C
- -C option, auditreduce command, How to Merge Audit Files From the Audit Trail
- C shell, privileged version, Profile Shells and RBAC
- -c option
- auditrecord command, How to Display Audit Record Definitions
- auditreduce command, How to Select Audit Events From the Audit Trail
- cache, credential, How the Kerberos Authentication System Works
- canon_user_plugin option, SASL and, SASL Options
- caret (^)
- in audit class prefixes
- How to Configure a User's Audit Characteristics
- How to Find Audit Records of Changes to Specific Files
- using prefix in audit_flags value, How to Configure a User's Audit Characteristics
- CD-ROM drives
- allocating, How to Mount an Allocated Device
- security, Device-Clean Scripts
- cdrw command, authorizations required, Selected Commands That Require Authorizations
- certificate signing requests (CSR), See certificates
- certificates
- exporting for use by another system, How to Export a Certificate and Private Key in PKCS #12 Format
- generating with pktool gencert command, How to Create a Certificate by Using the pktool gencert Command
- importing into keystore, How to Import a Certificate Into Your Keystore
- signing PKCS #10 CSR
- using the pktool command, How to Sign a Certificate Request by Using the pktool signcsr Command
- ChallengeResponseAuthentication keyword, See KbdInteractiveAuthentication keyword
- changing
- allocatable devices, How to Change Which Devices Can Be Allocated
- audit_class file, How to Add an Audit Class
- audit_event file, How to Change an Audit Event's Class Membership
- auditing defaults, How to Preselect Audit Classes
- default password algorithm, Changing the Default Algorithm for Password Encryption (Tasks)
- file ownership, How to Change the Owner of a File
- file permissions
- absolute mode, How to Change File Permissions in Absolute Mode
- special, How to Change Special File Permissions in Absolute Mode
- symbolic mode, How to Change File Permissions in Symbolic Mode
group ownership of file, How to Change Group Ownership of a File
- NFS secret keys, Implementation of Diffie-Hellman Authentication
- passphrase for Secure Shell, How to Change the Passphrase for a Secure Shell Private Key
- password algorithm for a domain, How to Specify a New Password Algorithm for an NIS Domain
- password algorithm task map, Changing the Default Algorithm for Password Encryption (Tasks)
- password of role, How to Change the Password of a Role
- properties of role, How to Change the Security Attributes of a Role
- rights profile contents, How to Create a Rights Profile
- root password, How to Change the root Password
- root role into user, How to Change the root Role Into a User
- special file permissions, How to Change Special File Permissions in Absolute Mode
- your password with kpasswd, Changing Your Password
- your password with passwd, Changing Your Password
- CheckHostIP keyword, ssh_config file, Keywords in Secure Shell
- chgrp command
- description, Commands for Viewing and Securing Files
- syntax, How to Change Group Ownership of a File
- chkey command
- Implementation of Diffie-Hellman Authentication
- How to Set Up a Diffie-Hellman Key for an NIS User
- chmod command
- changing special permissions
- How to Change Special File Permissions in Absolute Mode
- How to Change Special File Permissions in Absolute Mode
- description, Commands for Viewing and Securing Files
- syntax, How to Change Special File Permissions in Absolute Mode
- choosing, your password, Advice on Choosing a Password
- chown command, description, Commands for Viewing and Securing Files
- chroot directory, sftp and, How to Create an Isolated Directory for sftp Files
- ChrootDirectory keyword, ssh_config file, Keywords in Secure Shell
- Cipher keyword, ssh_config file, Keywords in Secure Shell
- Ciphers keyword, Secure Shell, Keywords in Secure Shell
- classes, See audit classes
- cleaning up, binary audit files, How to Clean Up a not_terminated Audit File
- clear protection level, Overview of Kerberized Commands
- ClearAllForwardings keyword, Secure Shell port forwarding, Keywords in Secure Shell
- client names, planning for in Kerberos, Client and Service Principal Names
- ClientAliveCountMax keyword, ssh_config file, Keywords in Secure Shell
- ClientAliveInterval keyword, ssh_config file, Keywords in Secure Shell
- clients
- AUTH_DH client-server session, Implementation of Diffie-Hellman Authentication
- configuring for Secure Shell
- Session Characteristics in Secure Shell
- Client Configuration in Secure Shell
- configuring Kerberos, Configuring Kerberos Clients
- definition in Kerberos, Authentication-Specific Terminology
- clntconfig principal
- creating
- How to Manually Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- clock skew
- Kerberos and, Synchronizing Clocks Between KDCs and Kerberos Clients
- Kerberos planning and, Clock Synchronization Within a Realm
- clock synchronizing
- Kerberos master KDC and
