JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris 11.1 Administration: Security Services     Oracle Solaris 11.1 Information Library
search filter icon
search icon

Document Information

Preface

Part I Security Overview

1.  Security Services (Overview)

Part II System, File, and Device Security

2.  Managing Machine Security (Overview)

3.  Controlling Access to Systems (Tasks)

4.  Virus Scanning Service (Tasks)

5.  Controlling Access to Devices (Tasks)

6.  Verifying File Integrity by Using BART (Tasks)

7.  Controlling Access to Files (Tasks)

Part III Roles, Rights Profiles, and Privileges

8.  Using Roles and Privileges (Overview)

9.  Using Role-Based Access Control (Tasks)

10.  Security Attributes in Oracle Solaris (Reference)

Part IV Cryptographic Services

11.  Cryptographic Framework (Overview)

12.  Cryptographic Framework (Tasks)

13.  Key Management Framework

Part V Authentication Services and Secure Communication

14.  Using Pluggable Authentication Modules

15.  Using Secure Shell

16.  Secure Shell (Reference)

17.  Using Simple Authentication and Security Layer

18.  Network Services Authentication (Tasks)

Part VI Kerberos Service

19.  Introduction to the Kerberos Service

20.  Planning for the Kerberos Service

21.  Configuring the Kerberos Service (Tasks)

22.  Kerberos Error Messages and Troubleshooting

23.  Administering Kerberos Principals and Policies (Tasks)

24.  Using Kerberos Applications (Tasks)

25.  The Kerberos Service (Reference)

Part VII Auditing in Oracle Solaris

26.  Auditing (Overview)

27.  Planning for Auditing

28.  Managing Auditing (Tasks)

29.  Auditing (Reference)

Glossary

Index

Numbers and Symbols

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

Q

R

S

T

U

V

W

X

Z

A

-A option, auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
-a option
auditrecord command, index iconHow to Display Audit Record Definitions
digest command, index iconHow to Compute a Digest of a File
encrypt command, index iconHow to Encrypt and Decrypt a File
Kerberized commands, index iconOverview of Kerberized Commands
mac command, index iconHow to Compute a MAC of a File
absolute mode
changing file permissions
index iconFile Permission Modes
index iconHow to Change File Permissions in Absolute Mode
changing special file permissions, index iconHow to Change Special File Permissions in Absolute Mode
description, index iconFile Permission Modes
setting special permissions, index iconFile Permission Modes
access
address space, index iconAddress Space Layout Randomization
control lists
See ACL
getting to server
with Kerberos, index iconGaining Access to a Service Using Kerberos
granting to your account
index iconGranting Access to Your Account
index iconGranting Access to Your Account
login authentication with Secure Shell, index iconHow to Reduce Password Prompts in Secure Shell
obtaining for a specific service, index iconObtaining Access to a Specific Service
restricting for
devices
index iconControlling Access to Devices
index iconConfiguring Device Policy (Tasks)
system hardware, index iconControlling Access to System Hardware (Tasks)
restricting for KDC servers, index iconHow to Restrict Access to KDC Servers
root access
displaying attempts on console, index iconHow to Restrict and Monitor root Logins
monitoring su command attempts
index iconLimiting and Monitoring Superuser Access
index iconHow to Monitor Who Is Using the su Command
restricting
index iconRestricting root Access to Shared Files
index iconHow to Restrict and Monitor root Logins
Secure RPC authentication, index iconOverview of Secure RPC
security
ACLs, index iconUsing Access Control Lists
controlling system usage, index iconControlling Access to Machine Resources
devices, index iconConfiguring Device Policy (Tasks)
file access restriction, index iconRestricting Access to Data in Files
firewall setup
index iconFirewall Systems
index iconFirewall Systems
login access restrictions
index iconMaintaining Login Control
index iconMaintaining Login Control
login authentication, index iconHow to Reduce Password Prompts in Secure Shell
login control, index iconMaintaining Login Control
monitoring system usage
index iconMonitoring Use of Machine Resources
index iconMonitoring File Integrity
network control, index iconControlling Network Access
NFS client-server, index iconImplementation of Diffie-Hellman Authentication
PATH variable setting, index iconSetting the PATH Variable
peripheral devices, index iconControlling Access to Devices
physical security, index iconMaintaining Physical Security
remote systems, index iconSecure Shell (Overview)
reporting problems, index iconReporting Security Problems
root login tracking, index iconLimiting and Monitoring Superuser Access
setuid programs, index iconRestricting setuid Executable Files
system hardware, index iconControlling Access to System Hardware (Tasks)
UFS ACLs, index iconUsing Access Control Lists to Protect UFS Files
sharing files, index iconSharing Files Across Machines
access control list
See ACL
Access Control Lists (ACLs), See ACL
ACL
description
