A
- -A option, auditreduce command, How to Merge Audit Files From the Audit Trail
- -a option
- auditrecord command, How to Display Audit Record Definitions
- digest command, How to Compute a Digest of a File
- encrypt command, How to Encrypt and Decrypt a File
- Kerberized commands, Overview of Kerberized Commands
- mac command, How to Compute a MAC of a File
- absolute mode
- changing file permissions
- File Permission Modes
- How to Change File Permissions in Absolute Mode
- changing special file permissions, How to Change Special File Permissions in Absolute Mode
- description, File Permission Modes
- setting special permissions, File Permission Modes
- access
- address space, Address Space Layout Randomization
- control lists
- See ACL
getting to server
- with Kerberos, Gaining Access to a Service Using Kerberos
granting to your account
- Granting Access to Your Account
- Granting Access to Your Account
- login authentication with Secure Shell, How to Reduce Password Prompts in Secure Shell
- obtaining for a specific service, Obtaining Access to a Specific Service
- restricting for
- devices
- Controlling Access to Devices
- Configuring Device Policy (Tasks)
- system hardware, Controlling Access to System Hardware (Tasks)
restricting for KDC servers, How to Restrict Access to KDC Servers
- root access
- displaying attempts on console, How to Restrict and Monitor root Logins
- monitoring su command attempts
- Limiting and Monitoring Superuser Access
- How to Monitor Who Is Using the su Command
- restricting
- Restricting root Access to Shared Files
- How to Restrict and Monitor root Logins
Secure RPC authentication, Overview of Secure RPC
- security
- ACLs, Using Access Control Lists
- controlling system usage, Controlling Access to Machine Resources
- devices, Configuring Device Policy (Tasks)
- file access restriction, Restricting Access to Data in Files
- firewall setup
- Firewall Systems
- Firewall Systems
- login access restrictions
- Maintaining Login Control
- Maintaining Login Control
- login authentication, How to Reduce Password Prompts in Secure Shell
- login control, Maintaining Login Control
- monitoring system usage
- Monitoring Use of Machine Resources
- Monitoring File Integrity
- network control, Controlling Network Access
- NFS client-server, Implementation of Diffie-Hellman Authentication
- PATH variable setting, Setting the PATH Variable
- peripheral devices, Controlling Access to Devices
- physical security, Maintaining Physical Security
- remote systems, Secure Shell (Overview)
- reporting problems, Reporting Security Problems
- root login tracking, Limiting and Monitoring Superuser Access
- setuid programs, Restricting setuid Executable Files
- system hardware, Controlling Access to System Hardware (Tasks)
- UFS ACLs, Using Access Control Lists to Protect UFS Files
sharing files, Sharing Files Across Machines
- access control list
- See ACL
- Access Control Lists (ACLs), See ACL
- ACL
- description
- Using Access Control Lists
- Using Access Control Lists to Protect UFS Files
- format of entries, Using Access Control Lists to Protect UFS Files
- kadm5.acl file
- How to Create a New Kerberos Principal
- How to Duplicate a Kerberos Principal
- How to Modify the Kerberos Administration Privileges
- acl audit token, format, acl Token
- active audit policy, temporary audit policy, How to Change Audit Policy
- add_drv command, description, Device Policy Commands
- adding
- administration principals (Kerberos), How to Configure a KDC to Use an LDAP Data Server
- allocatable device, How to Enable Device Allocation
- audit classes
- How to Add an Audit Class
- How to Add an Audit Class
- audit file systems, How to Create ZFS File Systems for Audit Files
- audit policy, How to Change Audit Policy
- auditing
- of individual users
- How to Configure a User's Audit Characteristics
- How to Lessen the Volume of Audit Records That Are Produced
- of roles, How to Audit Roles
- of zones, Planning Auditing (Tasks)
authorizations
- to command, How to Create an Authorization
cryptomgt role, How to Assign a Role
- DH authentication to mounted file systems, Administering Authentication With Secure RPC (Tasks)
- hardware provider mechanisms and features, How to Disable Hardware Provider Mechanisms and Features
- library plugin, How to Add a Software Provider
- new authorization, How to Create an Authorization
- new rights profile, How to Create a Rights Profile
- new rights profile from existing one, How to Clone and Modify a System Rights Profile
