A
- -A option, auditreduce command,
How to Merge Audit Files From the Audit Trail
- -a option
- auditrecord command,
How to Display Audit Record Definitions
- digest command,
How to Compute a Digest of a File
- encrypt command,
How to Encrypt and Decrypt a File
- Kerberized commands,
Overview of Kerberized Commands
- mac command,
How to Compute a MAC of a File
- absolute mode
- changing file permissions
File Permission Modes
How to Change File Permissions in Absolute Mode
- changing special file permissions,
How to Change Special File Permissions in Absolute Mode
- description,
File Permission Modes
- setting special permissions,
File Permission Modes
- access
- address space,
Address Space Layout Randomization
- control lists
- See ACL
getting to server
- with Kerberos,
Gaining Access to a Service Using Kerberos
granting to your account
Granting Access to Your Account
Granting Access to Your Account
- login authentication with Secure Shell,
How to Reduce Password Prompts in Secure Shell
- obtaining for a specific service,
Obtaining Access to a Specific Service
- restricting for
- devices
Controlling Access to Devices
Configuring Device Policy (Tasks)
- system hardware,
Controlling Access to System Hardware (Tasks)
restricting for KDC servers,
How to Restrict Access to KDC Servers
- root access
- displaying attempts on console,
How to Restrict and Monitor root Logins
- monitoring su command attempts
Limiting and Monitoring Superuser Access
How to Monitor Who Is Using the su Command
- restricting
Restricting root Access to Shared Files
How to Restrict and Monitor root Logins
Secure RPC authentication,
Overview of Secure RPC
- security
- ACLs,
Using Access Control Lists
- controlling system usage,
Controlling Access to Machine Resources
- devices,
Configuring Device Policy (Tasks)
- file access restriction,
Restricting Access to Data in Files
- firewall setup
Firewall Systems
Firewall Systems
- login access restrictions
Maintaining Login Control
Maintaining Login Control
- login authentication,
How to Reduce Password Prompts in Secure Shell
- login control,
Maintaining Login Control
- monitoring system usage
Monitoring Use of Machine Resources
Monitoring File Integrity
- network control,
Controlling Network Access
- NFS client-server,
Implementation of Diffie-Hellman Authentication
- PATH variable setting,
Setting the PATH Variable
- peripheral devices,
Controlling Access to Devices
- physical security,
Maintaining Physical Security
- remote systems,
Secure Shell (Overview)
- reporting problems,
Reporting Security Problems
- root login tracking,
Limiting and Monitoring Superuser Access
- setuid programs,
Restricting setuid Executable Files
- system hardware,
Controlling Access to System Hardware (Tasks)
- UFS ACLs,
Using Access Control Lists to Protect UFS Files
sharing files,
Sharing Files Across Machines
- access control list
- See ACL
- Access Control Lists (ACLs), See ACL
- ACL
- description
Using Access Control Lists
Using Access Control Lists to Protect UFS Files
- format of entries,
Using Access Control Lists to Protect UFS Files
- kadm5.acl file
How to Create a New Kerberos Principal
How to Duplicate a Kerberos Principal
How to Modify the Kerberos Administration Privileges
- acl audit token, format,
acl Token
- active audit policy, temporary audit policy,
How to Change Audit Policy
- add_drv command, description,
Device Policy Commands
- adding
- administration principals (Kerberos),
How to Configure a KDC to Use an LDAP Data Server
- allocatable device,
How to Enable Device Allocation
- audit classes
How to Add an Audit Class
How to Add an Audit Class
- audit file systems,
How to Create ZFS File Systems for Audit Files
- audit policy,
How to Change Audit Policy
- auditing
- of individual users
How to Configure a User's Audit Characteristics
How to Lessen the Volume of Audit Records That Are Produced
- of roles,
How to Audit Roles
- of zones,
Planning Auditing (Tasks)
authorizations
- to command,
How to Create an Authorization
cryptomgt role,
How to Assign a Role
- DH authentication to mounted file systems,
Administering Authentication With Secure RPC (Tasks)
- hardware provider mechanisms and features,
How to Disable Hardware Provider Mechanisms and Features
- library plugin,
How to Add a Software Provider
- new authorization,
How to Create an Authorization
- new rights profile,
How to Create a Rights Profile
- new rights profile from existing one,
How to Clone and Modify a System Rights Profile
