System Administration Guide: Security Services
Previous Next

E

-e option
auditreduce command, How to Select Audit Events From the Audit Trail
ppriv command, How to Determine Which Privileges a Program Requires
ebusy string, audit_warn script, audit_warn Script
eeprom command
Maintaining Physical Security
Controlling Access to System Hardware
effective privilege set, How Privileges Are Implemented
efficiency, auditing and, Auditing Efficiently
eject command, device cleanup and, Device-Clean Scripts
elfsign command
description
Scope of the Solaris Cryptographic Framework
Binary Signatures for Third-Party Software
enabling
auditing, How to Enable the Auditing Service
auditing service, How to Enable the Auditing Service
auditing service task map, Configuring and Enabling the Auditing Service (Task Map)
cryptographic mechanisms, How to Prevent the Use of a User-Level Mechanism
device allocation
How to Make a Device Allocatable
How to Make a Device Allocatable
Kerberized applications only, How to Enable Only Kerberized Applications
kernel software provider use, How to Prevent the Use of a Kernel Software Provider
keyboard abort, How to Disable a System's Abort Sequence
mechanisms and features on hardware provider, How to Disable Hardware Provider Mechanisms and Features
encrypt command
description, User-Level Commands in the Solaris Cryptographic Framework
error messages, How to Encrypt and Decrypt a File
syntax, How to Generate a Symmetric Key by Using the dd Command
troubleshooting, How to Encrypt and Decrypt a File
encrypting
communications between hosts, How to Log In to a Remote Host With Solaris Secure Shell
encrypt command, How to Encrypt and Decrypt a File
files
Protecting Files With Encryption
Protecting Files With the Solaris Cryptographic Framework (Task Map)
How to Encrypt and Decrypt a File
network traffic between hosts, Solaris Secure Shell (Overview)
passwords, Changing the Password Algorithm (Task Map)
private key of NIS user, How to Set Up a Diffie-Hellman Key for an NIS User
Secure NFS, DES Encryption With Secure NFS
using user-level commands, User-Level Commands in the Solaris Cryptographic Framework
encryption
algorithms
Kerberos and, Kerberos Encryption Types
DES algorithm, DES Encryption With Secure NFS
generating symmetric key
using the dd command, How to Generate a Symmetric Key by Using the dd Command
using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
installing third-party password modules, How to Install a Password Encryption Module From a Third Party
list of password algorithms, Password Encryption
modes
Kerberos and, Kerberos Encryption Types
password algorithm, Password Encryption
privacy service, What Is the Kerberos Service?
specifying algorithms in ssh_config file, Keywords in Solaris Secure Shell
specifying password algorithm
locally, Changing the Password Algorithm (Task Map)
specifying password algorithms in policy.conf file, Password Encryption
types
Kerberos and
Kerberos Encryption Types
Using Kerberos Encryption Types
with -x option, Overview of Kerberized Commands
ending, signal received during auditing shutdown, audit_warn Script
environment variables
See also variables
audit token for, exec_env Token
overriding proxy servers and ports, How to Set Up Default Connections to Hosts Outside a Firewall
PATH, Preventing Unintentional Misuse of Machine Resources
presence in audit records
Determining Audit Policy
Audit Token Formats
Solaris Secure Shell and, Solaris Secure Shell and Login Environment Variables
use with ssh-agent command, Solaris Secure Shell Commands
equal sign (=), file permissions symbol, File Permission Modes
error messages
encrypt command, How to Encrypt and Decrypt a File
Kerberos, Kerberos Error Messages
with kpasswd, Changing Your Password
errors
allocate error state, Allocate Error State
audit directories full
auditd Daemon
audit_warn Script
internal errors, audit_warn Script
EscapeChar keyword, ssh_config file, Keywords in Solaris Secure Shell
/etc/d_passwd file
and /etc/passwd file, Dial-Up Logins
creating, How to Create a Dial-Up Password
disabling dial-up logins temporarily, How to Temporarily Disable Dial-Up Logins
/etc/default/kbd file, How to Disable a System's Abort Sequence
/etc/default/login file
description, Solaris Secure Shell Files
login default settings, How to Monitor All Failed Login Attempts
restricting remote root access, How to Restrict and Monitor Superuser Logins
