Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
31. Solaris Auditing (Reference)
Glossary
Index
|
O
- -O option, auditreduce command, How to Merge Audit Files From the Audit Trail
- -o option, encrypt command, How to Encrypt and Decrypt a File
- object reuse requirements
- device-clean scripts
- tape drives, device_allocate File
- writing new scripts, Device-Clean Scripts
for devices, Device-Clean Scripts
- obtaining
- access to a specific service, Obtaining Access to a Specific Service
- credential for a server, Obtaining a Credential for a Server
- credential for a TGS, Obtaining a Credential for the Ticket-Granting Service
- forwardable tickets, Creating a Kerberos Ticket
- privileged commands, How to Change the Properties of a Role
- privileges
- How Processes Get Privileges
- Assigning Privileges
- How to Assign Privileges to a User or Role
- privileges on a process, How to Determine the Privileges on a Process
- tickets with kinit, Creating a Kerberos Ticket
- online help
- SEAM Administration Tool, Print and Online Help Features of the SEAM Tool
- URL for, Online Help URL in the Graphical Kerberos Administration Tool
- opaque audit token, format, opaque Token (Obsolete)
- OpenSSH, See Solaris Secure Shell
- OpenSSL, managing keystore, KMF Keystore Management
- Operator (RBAC)
- contents of rights profile, Operator Rights Profile
- creating role, How to Create and Assign a Role by Using the GUI
- recommended role, RBAC: An Alternative to the Superuser Model
- optional control flag, PAM, How PAM Stacking Works
- options to Kerberized commands, Overview of Kerberized Commands
- other ACL entries, description, ACL Entries for Files
- other audit class, Definitions of Audit Classes
- overflow prevention, audit trail, How to Prevent Audit Trail Overflow
- ovsec_adm.xxxxx file, description, Kerberos Files
- ownership of files
- ACLs and
- Using Access Control Lists
- Using Access Control Lists to Protect Files
- changing
- Commands for Viewing and Securing Files
- How to Change the Owner of a File
- changing group ownership, How to Change Group Ownership of a File
P
- -p option
- bart create, How to Compare Manifests for the Same System Over Time
- bsmrecord command, How to Display Audit Record Formats
- cryptoadm command
- How to Prevent the Use of a User-Level Mechanism
- How to Prevent the Use of a Kernel Software Provider
- logins command, How to Display Users Without Passwords
- packages, Solaris Secure Shell, Solaris Secure Shell Packages and Initialization
- packet transfers
- firewall security, Firewall Systems
- packet smashing, Encryption and Firewall Systems
- PAM
- adding a module, How to Add a PAM Module
- configuration file
- control flags, How PAM Stacking Works
- introduction, PAM Configuration (Reference)
- stacking diagrams, How PAM Stacking Works
- stacking example, PAM Stacking Example
- stacking explained, How PAM Stacking Works
- syntax, PAM Configuration File Syntax
/etc/syslog.conf file, How to Log PAM Error Reports
- framework, Introduction to the PAM Framework
- Kerberos and
- Kerberos Components
- Kerberos Components in the Solaris 8 Release
- overview, PAM (Overview)
- planning, Planning for Your PAM Implementation
- task map, PAM (Tasks)
- pam.conf file
- See PAM configuration file
- Kerberos and, Kerberos Files
- pam_roles command, description, Commands That Manage RBAC
- PAMAuthenticationViaKBDInt keyword, sshd_config file, Keywords in Solaris Secure Shell
- panels, table of SEAM Administration Tool, SEAM Tool Panel Descriptions
- passphrases
- changing for Solaris Secure Shell, How to Change the Passphrase for a Solaris Secure Shell Private Key
- encrypt command, How to Encrypt and Decrypt a File
- example, How to Log In to a Remote Host With Solaris Secure Shell
- generating in KMF, How to Generate a Passphrase by Using the pktool setpin Command
- mac command, How to Compute a MAC of a File
- storing safely, How to Encrypt and Decrypt a File
- using for MAC, How to Compute a MAC of a File
- using in Solaris Secure Shell
- How to Generate a Public/Private Key Pair for Use With Solaris Secure Shell
