U
- -U option, allocate command, Device Allocation Commands
- UDP
- addresses, ip port Token
- port forwarding and, How to Configure Port Forwarding in Secure Shell
- Secure Shell and, How to Configure Port Forwarding in Secure Shell
- using for remote audit logs, Audit Logs
- umask value
- and file creation, Default umask Value
- typical values, Default umask Value
- umount command, with security attributes, How to Authorize Users to Allocate a Device
- uninstalling, cryptographic providers, How to Prevent the Use of a User-Level Mechanism
- UNIX file permissions, See files, permissions
- unmounting, allocated devices, How to Deallocate a Device
- update_drv command, description, Device Policy Commands
- URL for online help, Graphical Kerberos Tool, Online Help URL in the Graphical Kerberos Administration Tool
- use_authid option, SASL and, SASL Options
- use of authorization audit token, use of authorization Token
- use of privilege audit token, use of privilege Token
- UseOpenSSLEngine keyword
- Secure Shell
- Keywords in Secure Shell
- Keywords in Secure Shell
- UsePrivilegedPort keyword, Secure Shell, Keywords in Secure Shell
- user accounts
- See also users
- changing root password, How to Change the root Password
- displaying login status
- How to Display a User's Login Status
- How to Display a User's Login Status
- user_attr database
- description
- RBAC Databases
- user_attr Database
- listing user exceptions to audit preselection, How to Configure a User's Audit Characteristics
- user_attr file, exceptions to system-wide audit classes, Audit Classes and Preselection
- user audit token, user Token
- user classes of files, File and Directory Ownership
- user database (RBAC), See user_attr database
- user ID
- audit ID and
- What Is Auditing?
- Process Audit Characteristics
- in NFS services, How to Create a Credential Table
- user ID numbers (UIDs), special accounts and, Special System Accounts
- User keyword, ssh_config file, Keywords in Secure Shell
- user principal, description, Kerberos Principals
- user procedures
- adding plugins to KMF, How to Manage Third-Party Plugins in KMF
- allocating devices, Managing Device Allocation (Tasks)
- assuming a role, How to Assume a Role
- chkey command, How to Set Up a Diffie-Hellman Key for an NIS User
- computing digest of a file, How to Compute a Digest of a File
- computing MAC of a file, How to Compute a MAC of a File
- creating self-signed certificate, How to Create a Certificate by Using the pktool gencert Command
- decrypting files, How to Encrypt and Decrypt a File
- encrypting files, Protecting Files With the Cryptographic Framework (Task Map)
- encrypting NIS user's private key, How to Set Up a Diffie-Hellman Key for an NIS User
- exporting certificates, How to Export a Certificate and Private Key in PKCS #12 Format
- generating a symmetric key
- using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore, How to Generate a Passphrase by Using the pktool setpin Command
- importing certificates, How to Import a Certificate Into Your Keystore
- protecting files, Protecting Files With UNIX Permissions (Task Map)
- using an assigned role, How to Assume a Role
- using pktool command, Using the Key Management Framework (Task Map)
- using Secure Shell, Using Secure Shell (Task Map)
- user rights management, See privileges
- User Security rights profile, modifying audit preselection for users, How to Configure a User's Audit Characteristics
- useradd command, description, Commands That Manage RBAC
- userattr command
- description, Commands That Manage RBAC
- displaying exceptions to system-wide auditing, How to Display Audit Service Defaults
- userdel command, description, Commands That Manage RBAC
- UserKnownHostsFile keyword, ssh_config file, Keywords in Secure Shell
- UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
- usermod command
- audit_flags keyword, How to Configure a User's Audit Characteristics
- usermod command
- changing user's RBAC properties, How to Change the Security Attributes of a User
- description, Commands That Manage RBAC
- exceptions to system-wide auditing, Audit Classes and Preselection
- usermod command
- specifying user exceptions to audit preselection, How to Configure a User's Audit Characteristics
- using caret (^) prefix for audit_flags exception, How to Configure a User's Audit Characteristics
- usermod command
- using to assign role, How to Assign a Role
- users
- allocating devices, How to Allocate a Device
- assigning allocate authorization to, How to Authorize Users to Allocate a Device
- assigning privileges to, How to Change the Security Attributes of a User
- assigning RBAC defaults, policy.conf File
- assigning rights profiles, How to Change the Security Attributes of a User
- auditing all of their commands, How to Audit All Commands by Users
- auditing individual users, How to Configure a User's Audit Characteristics
- authenticating to rights profile
- How to Reorder Assigned Security Attributes
- How to Enable a User to Use Own Password to Assume a Role
- authenticating to role
- How to Reorder Assigned Security Attributes
- How to Enable a User to Use Own Password to Assume a Role
- basic privilege set, How Privileges Are Implemented
