Index

Symbols  Numerics  A  B  C  D  E  F  G  H  I  K  L  M  N  O  P  R  S  T  U  V  X  Z  

Symbols

  • ; (semicolon)
  • /dev/arp device
    • getting IP MIB-II information 4.1.3
  • /etc/certs/elfsign/ORCLS11SE file 2.1.4
  • /etc/certs/elfsign directory
  • /etc/default/kbd file 3.4.2
  • /etc/default/login file
    • restricting remote root access 3.3.2
  • /etc/default/passwd file
  • /etc/default/su file
    • displaying su command attempts 3.3.2
    • monitoring access attempts 3.3.2
    • monitoring su command 3.3.1
  • /etc/issue file 3.1.1
  • /etc/logindevperm file 1.2.4.5
  • /etc/motd file 3.1.1
  • /etc/nologin file
    • disabling user logins temporarily 3.1.4
  • /etc/security/device_allocate file 4.4.2.7
  • /etc/security/device_maps file 4.4.2.6
  • /etc/security/policy.conf file
  • /usr/lib/security/$ISA/pkcs11_tpm.so 2.2.1.5
  • /var/adm/sulog file
    • monitoring contents of 3.3.1
  • - (minus sign)
  • @ (at sign)
  • * (asterisk)
  • \ (backslash)
  • # (pound sign)
  • + (plus sign)
  • > (redirect output)
  • >> (append output)

Numerics

  • 32-bit executables
    • protecting from compromising security 2.4.2

A


B

  • backslash (\)
  • banner messages
  • Blowfish encryption algorithm
  • boot_policy property
  • boot verification 1.2.2, 2.1

C


D


E

  • eeprom command 1.2.1, 3.4
  • eject command
  • ELF signatures
  • enabling
    • device allocation 4.2.1
    • keyboard abort 3.4.2
    • TPM secure keystore for PKCS #11 customers 2.2.1.5
    • verified boot 2.1
  • encrypting
  • encryption
    • list of password algorithms 1.2.4.2.2
    • password hashes 1.2.4.2.1
    • specifying password algorithm
    • specifying password algorithms in account-policy SMF stencil 1.2.4.2.2
  • environment variables 1.2
  • errors
  • executable stacks
    • preventing insertion of malicious code 2.4.3.1
    • protecting against 32-bit processes 2.4.2
    • troubleshooting protection status 2.4.3.1
    • viewing protection status 2.4.3.1

F


G

  • gateways 1.6.3
  • genunix module
    • verified boot and 2.1.3
  • getdevpolicy command
  • GRUB
    • Trusted Platform Module 2.2

H

  • hardware
    • protecting 1.2.1, 3.4
    • requiring password for access 3.4.1
    • restricting user control of 3.1.1
    • security extensions for 2.5
  • hosts
  • HW_BTI SPARC security extension 2.5.1

I

  • IBPB security extension 2.5.2
  • IBRS security extension 2.5.2
  • IF_PSCHANGE_MC_NO security extension 2.5.2
  • ILOM 2
  • installing
    • Secure by Default 1.3.1
    • virus scanning software 5.3.1
  • Intel Xeon CPU
    • CPU identifier 2.5.2
    • minimum microcode version 2.5.2
  • Internet firewall setup 1.6.3
  • IP MIB-II
    • getting information from /dev/arp 4.1.3

K

  • KADI security extension 2.4.6
  • kbd file 3.4.2
  • kernel zones
    • verified boot 2.1
  • KEYBOARD_ABORT system variable 3.4.2
  • keys
    • migrating or restoring TPM 2.2.2.3
  • KPTI security extension 2.5.2

L

  • L1DF security extension 2.5.2
  • labeling file systems 1.4.5
  • layout of address space
    • load-time randomization 2.4.1
  • LDAP naming service
  • ld -z sx=adistack linker option 2.4.5
  • ld -z sx= linker options 2.4.8
  • linker options
    • security extensions, for 2.4.8
    • security extensions, foradistack 2.4.5
  • list_devices command
  • listing
    • device policy 4.1.1
    • users with no passwords 3.1.3
  • load-time randomization
    • address space layout 2.4.1
  • log files
    • executable stack messages and 2.4.2
    • monitoring su command 3.3.1
    • process heap messages and 2.4.2
  • logging in
    • disabling temporarily 3.1.4
    • displaying user's login status 3.1.2
    • remotely 1.2.4.5
    • root login
    • security
      • access control on devices 1.2.4.5
      • access restrictions 1.2.4
      • system access control 1.2.4
      • tracking root login 1.3.3
    • system access control 1.2.4
    • task map 3.1
  • login access restrictions
    • svc:/system/name-service/switch:default 1.2.4
  • login file
    • restricting remote root access 3.3.2
  • logins command
    • authorization for 3.1.2
    • displaying user's login status 3.1.2
    • displaying users with no passwords 3.1.3
    • syntax 3.1.2

M

  • managing 1.2
  • man pages
  • MD_CLEAR security extension 2.5.2
  • MD5 encryption algorithm
  • MDS_NO security extension 2.5.2
  • media
  • messages file
    • executable stack messages 2.4.2
    • process heap messages 2.4.2
  • microphone
  • migrating
  • minimum microcode version
  • mitigating platform vulnerabilities
  • modules
  • monitoring
  • mount command
  • mounting
  • mt command 4.4.2.8.1

