanging a Role Password
index iconCreating a Role
of a user
index iconRestricting Users' Rights
index iconExpanding Users' Rights
rights profilesindex iconCreating Rights Profiles and Authorizations
rolesindex iconHow to Reorder Assigned Rights
rights profiles
index iconAssigning Rights Profiles in a Specific Order
index iconCreating Rights Profiles and Authorizations
index iconModifying a Rights Profile to Enable a User to Use Own Password for Role Password
role password
index iconChanging a Role Password
index iconCreating a Role
roles to replace superuserindex iconFollowing Your Chosen Rights Model
user password to assume role
index iconHow to Reorder Assigned Rights
index iconEnabling a User to Use Own Password for Role Password
without privilegesindex iconAdministrative Differences on a System With Privileges
administrators
adding to users' rightsindex iconExpanding Users' Rights
installing ARMOR packageindex iconUsing ARMOR Roles
restricting access to a databaseindex iconHow to Lock Down the MySQL Service
restricting access to a portindex iconHow to Apply Extended Privilege Policy to a Port
restricting rightsindex iconRestricting an Administrator to Explicitly Assigned Rights
restricting users' rightsindex iconRestricting Users' Rights
restricting web server privilegesindex iconHow to Assign Specific Privileges to the Apache Web Server
All rights profileindex iconRights Profiles Reference
allocate command
authorizations required forindex iconCommands and Associated Authorizations
Apache Web Server
assigning extended privilegesindex iconHow to Assign Specific Privileges to the Apache Web Server
verifying use of privilegeindex iconHow to Determine Which Privileges the Apache Web Server Is Using
applications
Apache Web Serverindex iconHow to Assign Specific Privileges to the Apache Web Server
assigning extended privilegesindex iconProtecting Directories on Your System From Application Processes
assigning extended privileges to editorsindex iconPreventing Guests From Spawning Editor Subprocesses
checking for authorizationsindex iconChecking for Authorizations in a Script or Program
Firefox browserindex iconRunning a Browser in a Protected Environment
legacy and privilegesindex iconLegacy Applications and the Use of Privileges
limiting access to specified directoriesindex iconProtecting Directories on Your System From Application Processes
MySQL databaseindex iconHow to Lock Down the MySQL Service
preventing from spawning new processesindex iconPreventing Selected Applications From Spawning New Processes
privilege-aware
index iconHow Processes Get Privileges
index iconHow Privileges Are Implemented
ARMOR
assigning roles to trusted usersindex iconUsing ARMOR Roles
installing packageindex iconUsing ARMOR Roles
introduction to standardindex iconUser and Process Rights Provide an Alternative to the Superuser Model
planning use ofindex iconFollowing Your Chosen Rights Model
assigning
authorizations in a rights profileindex iconAdding Authorizations to a Rights Profile
privileges
to commands in a rights profileindex iconCreating a Rights Profile That Includes Privileged Commands
to commands in a scriptindex iconHow to Run a Shell Script With Privileged Commands
to roleindex iconAssigning Privileges Directly to a Role
to userindex iconAssigning Privileges Directly to a User
rights
securelyindex iconSecurity Considerations When Assigning Rights
to specific resourcesindex iconLocking Down Resources by Using Extended Privileges
to usersindex iconUser and Process Rights Provide an Alternative to the Superuser Model
usability considerationsindex iconUsability Considerations When Assigning Rights
rights profile
to a roleindex iconCreating a Role
to a userindex iconCreating a User Who Can Administer DHCP
rights to users
to users
index iconRestricting Users' Rights
index iconExpanding Users' Rights
role to a user locallyindex iconCreating a Role
assuming role
how toindex iconExpanding Users' Rights
in a terminal windowindex iconAssuming an ARMOR Role
rootindex iconAssuming the root Role
when assignedindex iconUsing Your Assigned Administrative Rights
asterisk (*)
checking for in authorizationsindex iconChecking for Authorizations in a Script or Program
wildcard character
in authorizationsindex iconAuthorization Naming Conventions
at command
authorizations required forindex iconCommands and Associated Authorizations
atq command
authorizations required forindex iconCommands and Associated Authorizations
Audit Configuration rights profile
use ofindex iconAuditing Administrative Actions
audit_flags keyword
descriptionindex iconuser_attr Database
auditing
privileges andindex iconPrivileged Actions in the Audit Record
rolesindex iconAuditing Administrative Actions
auth_attr database
index iconauth_attr Database
index iconRights Databases
auth_profiles keyword
descriptionindex iconuser_attr Database
example ofindex iconRequiring a User to Type Password Before Administering DHCP
AUTH_PROFS_GRANTED keyword
policy.conf fileindex iconpolicy.conf File
authenticated rights profiles
assigningindex iconRequiring a User to Type Password Before Administering DHCP
keyword in policy.conf fileindex iconpolicy.conf File
searched before rights profiles
index iconHow to Troubleshoot Rights Assignments
index iconOrder of Search for Assigned Rights
authorizations  See alsoindex iconrights
adding to rights profileindex iconAdding Authorizations to a Rights Profile
checking for wildcardsindex iconChecking for Authorizations in a Script or Program
checking in privileged applicationindex iconApplications That Check Authorizations
commands requiringindex iconSelected Commands That Require Authorizations
compared to privileges
index iconMore About User Authorizations
index iconBasics of User and Process Rights
creating new onesindex iconHow to Create an Authorization
database
index iconauth_attr Database
index iconRights Databases
delegatingindex iconDelegation Authority in Authorizations
description
index iconAuthorizations Reference
index iconMore About User Authorizations
index iconBasics of User and Process Rights
effect of misspellingindex iconHow to Troubleshoot Rights Assignments
granularityindex iconAuthorization Naming Conventions
listingindex iconListing Authorizations
misspellingindex iconHow to Troubleshoot Rights Assignments
naming conventionsindex iconAuthorization Naming Conventions
preventing privilege escalationindex iconPrivilege Escalation and User Rights
removing from rights profileindex iconCloning and Removing Selected Rights From a Rights Profile
troubleshootingindex iconHow to Troubleshoot Rights Assignments
auths command
descriptionindex iconRights Administration Commands
use
index iconListing Authorizations
index iconHow to Create an Authorization
index iconChecking for Authorizations in a Script or Program
auths keyword
description
index iconuser_attr Database
index iconAdding Authorizations to a Rights Profile
use
index iconCloning and Removing Selected Rights From a Rights Profile
index iconCloning and Enhancing the Network IPsec Management Rights Profile
AUTHS_GRANTED keyword
policy.conf fileindex iconpolicy.conf File