- computing digest of files, How to Compute a Digest of a File
- computing MAC of files, How to Compute a MAC of a File
- creating rights profile for a group, How to Configure a User's Audit Characteristics
- creating root user, How to Change the root Role Into a User
- deallocating devices, How to Deallocate a Device
- determining directly assigned privileges, How to Determine the Privileges That You Have Been Directly Assigned
- determining own privileged commands, How to Determine the Privileged Commands That You Can Run
- disabling login, How to Temporarily Disable User Logins
- displaying login status, How to Display a User's Login Status
- encrypting files, How to Encrypt and Decrypt a File
- exceptions to Secure Shell defaults, How to Create User and Host Exceptions to Secure Shell Defaults
- generating a symmetric key, How to Generate a Symmetric Key by Using the pktool Command
- having no passwords, How to Display Users Without Passwords
- initial inheritable privileges, How Privileges Are Implemented
- modifying audit preselection mask of, How to Configure a User's Audit Characteristics
- modifying properties (RBAC), How to Change the Security Attributes of a User
- mounting allocated devices, How to Mount an Allocated Device
- removing audit flags, How to Configure a User's Audit Characteristics
- troubleshooting running privileged commands, How to Determine the Privileged Commands That You Can Run
- unmounting allocated devices, How to Deallocate a Device
- using rights profile
- How to Reorder Assigned Security Attributes
- How to Enable a User to Use Own Password to Assume a Role
- UseRsh keyword, ssh_config file, Keywords in Secure Shell
- using
- allocate command, How to Allocate a Device
- BART, Using BART (Tasks)
- cryptoadm command, Administering the Cryptographic Framework (Tasks)
- deallocate command, How to Deallocate a Device
- default RBAC configuration task map, Viewing and Using RBAC Defaults (Task Map)
- device allocation, How to Allocate a Device
- digest command, How to Compute a Digest of a File
- encrypt command, How to Encrypt and Decrypt a File
- file permissions, Protecting Files (Tasks)
- mac command, How to Compute a MAC of a File
- new password algorithm, How to Specify an Algorithm for Password Encryption
- pktool command
- How to Generate a Symmetric Key by Using the pktool Command
- How to Generate a Key Pair by Using the pktool genkeypair Command
- ppriv command
- How to Determine the Privileges on a Process
- How to Determine the Privileges on a Process
- privileges task map, Using Privileges (Tasks)
- RBAC defaults, Viewing and Using RBAC Defaults (Tasks)
- RBAC task map, Using RBAC (Tasks)
- rolemod command, How to Change the Security Attributes of a Role
- Secure Shell task map, Using Secure Shell (Task Map)
- ssh-add command, How to Reduce Password Prompts in Secure Shell
- ssh-agent daemon, How to Reduce Password Prompts in Secure Shell
- truss command, How to Determine Which Privileges a Program Requires
- umount command, How to Deallocate a Device
- usermod command, How to Change the Security Attributes of a User
- Using the Key Management Framework (Task Map), Using the Key Management Framework (Task Map)
- /usr/bin/ftp command, Kerberos and, Kerberos Commands
- /usr/bin/kdestroy command, Kerberos and, Kerberos Commands
- /usr/bin/kinit command, Kerberos and, Kerberos Commands
- /usr/bin/klist command, Kerberos and, Kerberos Commands
- /usr/bin/kpasswd command, Kerberos and, Kerberos Commands
- /usr/bin/ktutil command, Kerberos and, Kerberos Commands
- /usr/bin/kvno command, Kerberos and, Kerberos Commands
- /usr/bin/rcp command, Kerberos and, Kerberos Commands
- /usr/bin/rlogin command, Kerberos and, Kerberos Commands
- /usr/bin/rsh command, Kerberos and, Kerberos Commands
- /usr/bin/scp command, Kerberos and, Kerberos Commands
- /usr/bin/sftp command, Kerberos and, Kerberos Commands
- /usr/bin/ssh command, Kerberos and, Kerberos Commands
- /usr/bin/telnet command, Kerberos and, Kerberos Commands
- /usr/lib/inet/proftpd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/kprop command, description, Kerberos Commands
- /usr/lib/krb5/kadmind daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/kpropd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/krb5kdc daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/ktkt_warnd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/libsasl.so library, overview, SASL (Overview)
- /usr/lib/ssh/sshd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/gkadmin command, description, Kerberos Commands
- /usr/sbin/gsscred command, description, Kerberos Commands
- /usr/sbin/in.rlogind daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.rshd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.telnetd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/kadmin command, description, Kerberos Commands
- /usr/sbin/kadmin.local command, description, Kerberos Commands
- /usr/sbin/kclient command, description, Kerberos Commands
- /usr/sbin/kdb5_ldap_util command, description, Kerberos Commands
- /usr/sbin/kdb5_util command, description, Kerberos Commands
- /usr/sbin/kgcmgr command, description, Kerberos Commands
- /usr/sbin/kproplog command, description, Kerberos Commands