index iconUsing Access Control Lists
index iconUsing Access Control Lists to Protect UFS Files
format of entries, index iconUsing Access Control Lists to Protect UFS Files
kadm5.acl file
index iconHow to Create a New Kerberos Principal
index iconHow to Duplicate a Kerberos Principal
index iconHow to Modify the Kerberos Administration Privileges
acl audit token, format, index iconacl Token
active audit policy, temporary audit policy, index iconHow to Change Audit Policy
add_drv command, description, index iconDevice Policy Commands
adding
administration principals (Kerberos), index iconHow to Configure a KDC to Use an LDAP Data Server
allocatable device, index iconHow to Enable Device Allocation
audit classes
index iconHow to Add an Audit Class
index iconHow to Add an Audit Class
audit file systems, index iconHow to Create ZFS File Systems for Audit Files
audit policy, index iconHow to Change Audit Policy
auditing
of individual users
index iconHow to Configure a User's Audit Characteristics
index iconHow to Lessen the Volume of Audit Records That Are Produced
of roles, index iconHow to Audit Roles
of zones, index iconPlanning Auditing (Tasks)
authorizations
to command, index iconHow to Create an Authorization
cryptomgt role, index iconHow to Assign a Role
DH authentication to mounted file systems, index iconAdministering Authentication With Secure RPC (Tasks)
hardware provider mechanisms and features, index iconHow to Disable Hardware Provider Mechanisms and Features
library plugin, index iconHow to Add a Software Provider
new authorization, index iconHow to Create an Authorization
new rights profile, index iconHow to Create a Rights Profile
new rights profile from existing one, index iconHow to Clone and Modify a System Rights Profile
PAM modules, index iconHow to Add a PAM Module
plugins
auditing
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
index iconHow to Configure syslog Audit Logs
Cryptographic Framework, index iconHow to Add a Software Provider
KMF, index iconHow to Manage Third-Party Plugins in KMF
privileged users, index iconHow to Change the Security Attributes of a User
privileges
directly to role, index iconHow to Change the Security Attributes of a Role
directly to user, index iconHow to Change the Security Attributes of a User
to command in rights profile, index iconHow to Create a Rights Profile
RBAC properties
to legacy applications, index iconHow to Add RBAC Properties to Legacy Applications
roles, index iconHow to Create a Role
security attributes
to legacy applications, index iconHow to Add RBAC Properties to Legacy Applications
to roles, index iconHow to Change the Security Attributes of a Role
to users, index iconHow to Change the Security Attributes of a User
security-related role, index iconHow to Assign a Role
security to devices, index iconManaging Device Allocation (Tasks)
security to system hardware, index iconHow to Require a Password for SPARC Hardware Access
service principal to keytab file (Kerberos), index iconHow to Add a Kerberos Service Principal to a Keytab File
software provider, index iconHow to Add a Software Provider
temporary audit policy, index iconHow to Change Audit Policy
user-level software provider, index iconHow to Add a Software Provider
address space, random layout, index iconAddress Space Layout Randomization
admin_server section
krb5.conf file
index iconHow to Manually Configure a Master KDC
index iconHow to Configure a KDC to Use an LDAP Data Server
administering
auditing
audit -s command
index iconHow to Refresh the Audit Service
index iconHow to Enable the Audit Service
audit -t command, index iconHow to Disable the Audit Service
audit classes, index iconAudit Classes and Preselection
audit events, index iconAudit Events
audit files, index iconHow to View the Contents of Binary Audit Files
audit records, index iconAudit Records and Audit Tokens
audit_remote plugin
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
audit_syslog plugin, index iconHow to Configure syslog Audit Logs
audit trail overflow prevention, index iconHow to Prevent Audit Trail Overflow
auditconfig command
index iconConfiguring the Audit Service (Task Map)
index iconHow to Preselect Audit Classes
auditreduce command, index iconHow to Merge Audit Files From the Audit Trail
configuring, index iconConfiguring the Audit Service (Task Map)
cost control, index iconControlling Auditing Costs
description, index iconHow Is Auditing Configured?
disabling, index iconHow to Disable the Audit Service
efficiency, index iconAuditing Efficiently
enabling, index iconHow to Enable the Audit Service
plugins
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
policy, index iconHow to Change Audit Policy
praudit command, index iconHow to View the Contents of Binary Audit Files
queue controls, index iconHow to Change Audit Queue Controls
reducing space requirements, index iconCost of Storage of Audit Data
refreshing, index iconHow to Refresh the Audit Service
rights profiles required, index iconRights Profiles for Administering Auditing
in zones
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
