D
- -D option, ppriv command,
How to Determine Which Privileges a Program Requires
- -d option
- auditreduce command
How to Select Audit Events From the Audit Trail
How to Select Audit Events From the Audit Trail
- daemons
- kcfd,
Administrative Commands in the Cryptographic Framework
- keyserv,
How to Restart the Secure RPC Keyserver
- nscd (name service cache daemon),
Commands That Manage RBAC
- running with privileges,
Administrative Differences on a System With Privileges
- ssh-agent,
How to Reduce Password Prompts in Secure Shell
- sshd,
A Typical Secure Shell Session
- table of Kerberos,
Kerberos Daemons
- Data Encryption Standard, See DES encryption
- data forwarding, Secure Shell,
Command Execution and Data Forwarding in Secure Shell
- databases
- auth_attr,
auth_attr Database
- backing up and propagating KDC,
Backing Up and Propagating the Kerberos Database
- creating KDC,
How to Manually Configure a Master KDC
- cred for Secure RPC,
Diffie-Hellman Authentication and Secure RPC
- exec_attr,
exec_attr Database
- KDC propagation,
Which Database Propagation System to Use
- NFS secret keys,
Implementation of Diffie-Hellman Authentication
- prof_attr,
prof_attr Database
- publickey for Secure RPC,
Diffie-Hellman Authentication and Secure RPC
- RBAC,
RBAC Databases
- user_attr,
user_attr Database
- deallocate command
- allocate error state
Allocate Error State
Allocate Error State
- authorizations required
Device Allocation Commands
Selected Commands That Require Authorizations
- device-clean scripts and,
Device-Clean Scripts
- using,
How to Deallocate a Device
- deallocating
- devices,
How to Deallocate a Device
- forcibly,
How to Forcibly Deallocate a Device
- microphone,
How to Deallocate a Device
- debugging sequence number,
sequence Token
- decrypt command
- description,
User-Level Commands in the Cryptographic Framework
- syntax,
How to Encrypt and Decrypt a File
- decrypting
- conversation keys for Secure RPC,
Implementation of Diffie-Hellman Authentication
- files,
How to Encrypt and Decrypt a File
- NFS secret keys,
Implementation of Diffie-Hellman Authentication
- secret keys,
Implementation of Diffie-Hellman Authentication
- default/login file, description,
Secure Shell Files
- default_realm section
- krb5.conf file
How to Manually Configure a Master KDC
How to Configure a KDC to Use an LDAP Data Server
- defaults
- audit service,
Audit Service
- privilege settings in policy.conf file,
Files With Privilege Information
- system-wide in policy.conf file,
Password Encryption
- umask value,
Default umask Value
- definitive control flag, PAM,
How PAM Stacking Works
- delegating, RBAC authorizations,
Delegation Authority in Authorizations
- delete_entry command, ktutil command,
How to Temporarily Disable Authentication for a Service on a Host
- deleting
- archived audit files,
How to Prevent Audit Trail Overflow
- audit files,
How to Merge Audit Files From the Audit Trail
- host's service,
How to Temporarily Disable Authentication for a Service on a Host
- not_terminated audit files,
How to Clean Up a not_terminated Audit File
- policies (Kerberos),
How to Delete a Kerberos Policy
- principal (Kerberos),
How to Delete a Kerberos Principal
- DenyGroups keyword, sshd_config file,
Keywords in Secure Shell
- DenyUsers keyword, sshd_config file,
Keywords in Secure Shell
- DES encryption, kernel provider,
How to List Available Providers
- DES encryption, Secure NFS,
DES Encryption With Secure NFS
- destroying, tickets with kdestroy,
Destroying Kerberos Tickets
- determining
- audit ID of a user,
How to Update the Preselection Mask of Logged In Users
- auditing is running,
How to Determine That Auditing Is Running
- files with setuid permissions,
How to Find Files With Special File Permissions
- privileges on a process,
How to Determine the Privileges on a Process
- privileges task map,
Using Privileges (Tasks)
- /dev/arp device, getting IP MIB-II information,
How to Retrieve IP MIB-II Information From a /dev/* Device
- devfsadm command, description,
Device Policy Commands
- device_allocate file
- description,
device_allocate File
- format,
device_allocate File
- sample
How to Change Which Devices Can Be Allocated
device_allocate File
- device allocation
- adding devices,
Managing Device Allocation (Task Map)
- allocatable devices
device_allocate File
device_allocate File
- allocate error state,
Allocate Error State
- allocating devices,
How to Allocate a Device
- auditing,
How to Audit Device Allocation
- authorizations,
Device Allocation Rights Profiles
- authorizations for commands,
Device Allocation Commands
- authorizing users to allocate,
How to Authorize Users to Allocate a Device