- PAM modules,
How to Add a PAM Module
- plugins
- auditing
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
How to Configure syslog Audit Logs
- Cryptographic Framework,
How to Add a Software Provider
- KMF,
How to Manage Third-Party Plugins in KMF
privileged users,
How to Change the Security Attributes of a User
- privileges
- directly to role,
How to Change the Security Attributes of a Role
- directly to user,
How to Change the Security Attributes of a User
- to command in rights profile,
How to Create a Rights Profile
RBAC properties
- to legacy applications,
How to Add RBAC Properties to Legacy Applications
roles,
How to Create a Role
- security attributes
- to legacy applications,
How to Add RBAC Properties to Legacy Applications
- to roles,
How to Change the Security Attributes of a Role
- to users,
How to Change the Security Attributes of a User
security-related role,
How to Assign a Role
- security to devices,
Managing Device Allocation (Tasks)
- security to system hardware,
How to Require a Password for SPARC Hardware Access
- service principal to keytab file (Kerberos),
How to Add a Kerberos Service Principal to a Keytab File
- software provider,
How to Add a Software Provider
- temporary audit policy,
How to Change Audit Policy
- user-level software provider,
How to Add a Software Provider
- address space, random layout,
Address Space Layout Randomization
- admin_server section
- krb5.conf file
How to Manually Configure a Master KDC
How to Configure a KDC to Use an LDAP Data Server
- administering
- auditing
- audit -s command
How to Refresh the Audit Service
How to Enable the Audit Service
- audit -t command,
How to Disable the Audit Service
- audit classes,
Audit Classes and Preselection
- audit events,
Audit Events
- audit files,
How to View the Contents of Binary Audit Files
- audit records,
Audit Records and Audit Tokens
- audit_remote plugin
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- audit_syslog plugin,
How to Configure syslog Audit Logs
- audit trail overflow prevention,
How to Prevent Audit Trail Overflow
- auditconfig command
Configuring the Audit Service (Task Map)
How to Preselect Audit Classes
- auditreduce command,
How to Merge Audit Files From the Audit Trail
- configuring,
Configuring the Audit Service (Task Map)
- cost control,
Controlling Auditing Costs
- description,
How Is Auditing Configured?
- disabling,
How to Disable the Audit Service
- efficiency,
Auditing Efficiently
- enabling,
How to Enable the Audit Service
- plugins
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- policy,
How to Change Audit Policy
- praudit command,
How to View the Contents of Binary Audit Files
- queue controls,
How to Change Audit Queue Controls
- reducing space requirements,
Cost of Storage of Audit Data
- refreshing,
How to Refresh the Audit Service
- rights profiles required,
Rights Profiles for Administering Auditing
- in zones
Auditing on a System With Oracle Solaris Zones
Auditing and Oracle Solaris Zones
- zones,
Configuring the Audit Service in Zones (Tasks)
auditing in zones,
How to Plan Auditing in Zones
- authorizations,
How to Create an Authorization
- Cryptographic Framework and zones,
Cryptographic Services and Zones
- Cryptographic Framework commands,
Administrative Commands in the Cryptographic Framework
- Cryptographic Framework plus FIPS–140,
Cryptographic Framework and FIPS-140
- Cryptographic Framework task map,
Administering the Cryptographic Framework (Tasks)
- device allocation,
Managing Device Allocation (Task Map)
- device policy,
Configuring Device Policy (Task Map)
- file permissions
Protecting Files (Tasks)
Protecting Files With UNIX Permissions (Task Map)
- Kerberos
- keytabs,
Administering Keytab Files
- policies,
Administering Kerberos Policies
- principals,
Administering Kerberos Principals
metaslot,
Administrative Commands in the Cryptographic Framework
- NFS client-server file security,
Implementation of Diffie-Hellman Authentication
- password algorithms,
Changing the Default Algorithm for Password Encryption (Tasks)
- privileges,
Using Privileges (Tasks)
- RBAC properties
How to Create a Rights Profile
How to Create an Authorization
- remote logins with Secure Shell,
How to Generate a Public/Private Key Pair for Use With Secure Shell
- rights profiles,
How to Create a Rights Profile
- of a user
How to Reorder Assigned Security Attributes
How to Enable a User to Use Own Password to Assume a Role