zones, index iconConfiguring the Audit Service in Zones (Tasks)
auditing in zones, index iconHow to Plan Auditing in Zones
authorizations, index iconHow to Create an Authorization
Cryptographic Framework and zones, index iconCryptographic Services and Zones
Cryptographic Framework commands, index iconAdministrative Commands in the Cryptographic Framework
Cryptographic Framework plus FIPS–140, index iconCryptographic Framework and FIPS-140
Cryptographic Framework task map, index iconAdministering the Cryptographic Framework (Tasks)
device allocation, index iconManaging Device Allocation (Task Map)
device policy, index iconConfiguring Device Policy (Task Map)
file permissions
index iconProtecting Files (Tasks)
index iconProtecting Files With UNIX Permissions (Task Map)
Kerberos
keytabs, index iconAdministering Keytab Files
policies, index iconAdministering Kerberos Policies
principals, index iconAdministering Kerberos Principals
metaslot, index iconAdministrative Commands in the Cryptographic Framework
NFS client-server file security, index iconImplementation of Diffie-Hellman Authentication
password algorithms, index iconChanging the Default Algorithm for Password Encryption (Tasks)
privileges, index iconUsing Privileges (Tasks)
RBAC properties
index iconHow to Create a Rights Profile
index iconHow to Create an Authorization
remote logins with Secure Shell, index iconHow to Generate a Public/Private Key Pair for Use With Secure Shell
rights profiles, index iconHow to Create a Rights Profile
of a user
index iconHow to Reorder Assigned Security Attributes
index iconHow to Enable a User to Use Own Password to Assume a Role
role password, index iconHow to Change the Password of a Role
roles to replace superuser, index iconHow to Plan Your RBAC Implementation
Secure RPC task map, index iconAdministering Secure RPC (Task Map)
Secure Shell
clients, index iconClient Configuration in Secure Shell
overview, index iconA Typical Secure Shell Session
servers, index iconServer Configuration in Secure Shell
task map, index iconConfiguring Secure Shell (Task Map)
security properties
authorizations, index iconHow to Create an Authorization
of a legacy application, index iconHow to Add RBAC Properties to Legacy Applications
of a rights profile
index iconHow to Create a Rights Profile
index iconHow to Clone and Modify a System Rights Profile
of a role
index iconHow to Change the Password of a Role
index iconHow to Change the Security Attributes of a Role
index iconHow to Reorder Assigned Security Attributes
index iconHow to Enable a User to Use Own Password to Assume a Role
of a user, index iconHow to Change the Security Attributes of a User
user password to assume role
index iconHow to Reorder Assigned Security Attributes
index iconHow to Enable a User to Use Own Password to Assume a Role
without privileges, index iconAdministrative Differences on a System With Privileges
ZFS remotely with Secure Shell, index iconHow to Remotely Administer ZFS With Secure Shell
administrators, restricting rights, index iconHow to Restrict an Administrator to Explicitly Assigned Rights
AES kernel provider, index iconHow to List Available Providers
aes128-cbc encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
aes128-ctr encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
agent daemon, Secure Shell, index iconHow to Reduce Password Prompts in Secure Shell
ahlt audit policy
description, index iconUnderstanding Audit Policy
setting, index iconHow to Change Audit Policy
with cnt policy, index iconAudit Policies for Asynchronous and Synchronous Events
algorithms
definition in Cryptographic Framework, index iconTerminology in the Cryptographic Framework
file encryption, index iconHow to Encrypt and Decrypt a File
listing in the Cryptographic Framework, index iconHow to List Available Providers
passphrase protection in ssh-keygen, index iconSecure Shell and the OpenSSH Project
password
configuration, index iconHow to Specify an Algorithm for Password Encryption
password encryption
index iconPassword Encryption
index iconChanging the Default Algorithm for Password Encryption (Tasks)
All (RBAC), rights profile, index iconRights Profiles
all audit class, caution for using, index iconAudit Classes
allocate command
allocate error state, index iconAllocate Error State
authorizations required
index iconDevice Allocation Commands
index iconSelected Commands That Require Authorizations
removable media, index iconHow to Allocate a Device
user authorization, index iconHow to Authorize Users to Allocate a Device
using, index iconHow to Allocate a Device
allocate error state, index iconAllocate Error State
allocating devices
by users, index iconHow to Allocate a Device
forcibly, index iconHow to Forcibly Allocate a Device
troubleshooting, index iconHow to Allocate a Device
AllowGroups keyword, sshd_config file, index iconKeywords in Secure Shell
AllowTcpForwarding keyword
changing, index iconHow to Configure Port Forwarding in Secure Shell
sshd_config file, index iconKeywords in Secure Shell
AllowUsers keyword, sshd_config file, index iconKeywords in Secure Shell