- How to Reduce Password Prompts in Solaris Secure Shell
- PASSREQ in Solaris Secure Shell, Solaris Secure Shell and Login Environment Variables
- passwd command
- and kpasswd command, Changing Your Password
- and name services, Managing Password Information
- changing password of role, How to Change the Password of a Role
- passwd file, and /etc/d_passwd file, Dial-Up Logins
- password authentication, Solaris Secure Shell, Solaris Secure Shell Authentication
- PasswordAuthentication keyword, Solaris Secure Shell, Keywords in Solaris Secure Shell
- passwords
- authentication in Solaris Secure Shell, Solaris Secure Shell Authentication
- changing role password, How to Change the Password of a Role
- changing with kpasswd command, Changing Your Password
- changing with passwd -r command, Managing Password Information
- changing with passwd command, Changing Your Password
- creating for dial-up, How to Create a Dial-Up Password
- dial-up passwords
- disabling temporarily, How to Temporarily Disable Dial-Up Logins
- /etc/d_passwd file, Dial-Up Logins
disabling dial-up temporarily, How to Temporarily Disable Dial-Up Logins
- displaying users with no passwords, How to Display Users Without Passwords
- eliminating in Solaris Secure Shell, How to Reduce Password Prompts in Solaris Secure Shell
- eliminating in Solaris Secure Shell in CDE, How to Set Up the ssh-agent Command to Run Automatically in CDE
- encryption algorithms, Password Encryption
- finding users with no passwords, How to Display Users Without Passwords
- granting access without revealing, Granting Access to Your Account
- hardware access and, How to Require a Password for Hardware Access
- installing third-party encryption module, How to Install a Password Encryption Module From a Third Party
- LDAP, Managing Password Information
- specifying new password algorithm, How to Specify a New Password Algorithm for an LDAP Domain
local, Managing Password Information
- login security
- Maintaining Login Control
- Maintaining Login Control
- Managing Password Information
- managing, Kerberos Password Management
- modifying a principal's password, How to Modify a Kerberos Principal
- NIS, Managing Password Information
- specifying new password algorithm, How to Specify a New Password Algorithm for an NIS Domain
NIS+, Managing Password Information
- specifying new password algorithm, How to Specify a New Password Algorithm for an NIS+ Domain
policies and, Changing Your Password
- PROM security mode
- Maintaining Physical Security
- Controlling Access to System Hardware
- protecting
- keystore, How to Export a Certificate and Private Key in PKCS #12 Format
- PKCS #12 file, How to Export a Certificate and Private Key in PKCS #12 Format
requiring for hardware access, How to Require a Password for Hardware Access
- secret-key decryption for Secure RPC, Implementation of Diffie-Hellman Authentication
- specifying algorithm, How to Specify an Algorithm for Password Encryption
- in name services, How to Specify a New Password Algorithm for an NIS Domain
- locally, Changing the Password Algorithm (Task Map)
suggestions on choosing, Advice on Choosing a Password
- system logins
- Managing Password Information
- Special System Logins
- task map, Securing Logins and Passwords (Task Map)
- UNIX and Kerberos, Kerberos Password Management
- using Blowfish encryption algorithm for, How to Specify an Algorithm for Password Encryption
- using MD5 encryption algorithm for, How to Specify an Algorithm for Password Encryption
- using new algorithm, How to Specify an Algorithm for Password Encryption
- path_attr audit token
- Solaris Auditing Enhancements in the Solaris 10 Release
- path_attr Token
- path audit policy, description, Determining Audit Policy
- path audit token, format, path Token
- PATH environment variable
- and security, Setting the PATH Variable
- setting, Setting the PATH Variable
- PATH in Solaris Secure Shell, Solaris Secure Shell and Login Environment Variables
- permissions
- ACLs and
- Using Access Control Lists