- How to Manually Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- Kerberos planning and, Clock Synchronization Within a Realm
- Kerberos slave KDC and, How to Manually Configure a Slave KDC
- Kerberos slave server and, How to Configure a Slave KDC to Use Full Propagation
- cloning, rights profile contents, How to Clone and Modify a System Rights Profile
- cmd audit token, cmd Token
- cnt audit policy
- description, Understanding Audit Policy
- with ahlt policy, Audit Policies for Asynchronous and Synchronous Events
- combining audit files
- auditreduce command, How to Merge Audit Files From the Audit Trail
- from different zones, Auditing and Oracle Solaris Zones
- command execution, Secure Shell, Command Execution and Data Forwarding in Secure Shell
- command-line equivalents of SEAM Tool, Command-Line Equivalents of the SEAM Tool
- commands
- See also individual commands
- Cryptographic Framework commands, Administrative Commands in the Cryptographic Framework
- determining user's privileged commands, How to Determine the Privileged Commands That You Can Run
- device allocation commands, Device Allocation Commands
- device policy commands, Device Policy Commands
- file protection commands, Commands for Viewing and Securing Files
- for administering privileges, Administrative Commands for Handling Privileges
- Kerberos, Kerberos Commands
- RBAC administration commands, Commands That Manage RBAC
- Secure RPC commands, Implementation of Diffie-Hellman Authentication
- Secure Shell commands, Secure Shell Commands
- that assign privileges, Assigning Privileges
- that check for privileges, Applications That Check for Privileges
- user-level cryptographic commands, User-Level Commands in the Cryptographic Framework
- common keys
- calculating, Implementation of Diffie-Hellman Authentication
- DH authentication and, Diffie-Hellman Authentication and Secure RPC
- components
- BART, BART Components
- device allocation mechanism, Components of Device Allocation
- RBAC, RBAC Elements and Basic Concepts
- Secure Shell user session, Command Execution and Data Forwarding in Secure Shell
- compressing, audit files on disk, How to Compress Audit Files on a Dedicated File System
- Compression keyword, Secure Shell, Keywords in Secure Shell
- CompressionLevel keyword, ssh_config file, Keywords in Secure Shell
- Computer Emergency Response Team/Coordination Center (CERT/CC), Reporting Security Problems
- computer security, See system security
- computing
- DH key, How to Set Up a Diffie-Hellman Key for an NIS Host
- digest of a file, How to Compute a Digest of a File
- MAC of a file, How to Compute a MAC of a File
- secret key, How to Generate a Symmetric Key by Using the pktool Command
- configuration decisions
- auditing
- file storage, How to Plan Disk Space for Audit Records
- policy, Understanding Audit Policy
- remote file storage, How to Prepare to Stream Audit Records to Remote Storage
- who and what to audit, How to Plan Who and What to Audit
- zones, How to Plan Auditing in Zones
Kerberos
- client and service principal names, Client and Service Principal Names
- clients, Client Configuration Options
- clock synchronization, Clock Synchronization Within a Realm
- database propagation, Which Database Propagation System to Use
- encryption types, Kerberos Encryption Types
- KDC server, KDC Configuration Options
- mapping host names onto realms, Mapping Host Names Onto Realms
- number of realms, Number of Realms
- ports, Ports for the KDC and Admin Services
- realm hierarchy, Realm Hierarchy
- realm names, Realm Names
- realms, Planning Kerberos Realms
- slave KDCs, The Number of Slave KDCs
password algorithm, Password Encryption
- configuration files
- auditing, Audit Service Man Pages
- device_maps file, device_maps File
- PAM
- syntax, PAM Configuration (Reference)
for password algorithms, Password Encryption
- policy.conf file
- Password Encryption
- How to Specify an Algorithm for Password Encryption
- Commands That Manage RBAC
- Secure Shell, Session Characteristics in Secure Shell
- syslog.conf file, Files With Privilege Information
- with privilege information, Files With Privilege Information
- configured audit policy, permanent audit policy, How to Change Audit Policy
- configuring
- active audit policy, How to Change Audit Policy
- ahlt audit policy, How to Change Audit Policy
- audit_class file, How to Add an Audit Class
- audit classes, How to Preselect Audit Classes
- audit_event file, How to Change an Audit Event's Class Membership
- audit logs task map, Configuring Audit Logs (Task Map)
- audit policy, How to Change Audit Policy
- audit policy temporarily, How to Change Audit Policy
- audit queue controls, How to Change Audit Queue Controls
- audit service policy, How to Change Audit Policy
- audit trail overflow prevention, How to Prevent Audit Trail Overflow
- audit_warn script, How to Configure the audit_warn Email Alias
- auditing, Configuring the Audit Service (Tasks)
- auditing in zones