ALTSHELL in Secure Shell, index iconSecure Shell and Login Environment Variables
always-audit classes, process preselection mask, index iconProcess Audit Characteristics
antivirus software, See virus scanning
appending arrow (>>), preventing appending, index iconAssigning a Restricted Shell to Users
application server, configuring, index iconConfiguring Kerberos Network Application Servers
arcfour encryption algorithm, ssh_config file, index iconKeywords in Secure Shell
ARCFOUR kernel provider, index iconHow to List Available Providers
archiving, audit files, index iconHow to Prevent Audit Trail Overflow
arge audit policy
and exec_env token, index iconexec_env Token
description, index iconUnderstanding Audit Policy
setting, index iconHow to Audit All Commands by Users
argument audit token, format, index iconargument Token
argv audit policy
and exec_args token, index iconexec_args Token
description, index iconUnderstanding Audit Policy
setting, index iconHow to Audit All Commands by Users
assigning
authorizations in a rights profile, index iconHow to Create an Authorization
privileges to commands in a rights profile, index iconHow to Create a Rights Profile
privileges to commands in a script, index iconHow to Run a Shell Script With Privileged Commands
privileges to role, index iconHow to Change the Security Attributes of a Role
privileges to user, index iconHow to Change the Security Attributes of a User
rights profile
to a role, index iconHow to Change the Security Attributes of a Role
role to a user locally, index iconHow to Assign a Role
assuming role
how to, index iconCustomizing RBAC for Your Site (Tasks)
in a terminal window, index iconHow to Assume a Role
root, index iconHow to Assume a Role
asterisk (*
wildcard character
in RBAC authorizations, index iconAuthorization Naming Conventions
asterisk (*)
checking for in RBAC authorizations, index iconHow to Add RBAC Properties to Legacy Applications
device_allocate file
index icondevice_allocate File
index icondevice_allocate File
asynchronous audit events
index iconAudit Policies for Asynchronous and Synchronous Events
index iconAudit Policies for Asynchronous and Synchronous Events
at command, authorizations required, index iconSelected Commands That Require Authorizations
at sign (@), device_allocate file, index icondevice_allocate File
atq command, authorizations required, index iconSelected Commands That Require Authorizations
attribute audit token, index iconattribute Token
attributes, keyword in BART, index iconHow to Create a Control Manifest
audio devices, security, index iconDevice-Clean Scripts
audit -s command
index iconHow to Refresh the Audit Service
index iconHow to Refresh the Audit Service
index iconHow to Enable the Audit Service
audit -t command, index iconHow to Disable the Audit Service
audit_binfile plugin, index iconAudit Plugin Modules
getting attributes
index iconHow to Assign Audit Space for the Audit Trail
index iconHow to Assign Audit Space for the Audit Trail
index iconHow to Assign Audit Space for the Audit Trail
limiting audit file size, index iconHow to Assign Audit Space for the Audit Trail
removing queue size, index iconHow to Assign Audit Space for the Audit Trail
setting attributes, index iconHow to Assign Audit Space for the Audit Trail
setting free space warning, index iconHow to Assign Audit Space for the Audit Trail
audit characteristics
audit user ID, index iconProcess Audit Characteristics
processes, index iconProcess Audit Characteristics
session ID, index iconProcess Audit Characteristics
terminal ID, index iconProcess Audit Characteristics
user process preselection mask, index iconProcess Audit Characteristics
audit_class file
adding a class, index iconHow to Add an Audit Class
troubleshooting, index iconHow to Add an Audit Class
audit classes
adding, index iconHow to Add an Audit Class
configuration, index iconAudit Classes
description
index iconAudit Terminology and Concepts
index iconAudit Events
displaying defaults, index iconHow to Display Audit Service Defaults
exceptions to system-wide settings, index iconAudit Classes and Preselection
mapping events, index iconAudit Classes and Preselection
modifying default, index iconHow to Add an Audit Class
overview, index iconAudit Classes and Preselection
post-selection, index iconAudit Terminology and Concepts
prefixes, index iconAudit Class Syntax
preselecting
effect on public objects, index iconAudit Terminology and Concepts
for failure
index iconHow to Configure a User's Audit Characteristics
index iconHow to Configure syslog Audit Logs
index iconHow to Configure syslog Audit Logs
for success
index iconHow to Configure a User's Audit Characteristics
index iconHow to Configure syslog Audit Logs
index iconHow to Configure syslog Audit Logs
for success and failure, index iconHow to Preselect Audit Classes
preselection, index iconAudit Terminology and Concepts
process preselection mask, index iconProcess Audit Characteristics
replacing, index iconHow to Preselect Audit Classes
syntax
index iconAudit Classes
index iconAudit Class Syntax
user exceptions, index iconHow to Configure a User's Audit Characteristics
audit command