Solaris Secure Shell and, Solaris Secure Shell and Login Environment Variables
/etc/default/su file
displaying su command attempts, How to Restrict and Monitor Superuser Logins
monitoring access attempts, How to Restrict and Monitor Superuser Logins
monitoring su command, How to Monitor Who Is Using the su Command
/etc/dfs/dfstab file, sharing files, Sharing Files Across Machines
/etc/dialups file, creating, How to Create a Dial-Up Password
/etc/hosts.equiv file, description, Solaris Secure Shell Files
/etc/krb5/kadm5.acl file, description, Kerberos Files
/etc/krb5/kadm5.keytab file, description, Kerberos Files
/etc/krb5/kdc.conf file, description, Kerberos Files
/etc/krb5/kpropd.acl file, description, Kerberos Files
/etc/krb5/krb5.conf file, description, Kerberos Files
/etc/krb5/krb5.keytab file, description, Kerberos Files
/etc/krb5/warn.conf file, description, Kerberos Files
/etc/logindevperm file, Remote Logins
/etc/nologin file
description, Solaris Secure Shell Files
disabling user logins temporarily, How to Temporarily Disable User Logins
/etc/nsswitch.conf file, Maintaining Login Control
/etc/pam.conf file, Kerberos and, Kerberos Files
/etc/publickey file, DH authentication and, Diffie-Hellman Authentication and Secure RPC
/etc/security/audit_event file, audit events and, Audit Events
/etc/security/audit_startup file, audit_startup Script
/etc/security/audit_warn script, audit_warn Script
/etc/security/bsmconv script, device_maps File
description, bsmconv Script
/etc/security/crypt.conf file
changing with new password module, How to Install a Password Encryption Module From a Third Party
third-party password modules, How to Install a Password Encryption Module From a Third Party
/etc/security/device_allocate file, device_allocate File
/etc/security/device_maps file, device_maps File
/etc/security/policy.conf file, algorithms configuration, How to Specify an Algorithm for Password Encryption
/etc/ssh_host_dsa_key.pub file, description, Solaris Secure Shell Files
/etc/ssh_host_key.pub file, description, Solaris Secure Shell Files
/etc/ssh_host_rsa_key.pub file, description, Solaris Secure Shell Files
/etc/ssh/shosts.equiv file, description, Solaris Secure Shell Files
/etc/ssh/ssh_config file
configuring Solaris Secure Shell, Client Configuration in Solaris Secure Shell
description, Solaris Secure Shell Files
host-specific parameters, Host-Specific Parameters in Solaris Secure Shell
keywords, Keywords in Solaris Secure Shell
override, Solaris Secure Shell Files
/etc/ssh/ssh_host_dsa_key file, description, Solaris Secure Shell Files
/etc/ssh/ssh_host_key file
description, Solaris Secure Shell Files
override, Solaris Secure Shell Files
/etc/ssh/ssh_host_rsa_key file, description, Solaris Secure Shell Files
/etc/ssh/ssh_known_hosts file
controlling distribution, Maintaining Known Hosts in Solaris Secure Shell
description, Solaris Secure Shell Files
override, Solaris Secure Shell Files
secure distribution, Maintaining Known Hosts in Solaris Secure Shell
/etc/ssh/sshd_config file
description, Solaris Secure Shell Files
keywords, Keywords in Solaris Secure Shell
/etc/ssh/sshrc file, description, Solaris Secure Shell Files
/etc/syslog.conf file
auditing and
How to Configure syslog Audit Logs
syslog.conf File
executable stack messages and, Preventing Executable Files From Compromising Security
failed logins and, How to Monitor All Failed Login Attempts
PAM and, How to Log PAM Error Reports
/etc/system file, system File
event, description, Audit Events
event modifier field flags (header token), header Token
exec_args audit token
argv policy and, exec_args Token
format, exec_args Token
exec_attr database
description, exec_attr Database
summary, Databases That Support RBAC
exec audit class, Definitions of Audit Classes
exec_env audit token, format, exec_env Token
executable stacks
disabling logging messages, How to Disable Programs From Using Executable Stacks
logging messages, Preventing Executable Files From Compromising Security
protecting against
Preventing Executable Files From Compromising Security
How to Disable Programs From Using Executable Stacks
execute permissions, symbolic mode, File Permission Modes
exit audit token, format, exit Token (Obsolete)
export subcommand, pktool command, How to Export a Certificate and Private Key in PKCS #12 Format
EXTERNAL security mechanism plug-in, SASL and, SASL Plug-ins
Previous Next