- Using Access Control Lists to Protect Files
- changing file permissions
- absolute mode
- File Permission Modes
- How to Change File Permissions in Absolute Mode
- chmod command, Commands for Viewing and Securing Files
- symbolic mode
- File Permission Modes
- File Permission Modes
- How to Change File Permissions in Symbolic Mode
- How to Change File Permissions in Symbolic Mode
defaults, Default umask Value
- directory permissions, UNIX File Permissions
- file permissions
- absolute mode
- File Permission Modes
- How to Change File Permissions in Absolute Mode
- changing
- File Permission Modes
- How to Change File Permissions in Symbolic Mode
- description, UNIX File Permissions
- special permissions
- Sticky Bit
- File Permission Modes
- symbolic mode
- File Permission Modes
- File Permission Modes
- How to Change File Permissions in Symbolic Mode
- How to Change File Permissions in Symbolic Mode
finding files with setuid permissions, How to Find Files With Special File Permissions
- setgid permissions
- absolute mode
- File Permission Modes
- How to Change Special File Permissions in Absolute Mode
- description, setgid Permission
- symbolic mode, File Permission Modes
setuid permissions
- absolute mode
- File Permission Modes
- How to Change Special File Permissions in Absolute Mode
- description, setuid Permission
- security risks, setuid Permission
- symbolic mode, File Permission Modes
special file permissions
- Special File Permissions (setuid, setgid and Sticky Bit)
- Sticky Bit
- File Permission Modes
- sticky bit, Sticky Bit
- umask value, Default umask Value
- user classes and, File and Directory Ownership
- PermitEmptyPasswords keyword, sshd_config file, Keywords in Solaris Secure Shell
- PermitRootLogin keyword, sshd_config file, Keywords in Solaris Secure Shell
- permitted privilege set, How Privileges Are Implemented
- PermitUserEnvironment keyword, sshd_config file, Keywords in Solaris Secure Shell
- perzone audit policy
- description, Determining Audit Policy
- setting, How to Configure Audit Policy
- using
- How to Plan Auditing in Zones
- How to Configure Per-Zone Auditing
- Auditing and Solaris Zones
- when to use, Auditing on a System With Zones
- pfcsh command, description, Profile Shell in RBAC
- pfexec command, description, Commands That Manage RBAC
- pfksh command, description, Profile Shell in RBAC
- pfsh command, description, Profile Shell in RBAC
- physical security, description, Maintaining Physical Security
- PKCS #11 library
- adding as provider, How to Add a Software Provider
- in Solaris Cryptographic Framework, Solaris Cryptographic Framework
- PKCS #11 softtokens, managing keystore, KMF Keystore Management
- PKCS #12 files, protecting, How to Export a Certificate and Private Key in PKCS #12 Format
- pkcs11_kernel.so user-level provider, How to List Available Providers
- pkcs11_softtoken.so user-level provider, How to List Available Providers
- pkgadd command
- installing third-party providers, How to Add a Software Provider
- installing third-party software, How to Install a Password Encryption Module From a Third Party
- PKI
- managed by KMF, Managing Public Key Technologies
- policy managed by KMF, KMF Policy Management
- pktool command
- creating self-signed certificate, How to Create a Certificate by Using the pktool gencert Command
- export subcommand, How to Export a Certificate and Private Key in PKCS #12 Format
- gencert subcommand, How to Create a Certificate by Using the pktool gencert Command
- generating secret keys, How to Generate a Symmetric Key by Using the pktool Command
- import subcommand, How to Import a Certificate Into Your Keystore
- list subcommand, How to Create a Certificate by Using the pktool gencert Command
- managing PKI objects, Managing Public Key Technologies
- setpin subcommand, How to Generate a Passphrase by Using the pktool setpin Command
- plain.so.1 plug-in, SASL and, SASL Plug-ins
- planning
- auditing, Planning Solaris Auditing (Tasks)
- auditing in zones, How to Plan Auditing in Zones
- auditing task map, Planning Solaris Auditing (Task Map)