disabling audit service, index iconHow to Disable the Audit Service
options, index iconAudit Service Man Pages
refreshing audit service, index iconHow to Refresh the Audit Service
Audit Configuration rights profile, index iconRights Profiles for Administering Auditing
auditing a role, index iconHow to Audit Roles
configuring audit policy, index iconHow to Change Audit Policy
displaying auditing defaults, index iconHow to Display Audit Service Defaults
preselecting audit classes, index iconHow to Preselect Audit Classes
Audit Control rights profile, index iconRights Profiles for Administering Auditing
disabling audit service, index iconHow to Disable the Audit Service
enabling audit service, index iconHow to Enable the Audit Service
refreshing audit service, index iconHow to Refresh the Audit Service
audit directory, creating file systems for, index iconHow to Create ZFS File Systems for Audit Files
audit_event file
changing class membership, index iconHow to Change an Audit Event's Class Membership
description, index iconAudit Events
removing events safely, index iconHow to Prevent the Auditing of Specific Events
audit event-to-class mappings, changing, index iconHow to Change an Audit Event's Class Membership
audit events
asynchronous, index iconAudit Policies for Asynchronous and Synchronous Events
audit_event file, index iconAudit Events
changing class membership, index iconHow to Change an Audit Event's Class Membership
description, index iconAudit Events
mapping to classes, index iconAudit Classes and Preselection
removing from audit_event file, index iconHow to Prevent the Auditing of Specific Events
selecting from audit trail, index iconHow to Select Audit Events From the Audit Trail
selecting from audit trail in zones, index iconAuditing and Oracle Solaris Zones
summary, index iconAudit Terminology and Concepts
synchronous, index iconAudit Policies for Asynchronous and Synchronous Events
viewing from binary files, index iconHow to View the Contents of Binary Audit Files
audit file system, description, index iconAudit Terminology and Concepts
audit files
combining, index iconHow to Merge Audit Files From the Audit Trail
compressing on disk, index iconHow to Compress Audit Files on a Dedicated File System
copying messages to single file, index iconHow to Select Audit Events From the Audit Trail
creating summary files
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
effects of Coordinated Universal Time (UTC), index iconHow to Merge Audit Files From the Audit Trail
limiting size of, index iconHow to Limit the Size of Binary Audit Files
managing, index iconHow to Prevent Audit Trail Overflow
printing, index iconHow to View the Contents of Binary Audit Files
reading with praudit, index iconHow to View the Contents of Binary Audit Files
reducing, index iconHow to Merge Audit Files From the Audit Trail
reducing space requirements, index iconCost of Storage of Audit Data
reducing storage-space requirements, index iconAuditing Efficiently
setting aside disk space for, index iconHow to Create ZFS File Systems for Audit Files
time stamps, index iconConventions for Binary Audit File Names
ZFS file systems
index iconHow to Create ZFS File Systems for Audit Files
index iconHow to Compress Audit Files on a Dedicated File System
audit flags, summary, index iconAudit Terminology and Concepts
audit_flags keyword, index iconHow to Display Audit Service Defaults
specifying user exceptions to audit preselection, index iconHow to Configure a User's Audit Characteristics
use, index iconAudit Class Syntax
using caret (^) prefix, index iconHow to Configure a User's Audit Characteristics
audit logs
See also audit files
comparing binary and text summaries, index iconAudit Logs
configuring, index iconConfiguring Audit Logs (Tasks)
configuring text summary audit logs, index iconHow to Configure syslog Audit Logs
modes, index iconAudit Logs
audit.notice entry, syslog.conf file, index iconHow to Configure syslog Audit Logs
audit plugins
audit_binfile plugin
index iconHow to Change Audit Queue Controls
index iconHow to Assign Audit Space for the Audit Trail
audit_remote plugin
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
audit_syslog plugin, index iconHow to Configure syslog Audit Logs
description, index iconAudit Terminology and Concepts
qsize attribute, index iconHow to Change Audit Queue Controls
summary
index iconAudit Service Man Pages
index iconAudit Plugins
index iconAudit Remote Server
audit policy
audit tokens from, index iconAudit Policy
defaults, index iconUnderstanding Audit Policy
description, index iconAudit Terminology and Concepts
displaying defaults, index iconHow to Display Audit Service Defaults
effects of, index iconUnderstanding Audit Policy
public, index iconUnderstanding Audit Policy
setting, index iconHow to Change Audit Policy
setting ahlt, index iconHow to Change Audit Policy
setting arge, index iconHow to Audit All Commands by Users
setting argv, index iconHow to Audit All Commands by Users
setting in global zone
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
setting perzone, index iconHow to Change Audit Policy
