U
- -U option, allocate command,
Device Allocation Commands
- UDP
- addresses,
ip port Token
- port forwarding and,
How to Configure Port Forwarding in Secure Shell
- Secure Shell and,
How to Configure Port Forwarding in Secure Shell
- using for remote audit logs,
Audit Logs
- umask value
- and file creation,
Default umask Value
- typical values,
Default umask Value
- umount command, with security attributes,
How to Authorize Users to Allocate a Device
- uninstalling, cryptographic providers,
How to Prevent the Use of a User-Level Mechanism
- UNIX file permissions, See files, permissions
- unmounting, allocated devices,
How to Deallocate a Device
- update_drv command, description,
Device Policy Commands
- URL for online help, Graphical Kerberos Tool,
Online Help URL in the Graphical Kerberos Administration Tool
- use_authid option, SASL and,
SASL Options
- use of authorization audit token,
use of authorization Token
- use of privilege audit token,
use of privilege Token
- UseOpenSSLEngine keyword
- Secure Shell
Keywords in Secure Shell
Keywords in Secure Shell
- UsePrivilegedPort keyword, Secure Shell,
Keywords in Secure Shell
- user accounts
- See also users
- changing root password,
How to Change the root Password
- displaying login status
How to Display a User's Login Status
How to Display a User's Login Status
- user_attr database
- description
RBAC Databases
user_attr Database
- listing user exceptions to audit preselection,
How to Configure a User's Audit Characteristics
- user_attr file, exceptions to system-wide audit classes,
Audit Classes and Preselection
- user audit token,
user Token
- user classes of files,
File and Directory Ownership
- user database (RBAC), See user_attr database
- user ID
- audit ID and
What Is Auditing?
Process Audit Characteristics
- in NFS services,
How to Create a Credential Table
- user ID numbers (UIDs), special accounts and,
Special System Accounts
- User keyword, ssh_config file,
Keywords in Secure Shell
- user principal, description,
Kerberos Principals
- user procedures
- adding plugins to KMF,
How to Manage Third-Party Plugins in KMF
- allocating devices,
Managing Device Allocation (Tasks)
- assuming a role,
How to Assume a Role
- chkey command,
How to Set Up a Diffie-Hellman Key for an NIS User
- computing digest of a file,
How to Compute a Digest of a File
- computing MAC of a file,
How to Compute a MAC of a File
- creating self-signed certificate,
How to Create a Certificate by Using the pktool gencert Command
- decrypting files,
How to Encrypt and Decrypt a File
- encrypting files,
Protecting Files With the Cryptographic Framework (Task Map)
- encrypting NIS user's private key,
How to Set Up a Diffie-Hellman Key for an NIS User
- exporting certificates,
How to Export a Certificate and Private Key in PKCS #12 Format
- generating a symmetric key
- using the pktool command,
How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore,
How to Generate a Passphrase by Using the pktool setpin Command
- importing certificates,
How to Import a Certificate Into Your Keystore
- protecting files,
Protecting Files With UNIX Permissions (Task Map)
- using an assigned role,
How to Assume a Role
- using pktool command,
Using the Key Management Framework (Task Map)
- using Secure Shell,
Using Secure Shell (Task Map)
- user rights management, See privileges
- User Security rights profile, modifying audit preselection for users,
How to Configure a User's Audit Characteristics
- useradd command, description,
Commands That Manage RBAC
- userattr command
- description,
Commands That Manage RBAC
- displaying exceptions to system-wide auditing,
How to Display Audit Service Defaults
- userdel command, description,
Commands That Manage RBAC
- UserKnownHostsFile keyword, ssh_config file,
Keywords in Secure Shell
- UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
- usermod command
- audit_flags keyword,
How to Configure a User's Audit Characteristics
- usermod command
- changing user's RBAC properties,
How to Change the Security Attributes of a User
- description,
Commands That Manage RBAC
- exceptions to system-wide auditing,
Audit Classes and Preselection
- usermod command
- specifying user exceptions to audit preselection,
How to Configure a User's Audit Characteristics
- using caret (^) prefix for audit_flags exception,
How to Configure a User's Audit Characteristics
- usermod command
- using to assign role,
How to Assign a Role
- users
- allocating devices,
How to Allocate a Device
- assigning allocate authorization to,
How to Authorize Users to Allocate a Device
- assigning privileges to,
How to Change the Security Attributes of a User
- assigning RBAC defaults,
policy.conf File
- assigning rights profiles,
How to Change the Security Attributes of a User
- auditing all of their commands,
How to Audit All Commands by Users
- auditing individual users,
How to Configure a User's Audit Characteristics
- authenticating to rights profile
How to Reorder Assigned Security Attributes
How to Enable a User to Use Own Password to Assume a Role
- authenticating to role
How to Reorder Assigned Security Attributes
How to Enable a User to Use Own Password to Assume a Role
- basic privilege set,
How Privileges Are Implemented
- computing digest of files,