- PAM modules, How to Add a PAM Module
- plugins
- auditing
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- How to Configure syslog Audit Logs
- Cryptographic Framework, How to Add a Software Provider
- KMF, How to Manage Third-Party Plugins in KMF
privileged users, How to Change the Security Attributes of a User
- privileges
- directly to role, How to Change the Security Attributes of a Role
- directly to user, How to Change the Security Attributes of a User
- to command in rights profile, How to Create a Rights Profile
RBAC properties
- to legacy applications, How to Add RBAC Properties to Legacy Applications
roles, How to Create a Role
- security attributes
- to legacy applications, How to Add RBAC Properties to Legacy Applications
- to roles, How to Change the Security Attributes of a Role
- to users, How to Change the Security Attributes of a User
security-related role, How to Assign a Role
- security to devices, Managing Device Allocation (Tasks)
- security to system hardware, How to Require a Password for SPARC Hardware Access
- service principal to keytab file (Kerberos), How to Add a Kerberos Service Principal to a Keytab File
- software provider, How to Add a Software Provider
- temporary audit policy, How to Change Audit Policy
- user-level software provider, How to Add a Software Provider
- address space, random layout, Address Space Layout Randomization
- admin_server section
- krb5.conf file
- How to Manually Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- administering
- auditing
- audit -s command
- How to Refresh the Audit Service
- How to Enable the Audit Service
- audit -t command, How to Disable the Audit Service
- audit classes, Audit Classes and Preselection
- audit events, Audit Events
- audit files, How to View the Contents of Binary Audit Files
- audit records, Audit Records and Audit Tokens
- audit_remote plugin
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- audit_syslog plugin, How to Configure syslog Audit Logs
- audit trail overflow prevention, How to Prevent Audit Trail Overflow
- auditconfig command
- Configuring the Audit Service (Task Map)
- How to Preselect Audit Classes
- auditreduce command, How to Merge Audit Files From the Audit Trail
- configuring, Configuring the Audit Service (Task Map)
- cost control, Controlling Auditing Costs
- description, How Is Auditing Configured?
- disabling, How to Disable the Audit Service
- efficiency, Auditing Efficiently
- enabling, How to Enable the Audit Service
- plugins
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- policy, How to Change Audit Policy
- praudit command, How to View the Contents of Binary Audit Files
- queue controls, How to Change Audit Queue Controls
- reducing space requirements, Cost of Storage of Audit Data
- refreshing, How to Refresh the Audit Service
- rights profiles required, Rights Profiles for Administering Auditing
- in zones
- Auditing on a System With Oracle Solaris Zones
- Auditing and Oracle Solaris Zones
- zones, Configuring the Audit Service in Zones (Tasks)
auditing in zones, How to Plan Auditing in Zones
- authorizations, How to Create an Authorization
- Cryptographic Framework and zones, Cryptographic Services and Zones
- Cryptographic Framework commands, Administrative Commands in the Cryptographic Framework
- Cryptographic Framework plus FIPS–140, Cryptographic Framework and FIPS-140
- Cryptographic Framework task map, Administering the Cryptographic Framework (Tasks)
- device allocation, Managing Device Allocation (Task Map)
- device policy, Configuring Device Policy (Task Map)
- file permissions
- Protecting Files (Tasks)
- Protecting Files With UNIX Permissions (Task Map)
- Kerberos
- keytabs, Administering Keytab Files
- policies, Administering Kerberos Policies
- principals, Administering Kerberos Principals
metaslot, Administrative Commands in the Cryptographic Framework
- NFS client-server file security, Implementation of Diffie-Hellman Authentication
- password algorithms, Changing the Default Algorithm for Password Encryption (Tasks)
- privileges, Using Privileges (Tasks)
- RBAC properties
- How to Create a Rights Profile
- How to Create an Authorization
- remote logins with Secure Shell, How to Generate a Public/Private Key Pair for Use With Secure Shell
- rights profiles, How to Create a Rights Profile
- of a user
- How to Reorder Assigned Security Attributes
- How to Enable a User to Use Own Password to Assume a Role