role password,
How to Change the Password of a Role
- roles to replace superuser,
How to Plan Your RBAC Implementation
- Secure RPC task map,
Administering Secure RPC (Task Map)
- Secure Shell
- clients,
Client Configuration in Secure Shell
- overview,
A Typical Secure Shell Session
- servers,
Server Configuration in Secure Shell
- task map,
Configuring Secure Shell (Task Map)
security properties
- authorizations,
How to Create an Authorization
- of a legacy application,
How to Add RBAC Properties to Legacy Applications
- of a rights profile
How to Create a Rights Profile
How to Clone and Modify a System Rights Profile
- of a role
How to Change the Password of a Role
How to Change the Security Attributes of a Role
How to Reorder Assigned Security Attributes
How to Enable a User to Use Own Password to Assume a Role
- of a user,
How to Change the Security Attributes of a User
user password to assume role
How to Reorder Assigned Security Attributes
How to Enable a User to Use Own Password to Assume a Role
- without privileges,
Administrative Differences on a System With Privileges
- ZFS remotely with Secure Shell,
How to Remotely Administer ZFS With Secure Shell
- administrators, restricting rights,
How to Restrict an Administrator to Explicitly Assigned Rights
- AES kernel provider,
How to List Available Providers
- aes128-cbc encryption algorithm, ssh_config file,
Keywords in Secure Shell
- aes128-ctr encryption algorithm, ssh_config file,
Keywords in Secure Shell
- agent daemon, Secure Shell,
How to Reduce Password Prompts in Secure Shell
- ahlt audit policy
- description,
Understanding Audit Policy
- setting,
How to Change Audit Policy
- with cnt policy,
Audit Policies for Asynchronous and Synchronous Events
- algorithms
- definition in Cryptographic Framework,
Terminology in the Cryptographic Framework
- file encryption,
How to Encrypt and Decrypt a File
- listing in the Cryptographic Framework,
How to List Available Providers
- passphrase protection in ssh-keygen,
Secure Shell and the OpenSSH Project
- password
- configuration,
How to Specify an Algorithm for Password Encryption
password encryption
Password Encryption
Changing the Default Algorithm for Password Encryption (Tasks)
- All (RBAC), rights profile,
Rights Profiles
- all audit class, caution for using,
Audit Classes
- allocate command
- allocate error state,
Allocate Error State
- authorizations required
Device Allocation Commands
Selected Commands That Require Authorizations
- removable media,
How to Allocate a Device
- user authorization,
How to Authorize Users to Allocate a Device
- using,
How to Allocate a Device
- allocate error state,
Allocate Error State
- allocating devices
- by users,
How to Allocate a Device
- forcibly,
How to Forcibly Allocate a Device
- troubleshooting,
How to Allocate a Device
- AllowGroups keyword, sshd_config file,
Keywords in Secure Shell
- AllowTcpForwarding keyword
- changing,
How to Configure Port Forwarding in Secure Shell
- sshd_config file,
Keywords in Secure Shell
- AllowUsers keyword, sshd_config file,
Keywords in Secure Shell
- ALTSHELL in Secure Shell,
Secure Shell and Login Environment Variables
- always-audit classes, process preselection mask,
Process Audit Characteristics
- antivirus software, See virus scanning
- appending arrow (>>), preventing appending,
Assigning a Restricted Shell to Users
- application server, configuring,
Configuring Kerberos Network Application Servers
- arcfour encryption algorithm, ssh_config file,
Keywords in Secure Shell
- ARCFOUR kernel provider,
How to List Available Providers
- archiving, audit files,
How to Prevent Audit Trail Overflow
- arge audit policy
- and exec_env token,
exec_env Token
- description,
Understanding Audit Policy
- setting,
How to Audit All Commands by Users
- argument audit token, format,
argument Token
- argv audit policy
- and exec_args token,
exec_args Token
- description,
Understanding Audit Policy
- setting,
How to Audit All Commands by Users
- assigning
- authorizations in a rights profile,
How to Create an Authorization
- privileges to commands in a rights profile,
How to Create a Rights Profile
- privileges to commands in a script,
How to Run a Shell Script With Privileged Commands
- privileges to role,
How to Change the Security Attributes of a Role
- privileges to user,
How to Change the Security Attributes of a User
- rights profile
- to a role,
How to Change the Security Attributes of a Role
role to a user locally,