- Auditing on a System With Oracle Solaris Zones
- Auditing and Oracle Solaris Zones
- auditing task map, Configuring the Audit Service (Task Map)
- authorizations, How to Create an Authorization
- chroot directory for sftp, How to Create an Isolated Directory for sftp Files
- device allocation, Managing Device Allocation (Task Map)
- device policy, Configuring Device Policy (Task Map)
- DH key for NIS user, How to Set Up a Diffie-Hellman Key for an NIS User
- DH key in NIS, How to Set Up a Diffie-Hellman Key for an NIS Host
- exceptions to Secure Shell system defaults, How to Create User and Host Exceptions to Secure Shell Defaults
- hardware security, Controlling Access to System Hardware (Tasks)
- host-based authentication for Secure Shell, How to Set Up Host-Based Authentication for Secure Shell
- identical auditing for non-global zones, How to Configure All Zones Identically for Auditing
- Kerberos
- adding administration principals, How to Configure a KDC to Use an LDAP Data Server
- clients, Configuring Kerberos Clients
- cross-realm authentication, Configuring Cross-Realm Authentication
- master KDC server
- How to Automatically Configure a Master KDC
- How to Interactively Configure a Master KDC
- How to Manually Configure a Master KDC
- master KDC server using LDAP, How to Configure a KDC to Use an LDAP Data Server
- NFS servers, How to Configure Kerberos NFS Servers
- overview, Configuring the Kerberos Service (Tasks)
- slave KDC server
- How to Automatically Configure a Slave KDC
- How to Interactively Configure a Slave KDC
- How to Manually Configure a Slave KDC
- task map, Configuring the Kerberos Service (Task Map)
password for hardware access, How to Require a Password for SPARC Hardware Access
- per-zone auditing, How to Configure Per-Zone Auditing
- permanent audit policy, How to Change Audit Policy
- perzone audit policy, How to Change Audit Policy
- port forwarding in Secure Shell, How to Configure Port Forwarding in Secure Shell
- privileged users, How to Change the Security Attributes of a User
- RBAC
- Customizing RBAC for Your Site (Tasks)
- How to Plan Your RBAC Implementation
- RBAC task map, Initially Configuring RBAC (Task Map)
- rights profiles, How to Create a Rights Profile
- roles
- How to Create a Role
- How to Change the Security Attributes of a Role
- root role as user, How to Change the root Role Into a User
- Secure Shell
- clients, Client Configuration in Secure Shell
- servers, Server Configuration in Secure Shell
Secure Shell task map, Configuring Secure Shell (Task Map)
- space for audit trail, How to Assign Audit Space for the Audit Trail
- temporary audit policy, How to Change Audit Policy
- text summaries of audit records, How to Configure syslog Audit Logs
- configuring application servers, Configuring Kerberos Network Application Servers
- ConnectionAttempts keyword, ssh_config file, Keywords in Secure Shell
- ConnectTimeout keyword, ssh_config file, Keywords in Secure Shell
- console, displaying su command attempts, How to Restrict and Monitor root Logins
- CONSOLE in Secure Shell, Secure Shell and Login Environment Variables
- Console User (RBAC), rights profile, Rights Profiles
- CONSOLE_USER keyword, policy.conf file, policy.conf File
- consumers, definition in Cryptographic Framework, Terminology in the Cryptographic Framework
- context-sensitive help, SEAM Tool, Print and Online Help Features of the SEAM Tool
- control flags, PAM, How PAM Stacking Works
- control manifests (BART), BART (Overview)
- controlling, system usage, Controlling Access to Machine Resources
- conversation keys
- decrypting in secure RPC, Implementation of Diffie-Hellman Authentication
- generating in secure RPC, Implementation of Diffie-Hellman Authentication
- converting, audit records to readable format, How to View the Contents of Binary Audit Files
- Coordinated Universal Time (UTC)
- time stamp use in auditing
- How to Merge Audit Files From the Audit Trail
- Conventions for Binary Audit File Names
- copying, files using Secure Shell, How to Copy Files With Secure Shell
- copying audit records to single file, How to Select Audit Events From the Audit Trail
- cost control, and auditing, Controlling Auditing Costs
- crammd5.so.1 plug-in, SASL and, SASL Plug-ins
- creating
- audit trail, Audit Trail
- authorization, How to Create an Authorization
- credential table, How to Create a Credential Table
- file digests, How to Compute a Digest of a File
- key pair, How to Generate a Key Pair by Using the pktool genkeypair Command
- new device-clean scripts, Device-Clean Scripts
- new policy (Kerberos)
- How to Create a New Kerberos Principal
- How to Create a New Kerberos Policy
- new principal (Kerberos), How to Create a New Kerberos Principal
- privileged users, How to Change the Security Attributes of a User
- rights profile for a group of users, How to Configure a User's Audit Characteristics
- rights profiles, How to Create a Rights Profile