How to Compute a Digest of a File
- computing MAC of files,
How to Compute a MAC of a File
- creating rights profile for a group,
How to Configure a User's Audit Characteristics
- creating root user,
How to Change the root Role Into a User
- deallocating devices,
How to Deallocate a Device
- determining directly assigned privileges,
How to Determine the Privileges That You Have Been Directly Assigned
- determining own privileged commands,
How to Determine the Privileged Commands That You Can Run
- disabling login,
How to Temporarily Disable User Logins
- displaying login status,
How to Display a User's Login Status
- encrypting files,
How to Encrypt and Decrypt a File
- exceptions to Secure Shell defaults,
How to Create User and Host Exceptions to Secure Shell Defaults
- generating a symmetric key,
How to Generate a Symmetric Key by Using the pktool Command
- having no passwords,
How to Display Users Without Passwords
- initial inheritable privileges,
How Privileges Are Implemented
- modifying audit preselection mask of,
How to Configure a User's Audit Characteristics
- modifying properties (RBAC),
How to Change the Security Attributes of a User
- mounting allocated devices,
How to Mount an Allocated Device
- removing audit flags,
How to Configure a User's Audit Characteristics
- troubleshooting running privileged commands,
How to Determine the Privileged Commands That You Can Run
- unmounting allocated devices,
How to Deallocate a Device
- using rights profile
How to Reorder Assigned Security Attributes
How to Enable a User to Use Own Password to Assume a Role
- UseRsh keyword, ssh_config file,
Keywords in Secure Shell
- using
- allocate command,
How to Allocate a Device
- BART,
Using BART (Tasks)
- cryptoadm command,
Administering the Cryptographic Framework (Tasks)
- deallocate command,
How to Deallocate a Device
- default RBAC configuration task map,
Viewing and Using RBAC Defaults (Task Map)
- device allocation,
How to Allocate a Device
- digest command,
How to Compute a Digest of a File
- encrypt command,
How to Encrypt and Decrypt a File
- file permissions,
Protecting Files (Tasks)
- mac command,
How to Compute a MAC of a File
- new password algorithm,
How to Specify an Algorithm for Password Encryption
- pktool command
How to Generate a Symmetric Key by Using the pktool Command
How to Generate a Key Pair by Using the pktool genkeypair Command
- ppriv command
How to Determine the Privileges on a Process
How to Determine the Privileges on a Process
- privileges task map,
Using Privileges (Tasks)
- RBAC defaults,
Viewing and Using RBAC Defaults (Tasks)
- RBAC task map,
Using RBAC (Tasks)
- rolemod command,
How to Change the Security Attributes of a Role
- Secure Shell task map,
Using Secure Shell (Task Map)
- ssh-add command,
How to Reduce Password Prompts in Secure Shell
- ssh-agent daemon,
How to Reduce Password Prompts in Secure Shell
- truss command,
How to Determine Which Privileges a Program Requires
- umount command,
How to Deallocate a Device
- usermod command,
How to Change the Security Attributes of a User
- Using the Key Management Framework (Task Map),
Using the Key Management Framework (Task Map)
- /usr/bin/ftp command, Kerberos and,
Kerberos Commands
- /usr/bin/kdestroy command, Kerberos and,
Kerberos Commands
- /usr/bin/kinit command, Kerberos and,
Kerberos Commands
- /usr/bin/klist command, Kerberos and,
Kerberos Commands
- /usr/bin/kpasswd command, Kerberos and,
Kerberos Commands
- /usr/bin/ktutil command, Kerberos and,
Kerberos Commands
- /usr/bin/kvno command, Kerberos and,
Kerberos Commands
- /usr/bin/rcp command, Kerberos and,
Kerberos Commands
- /usr/bin/rlogin command, Kerberos and,
Kerberos Commands
- /usr/bin/rsh command, Kerberos and,
Kerberos Commands
- /usr/bin/scp command, Kerberos and,
Kerberos Commands
- /usr/bin/sftp command, Kerberos and,
Kerberos Commands
- /usr/bin/ssh command, Kerberos and,
Kerberos Commands
- /usr/bin/telnet command, Kerberos and,
Kerberos Commands
- /usr/lib/inet/proftpd daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/kprop command, description,
Kerberos Commands
- /usr/lib/krb5/kadmind daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/krb5/kpropd daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/krb5/krb5kdc daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/krb5/ktkt_warnd daemon, Kerberos and,
Kerberos Daemons
- /usr/lib/libsasl.so library, overview,
SASL (Overview)
- /usr/lib/ssh/sshd daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/gkadmin command, description,
Kerberos Commands
- /usr/sbin/gsscred command, description,
Kerberos Commands
- /usr/sbin/in.rlogind daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/in.rshd daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/in.telnetd daemon, Kerberos and,
Kerberos Daemons
- /usr/sbin/kadmin command, description,
Kerberos Commands
- /usr/sbin/kadmin.local command, description,
Kerberos Commands
- /usr/sbin/kclient command, description,
Kerberos Commands
- /usr/sbin/kdb5_ldap_util command, description,
Kerberos Commands
- /usr/sbin/kdb5_util command, description,
Kerberos Commands
- /usr/sbin/kgcmgr command, description,
Kerberos Commands
- /usr/sbin/kproplog command, description,
Kerberos Commands