How to Assign a Role
- assuming role
- how to,
Customizing RBAC for Your Site (Tasks)
- in a terminal window,
How to Assume a Role
- root,
How to Assume a Role
- asterisk (*
- wildcard character
- in RBAC authorizations,
Authorization Naming Conventions
- asterisk (*)
- checking for in RBAC authorizations,
How to Add RBAC Properties to Legacy Applications
- device_allocate file
device_allocate File
device_allocate File
- asynchronous audit events
Audit Policies for Asynchronous and Synchronous Events
Audit Policies for Asynchronous and Synchronous Events
- at command, authorizations required,
Selected Commands That Require Authorizations
- at sign (@), device_allocate file,
device_allocate File
- atq command, authorizations required,
Selected Commands That Require Authorizations
- attribute audit token,
attribute Token
- attributes, keyword in BART,
How to Create a Control Manifest
- audio devices, security,
Device-Clean Scripts
- audit -s command
How to Refresh the Audit Service
How to Refresh the Audit Service
How to Enable the Audit Service
- audit -t command,
How to Disable the Audit Service
- audit_binfile plugin,
Audit Plugin Modules
- getting attributes
How to Assign Audit Space for the Audit Trail
How to Assign Audit Space for the Audit Trail
How to Assign Audit Space for the Audit Trail
- limiting audit file size,
How to Assign Audit Space for the Audit Trail
- removing queue size,
How to Assign Audit Space for the Audit Trail
- setting attributes,
How to Assign Audit Space for the Audit Trail
- setting free space warning,
How to Assign Audit Space for the Audit Trail
- audit characteristics
- audit user ID,
Process Audit Characteristics
- processes,
Process Audit Characteristics
- session ID,
Process Audit Characteristics
- terminal ID,
Process Audit Characteristics
- user process preselection mask,
Process Audit Characteristics
- audit_class file
- adding a class,
How to Add an Audit Class
- troubleshooting,
How to Add an Audit Class
- audit classes
- adding,
How to Add an Audit Class
- configuration,
Audit Classes
- description
Audit Terminology and Concepts
Audit Events
- displaying defaults,
How to Display Audit Service Defaults
- exceptions to system-wide settings,
Audit Classes and Preselection
- mapping events,
Audit Classes and Preselection
- modifying default,
How to Add an Audit Class
- overview,
Audit Classes and Preselection
- post-selection,
Audit Terminology and Concepts
- prefixes,
Audit Class Syntax
- preselecting
- effect on public objects,
Audit Terminology and Concepts
- for failure
How to Configure a User's Audit Characteristics
How to Configure syslog Audit Logs
How to Configure syslog Audit Logs
- for success
How to Configure a User's Audit Characteristics
How to Configure syslog Audit Logs
How to Configure syslog Audit Logs
- for success and failure,
How to Preselect Audit Classes
preselection,
Audit Terminology and Concepts
- process preselection mask,
Process Audit Characteristics
- replacing,
How to Preselect Audit Classes
- syntax
Audit Classes
Audit Class Syntax
- user exceptions,
How to Configure a User's Audit Characteristics
- audit command
- disabling audit service,
How to Disable the Audit Service
- options,
Audit Service Man Pages
- refreshing audit service,
How to Refresh the Audit Service
- Audit Configuration rights profile,
Rights Profiles for Administering Auditing
- auditing a role,
How to Audit Roles
- configuring audit policy,
How to Change Audit Policy
- displaying auditing defaults,
How to Display Audit Service Defaults
- preselecting audit classes,
How to Preselect Audit Classes
- Audit Control rights profile,
Rights Profiles for Administering Auditing
- disabling audit service,
How to Disable the Audit Service
- enabling audit service,
How to Enable the Audit Service
- refreshing audit service,
How to Refresh the Audit Service
- audit directory, creating file systems for,
How to Create ZFS File Systems for Audit Files
- audit_event file
- changing class membership,
How to Change an Audit Event's Class Membership
- description,
Audit Events
- removing events safely,
How to Prevent the Auditing of Specific Events
- audit event-to-class mappings, changing,
How to Change an Audit Event's Class Membership
- audit events
- asynchronous,
Audit Policies for Asynchronous and Synchronous Events
- audit_event file,
Audit Events
- changing class membership,
How to Change an Audit Event's Class Membership
- description,
Audit Events
- mapping to classes,
