Document Information
Preface
Part I Security Overview
1. Security Services (Overview)
Part II System, File, and Device Security
2. Managing Machine Security (Overview)
3. Controlling Access to Systems (Tasks)
4. Virus Scanning Service (Tasks)
5. Controlling Access to Devices (Tasks)
6. Using the Basic Audit Reporting Tool (Tasks)
7. Controlling Access to Files (Tasks)
Part III Roles, Rights Profiles, and Privileges
8. Using Roles and Privileges (Overview)
9. Using Role-Based Access Control (Tasks)
10. Role-Based Access Control (Reference)
11. Privileges (Tasks)
12. Privileges (Reference)
Part IV Solaris Cryptographic Services
13. Solaris Cryptographic Framework (Overview)
14. Solaris Cryptographic Framework (Tasks)
15. Solaris Key Management Framework
Part V Authentication Services and Secure Communication
16. Using Authentication Services (Tasks)
17. Using PAM
18. Using SASL
19. Using Solaris Secure Shell (Tasks)
20. Solaris Secure Shell (Reference)
Part VI Kerberos Service
21. Introduction to the Kerberos Service
22. Planning for the Kerberos Service
23. Configuring the Kerberos Service (Tasks)
24. Kerberos Error Messages and Troubleshooting
25. Administering Kerberos Principals and Policies (Tasks)
26. Using Kerberos Applications (Tasks)
27. The Kerberos Service (Reference)
Part VII Solaris Auditing
28. Solaris Auditing (Overview)
29. Planning for Solaris Auditing
30. Managing Solaris Auditing (Tasks)
31. Solaris Auditing (Reference)
Glossary
Index
|
U
- -U option
- allocate command, Device Allocation Commands
- list_devices command, Device Allocation Commands
- uauth audit token
- Solaris Auditing Enhancements in the Solaris 10 Release
- uauth Token
- UDP
- addresses, iport Token
- port forwarding and, How to Configure Port Forwarding in Solaris Secure Shell
- Solaris Secure Shell and, How to Configure Port Forwarding in Solaris Secure Shell
- using for remote audit logs, Audit Files
- umask value
- and file creation, Default umask Value
- typical settings, Default umask Value
- umount command, with security attributes, How to Authorize Users to Allocate a Device
- uninstalling, cryptographic providers, How to Prevent the Use of a User-Level Mechanism
- UNIX file permissions, See files, permissions
- unmounting, allocated devices, How to Deallocate a Device
- update_drv command
- description, Device Policy Commands
- using, How to Change the Device Policy on an Existing Device
- updating, auditing service, How to Update the Auditing Service
- URL for online help, Graphical Kerberos Tool, Online Help URL in the Graphical Kerberos Administration Tool
- use_authid option, SASL and, SASL Options
- UseLogin keyword, sshd_config file, Keywords in Solaris Secure Shell
- user accounts
- See also users
- displaying login status
- How to Display a User's Login Status
- How to Display a User's Login Status
- User Accounts tool, description, How to Change the RBAC Properties of a User
- user ACL entries
- default entries for directories, ACL Entries for Directories
- description, ACL Entries for Files
- setting, How to Add ACL Entries to a File
- user administration audit class, Definitions of Audit Classes
- user_attr database
- defaultpriv keyword, Files With Privilege Information
- description
- Databases That Support RBAC
- user_attr Database
- limitpriv keyword, Files With Privilege Information
- RBAC relationships, RBAC Database Relationships
- user audit fields, audit_user database, audit_user Database
- user classes of files, File and Directory Ownership
- user database (RBAC), See user_attr database
- user ID
- audit ID and
- What Is Auditing?
- Process Audit Characteristics
- in NFS services, How to Create a Credential Table
- User keyword, ssh_config file, Keywords in Solaris Secure Shell
- user principal, description, Kerberos Principals
- user procedures
- adding plugins to KMF, How to Manage Third-Party Plugins in KMF
- allocating devices, Allocating Devices (Task Map)
- assuming a role, Using Roles (Task Map)
- chkey command, How to Set Up a Diffie-Hellman Key for an NIS User
- computing digest of a file, How to Compute a Digest of a File
- computing MAC of a file, How to Compute a MAC of a File
- creating self-signed certificate, How to Create a Certificate by Using the pktool gencert Command
- decrypting files, How to Encrypt and Decrypt a File
- encrypting files, Protecting Files With the Solaris Cryptographic Framework (Task Map)
- encrypting NIS user's private key, How to Set Up a Diffie-Hellman Key for an NIS User
- exporting certificates, How to Export a Certificate and Private Key in PKCS #12 Format
- generating a symmetric key
- using the dd command, How to Generate a Symmetric Key by Using the dd Command
- using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore, How to Generate a Passphrase by Using the pktool setpin Command
- importing certificates, How to Import a Certificate Into Your Keystore
- protecting files, Protecting Files With UNIX Permissions (Task Map)
- using ACLs, Protecting Files With ACLs (Task Map)
- using an assigned role, Using Roles (Task Map)
- using pktool command, Using the Key Management Framework (Task Map)
- using Solaris Secure Shell, Using Solaris Secure Shell (Task Map)
- user scripts, configuring for ssh-agent daemon in CDE, How to Set Up the ssh-agent Command to Run Automatically in CDE
- useradd command
- adding local user, How to Make root User Into a Role
- description, Commands That Manage RBAC
- userdel command, description, Commands That Manage RBAC
- UserKnownHostsFile keyword, ssh_config file, Keywords in Solaris Secure Shell
- UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
- usermod command
- changing user's RBAC properties, How to Change the RBAC Properties of a User
- description, Commands That Manage RBAC
- using to assign role, How to Assign a Role to a Local User
- users
- adding local user, How to Make root User Into a Role
- allocating devices, How to Allocate a Device
- assigning allocate authorization to, How to Authorize Users to Allocate a Device
- assigning privileges to, How to Assign Privileges to a User or Role
- assigning RBAC defaults, policy.conf File
- basic privilege set, How Privileges Are Implemented
- changing properties from command line, How to Change the RBAC Properties of a User
- computing digest of files, How to Compute a Digest of a File
- computing MAC of files, How to Compute a MAC of a File
- creating local user, How to Make root User Into a Role
- deallocating devices, How to Deallocate a Device
- determining directly assigned privileges, How to Determine the Privileges That You Have Been Directly Assigned
- determining own privileged commands, How to Determine the Privileged Commands That You Can Run
- disabling login, How to Temporarily Disable User Logins
- displaying login status, How to Display a User's Login Status
- encrypting files, How to Encrypt and Decrypt a File
- generating a symmetric key, How to Generate a Symmetric Key by Using the pktool Command
- having no passwords, How to Display Users Without Passwords
- initial inheritable privileges, How Privileges Are Implemented
- modifying audit preselection mask of, How to Change a User's Audit Characteristics
- modifying properties (RBAC), How to Change the RBAC Properties of a User
- mounting allocated devices, How to Mount an Allocated Device
- restricting basic privileges, How to Limit a User's or Role's Privileges
- unmounting allocated devices, How to Deallocate a Device
- using
- ACLs, How to Add ACL Entries to a File
- allocate command, How to Allocate a Device
- BART, Using BART (Tasks)
- cryptoadm command, Administering the Cryptographic Framework
- cryptographic framework task map, Using the Cryptographic Framework (Task Map)
- dd command, How to Generate a Symmetric Key by Using the dd Command
- deallocate command, How to Deallocate a Device
- device allocation
- Allocating Devices (Task Map)
- How to Allocate a Device
- digest command, How to Compute a Digest of a File
- encrypt command, How to Encrypt and Decrypt a File
- file permissions, Protecting Files (Task Map)
- mac command, How to Compute a MAC of a File
- mount command, How to Mount an Allocated Device
- new password algorithm, How to Specify an Algorithm for Password Encryption
- pktool command, How to Generate a Symmetric Key by Using the pktool Command
- ppriv command
- How to Determine the Privileges on a Process
- How to Determine the Privileges on a Process
- privileges, Determining Your Assigned Privileges
- privileges task map, Determining Your Privileges (Task Map)
- RBAC task map, Using RBAC (Task Map)
- roles, Using Roles
- roles task map, Using Roles (Task Map)
- smrole command, How to Assign Privileges to a User or Role
- Solaris Secure Shell task map, Using Solaris Secure Shell (Task Map)
- ssh-add command, How to Reduce Password Prompts in Solaris Secure Shell
- ssh-agent daemon, How to Reduce Password Prompts in Solaris Secure Shell
- truss command, How to Determine Which Privileges a Program Requires
- umount command, How to Deallocate a Device
- usermod command, How to Assign Privileges to a User or Role
- Using the Key Management Framework (Task Map), Using the Key Management Framework (Task Map)
- /usr/bin/ftp command, Kerberos and, Kerberos Commands
- /usr/bin/kdestroy command, Kerberos and, Kerberos Commands
- /usr/bin/kinit command, Kerberos and, Kerberos Commands
- /usr/bin/klist command, Kerberos and, Kerberos Commands
- /usr/bin/kpasswd command, Kerberos and, Kerberos Commands
- /usr/bin/ktutil command, Kerberos and, Kerberos Commands
- /usr/bin/rcp command, Kerberos and, Kerberos Commands
- /usr/bin/rdist command, Kerberos and, Kerberos Commands
- /usr/bin/rlogin command, Kerberos and, Kerberos Commands
- /usr/bin/rsh command, Kerberos and, Kerberos Commands
- /usr/bin/telnet command, Kerberos and, Kerberos Commands
- /usr/lib/kprop command, description, Kerberos Commands
- /usr/lib/krb5/kadmind daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/kpropd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/krb5kdc daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/ktkt_warnd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/libsasl.so library, overview, SASL (Overview)
- /usr/sbin/gkadmin command, description, Kerberos Commands
- /usr/sbin/gsscred command, description, Kerberos Commands
- /usr/sbin/in.ftpd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.rlogind daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.rshd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.telnetd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/kadmin command, description, Kerberos Commands
- /usr/sbin/kadmin.local command, description, Kerberos Commands
- /usr/sbin/kclient command, description, Kerberos Commands
- /usr/sbin/kdb5_ldap_util command, description, Kerberos Commands
- /usr/sbin/kdb5_util command, description, Kerberos Commands
- /usr/sbin/kgcmgr command, description, Kerberos Commands
- /usr/sbin/kproplog command, description, Kerberos Commands
- /usr/share/lib/xml directory, praudit Command
- uucico command, login program, How to Create a Dial-Up Password
|