that does not affect tokens, index iconAudit Policy
tokens added by, index iconAudit Policy
audit preselection mask
modifying for existing users, index iconHow to Update the Preselection Mask of Logged In Users
modifying for individual users, index iconHow to Configure a User's Audit Characteristics
audit queue, events included, index iconAudit Classes and Preselection
audit queue controls
displaying defaults, index iconHow to Display Audit Service Defaults
getting, index iconHow to Change Audit Queue Controls
audit records
converting to readable format, index iconHow to View the Contents of Binary Audit Files
copying to single file, index iconHow to Select Audit Events From the Audit Trail
description, index iconAudit Terminology and Concepts
displaying, index iconHow to View the Contents of Binary Audit Files
displaying definitions of
procedure, index iconHow to Display Audit Record Definitions
displaying formats of a program, index iconHow to Display Audit Record Definitions
displaying formats of an audit class, index iconHow to Display Audit Record Definitions
displaying in XML format, index iconHow to View the Contents of Binary Audit Files
event modifiers, index iconheader Token
events that generate, index iconHow Does Auditing Work?
format, index iconAudit Record Structure
formatting example, index iconHow to Display Audit Record Definitions
merging, index iconHow to Merge Audit Files From the Audit Trail
overview, index iconAudit Records and Audit Tokens
reducing audit files, index iconHow to Merge Audit Files From the Audit Trail
sequence of tokens, index iconAudit Record Structure
/var/adm/auditlog file, index iconHow to Configure syslog Audit Logs
audit_remote plugin, index iconAudit Plugin Modules
configuring, index iconHow to Configure a Remote Repository for Audit Files
getting attributes
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
setting attributes
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
troubleshooting audit queue overfull, index iconHow to Send Audit Files to a Remote Repository
Audit Remote Server (ARS), managing, index iconManaging a Remote Repository
Audit Review rights profile, index iconRights Profiles for Administering Auditing
audit service
See also auditing
audit trail creation, index iconAudit Trail
configuring policy, index iconHow to Change Audit Policy
configuring queue controls, index iconHow to Change Audit Queue Controls
defaults, index iconAudit Service
disabling, index iconHow to Disable the Audit Service
enabling, index iconHow to Enable the Audit Service
policy, index iconUnderstanding Audit Policy
refreshing the kernel, index iconHow to Refresh the Audit Service
troubleshooting, index iconHow to Determine That Auditing Is Running
audit session ID, index iconProcess Audit Characteristics
overview, index iconWhat Is Auditing?
audit_syslog plugin, index iconAudit Plugin Modules
setting attributes, index iconHow to Configure syslog Audit Logs
audit tokens
See also individual audit token names
added by audit policy, index iconAudit Policy
audit record format, index iconAudit Record Structure
description
index iconAudit Terminology and Concepts
index iconAudit Records and Audit Tokens
format, index iconAudit Token Formats
list of, index iconAudit Token Formats
xclient token, index iconxclient Token
audit trail
adding disk space, index iconHow to Assign Audit Space for the Audit Trail
analysis costs, index iconCost of Analysis of Audit Data
cleaning up not terminated files, index iconHow to Clean Up a not_terminated Audit File
creating
summary files
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
description, index iconAudit Terminology and Concepts
effect of audit policy, index iconUnderstanding Audit Policy
monitoring in real time, index iconAuditing Efficiently
no public objects, index iconAudit Terminology and Concepts
overview, index iconHow Is Auditing Configured?
preventing overflow, index iconHow to Prevent Audit Trail Overflow
reducing size of
index iconHow to Lessen the Volume of Audit Records That Are Produced
index iconHow to Compress Audit Files on a Dedicated File System
selecting events from, index iconHow to Select Audit Events From the Audit Trail
sending files to remote repository
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
viewing events from, index iconHow to View the Contents of Binary Audit Files
viewing events from different zones, index iconAuditing and Oracle Solaris Zones
audit user ID
mechanism, index iconProcess Audit Characteristics
overview, index iconWhat Is Auditing?
audit_warn script
configuring, index iconHow to Configure the audit_warn Email Alias
description, index iconAudit Service Man Pages
auditconfig command
adding audit file systems, index iconHow to Assign Audit Space for the Audit Trail
audit classes as arguments, index iconAudit Classes and Preselection
configuring policy, index iconHow to Change Audit Policy
configuring queue controls, index iconHow to Change Audit Queue Controls
description, index iconAudit Service Man Pages
displaying audit defaults, index iconHow to Display Audit Service Defaults