role password, How to Change the Password of a Role
- roles to replace superuser, How to Plan Your RBAC Implementation
- Secure RPC task map, Administering Secure RPC (Task Map)
- Secure Shell
- clients, Client Configuration in Secure Shell
- overview, A Typical Secure Shell Session
- servers, Server Configuration in Secure Shell
- task map, Configuring Secure Shell (Task Map)
security properties
- authorizations, How to Create an Authorization
- of a legacy application, How to Add RBAC Properties to Legacy Applications
- of a rights profile
- How to Create a Rights Profile
- How to Clone and Modify a System Rights Profile
- of a role
- How to Change the Password of a Role
- How to Change the Security Attributes of a Role
- How to Reorder Assigned Security Attributes
- How to Enable a User to Use Own Password to Assume a Role
- of a user, How to Change the Security Attributes of a User
user password to assume role
- How to Reorder Assigned Security Attributes
- How to Enable a User to Use Own Password to Assume a Role
- without privileges, Administrative Differences on a System With Privileges
- ZFS remotely with Secure Shell, How to Remotely Administer ZFS With Secure Shell
- administrators, restricting rights, How to Restrict an Administrator to Explicitly Assigned Rights
- AES kernel provider, How to List Available Providers
- aes128-cbc encryption algorithm, ssh_config file, Keywords in Secure Shell
- aes128-ctr encryption algorithm, ssh_config file, Keywords in Secure Shell
- agent daemon, Secure Shell, How to Reduce Password Prompts in Secure Shell
- ahlt audit policy
- description, Understanding Audit Policy
- setting, How to Change Audit Policy
- with cnt policy, Audit Policies for Asynchronous and Synchronous Events
- algorithms
- definition in Cryptographic Framework, Terminology in the Cryptographic Framework
- file encryption, How to Encrypt and Decrypt a File
- listing in the Cryptographic Framework, How to List Available Providers
- passphrase protection in ssh-keygen, Secure Shell and the OpenSSH Project
- password
- configuration, How to Specify an Algorithm for Password Encryption
password encryption
- Password Encryption
- Changing the Default Algorithm for Password Encryption (Tasks)
- All (RBAC), rights profile, Rights Profiles
- all audit class, caution for using, Audit Classes
- allocate command
- allocate error state, Allocate Error State
- authorizations required
- Device Allocation Commands
- Selected Commands That Require Authorizations
- removable media, How to Allocate a Device
- user authorization, How to Authorize Users to Allocate a Device
- using, How to Allocate a Device
- allocate error state, Allocate Error State
- allocating devices
- by users, How to Allocate a Device
- forcibly, How to Forcibly Allocate a Device
- troubleshooting, How to Allocate a Device
- AllowGroups keyword, sshd_config file, Keywords in Secure Shell
- AllowTcpForwarding keyword
- changing, How to Configure Port Forwarding in Secure Shell
- sshd_config file, Keywords in Secure Shell
- AllowUsers keyword, sshd_config file, Keywords in Secure Shell
- ALTSHELL in Secure Shell, Secure Shell and Login Environment Variables
- always-audit classes, process preselection mask, Process Audit Characteristics
- antivirus software, See virus scanning
- appending arrow (>>), preventing appending, Assigning a Restricted Shell to Users
- application server, configuring, Configuring Kerberos Network Application Servers
- arcfour encryption algorithm, ssh_config file, Keywords in Secure Shell
- ARCFOUR kernel provider, How to List Available Providers
- archiving, audit files, How to Prevent Audit Trail Overflow
- arge audit policy
- and exec_env token, exec_env Token
- description, Understanding Audit Policy
- setting, How to Audit All Commands by Users
- argument audit token, format, argument Token
- argv audit policy
- and exec_args token, exec_args Token
- description, Understanding Audit Policy
- setting, How to Audit All Commands by Users
- assigning
- authorizations in a rights profile, How to Create an Authorization
- privileges to commands in a rights profile, How to Create a Rights Profile
- privileges to commands in a script, How to Run a Shell Script With Privileged Commands
- privileges to role, How to Change the Security Attributes of a Role
- privileges to user, How to Change the Security Attributes of a User
- rights profile
- to a role, How to Change the Security Attributes of a Role
role to a user locally, How to Assign a Role