Audit Classes and Preselection
- removing from audit_event file,
How to Prevent the Auditing of Specific Events
- selecting from audit trail,
How to Select Audit Events From the Audit Trail
- selecting from audit trail in zones,
Auditing and Oracle Solaris Zones
- summary,
Audit Terminology and Concepts
- synchronous,
Audit Policies for Asynchronous and Synchronous Events
- viewing from binary files,
How to View the Contents of Binary Audit Files
- audit file system, description,
Audit Terminology and Concepts
- audit files
- combining,
How to Merge Audit Files From the Audit Trail
- compressing on disk,
How to Compress Audit Files on a Dedicated File System
- copying messages to single file,
How to Select Audit Events From the Audit Trail
- creating summary files
How to Select Audit Events From the Audit Trail
How to Select Audit Events From the Audit Trail
How to Select Audit Events From the Audit Trail
- effects of Coordinated Universal Time (UTC),
How to Merge Audit Files From the Audit Trail
- limiting size of,
How to Limit the Size of Binary Audit Files
- managing,
How to Prevent Audit Trail Overflow
- printing,
How to View the Contents of Binary Audit Files
- reading with praudit,
How to View the Contents of Binary Audit Files
- reducing,
How to Merge Audit Files From the Audit Trail
- reducing space requirements,
Cost of Storage of Audit Data
- reducing storage-space requirements,
Auditing Efficiently
- setting aside disk space for,
How to Create ZFS File Systems for Audit Files
- time stamps,
Conventions for Binary Audit File Names
- ZFS file systems
How to Create ZFS File Systems for Audit Files
How to Compress Audit Files on a Dedicated File System
- audit flags, summary,
Audit Terminology and Concepts
- audit_flags keyword,
How to Display Audit Service Defaults
- specifying user exceptions to audit preselection,
How to Configure a User's Audit Characteristics
- use,
Audit Class Syntax
- using caret (^) prefix,
How to Configure a User's Audit Characteristics
- audit logs
- See also audit files
- comparing binary and text summaries,
Audit Logs
- configuring,
Configuring Audit Logs (Tasks)
- configuring text summary audit logs,
How to Configure syslog Audit Logs
- modes,
Audit Logs
- audit.notice entry, syslog.conf file,
How to Configure syslog Audit Logs
- audit plugins
- audit_binfile plugin
How to Change Audit Queue Controls
How to Assign Audit Space for the Audit Trail
- audit_remote plugin
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- audit_syslog plugin,
How to Configure syslog Audit Logs
- description,
Audit Terminology and Concepts
- qsize attribute,
How to Change Audit Queue Controls
- summary
Audit Service Man Pages
Audit Plugins
Audit Remote Server
- audit policy
- audit tokens from,
Audit Policy
- defaults,
Understanding Audit Policy
- description,
Audit Terminology and Concepts
- displaying defaults,
How to Display Audit Service Defaults
- effects of,
Understanding Audit Policy
- public,
Understanding Audit Policy
- setting,
How to Change Audit Policy
- setting ahlt,
How to Change Audit Policy
- setting arge,
How to Audit All Commands by Users
- setting argv,
How to Audit All Commands by Users
- setting in global zone
Auditing on a System With Oracle Solaris Zones
Auditing and Oracle Solaris Zones
- setting perzone,
How to Change Audit Policy
- that does not affect tokens,
Audit Policy
- tokens added by,
Audit Policy
- audit preselection mask
- modifying for existing users,
How to Update the Preselection Mask of Logged In Users
- modifying for individual users,
How to Configure a User's Audit Characteristics
- audit queue, events included,
Audit Classes and Preselection
- audit queue controls
- displaying defaults,
How to Display Audit Service Defaults
- getting,
How to Change Audit Queue Controls
- audit records
- converting to readable format,
How to View the Contents of Binary Audit Files
- copying to single file,
How to Select Audit Events From the Audit Trail
- description,
Audit Terminology and Concepts
- displaying,
How to View the Contents of Binary Audit Files
- displaying definitions of
- procedure,
How to Display Audit Record Definitions
displaying formats of a program,
How to Display Audit Record Definitions
- displaying formats of an audit class,
How to Display Audit Record Definitions
- displaying in XML format,
How to View the Contents of Binary Audit Files
- event modifiers,
header Token
- events that generate,
How Does Auditing Work?