- roles, How to Create a Role
- root user, How to Change the root Role Into a User
- secret keys
- for encryption, How to Generate a Symmetric Key by Using the pktool Command
Secure Shell keys, How to Generate a Public/Private Key Pair for Use With Secure Shell
- stash file
- How to Manually Configure a Slave KDC
- How to Configure a Slave KDC to Use Full Propagation
- storage for binary audit files, How to Create ZFS File Systems for Audit Files
- tickets with kinit, Creating a Kerberos Ticket
- cred database, DH authentication, Diffie-Hellman Authentication and Secure RPC
- cred table
- DH authentication and, Diffie-Hellman Authentication and Secure RPC
- information stored by server, Implementation of Diffie-Hellman Authentication
- credential
- cache, How the Kerberos Authentication System Works
- description
- Implementation of Diffie-Hellman Authentication
- Authentication-Specific Terminology
- mapping, Mapping GSS Credentials to UNIX Credentials
- obtaining for a server, Obtaining a Credential for a Server
- obtaining for a TGS, Obtaining a Credential for the Ticket-Granting Service
- or tickets, How the Kerberos Service Works
- credential table, adding single entry to, How to Add a Single Entry to the Credential Table
- crontab files, authorizations required, Selected Commands That Require Authorizations
- cross-realm authentication, configuring, Configuring Cross-Realm Authentication
- CRYPT_ALGORITHMS_ALLOW keyword, policy.conf file, Password Encryption
- CRYPT_ALGORITHMS_DEPRECATE keyword, policy.conf file, Password Encryption
- crypt_bsdbf password algorithm, Password Encryption
- crypt_bsdmd5 password algorithm, Password Encryption
- crypt command, file security, Protecting Files With Encryption
- CRYPT_DEFAULT keyword, policy.conf file, Password Encryption
- CRYPT_DEFAULT system variable, How to Specify an Algorithm for Password Encryption
- crypt_sha256 password algorithm
- Password Encryption
- Changing the Default Algorithm for Password Encryption (Tasks)
- crypt_sunmd5 password algorithm
- Password Encryption
- Password Encryption
- crypt_unix password algorithm, Password Encryption
- Crypto Management (RBAC), creating role, How to Assign a Role
- cryptoadm command
- description, Scope of the Cryptographic Framework
- disabling cryptographic mechanisms
- How to Prevent the Use of a User-Level Mechanism
- How to Prevent the Use of a Kernel Software Provider
- disabling hardware mechanisms, How to Disable Hardware Provider Mechanisms and Features
- installing PKCS #11 library, How to Add a Software Provider
- listing providers, How to List Available Providers
- -m option
- How to Prevent the Use of a User-Level Mechanism
- How to Prevent the Use of a Kernel Software Provider
- -p option
- How to Prevent the Use of a User-Level Mechanism
- How to Prevent the Use of a Kernel Software Provider
- restoring kernel software provider, How to Prevent the Use of a Kernel Software Provider
- cryptoadm install command, installing PKCS #11 library, How to Add a Software Provider
- Cryptographic Framework
- administering with role, How to Assign a Role
- connecting providers, Plugins to the Cryptographic Framework
- consumers, Introduction to the Cryptographic Framework
- cryptoadm command
- Scope of the Cryptographic Framework
- Administrative Commands in the Cryptographic Framework
- definition of terms, Terminology in the Cryptographic Framework
- description, Introduction to the Cryptographic Framework
- elfsign command, Binary Signatures for Third-Party Software
- error messages, How to Encrypt and Decrypt a File
- FIPS–140 and, Cryptographic Framework and FIPS-140
- hardware plugins, Introduction to the Cryptographic Framework
- interacting with, Scope of the Cryptographic Framework
- listing providers
- How to List Available Providers
- How to List Available Providers
- PKCS #11 library, Introduction to the Cryptographic Framework
- providers
- Introduction to the Cryptographic Framework
- Terminology in the Cryptographic Framework
- refreshing, How to Refresh or Restart All Cryptographic Services
- registering providers, Plugins to the Cryptographic Framework
- restarting, How to Refresh or Restart All Cryptographic Services
- signing providers, Plugins to the Cryptographic Framework
- SPARC T4 series optimizations, Cryptographic Framework and the SPARC T-Series Servers in This Release
- user-level commands, User-Level Commands in the Cryptographic Framework
- zones and
- Cryptographic Services and Zones
- How to Refresh or Restart All Cryptographic Services
- cryptographic mechanisms, optimized for SPARC T4 series, Cryptographic Framework and the SPARC T-Series Servers in This Release
- cryptographic services, See Cryptographic Framework
- Cryptoki, See PKCS #11 library
- csh command, privileged version, Profile Shells and RBAC
- customizing, manifests, How to Customize a Manifest
- customizing a report (BART), How to Customize a BART Report by Using a Rules File