- assuming role
- how to, Customizing RBAC for Your Site (Tasks)
- in a terminal window, How to Assume a Role
- root, How to Assume a Role
- asterisk (*
- wildcard character
- in RBAC authorizations, Authorization Naming Conventions
- asterisk (*)
- checking for in RBAC authorizations, How to Add RBAC Properties to Legacy Applications
- device_allocate file
- device_allocate File
- device_allocate File
- asynchronous audit events
- Audit Policies for Asynchronous and Synchronous Events
- Audit Policies for Asynchronous and Synchronous Events
- at command, authorizations required, Selected Commands That Require Authorizations
- at sign (@), device_allocate file, device_allocate File
- atq command, authorizations required, Selected Commands That Require Authorizations
- attribute audit token, attribute Token
- attributes, keyword in BART, How to Create a Control Manifest
- audio devices, security, Device-Clean Scripts
- audit -s command
- How to Refresh the Audit Service
- How to Refresh the Audit Service
- How to Enable the Audit Service
- audit -t command, How to Disable the Audit Service
- audit_binfile plugin, Audit Plugin Modules
- getting attributes
- How to Assign Audit Space for the Audit Trail
- How to Assign Audit Space for the Audit Trail
- How to Assign Audit Space for the Audit Trail
- limiting audit file size, How to Assign Audit Space for the Audit Trail
- removing queue size, How to Assign Audit Space for the Audit Trail
- setting attributes, How to Assign Audit Space for the Audit Trail
- setting free space warning, How to Assign Audit Space for the Audit Trail
- audit characteristics
- audit user ID, Process Audit Characteristics
- processes, Process Audit Characteristics
- session ID, Process Audit Characteristics
- terminal ID, Process Audit Characteristics
- user process preselection mask, Process Audit Characteristics
- audit_class file
- adding a class, How to Add an Audit Class
- troubleshooting, How to Add an Audit Class
- audit classes
- adding, How to Add an Audit Class
- configuration, Audit Classes
- description
- Audit Terminology and Concepts
- Audit Events
- displaying defaults, How to Display Audit Service Defaults
- exceptions to system-wide settings, Audit Classes and Preselection
- mapping events, Audit Classes and Preselection
- modifying default, How to Add an Audit Class
- overview, Audit Classes and Preselection
- post-selection, Audit Terminology and Concepts
- prefixes, Audit Class Syntax
- preselecting
- effect on public objects, Audit Terminology and Concepts
- for failure
- How to Configure a User's Audit Characteristics
- How to Configure syslog Audit Logs
- How to Configure syslog Audit Logs
- for success
- How to Configure a User's Audit Characteristics
- How to Configure syslog Audit Logs
- How to Configure syslog Audit Logs
- for success and failure, How to Preselect Audit Classes
preselection, Audit Terminology and Concepts
- process preselection mask, Process Audit Characteristics
- replacing, How to Preselect Audit Classes
- syntax
- Audit Classes
- Audit Class Syntax
- user exceptions, How to Configure a User's Audit Characteristics
- audit command
- disabling audit service, How to Disable the Audit Service
- options, Audit Service Man Pages
- refreshing audit service, How to Refresh the Audit Service
- Audit Configuration rights profile, Rights Profiles for Administering Auditing
- auditing a role, How to Audit Roles
- configuring audit policy, How to Change Audit Policy
- displaying auditing defaults, How to Display Audit Service Defaults
- preselecting audit classes, How to Preselect Audit Classes
- Audit Control rights profile, Rights Profiles for Administering Auditing
- disabling audit service, How to Disable the Audit Service
- enabling audit service, How to Enable the Audit Service
- refreshing audit service, How to Refresh the Audit Service
- audit directory, creating file systems for, How to Create ZFS File Systems for Audit Files
- audit_event file
- changing class membership, How to Change an Audit Event's Class Membership
- description, Audit Events
- removing events safely, How to Prevent the Auditing of Specific Events
- audit event-to-class mappings, changing, How to Change an Audit Event's Class Membership
- audit events
- asynchronous, Audit Policies for Asynchronous and Synchronous Events
- audit_event file, Audit Events
- changing class membership, How to Change an Audit Event's Class Membership
- description, Audit Events