- Kerberos
- client and service principal names, Client and Service Principal Names
- clock synchronization, Clock Synchronization Within a Realm
- configuration decisions, Planning for the Kerberos Service
- database propagation, Which Database Propagation System to Use
- number of realms, Number of Realms
- ports, Ports for the KDC and Admin Services
- realm hierarchy, Realm Hierarchy
- realm names, Realm Names
- realms, Planning Kerberos Realms
- slave KDCs, The Number of Slave KDCs
PAM, Planning for Your PAM Implementation
- RBAC, How to Plan Your RBAC Implementation
- pluggable authentication module, See PAM
- plugin line
- audit_control file, audit_control File
- flags line and, How to Configure syslog Audit Logs
- plugin_list option, SASL and, SASL Options
- plugins
- adding to KMF, How to Manage Third-Party Plugins in KMF
- in auditing service, How to Configure syslog Audit Logs
- in cryptographic framework, Solaris Cryptographic Framework
- managed in KMF, KMF Plugin Management
- removing from KMF, How to Manage Third-Party Plugins in KMF
- SASL and, SASL Plug-ins
- plus sign (+)
- ACL entry, How to Check if a File Has an ACL
- audit class prefix, Audit Class Syntax
- entry in sulog file, How to Monitor Who Is Using the su Command
- file permissions symbol, File Permission Modes
- policies
- administering
- Administering Kerberos Principals and Policies (Tasks)
- Administering Kerberos Policies
- creating (Kerberos), How to Create a New Kerberos Principal
- creating new (Kerberos), How to Create a New Kerberos Policy
- deleting, How to Delete a Kerberos Policy
- for auditing, Determining Audit Policy
- modifying, How to Modify a Kerberos Policy
- on devices, How to View Device Policy
- overview, Security Policy
- passwords and, Changing Your Password
- SEAM Administration Tool panels for, SEAM Tool Panel Descriptions
- specifying password algorithm, Changing the Password Algorithm (Task Map)
- task map for administering, Administering Kerberos Policies (Task Map)
- viewing attributes, How to View a Kerberos Policy's Attributes
- viewing list of, How to View the List of Kerberos Policies
- policy
- definition in cryptographic framework, Terminology in the Solaris Cryptographic Framework
- definition in Solaris OS, Security Policy
- policy.conf file
- adding password encryption module, How to Install a Password Encryption Module From a Third Party
- Basic Solaris User rights profile, Basic Solaris User Rights Profile
- description
- policy.conf File
- Commands That Manage RBAC
- keywords
- for password algorithms, Password Encryption
- for privileges
- policy.conf File
- Files With Privilege Information
- for RBAC authorizations, policy.conf File
- for rights profiles, policy.conf File
- for workstation owner, policy.conf File
specifying encryption algorithms in, How to Specify an Algorithm for Password Encryption
- specifying password algorithm
- in name services, How to Specify a New Password Algorithm for an NIS Domain
specifying password algorithms, How to Specify an Algorithm for Password Encryption
- port forwarding
- configuring in Solaris Secure Shell, How to Configure Port Forwarding in Solaris Secure Shell
- Solaris Secure Shell
- How to Use Port Forwarding in Solaris Secure Shell
- How to Use Port Forwarding in Solaris Secure Shell
- Port keyword, Solaris Secure Shell, Keywords in Solaris Secure Shell
- ports, for Kerberos KDC, Ports for the KDC and Admin Services
- postdated ticket
- definition, Types of Tickets
- description, How the Kerberos Service Works
- postsigterm string, audit_warn script, audit_warn Script
- pound sign (#)
- device_allocate file, device_allocate File
- device_maps file, device_maps File
- ppriv command
- for debugging, How to Determine Which Privileges a Program Requires
- listing privileges, How to Determine the Privileges on a Process
- praudit command
- converting audit records to readable format
- How to View the Contents of Binary Audit Files
- praudit Command
- DTD for -x option, praudit Command
- options, praudit Command