- format,
Audit Record Structure
- formatting example,
How to Display Audit Record Definitions
- merging,
How to Merge Audit Files From the Audit Trail
- overview,
Audit Records and Audit Tokens
- reducing audit files,
How to Merge Audit Files From the Audit Trail
- sequence of tokens,
Audit Record Structure
- /var/adm/auditlog file,
How to Configure syslog Audit Logs
- audit_remote plugin,
Audit Plugin Modules
- configuring,
How to Configure a Remote Repository for Audit Files
- getting attributes
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- setting attributes
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- troubleshooting audit queue overfull,
How to Send Audit Files to a Remote Repository
- Audit Remote Server (ARS), managing,
Managing a Remote Repository
- Audit Review rights profile,
Rights Profiles for Administering Auditing
- audit service
- See also auditing
- audit trail creation,
Audit Trail
- configuring policy,
How to Change Audit Policy
- configuring queue controls,
How to Change Audit Queue Controls
- defaults,
Audit Service
- disabling,
How to Disable the Audit Service
- enabling,
How to Enable the Audit Service
- policy,
Understanding Audit Policy
- refreshing the kernel,
How to Refresh the Audit Service
- troubleshooting,
How to Determine That Auditing Is Running
- audit session ID,
Process Audit Characteristics
- overview,
What Is Auditing?
- audit_syslog plugin,
Audit Plugin Modules
- setting attributes,
How to Configure syslog Audit Logs
- audit tokens
- See also individual audit token names
- added by audit policy,
Audit Policy
- audit record format,
Audit Record Structure
- description
Audit Terminology and Concepts
Audit Records and Audit Tokens
- format,
Audit Token Formats
- list of,
Audit Token Formats
- xclient token,
xclient Token
- audit trail
- adding disk space,
How to Assign Audit Space for the Audit Trail
- analysis costs,
Cost of Analysis of Audit Data
- cleaning up not terminated files,
How to Clean Up a not_terminated Audit File
- creating
- summary files
How to Select Audit Events From the Audit Trail
How to Select Audit Events From the Audit Trail
description,
Audit Terminology and Concepts
- effect of audit policy,
Understanding Audit Policy
- monitoring in real time,
Auditing Efficiently
- no public objects,
Audit Terminology and Concepts
- overview,
How Is Auditing Configured?
- preventing overflow,
How to Prevent Audit Trail Overflow
- reducing size of
How to Lessen the Volume of Audit Records That Are Produced
How to Compress Audit Files on a Dedicated File System
- selecting events from,
How to Select Audit Events From the Audit Trail
- sending files to remote repository
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- viewing events from,
How to View the Contents of Binary Audit Files
- viewing events from different zones,
Auditing and Oracle Solaris Zones
- audit user ID
- mechanism,
Process Audit Characteristics
- overview,
What Is Auditing?