- mapping to classes, Audit Classes and Preselection
- removing from audit_event file, How to Prevent the Auditing of Specific Events
- selecting from audit trail, How to Select Audit Events From the Audit Trail
- selecting from audit trail in zones, Auditing and Oracle Solaris Zones
- summary, Audit Terminology and Concepts
- synchronous, Audit Policies for Asynchronous and Synchronous Events
- viewing from binary files, How to View the Contents of Binary Audit Files
- audit file system, description, Audit Terminology and Concepts
- audit files
- combining, How to Merge Audit Files From the Audit Trail
- compressing on disk, How to Compress Audit Files on a Dedicated File System
- copying messages to single file, How to Select Audit Events From the Audit Trail
- creating summary files
- How to Select Audit Events From the Audit Trail
- How to Select Audit Events From the Audit Trail
- How to Select Audit Events From the Audit Trail
- effects of Coordinated Universal Time (UTC), How to Merge Audit Files From the Audit Trail
- limiting size of, How to Limit the Size of Binary Audit Files
- managing, How to Prevent Audit Trail Overflow
- printing, How to View the Contents of Binary Audit Files
- reading with praudit, How to View the Contents of Binary Audit Files
- reducing, How to Merge Audit Files From the Audit Trail
- reducing space requirements, Cost of Storage of Audit Data
- reducing storage-space requirements, Auditing Efficiently
- setting aside disk space for, How to Create ZFS File Systems for Audit Files
- time stamps, Conventions for Binary Audit File Names
- ZFS file systems
- How to Create ZFS File Systems for Audit Files
- How to Compress Audit Files on a Dedicated File System
- audit flags, summary, Audit Terminology and Concepts
- audit_flags keyword, How to Display Audit Service Defaults
- specifying user exceptions to audit preselection, How to Configure a User's Audit Characteristics
- use, Audit Class Syntax
- using caret (^) prefix, How to Configure a User's Audit Characteristics
- audit logs
- See also audit files
- comparing binary and text summaries, Audit Logs
- configuring, Configuring Audit Logs (Tasks)
- configuring text summary audit logs, How to Configure syslog Audit Logs
- modes, Audit Logs
- audit.notice entry, syslog.conf file, How to Configure syslog Audit Logs
- audit plugins
- audit_binfile plugin
- How to Change Audit Queue Controls
- How to Assign Audit Space for the Audit Trail
- audit_remote plugin
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- audit_syslog plugin, How to Configure syslog Audit Logs
- description, Audit Terminology and Concepts
- qsize attribute, How to Change Audit Queue Controls
- summary
- Audit Service Man Pages
- Audit Plugins
- Audit Remote Server
- audit policy
- audit tokens from, Audit Policy
- defaults, Understanding Audit Policy
- description, Audit Terminology and Concepts
- displaying defaults, How to Display Audit Service Defaults
- effects of, Understanding Audit Policy
- public, Understanding Audit Policy
- setting, How to Change Audit Policy
- setting ahlt, How to Change Audit Policy
- setting arge, How to Audit All Commands by Users
- setting argv, How to Audit All Commands by Users
- setting in global zone
- Auditing on a System With Oracle Solaris Zones
- Auditing and Oracle Solaris Zones
- setting perzone, How to Change Audit Policy
- that does not affect tokens, Audit Policy
- tokens added by, Audit Policy
- audit preselection mask
- modifying for existing users, How to Update the Preselection Mask of Logged In Users
- modifying for individual users, How to Configure a User's Audit Characteristics
- audit queue, events included, Audit Classes and Preselection
- audit queue controls
- displaying defaults, How to Display Audit Service Defaults
- getting, How to Change Audit Queue Controls
- audit records
- converting to readable format, How to View the Contents of Binary Audit Files
- copying to single file, How to Select Audit Events From the Audit Trail
- description, Audit Terminology and Concepts
- displaying, How to View the Contents of Binary Audit Files
- displaying definitions of
- procedure, How to Display Audit Record Definitions
displaying formats of a program, How to Display Audit Record Definitions
- displaying formats of an audit class, How to Display Audit Record Definitions
- displaying in XML format, How to View the Contents of Binary Audit Files
- event modifiers, header Token
- events that generate, How Does Auditing Work?