N

  • names
    • device names
    • devices in device_maps 4.4.2.6
  • naming conventions
  • naming service configuration
    • login access restrictions 1.2.4
  • naming services 1.2
  • netservices limited installation option 1.3.1
  • network security
  • NIS naming service
  • nobody user 1.4.4
  • noexec_user_stack
    • compatibility with nxstack 2.4.3
  • noexec_user_stack replacement 2.4.2
  • nxheap
  • nxstack
    • compatibility withnoexec_user_stack 2.4.3
    • security extension 2.4.2
    • variable 2.4.3.1

O

  • object reuse requirements
  • Oracle ILOM
    • preventing access to USB ports 2.3
    • Trusted Platform Module 2.2
    • verified boot 2.1.4
    • verified boot and 2.1.2
  • ownership of files

P


R

  • RDCL_NO security extension 2.5.2
  • redirection
  • rem_drv command
  • remote logins
  • removable media
  • restoring
  • restricted shell (rsh) 1.3.5.2
  • restricting
    • remote root access 3.3.2
    • root access 3.3
  • rights profiles
  • roles
    • using to access the hardware 3.4.1
  • root access
    • monitoring and restricting 3.3
    • monitoring attempts 3.3.2
    • troubleshooting remote 3.3.2
  • root account
  • root user
    • displaying access attempts on console 3.3.2
    • monitoring su command attempts 1.3.3, 3.3.1
    • restricting access 1.4.4
    • restricting remote access 3.3.2
    • tracking logins 1.3.3
  • RSBS security extension 2.5.2
  • rsh command (restricted shell) 1.3.5.2

S


T

  • TAA_NO security extension 2.5.2
  • task maps
    • configuring device policy 4.1
    • device allocation 4.2
    • device policy 4.1
    • managing device allocation 4.2
    • managing device policy 4.1
    • securing logins and passwords 3.1
  • tcsd daemon 2.2.2.1
    • Trusted Platform Module 2.2
  • TPM 2
  • tpmadm command
  • Trojan horse 1.3.5.1
  • troubleshooting
    • allocating a device 4.3.1
    • executable stack protection 2.4.3.1
    • list_devices command 4.2.3
    • mounting a device 4.3.2
    • preventing programs from using executable stacks 2.4.3.1
    • remote root access 3.3.2
    • terminal where su command originated 3.3.1
    • Trusted Platform Module 2.2.2
  • TrouSerS package 2.2.2.1
  • Trusted Computing Group Software Stack
    • Trusted Platform Module 2.2
  • trusted hosts 1.6.3
  • Trusted Platform Module
    • backing up TPM data and keys
    • components in Oracle Solaris 2.2
    • enabling TPM failover 2.2.2.2
    • initializing
    • initializing and backing up 2.2.1
    • migrating or restoring TPM data and keys 2.2.2.3
    • monitoring status 2.2.2.1
    • owner of 2.2
    • PKCS #11 users 2.2.1.5
    • TPM packages in Oracle Solaris 2.2.1, 2.2.2.1
    • troubleshooting 2.2.2
  • TSX_DISABLE security extension 2.5.2

U

  • umount command
  • unmounting
    • allocated devices 4.3.3
  • update_drv command
  • upgrading
    • firmware for verified boot 2.1.1
  • USB ports
    • preventing access 2.3
  • user accounts 1.2
    • displaying login status 3.1.2
  • user ID numbers (UIDs)
  • user procedures
    • allocating devices 4.2
  • users
    • allocating devices 4.3.1
    • assigning allocate authorization to 4.2.2.1
    • deallocating devices 4.3.3
    • disabling login 3.1.4
    • displaying login status 3.1.2
    • having no passwords 3.1.3
    • mounting allocated devices 4.3.2
    • unmounting allocated devices 4.3.3

V

  • variables
    • KEYBOARD_ABORT system variable 3.4.2
    • noexec_user_stack* deprecated 2.4.3
    • PATH environment variable 1.3.5.1
  • verified boot
    • boot_policy 1.2.2
    • certificate sources 2.1.5
    • configuration properties 2.1.4
    • ELF signatures 2.1.2
    • enabling 2.1
    • firmware upgrade 2.1.1
    • manual certificate verification 2.1.5
    • Oracle ILOM and 2.1.2
    • Oracle ILOM and SPARC 2.1
    • policy 2.1.4
    • SPARC and x86 systems 2.1
    • SPARC systems with Oracle ILOM 2.1
    • verification sequence 2.1.3
    • verified boot certificate 2.1.4
  • verifying
    • verified boot certificates manually 2.1.5
  • viewing
    • device allocation information 4.2.3
    • device policy 4.1.1
    • user's login status 3.1.2
    • users with no passwords 3.1.3
  • viruses
  • virus scanning
  • virus-scan package 5.3

X

  • x86 systems
    • mitigating vulnerabilities 2.5.2
    • security extensions for 2.5.2
    • verified boot 2.1

Z

  • zones
    • devices and 1.5
    • kernel and verified boot 2.1