- output formats, praudit Command
- piping auditreduce output to, How to View the Contents of Binary Audit Files
- use in a script, praudit Command
- viewing audit records, How to View the Contents of Binary Audit Files
- with no options, praudit Command
- XML format, How to View the Contents of Binary Audit Files
- PreferredAuthentications keyword, ssh_config file, Keywords in Solaris Secure Shell
- prefixes for audit classes, Audit Class Syntax
- preselecting, audit classes, How to Modify the audit_control File
- preselection in auditing, Audit Terminology and Concepts
- preselection mask (auditing)
- description, Process Audit Characteristics
- reducing storage costs, audit Command
- system-wide, audit_control File
- preventing
- access to system hardware, SPARC: Controlling Access to System Hardware (Task Map)
- audit trail overflow, How to Prevent Audit Trail Overflow
- executables from compromising security, Preventing Executable Files From Compromising Security
- kernel software provider use, How to Prevent the Use of a Kernel Software Provider
- use of hardware mechanism, How to Disable Hardware Provider Mechanisms and Features
- primary, in principal names, Kerberos Principals
- Primary Administrator (RBAC)
- assuming role, How to Assume a Role in a Terminal Window
- recommended role, RBAC: An Alternative to the Superuser Model
- rights profile contents, Primary Administrator Rights Profile
- primary audit directory, audit_control File
- principal
- adding administration
- How to Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- adding service principal to keytab
- Administering Keytab Files
- How to Add a Kerberos Service Principal to a Keytab File
- administering
- Administering Kerberos Principals and Policies (Tasks)
- Administering Kerberos Principals
- automating creation of, Automating the Creation of New Kerberos Principals
- creating, How to Create a New Kerberos Principal
- creating clntconfig
- How to Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- creating host
- How to Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- deleting, How to Delete a Kerberos Principal
- duplicating, How to Duplicate a Kerberos Principal
- Kerberos, Kerberos Principals
- modifying, How to Modify a Kerberos Principal
- principal name, Kerberos Principals
- removing from keytab file, How to Remove a Service Principal From a Keytab File
- removing service principal from keytab, How to Remove a Service Principal From a Keytab File
- SEAM Administration Tool panels for, SEAM Tool Panel Descriptions
- service principal, Kerberos Principals
- setting up defaults, How to Set Up Defaults for Creating New Kerberos Principals
- task map for administering, Administering Kerberos Principals (Task Map)
- user ID comparison, How to Create a Credential Table
- user principal, Kerberos Principals
- viewing attributes, How to View a Kerberos Principal's Attributes
- viewing list of, How to View the List of Kerberos Principals
- viewing sublist of principals, How to View the List of Kerberos Principals
- principal file, description, Kerberos Files
- principal.kadm5 file, description, Kerberos Files
- principal.kadm5.lock file, description, Kerberos Files
- principal.ok file, description, Kerberos Files
- principal.ulog file, description, Kerberos Files
- principle of least privilege, Privileges Protect Kernel Processes
- print format field, arbitrary token, arbitrary Token (Obsolete)
- Printer Management rights profile, Printer Management Rights Profile
- printing, audit log, How to View the Contents of Binary Audit Files
- PrintMotd keyword, sshd_config file, Keywords in Solaris Secure Shell
- priv.debug entry, syslog.conf file, Files With Privilege Information
- PRIV_DEFAULT keyword
- policy.conf file
- policy.conf File
- Files With Privilege Information
- PRIV_LIMIT keyword
- policy.conf file
- policy.conf File
- Files With Privilege Information
- PRIV_PROC_LOCK_MEMORY privilege, Privileges and System Resources
- privacy
- availability, Overview of Kerberized Commands
- Kerberos and, What Is the Kerberos Service?