- format, Audit Record Structure
- formatting example, How to Display Audit Record Definitions
- merging, How to Merge Audit Files From the Audit Trail
- overview, Audit Records and Audit Tokens
- reducing audit files, How to Merge Audit Files From the Audit Trail
- sequence of tokens, Audit Record Structure
- /var/adm/auditlog file, How to Configure syslog Audit Logs
- audit_remote plugin, Audit Plugin Modules
- configuring, How to Configure a Remote Repository for Audit Files
- getting attributes
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- setting attributes
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- troubleshooting audit queue overfull, How to Send Audit Files to a Remote Repository
- Audit Remote Server (ARS), managing, Managing a Remote Repository
- Audit Review rights profile, Rights Profiles for Administering Auditing
- audit service
- See also auditing
- audit trail creation, Audit Trail
- configuring policy, How to Change Audit Policy
- configuring queue controls, How to Change Audit Queue Controls
- defaults, Audit Service
- disabling, How to Disable the Audit Service
- enabling, How to Enable the Audit Service
- policy, Understanding Audit Policy
- refreshing the kernel, How to Refresh the Audit Service
- troubleshooting, How to Determine That Auditing Is Running
- audit session ID, Process Audit Characteristics
- overview, What Is Auditing?
- audit_syslog plugin, Audit Plugin Modules
- setting attributes, How to Configure syslog Audit Logs
- audit tokens
- See also individual audit token names
- added by audit policy, Audit Policy
- audit record format, Audit Record Structure
- description
- Audit Terminology and Concepts
- Audit Records and Audit Tokens
- format, Audit Token Formats
- list of, Audit Token Formats
- xclient token, xclient Token
- audit trail
- adding disk space, How to Assign Audit Space for the Audit Trail
- analysis costs, Cost of Analysis of Audit Data
- cleaning up not terminated files, How to Clean Up a not_terminated Audit File
- creating
- summary files
- How to Select Audit Events From the Audit Trail
- How to Select Audit Events From the Audit Trail
description, Audit Terminology and Concepts
- effect of audit policy, Understanding Audit Policy
- monitoring in real time, Auditing Efficiently
- no public objects, Audit Terminology and Concepts
- overview, How Is Auditing Configured?
- preventing overflow, How to Prevent Audit Trail Overflow
- reducing size of
- How to Lessen the Volume of Audit Records That Are Produced
- How to Compress Audit Files on a Dedicated File System
- selecting events from, How to Select Audit Events From the Audit Trail
- sending files to remote repository
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- viewing events from, How to View the Contents of Binary Audit Files
- viewing events from different zones, Auditing and Oracle Solaris Zones
- audit user ID
- mechanism, Process Audit Characteristics
- overview, What Is Auditing?