-getplugin option
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
index iconHow to Configure syslog Audit Logs
policy options, index iconHow to Change Audit Policy
preselecting audit classes, index iconHow to Preselect Audit Classes
queue control options, index iconHow to Change Audit Queue Controls
sending files to remote repository
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
-setflags option, index iconHow to Preselect Audit Classes
-setnaflags option, index iconHow to Preselect Audit Classes
-setplugin option
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
index iconHow to Configure syslog Audit Logs
setting active audit policy, index iconHow to Change Audit Policy
setting audit_binfile attributes, index iconHow to Assign Audit Space for the Audit Trail
setting audit policy, index iconHow to Audit All Commands by Users
setting audit policy temporarily, index iconHow to Change Audit Policy
setting audit_remote attributes
index iconHow to Send Audit Files to a Remote Repository
index iconHow to Configure a Remote Repository for Audit Files
setting system-wide audit parameters, index iconAudit Classes and Preselection
viewing default audit preselection, index iconHow to Preselect Audit Classes
auditd daemon
refreshing audit service
index iconHow to Refresh the Audit Service
index iconHow to Refresh the Audit Service
auditing
adding audit flags to a group of users, index iconHow to Configure a User's Audit Characteristics
all commands by users, index iconHow to Audit All Commands by Users
Audit Remote Server (ARS), index iconManaging a Remote Repository
changes in current release, index iconAbout the Audit Service in This Release
changes in device policy, index iconHow to Audit Changes in Device Policy
configuring
all zones, index iconConfiguring the Audit Service (Tasks)
global zone, index iconHow to Change Audit Policy
identically for all zones, index iconHow to Configure All Zones Identically for Auditing
per zone, index iconHow to Configure Per-Zone Auditing
configuring in global zone, index iconHow to Plan Auditing in Zones
defaults, index iconAudit Service
determining if running, index iconHow to Determine That Auditing Is Running
device allocation, index iconHow to Audit Device Allocation
disabling, index iconHow to Disable the Audit Service
enabling, index iconHow to Enable the Audit Service
finding changes to specific files, index iconHow to Find Audit Records of Changes to Specific Files
getting queue controls, index iconHow to Change Audit Queue Controls
local definition, index iconAudit Terminology and Concepts
logins, index iconHow to Audit Logins From Other Operating Systems
man page summaries, index iconAudit Service Man Pages
planning, index iconPlanning Auditing (Tasks)
planning in zones
index iconHow to Plan Auditing in Zones
index iconHow to Plan Auditing in Zones
plugin modules, index iconAudit Plugin Modules
post-selection definition, index iconAudit Terminology and Concepts
preselection definition, index iconAudit Terminology and Concepts
privileges and, index iconPrivileges and Auditing
remote definition, index iconAudit Terminology and Concepts
removing user-specific audit flags, index iconHow to Configure a User's Audit Characteristics
rights profiles for, index iconRights Profiles for Administering Auditing
roles, index iconHow to Audit Roles
setting queue controls, index iconHow to Change Audit Queue Controls
sftp file transfers, index iconHow to Audit FTP and SFTP File Transfers
troubleshooting, index iconTroubleshooting the Audit Service (Task Map)
troubleshooting praudit command, index iconHow to View the Contents of Binary Audit Files
updating information
index iconHow to Refresh the Audit Service
index iconHow to Refresh the Audit Service
users only, index iconHow to Configure a User's Audit Characteristics
zones and
index iconAuditing on a System With Oracle Solaris Zones
index iconAuditing and Oracle Solaris Zones
auditlog file, text audit records, index iconHow to Configure syslog Audit Logs
auditrecord command
[] (square brackets) in output, index iconAudit Record Analysis
description, index iconAudit Service Man Pages
displaying audit record definitions, index iconHow to Display Audit Record Definitions
example, index iconHow to Display Audit Record Definitions
listing all formats, index iconHow to Display Audit Record Definitions
listing formats of class, index iconHow to Display Audit Record Definitions
listing formats of program, index iconHow to Display Audit Record Definitions
optional tokens ([]), index iconAudit Record Analysis
auditreduce command
-A option, index iconHow to Merge Audit Files From the Audit Trail
-b option, index iconHow to Select Audit Events From the Audit Trail
-C option, index iconHow to Merge Audit Files From the Audit Trail
-c option
index iconHow to Select Audit Events From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
cleaning up audit files, index iconHow to Clean Up a not_terminated Audit File
-d option, index iconHow to Select Audit Events From the Audit Trail
description, index iconAudit Service Man Pages