- security service, Kerberos Security Services
- private keys
- See also secret keys
- definition in Kerberos, Authentication-Specific Terminology
- Solaris Secure Shell identity files, Solaris Secure Shell Files
- private protection level, Overview of Kerberized Commands
- privilege audit token
- Solaris Auditing Enhancements in the Solaris 10 Release
- privilege Token
- privilege checking, in applications, Applications That Check for Privileges
- privilege sets
- adding privileges to, Expanding a User or Role's Privileges
- basic, How Privileges Are Implemented
- effective, How Privileges Are Implemented
- inheritable, How Privileges Are Implemented
- limit, How Privileges Are Implemented
- listing, How Privileges Are Implemented
- permitted, How Privileges Are Implemented
- removing privileges from, Restricting a User or Role's Privileges
- privileged application
- authorization checking, Applications That Check Authorizations
- description, Solaris RBAC Elements and Basic Concepts
- ID checking, Applications That Check UIDs and GIDs
- privilege checking, Applications That Check for Privileges
- privileged ports, alternative to Secure RPC, Authentication and Authorization for Remote Access
- privileges
- adding to command, How to Add Privileges to a Command
- administering, Managing Privileges (Task Map)
- assigning to a command, Assigning Privileges
- assigning to a script, Assigning Privileges to a Script
- assigning to a user, Assigning Privileges
- assigning to user or role, How to Assign Privileges to a User or Role
- auditing and, Privileges and Auditing
- categories, Privilege Descriptions
- commands, Administrative Commands for Handling Privileges
- compared to superuser model, Privileges (Overview)
- debugging
- Privileges and Debugging
- How to Determine Which Privileges a Program Requires
- description
- Solaris RBAC Elements and Basic Concepts
- Solaris RBAC Elements and Basic Concepts
- Privilege Descriptions
- determining directly assigned ones, How to Determine the Privileges That You Have Been Directly Assigned
- devices and, Privileges and Devices
- differences from superuser model, Administrative Differences on a System With Privileges
- effects on SEAM Administration Tool, Using the SEAM Tool With Limited Kerberos Administration Privileges
- escalation, Prevention of Privilege Escalation
- executing commands with privilege, Expanding a User or Role's Privileges
- files, Files With Privilege Information
- finding missing, How to Determine Which Privileges a Program Requires
- how to use, Determining Your Privileges (Task Map)
- implemented in sets, How Privileges Are Implemented
- inherited by processes, How Processes Get Privileges
- limiting use by user or role, How to Limit a User's or Role's Privileges
- listing on a process, How to Determine the Privileges on a Process
- PRIV_PROC_LOCK_MEMORY, Privileges and System Resources
- processes with assigned privileges, How Processes Get Privileges
- programs aware of privileges, How Processes Get Privileges
- protecting kernel processes, Privileges Protect Kernel Processes
- removing from a user, Restricting a User or Role's Privileges
- removing from basic set, How to Limit a User's or Role's Privileges
- removing from limit set, How to Limit a User's or Role's Privileges
- task map, Managing and Using Privileges (Task Map)
- using in shell script, How to Run a Shell Script With Privileged Commands
- privileges file, description, Privilege Descriptions
- PROC privileges, Privilege Descriptions
- process audit characteristics
- audit ID, Process Audit Characteristics
- audit session ID, Process Audit Characteristics
- process preselection mask, Process Audit Characteristics
- terminal ID, Process Audit Characteristics
- process audit class, Definitions of Audit Classes
- process audit token, format, process Token
- process modify audit class, Definitions of Audit Classes
- process preselection mask, description, Process Audit Characteristics
- process privileges, Privilege Descriptions
- process rights management, See privileges
- process start audit class, Definitions of Audit Classes
- processing time costs, of auditing service, Cost of Increased Processing Time of Audit Data
- prof_attr database
- description, prof_attr Database
- summary, Databases That Support RBAC
- profile shells, description, Profile Shell in RBAC
- profiles, See rights profiles
- profiles command, description, Commands That Manage RBAC
- PROFS_GRANTED keyword, policy.conf file, policy.conf File
- programs