- audit_warn script
- configuring, How to Configure the audit_warn Email Alias
- description, Audit Service Man Pages
- auditconfig command
- adding audit file systems, How to Assign Audit Space for the Audit Trail
- audit classes as arguments, Audit Classes and Preselection
- configuring policy, How to Change Audit Policy
- configuring queue controls, How to Change Audit Queue Controls
- description, Audit Service Man Pages
- displaying audit defaults, How to Display Audit Service Defaults
- -getplugin option
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- How to Configure syslog Audit Logs
- policy options, How to Change Audit Policy
- preselecting audit classes, How to Preselect Audit Classes
- queue control options, How to Change Audit Queue Controls
- sending files to remote repository
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- -setflags option, How to Preselect Audit Classes
- -setnaflags option, How to Preselect Audit Classes
- -setplugin option
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- How to Configure syslog Audit Logs
- setting active audit policy, How to Change Audit Policy
- setting audit_binfile attributes, How to Assign Audit Space for the Audit Trail
- setting audit policy, How to Audit All Commands by Users
- setting audit policy temporarily, How to Change Audit Policy
- setting audit_remote attributes
- How to Send Audit Files to a Remote Repository
- How to Configure a Remote Repository for Audit Files
- setting system-wide audit parameters, Audit Classes and Preselection
- viewing default audit preselection, How to Preselect Audit Classes
- auditd daemon
- refreshing audit service
- How to Refresh the Audit Service
- How to Refresh the Audit Service
- auditing
- adding audit flags to a group of users, How to Configure a User's Audit Characteristics
- all commands by users, How to Audit All Commands by Users
- Audit Remote Server (ARS), Managing a Remote Repository
- changes in current release, About the Audit Service in This Release
- changes in device policy, How to Audit Changes in Device Policy
- configuring
- all zones, Configuring the Audit Service (Tasks)
- global zone, How to Change Audit Policy
- identically for all zones, How to Configure All Zones Identically for Auditing
- per zone, How to Configure Per-Zone Auditing
configuring in global zone, How to Plan Auditing in Zones
- defaults, Audit Service
- determining if running, How to Determine That Auditing Is Running
- device allocation, How to Audit Device Allocation
- disabling, How to Disable the Audit Service
- enabling, How to Enable the Audit Service
- finding changes to specific files, How to Find Audit Records of Changes to Specific Files
- getting queue controls, How to Change Audit Queue Controls
- local definition, Audit Terminology and Concepts
- logins, How to Audit Logins From Other Operating Systems
- man page summaries, Audit Service Man Pages
- planning, Planning Auditing (Tasks)
- planning in zones
- How to Plan Auditing in Zones
- How to Plan Auditing in Zones
- plugin modules, Audit Plugin Modules
- post-selection definition, Audit Terminology and Concepts
- preselection definition, Audit Terminology and Concepts
- privileges and, Privileges and Auditing
- remote definition, Audit Terminology and Concepts
- removing user-specific audit flags, How to Configure a User's Audit Characteristics
- rights profiles for, Rights Profiles for Administering Auditing
- roles, How to Audit Roles
- setting queue controls, How to Change Audit Queue Controls
- sftp file transfers, How to Audit FTP and SFTP File Transfers
- troubleshooting, Troubleshooting the Audit Service (Task Map)
- troubleshooting praudit command, How to View the Contents of Binary Audit Files
- updating information
- How to Refresh the Audit Service
- How to Refresh the Audit Service
- users only, How to Configure a User's Audit Characteristics
- zones and
- Auditing on a System With Oracle Solaris Zones
- Auditing and Oracle Solaris Zones
- auditlog file, text audit records, How to Configure syslog Audit Logs
- auditrecord command
- [] (square brackets) in output, Audit Record Analysis
- description, Audit Service Man Pages
- displaying audit record definitions, How to Display Audit Record Definitions
- example, How to Display Audit Record Definitions
- listing all formats, How to Display Audit Record Definitions
- listing formats of class, How to Display Audit Record Definitions
- listing formats of program, How to Display Audit Record Definitions
- optional tokens ([]), Audit Record Analysis
- auditreduce command
- -A option, How to Merge Audit Files From the Audit Trail
- -b option, How to Select Audit Events From the Audit Trail
- -C option, How to Merge Audit Files From the Audit Trail
- -c option
- How to Select Audit Events From the Audit Trail
- How to Select Audit Events From the Audit Trail
- cleaning up audit files, How to Clean Up a not_terminated Audit File
- -d option, How to Select Audit Events From the Audit Trail
- description, Audit Service Man Pages
- -e option, How to Select Audit Events From the Audit Trail
- examples, How to Merge Audit Files From the Audit Trail
- filtering options, How to Select Audit Events From the Audit Trail
- -M option, How to Merge Audit Files From the Audit Trail
- merging audit records, How to Merge Audit Files From the Audit Trail
- -O option
- How to Merge Audit Files From the Audit Trail
- How to Merge Audit Files From the Audit Trail
- How to Select Audit Events From the Audit Trail
- selecting audit records, How to Select Audit Events From the Audit Trail
- time stamp use, How to Merge Audit Files From the Audit Trail
- trailer tokens, and, trailer Token
- using lowercase options, How to Select Audit Events From the Audit Trail
- using uppercase options, How to Merge Audit Files From the Audit Trail
- auditstat command, description, Audit Service Man Pages
- auth_attr database
- description, auth_attr Database
- summary, RBAC Databases
- AUTH_DES authentication, See AUTH_DH authentication
- AUTH_DH authentication, and NFS, NFS Services and Secure RPC
- authentication
- AUTH_DH client-server session, Implementation of Diffie-Hellman Authentication
- configuring cross-realm, Configuring Cross-Realm Authentication
- description, Authentication and Authorization for Remote Access
- DH authentication, Diffie-Hellman Authentication and Secure RPC
- disabling with -X option, Overview of Kerberized Commands
- Kerberos and, What Is the Kerberos Service?