-e option, index iconHow to Select Audit Events From the Audit Trail
examples, index iconHow to Merge Audit Files From the Audit Trail
filtering options, index iconHow to Select Audit Events From the Audit Trail
-M option, index iconHow to Merge Audit Files From the Audit Trail
merging audit records, index iconHow to Merge Audit Files From the Audit Trail
-O option
index iconHow to Merge Audit Files From the Audit Trail
index iconHow to Merge Audit Files From the Audit Trail
index iconHow to Select Audit Events From the Audit Trail
selecting audit records, index iconHow to Select Audit Events From the Audit Trail
time stamp use, index iconHow to Merge Audit Files From the Audit Trail
trailer tokens, and, index icontrailer Token
using lowercase options, index iconHow to Select Audit Events From the Audit Trail
using uppercase options, index iconHow to Merge Audit Files From the Audit Trail
auditstat command, description, index iconAudit Service Man Pages
auth_attr database
description, index iconauth_attr Database
summary, index iconRBAC Databases
AUTH_DES authentication, See AUTH_DH authentication
AUTH_DH authentication, and NFS, index iconNFS Services and Secure RPC
authentication
AUTH_DH client-server session, index iconImplementation of Diffie-Hellman Authentication
configuring cross-realm, index iconConfiguring Cross-Realm Authentication
description, index iconAuthentication and Authorization for Remote Access
DH authentication, index iconDiffie-Hellman Authentication and Secure RPC
disabling with -X option, index iconOverview of Kerberized Commands
Kerberos and, index iconWhat Is the Kerberos Service?
naming services, index iconOverview of Secure RPC
network security, index iconAuthentication and Authorization for Remote Access
NFS-mounted files
index iconHow to Share NFS Files With Diffie-Hellman Authentication
index iconHow to Share NFS Files With Diffie-Hellman Authentication
overview of Kerberos, index iconHow the Kerberos Authentication System Works
Secure RPC, index iconOverview of Secure RPC
Secure Shell
methods, index iconSecure Shell Authentication
process, index iconAuthentication and Key Exchange in Secure Shell
terminology, index iconAuthentication-Specific Terminology
types, index iconAuthentication and Authorization for Remote Access
use with NFS, index iconNFS Services and Secure RPC
authentication methods
GSS-API credentials in Secure Shell, index iconSecure Shell Authentication
host-based in Secure Shell
index iconSecure Shell Authentication
index iconHow to Set Up Host-Based Authentication for Secure Shell
password in Secure Shell, index iconSecure Shell Authentication
public keys in Secure Shell, index iconSecure Shell Authentication
Secure Shell, index iconSecure Shell Authentication
authenticator
in Kerberos
index iconAuthentication-Specific Terminology
index iconObtaining a Credential for a Server
authorizations
adding to rights profile, index iconHow to Create an Authorization
device allocation, index iconDevice Allocation Rights Profiles
Kerberos and, index iconWhat Is the Kerberos Service?
removing from rights profile, index iconHow to Clone and Modify a System Rights Profile
troubleshooting, index iconHow to Troubleshoot RBAC and Privilege Assignment
types, index iconAuthentication and Authorization for Remote Access
authorizations (RBAC)
checking for wildcards, index iconHow to Add RBAC Properties to Legacy Applications
checking in privileged application, index iconApplications That Check Authorizations
commands that require authorizations, index iconSelected Commands That Require Authorizations
database
index iconRBAC Databases
index iconauth_attr Database
definition, index iconRBAC Authorizations
delegating, index iconDelegation Authority in Authorizations
description
index iconRBAC Elements and Basic Concepts
index iconAuthorizations
for allocating device, index iconHow to Authorize Users to Allocate a Device
for device allocation, index iconDevice Allocation Commands
granularity, index iconAuthorization Naming Conventions
naming convention, index iconAuthorization Naming Conventions
not requiring for device allocation, index iconHow to Change Which Devices Can Be Allocated
solaris.device.allocate
index iconHow to Authorize Users to Allocate a Device
index iconDevice Allocation Commands
solaris.device.revoke, index iconDevice Allocation Commands
authorized_keys file, description, index iconSecure Shell Files
AuthorizedKeysFile keyword, sshd_config file, index iconKeywords in Secure Shell
auths command, description, index iconCommands That Manage RBAC
AUTHS_GRANTED keyword, policy.conf file, index iconpolicy.conf File
auto_transition option, SASL and, index iconSASL Options
automatic login
disabling, index iconOverview of Kerberized Commands
enabling, index iconOverview of Kerberized Commands
automatically configuring
Kerberos
master KDC server, index iconHow to Automatically Configure a Master KDC
slave KDC server, index iconHow to Automatically Configure a Slave KDC
automating principal creation, index iconAutomating the Creation of New Kerberos Principals
auxprop_login option, SASL and, index iconSASL Options