- changing allocatable devices,
How to Change Which Devices Can Be Allocated
- commands,
Device Allocation Commands
- components of mechanism,
Components of Device Allocation
- configuration file,
device_maps File
- deallocate command
- device-clean scripts and,
Device-Clean Scripts
- using,
How to Deallocate a Device
deallocating devices,
How to Deallocate a Device
- device_allocate file,
device_allocate File
- device-clean scripts
- description,
Device-Clean Scripts
- options,
Device-Clean Scripts
- writing new scripts,
Device-Clean Scripts
device_maps file,
device_maps File
- disabling,
How to Enable Device Allocation
- enabling
How to Enable Device Allocation
How to Enable Device Allocation
- examples,
How to Allocate a Device
- forcibly allocating devices,
How to Forcibly Allocate a Device
- forcibly deallocating devices,
How to Forcibly Deallocate a Device
- making device allocatable,
How to Enable Device Allocation
- managing devices,
Managing Device Allocation (Task Map)
- mounting devices,
How to Mount an Allocated Device
- not requiring authorization,
How to Change Which Devices Can Be Allocated
- preventing,
How to Change Which Devices Can Be Allocated
- requiring authorization,
How to Change Which Devices Can Be Allocated
- rights profiles,
Device Allocation Rights Profiles
- SMF service,
Device Allocation Service
- task map,
Managing Device Allocation (Task Map)
- troubleshooting
How to Allocate a Device
How to Mount an Allocated Device
- troubleshooting permissions,
How to View Allocation Information About a Device
- unmounting allocated device,
How to Deallocate a Device
- user procedures,
Managing Device Allocation (Tasks)
- using,
Managing Device Allocation (Tasks)
- using allocate command,
How to Allocate a Device
- viewing information,
How to View Allocation Information About a Device
- device-clean scripts
- description,
Device-Clean Scripts
- media
device_allocate File
Device-Clean Scripts
- object reuse,
Device-Clean Scripts
- options,
Device-Clean Scripts
- writing new scripts,
Device-Clean Scripts
- device management, See device policy
- Device Management rights profile,
Device Allocation Rights Profiles
- device_maps file
- description,
device_maps File
- format,
device_maps File
- sample entries,
device_maps File
- device policy
- add_drv command,
Device Policy Commands
- auditing changes,
How to Audit Changes in Device Policy
- commands,
Device Policy Commands
- configuring,
Configuring Device Policy (Tasks)
- kernel protection,
Device Protection (Reference)
- managing devices,
Configuring Device Policy (Task Map)
- overview
Controlling Access to Devices
Device Policy (Overview)
- task map,
Configuring Device Policy (Task Map)
- update_drv command,
Device Policy Commands
- viewing,
How to View Device Policy
- Device Security rights profile
How to Enable Device Allocation
Device Allocation Rights Profiles
- devices
- allocating for use,
Managing Device Allocation (Tasks)
- auditing allocation of,
How to Audit Device Allocation
- auditing policy changes,
How to Audit Changes in Device Policy
- authorizing users to allocate,
How to Authorize Users to Allocate a Device
- changing which are allocatable,
How to Change Which Devices Can Be Allocated
- deallocating a device,
How to Deallocate a Device
- device allocation
- See device allocation
forcibly allocating,
How to Forcibly Allocate a Device
- forcibly deallocating,
How to Forcibly Deallocate a Device
- getting IP MIB-II information,
How to Retrieve IP MIB-II Information From a /dev/* Device
- listing,
How to View Device Policy
- listing device names,
How to View Allocation Information About a Device
- login access control,
Remote Logins
- making allocatable,
How to Enable Device Allocation
- managing,
Configuring Device Policy (Task Map)
- managing allocation of,
Managing Device Allocation (Task Map)
- mounting allocated devices,
How to Mount an Allocated Device
- not requiring authorization for use,
How to Change Which Devices Can Be Allocated
- policy commands,
Device Policy Commands
- preventing use of all,
How to Change Which Devices Can Be Allocated
- preventing use of some,
How to Change Which Devices Can Be Allocated
- privilege model and,
Privileges and Devices
- protecting by device allocation,
Controlling Access to Devices
- protecting in the kernel,
Controlling Access to Devices
- security,
Controlling Access to Devices
- superuser model and,
Privileges and Devices
- unmounting allocated device,
How to Deallocate a Device
- viewing allocation information,
How to View Allocation Information About a Device
- viewing device policy,
How to View Device Policy
- zones and,
Controlling Access to Devices
- DH authentication
