M
- -M option, auditreduce command, How to Merge Audit Files From the Audit Trail
- -m option
- cryptoadm command
- How to Prevent the Use of a User-Level Mechanism
- How to Prevent the Use of a Kernel Software Provider
- Kerberized commands, Overview of Kerberized Commands
- mac command
- description, User-Level Commands in the Cryptographic Framework
- syntax, How to Compute a MAC of a File
- machine security, See system security
- MACS keyword, Secure Shell, Keywords in Secure Shell
- mail, using with Secure Shell, How to Use Port Forwarding in Secure Shell
- man pages
- audit service, Audit Service Man Pages
- commands that require authorizations, Selected Commands That Require Authorizations
- device allocation, Device Allocation Commands
- policy, Security Policy
- RBAC, Commands That Manage RBAC
- Secure Shell, Secure Shell Commands
- managing
- See also administering
- audit files
- How to Merge Audit Files From the Audit Trail
- How to Prevent Audit Trail Overflow
- audit records task map, Managing Audit Records on Local Systems (Task Map)
- audit trail overflow, How to Prevent Audit Trail Overflow
- auditing in zones
- Auditing on a System With Oracle Solaris Zones
- Auditing and Oracle Solaris Zones
- device allocation task map, Managing Device Allocation (Task Map)
- devices, Managing Device Allocation (Task Map)
- file permissions, Protecting Files (Tasks)
- keystores with KMF, KMF Keystore Management
- passwords with Kerberos, Kerberos Password Management
- privileges task map, Using Privileges (Tasks)
- RBAC task map, Managing RBAC (Task Map)
- manifests
- See also bart create
- control, BART (Overview)
- customizing, How to Customize a Manifest
- file format, BART Manifest File Format
- test in BART, BART Report
- manually configuring
- Kerberos
- master KDC server, How to Manually Configure a Master KDC
- master KDC server using LDAP, How to Configure a KDC to Use an LDAP Data Server
- slave KDC server, How to Manually Configure a Slave KDC
- mapping
- host names onto realms (Kerberos), Mapping Host Names Onto Realms
- UIDs to Kerberos principals, Using the gsscred Table
- mapping GSS credentials, Mapping GSS Credentials to UNIX Credentials
- mappings, events to classes (auditing), Audit Classes and Preselection
- mask (auditing), description of process preselection, Process Audit Characteristics
- master KDC
- automatically configuring, How to Automatically Configure a Master KDC
- configuring with LDAP, How to Configure a KDC to Use an LDAP Data Server
- definition, Kerberos-Specific Terminology
- interactively configuring, How to Interactively Configure a Master KDC
- manually configuring, How to Manually Configure a Master KDC
- slave KDCs and
- Kerberos Servers
- Configuring KDC Servers
- swapping with slave KDC, Swapping a Master KDC and a Slave KDC
- Match blocks
- chroot directory and, How to Create an Isolated Directory for sftp Files
- exceptions to Secure Shell defaults, How to Create User and Host Exceptions to Secure Shell Defaults
- Match keyword, sshd_config file, Keywords in Secure Shell
- max_life value, description, Ticket Lifetimes
- max_renewable_life value, description, Ticket Lifetimes
- MaxStartups keyword, sshd_config file, Keywords in Secure Shell
- MD4 encryption algorithm, kernel provider, How to List Available Providers
- MD5 encryption algorithm
- allowing in heterogeneous environment, How to Specify an Algorithm for Password Encryption
- MD5 encryption algorithm, kernel provider, How to List Available Providers
- MD5 encryption algorithm
- policy.conf file
- How to Specify an Algorithm for Password Encryption
- How to Specify an Algorithm for Password Encryption
- mech_dh mechanism, GSS-API credentials, Acquiring GSS Credentials in Secure Shell
- mech_krb mechanism, GSS-API credentials, Acquiring GSS Credentials in Secure Shell
- mech_list option, SASL and, SASL Options
- mechanism, definition in Cryptographic Framework, Terminology in the Cryptographic Framework
- mechanisms
- disabling all on hardware provider, How to Disable Hardware Provider Mechanisms and Features
- enabling some on hardware provider, How to Disable Hardware Provider Mechanisms and Features
- media, device-clean scripts, Device-Clean Scripts
- Media Backup rights profile
- assigning to trusted users
- RBAC: An Alternative to the Superuser Model
- How to Plan Your RBAC Implementation
- Media Restore rights profile, assigning to trusted users, How to Plan Your RBAC Implementation
- merging, binary audit records, How to Merge Audit Files From the Audit Trail
- message authentication code (MAC), computing for file, How to Compute a MAC of a File
- messages file, executable stack messages, Protecting Executable Files From Compromising Security
- metaslot
- administering, Administrative Commands in the Cryptographic Framework
- definition in Cryptographic Framework, Terminology in the Cryptographic Framework
- microphone
- allocating, How to Allocate a Device
- deallocating, How to Deallocate a Device
- minus sign (-)
- audit class prefix, Audit Class Syntax
- entry in sulog file, How to Monitor Who Is Using the su Command
- file permissions symbol, File Permission Modes
- symbol of file type, File and Directory Ownership
- mode, definition in Cryptographic Framework, Terminology in the Cryptographic Framework
- modifying
- policies (Kerberos), How to Modify a Kerberos Policy
- principal's password (Kerberos), How to Modify a Kerberos Principal
- principals (Kerberos), How to Modify a Kerberos Principal
- roles (RBAC), How to Change the Security Attributes of a Role
- user security attributes, How to Configure a User's Audit Characteristics
- users (RBAC), How to Change the Security Attributes of a User
- modules, password encryption, Password Encryption
- monitoring
- audit trail in real time, Auditing Efficiently
- root access, Monitoring and Restricting root Access (Tasks)
- root access attempts, How to Restrict and Monitor root Logins
- su command attempts
- Limiting and Monitoring Superuser Access
- How to Monitor Who Is Using the su Command
- system usage
- Monitoring Use of Machine Resources
- Monitoring File Integrity
- use of privileged commands, How to Audit Roles
- mount command, with security attributes, How to Authorize Users to Allocate a Device
- mounting
- allocated CD-ROM, How to Mount an Allocated Device
- allocated devices, How to Mount an Allocated Device
- files with DH authentication, How to Share NFS Files With Diffie-Hellman Authentication
- mt command, Device-Clean Scripts