- audit_warn script
- configuring,
How to Configure the audit_warn Email Alias
- description,
Audit Service Man Pages
- auditconfig command
- adding audit file systems,
How to Assign Audit Space for the Audit Trail
- audit classes as arguments,
Audit Classes and Preselection
- configuring policy,
How to Change Audit Policy
- configuring queue controls,
How to Change Audit Queue Controls
- description,
Audit Service Man Pages
- displaying audit defaults,
How to Display Audit Service Defaults
- -getplugin option
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
How to Configure syslog Audit Logs
- policy options,
How to Change Audit Policy
- preselecting audit classes,
How to Preselect Audit Classes
- queue control options,
How to Change Audit Queue Controls
- sending files to remote repository
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- -setflags option,
How to Preselect Audit Classes
- -setnaflags option,
How to Preselect Audit Classes
- -setplugin option
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
How to Configure syslog Audit Logs
- setting active audit policy,
How to Change Audit Policy
- setting audit_binfile attributes,
How to Assign Audit Space for the Audit Trail
- setting audit policy,
How to Audit All Commands by Users
- setting audit policy temporarily,
How to Change Audit Policy
- setting audit_remote attributes
How to Send Audit Files to a Remote Repository
How to Configure a Remote Repository for Audit Files
- setting system-wide audit parameters,
Audit Classes and Preselection
- viewing default audit preselection,
How to Preselect Audit Classes
- auditd daemon
- refreshing audit service
How to Refresh the Audit Service
How to Refresh the Audit Service
- auditing
- adding audit flags to a group of users,
How to Configure a User's Audit Characteristics
- all commands by users,
How to Audit All Commands by Users
- Audit Remote Server (ARS),
Managing a Remote Repository
- changes in current release,
About the Audit Service in This Release
- changes in device policy,
How to Audit Changes in Device Policy
- configuring
- all zones,
Configuring the Audit Service (Tasks)
- global zone,
How to Change Audit Policy
- identically for all zones,
How to Configure All Zones Identically for Auditing
- per zone,
How to Configure Per-Zone Auditing
configuring in global zone,
How to Plan Auditing in Zones
- defaults,
Audit Service
- determining if running,
How to Determine That Auditing Is Running
- device allocation,
How to Audit Device Allocation
- disabling,
How to Disable the Audit Service
- enabling,
How to Enable the Audit Service
- finding changes to specific files,
How to Find Audit Records of Changes to Specific Files
- getting queue controls,
How to Change Audit Queue Controls
- local definition,
Audit Terminology and Concepts
- logins,
How to Audit Logins From Other Operating Systems
- man page summaries,
Audit Service Man Pages
- planning,
Planning Auditing (Tasks)
- planning in zones
How to Plan Auditing in Zones
How to Plan Auditing in Zones
- plugin modules,
Audit Plugin Modules
- post-selection definition,
Audit Terminology and Concepts
- preselection definition,
Audit Terminology and Concepts
- privileges and,
Privileges and Auditing
- remote definition,
Audit Terminology and Concepts
- removing user-specific audit flags,
How to Configure a User's Audit Characteristics
- rights profiles for,
Rights Profiles for Administering Auditing
- roles,
How to Audit Roles
- setting queue controls,
How to Change Audit Queue Controls
- sftp file transfers,
How to Audit FTP and SFTP File Transfers
- troubleshooting,
Troubleshooting the Audit Service (Task Map)
- troubleshooting praudit command,
How to View the Contents of Binary Audit Files
- updating information
How to Refresh the Audit Service
How to Refresh the Audit Service
- users only,
How to Configure a User's Audit Characteristics
- zones and
Auditing on a System With Oracle Solaris Zones
Auditing and Oracle Solaris Zones
- auditlog file, text audit records,
How to Configure syslog Audit Logs
- auditrecord command
- [] (square brackets) in output,
Audit Record Analysis
- description,
Audit Service Man Pages
- displaying audit record definitions,
How to Display Audit Record Definitions
- example,
How to Display Audit Record Definitions
- listing all formats,
How to Display Audit Record Definitions
- listing formats of class,
How to Display Audit Record Definitions
- listing formats of program,
How to Display Audit Record Definitions
- optional tokens ([]),
Audit Record Analysis
- auditreduce command
- -A option,
How to Merge Audit Files From the Audit Trail
- -b option,
How to Select Audit Events From the Audit Trail
- -C option,
How to Merge Audit Files From the Audit Trail
- -c option
How to Select Audit Events From the Audit Trail
How to Select Audit Events From the Audit Trail
- cleaning up audit files,
How to Clean Up a not_terminated Audit File
- -d option,
How to Select Audit Events From the Audit Trail
- description,
Audit Service Man Pages
- -e option,
How to Select Audit Events From the Audit Trail
- examples,
How to Merge Audit Files From the Audit Trail
- filtering options,
How to Select Audit Events From the Audit Trail
- -M option,
How to Merge Audit Files From the Audit Trail
- merging audit records,
How to Merge Audit Files From the Audit Trail
- -O option
How to Merge Audit Files From the Audit Trail
How to Merge Audit Files From the Audit Trail
How to Select Audit Events From the Audit Trail
- selecting audit records,
How to Select Audit Events From the Audit Trail
- time stamp use,
How to Merge Audit Files From the Audit Trail
- trailer tokens, and,
trailer Token
- using lowercase options,
How to Select Audit Events From the Audit Trail
- using uppercase options,
How to Merge Audit Files From the Audit Trail
- auditstat command, description,
Audit Service Man Pages
- auth_attr database
- description,
auth_attr Database
- summary,
RBAC Databases
- AUTH_DES authentication, See AUTH_DH authentication
- AUTH_DH authentication, and NFS,
NFS Services and Secure RPC
- authentication
- AUTH_DH client-server session,
Implementation of Diffie-Hellman Authentication
- configuring cross-realm,
Configuring Cross-Realm Authentication
- description,
Authentication and Authorization for Remote Access
- DH authentication,
Diffie-Hellman Authentication and Secure RPC
- disabling with -X option,
Overview of Kerberized Commands
- Kerberos and,
What Is the Kerberos Service?