- configuring in NIS,
How to Set Up a Diffie-Hellman Key for an NIS Host
- description,
Diffie-Hellman Authentication and Secure RPC
- for NIS client,
How to Set Up a Diffie-Hellman Key for an NIS Host
- mounting files with,
How to Share NFS Files With Diffie-Hellman Authentication
- sharing files with,
How to Share NFS Files With Diffie-Hellman Authentication
- Diffie-Hellman authentication, See DH authentication
- digest command
- description,
User-Level Commands in the Cryptographic Framework
- example,
How to Compute a Digest of a File
- syntax,
How to Compute a Digest of a File
- digestmd5.so.1 plug-in, SASL and,
SASL Plug-ins
- digests
- computing for file,
How to Compute a Digest of a File
- of files
How to Compute a Digest of a File
How to Compute a Digest of a File
- direct realms,
How to Establish Direct Cross-Realm Authentication
- directories
- See also files
- displaying files and related information
Commands for Viewing and Securing Files
How to Display File Information
- permissions
- defaults,
Default umask Value
- description,
UNIX File Permissions
public directories,
Sticky Bit
- DisableBanner keyword, ssh_config file,
Keywords in Secure Shell
- disabling
- 32-bit executables that compromise security,
Protecting Executable Files From Compromising Security
- abort sequence,
How to Disable a System's Abort Sequence
- audit policy,
How to Change Audit Policy
- audit service,
How to Disable the Audit Service
- cryptographic mechanisms,
How to Prevent the Use of a User-Level Mechanism
- device allocation,
How to Enable Device Allocation
- executable stacks,
How to Disable Programs From Using Executable Stacks
- hardware mechanisms,
How to Disable Hardware Provider Mechanisms and Features
- keyboard abort,
How to Disable a System's Abort Sequence
- keyboard shutdown,
How to Disable a System's Abort Sequence
- logging of executable stack messages,
How to Disable Programs From Using Executable Stacks
- logins temporarily,
How to Temporarily Disable User Logins
- programs from using executable stacks,
How to Disable Programs From Using Executable Stacks
- remote root access,
How to Restrict and Monitor root Logins
- service on a host (Kerberos),
How to Temporarily Disable Authentication for a Service on a Host
- system abort sequence,
How to Disable a System's Abort Sequence
- user logins,
How to Temporarily Disable User Logins
- disk space, for binary audit files,
How to Create ZFS File Systems for Audit Files
- disk space requirements, audit files,
Cost of Storage of Audit Data
- displaying
- allocatable devices,
How to View Allocation Information About a Device
- audit policies,
How to Change Audit Policy
- audit policy defaults,
How to Display Audit Service Defaults
- audit queue controls
How to Display Audit Service Defaults
How to Change Audit Queue Controls
- audit record definitions,
How to Display Audit Record Definitions
- audit records,
How to View the Contents of Binary Audit Files
- audit records in XML format,
How to View the Contents of Binary Audit Files
- auditing defaults,
How to Display Audit Service Defaults
- definition of audit records,
How to Display Audit Record Definitions
- device policy,
How to View Device Policy
- exceptions to system-wide auditing,
How to Display Audit Service Defaults
- file information,
How to Display File Information
- files and related information,
Commands for Viewing and Securing Files
- providers in the Cryptographic Framework,
How to List Available Providers
- roles you can assume
How to Assume a Role
Commands That Manage RBAC
- root access attempts,
How to Restrict and Monitor root Logins
- selected audit records,
How to Merge Audit Files From the Audit Trail
- su command attempts,
How to Restrict and Monitor root Logins
- sublist of principals (Kerberos),
How to View the List of Kerberos Principals
- user's login status
How to Display a User's Login Status
How to Display a User's Login Status
- users with no passwords,
How to Display Users Without Passwords
- dminfo command,
device_maps File
- DNS, Kerberos and,
Client and Service Principal Names
- domain_realm section
- krb5.conf file
Mapping Host Names Onto Realms
How to Manually Configure a Master KDC
How to Configure a KDC to Use an LDAP Data Server
- dot (.)
- authorization name separator,
Authorization Naming Conventions
- displaying hidden files,
How to Display File Information
- double dollar sign ($$), parent shell process number,
How to Determine the Privileges on a Process
- DSAAuthentication keyword, See PubkeyAuthentication keyword
- duplicating, principals (Kerberos),
How to Duplicate a Kerberos Principal
- DynamicForward keyword, ssh_config file,
Keywords in Secure Shell