- naming services, Overview of Secure RPC
- network security, Authentication and Authorization for Remote Access
- NFS-mounted files
- How to Share NFS Files With Diffie-Hellman Authentication
- How to Share NFS Files With Diffie-Hellman Authentication
- overview of Kerberos, How the Kerberos Authentication System Works
- Secure RPC, Overview of Secure RPC
- Secure Shell
- methods, Secure Shell Authentication
- process, Authentication and Key Exchange in Secure Shell
terminology, Authentication-Specific Terminology
- types, Authentication and Authorization for Remote Access
- use with NFS, NFS Services and Secure RPC
- authentication methods
- GSS-API credentials in Secure Shell, Secure Shell Authentication
- host-based in Secure Shell
- Secure Shell Authentication
- How to Set Up Host-Based Authentication for Secure Shell
- password in Secure Shell, Secure Shell Authentication
- public keys in Secure Shell, Secure Shell Authentication
- Secure Shell, Secure Shell Authentication
- authenticator
- in Kerberos
- Authentication-Specific Terminology
- Obtaining a Credential for a Server
- authorizations
- adding to rights profile, How to Create an Authorization
- device allocation, Device Allocation Rights Profiles
- Kerberos and, What Is the Kerberos Service?
- removing from rights profile, How to Clone and Modify a System Rights Profile
- troubleshooting, How to Troubleshoot RBAC and Privilege Assignment
- types, Authentication and Authorization for Remote Access
- authorizations (RBAC)
- checking for wildcards, How to Add RBAC Properties to Legacy Applications
- checking in privileged application, Applications That Check Authorizations
- commands that require authorizations, Selected Commands That Require Authorizations
- database
- RBAC Databases
- auth_attr Database
- definition, RBAC Authorizations
- delegating, Delegation Authority in Authorizations
- description
- RBAC Elements and Basic Concepts
- Authorizations
- for allocating device, How to Authorize Users to Allocate a Device
- for device allocation, Device Allocation Commands
- granularity, Authorization Naming Conventions
- naming convention, Authorization Naming Conventions
- not requiring for device allocation, How to Change Which Devices Can Be Allocated
- solaris.device.allocate
- How to Authorize Users to Allocate a Device
- Device Allocation Commands
- solaris.device.revoke, Device Allocation Commands
- authorized_keys file, description, Secure Shell Files
- AuthorizedKeysFile keyword, sshd_config file, Keywords in Secure Shell
- auths command, description, Commands That Manage RBAC
- AUTHS_GRANTED keyword, policy.conf file, policy.conf File
- auto_transition option, SASL and, SASL Options
- automatic login
- disabling, Overview of Kerberized Commands
- enabling, Overview of Kerberized Commands
- automatically configuring
- Kerberos
- master KDC server, How to Automatically Configure a Master KDC
- slave KDC server, How to Automatically Configure a Slave KDC
- automating principal creation, Automating the Creation of New Kerberos Principals
- auxprop_login option, SASL and, SASL Options