- naming services,
Overview of Secure RPC
- network security,
Authentication and Authorization for Remote Access
- NFS-mounted files
How to Share NFS Files With Diffie-Hellman Authentication
How to Share NFS Files With Diffie-Hellman Authentication
- overview of Kerberos,
How the Kerberos Authentication System Works
- Secure RPC,
Overview of Secure RPC
- Secure Shell
- methods,
Secure Shell Authentication
- process,
Authentication and Key Exchange in Secure Shell
terminology,
Authentication-Specific Terminology
- types,
Authentication and Authorization for Remote Access
- use with NFS,
NFS Services and Secure RPC
- authentication methods
- GSS-API credentials in Secure Shell,
Secure Shell Authentication
- host-based in Secure Shell
Secure Shell Authentication
How to Set Up Host-Based Authentication for Secure Shell
- password in Secure Shell,
Secure Shell Authentication
- public keys in Secure Shell,
Secure Shell Authentication
- Secure Shell,
Secure Shell Authentication
- authenticator
- in Kerberos
Authentication-Specific Terminology
Obtaining a Credential for a Server
- authorizations
- adding to rights profile,
How to Create an Authorization
- device allocation,
Device Allocation Rights Profiles
- Kerberos and,
What Is the Kerberos Service?
- removing from rights profile,
How to Clone and Modify a System Rights Profile
- troubleshooting,
How to Troubleshoot RBAC and Privilege Assignment
- types,
Authentication and Authorization for Remote Access
- authorizations (RBAC)
- checking for wildcards,
How to Add RBAC Properties to Legacy Applications
- checking in privileged application,
Applications That Check Authorizations
- commands that require authorizations,
Selected Commands That Require Authorizations
- database
RBAC Databases
auth_attr Database
- definition,
RBAC Authorizations
- delegating,
Delegation Authority in Authorizations
- description
RBAC Elements and Basic Concepts
Authorizations
- for allocating device,
How to Authorize Users to Allocate a Device
- for device allocation,
Device Allocation Commands
- granularity,
Authorization Naming Conventions
- naming convention,
Authorization Naming Conventions
- not requiring for device allocation,
How to Change Which Devices Can Be Allocated
- solaris.device.allocate
How to Authorize Users to Allocate a Device
Device Allocation Commands
- solaris.device.revoke,
Device Allocation Commands
- authorized_keys file, description,
Secure Shell Files
- AuthorizedKeysFile keyword, sshd_config file,
Keywords in Secure Shell
- auths command, description,
Commands That Manage RBAC
- AUTHS_GRANTED keyword, policy.conf file,
policy.conf File
- auto_transition option, SASL and,
SASL Options
- automatic login
- disabling,
Overview of Kerberized Commands
- enabling,
Overview of Kerberized Commands
- automatically configuring
- Kerberos
- master KDC server,
How to Automatically Configure a Master KDC
- slave KDC server,
How to Automatically Configure a Slave KDC
- automating principal creation,
Automating the Creation of New Kerberos Principals
- auxprop_login option, SASL and,
SASL Options