- checking for RBAC authorizations, How to Add RBAC Properties to Legacy Applications
- privilege-aware
- How Privileges Are Implemented
- How Processes Get Privileges
- project.max-locked-memory resource control, Privileges and System Resources
- PROM security mode, Controlling Access to System Hardware
- propagation
- KDC database, Which Database Propagation System to Use
- Kerberos database, Backing Up and Propagating the Kerberos Database
- protecting
- BIOS, pointer to, How to Require a Password for Hardware Access
- by using passwords with cryptographic framework, Using the Key Management Framework (Task Map)
- contents of keystore, How to Export a Certificate and Private Key in PKCS #12 Format
- files with cryptographic framework, Protecting Files With the Solaris Cryptographic Framework (Task Map)
- PROM, How to Require a Password for Hardware Access
- system from risky programs, Protecting Against Programs With Security Risk (Task Map)
- protecting files
- task map, Protecting Files (Task Map)
- user procedures, Protecting Files With UNIX Permissions (Task Map)
- with ACLs
- Using Access Control Lists to Protect Files
- Protecting Files With ACLs (Task Map)
- with ACLs task map, Protecting Files With ACLs (Task Map)
- with UNIX permissions
- Using UNIX Permissions to Protect Files
- Protecting Files With UNIX Permissions (Task Map)
- with UNIX permissions task map, Protecting Files With UNIX Permissions (Task Map)
- protection level
- clear, Overview of Kerberized Commands
- private, Overview of Kerberized Commands
- safe, Overview of Kerberized Commands
- setting in ftp, Overview of Kerberized Commands
- Protocol keyword, ssh_config file, Keywords in Solaris Secure Shell
- providers
- adding library, How to Add a Software Provider
- adding software provider, How to Add a Software Provider
- adding user-level software provider, How to Add a Software Provider
- connecting to cryptographic framework, Plugins to the Solaris Cryptographic Framework
- definition as plugins
- Solaris Cryptographic Framework
- Terminology in the Solaris Cryptographic Framework
- definition in cryptographic framework, Terminology in the Solaris Cryptographic Framework
- disabling hardware mechanisms, How to Disable Hardware Provider Mechanisms and Features
- installing, Plugins to the Solaris Cryptographic Framework
- listing hardware providers, How to List Hardware Providers
- listing in cryptographic framework, How to List Available Providers
- preventing use of kernel software provider, How to Prevent the Use of a Kernel Software Provider
- registering, Plugins to the Solaris Cryptographic Framework
- restoring use of kernel software provider, How to Prevent the Use of a Kernel Software Provider
- signing, Plugins to the Solaris Cryptographic Framework
- proxiable ticket, definition, Types of Tickets
- proxy ticket, definition, Types of Tickets
- ProxyCommand keyword, ssh_config file, Keywords in Solaris Secure Shell
- pseudo-tty, use in Solaris Secure Shell, Command Execution and Data Forwarding in Solaris Secure Shell
- PubkeyAuthentication keyword, Solaris Secure Shell, Keywords in Solaris Secure Shell
- public audit policy
- description, Determining Audit Policy
- read-only events, Determining Audit Policy
- public directories
- auditing, Audit Terminology and Concepts
- sticky bit and, Sticky Bit
- public key authentication, Solaris Secure Shell, Solaris Secure Shell Authentication
- public key cryptography
- AUTH_DH client-server session, Implementation of Diffie-Hellman Authentication
- changing NFS public keys and secret keys, Implementation of Diffie-Hellman Authentication
- common keys
- calculation, Implementation of Diffie-Hellman Authentication
database of public keys for Secure RPC, Implementation of Diffie-Hellman Authentication
- generating keys
- conversation keys for Secure NFS, Implementation of Diffie-Hellman Authentication
- using Diffie-Hellman, Implementation of Diffie-Hellman Authentication
NFS secret keys, Implementation of Diffie-Hellman Authentication
- public key technologies, See PKI
- public keys
- changing passphrase, How to Change the Passphrase for a Solaris Secure Shell Private Key
- DH authentication and, Diffie-Hellman Authentication and Secure RPC
- generating public-private key pair, How to Generate a Public/Private Key Pair for Use With Solaris Secure Shell
- Solaris Secure Shell identity files, Solaris Secure Shell Files
- public objects, auditing, Audit Terminology and Concepts
- publickey map, DH authentication, Diffie-Hellman Authentication and Secure RPC
- pwcheck_method option, SASL and, SASL Options
|