D
- -D option, ppriv command, How to Determine Which Privileges a Program Requires
- -d option
- auditreduce command
- How to Select Audit Events From the Audit Trail
- How to Select Audit Events From the Audit Trail
- daemons
- kcfd, Administrative Commands in the Cryptographic Framework
- keyserv, How to Restart the Secure RPC Keyserver
- nscd (name service cache daemon), Commands That Manage RBAC
- running with privileges, Administrative Differences on a System With Privileges
- ssh-agent, How to Reduce Password Prompts in Secure Shell
- sshd, A Typical Secure Shell Session
- table of Kerberos, Kerberos Daemons
- Data Encryption Standard, See DES encryption
- data forwarding, Secure Shell, Command Execution and Data Forwarding in Secure Shell
- databases
- auth_attr, auth_attr Database
- backing up and propagating KDC, Backing Up and Propagating the Kerberos Database
- creating KDC, How to Manually Configure a Master KDC
- cred for Secure RPC, Diffie-Hellman Authentication and Secure RPC
- exec_attr, exec_attr Database
- KDC propagation, Which Database Propagation System to Use
- NFS secret keys, Implementation of Diffie-Hellman Authentication
- prof_attr, prof_attr Database
- publickey for Secure RPC, Diffie-Hellman Authentication and Secure RPC
- RBAC, RBAC Databases
- user_attr, user_attr Database
- deallocate command
- allocate error state
- Allocate Error State
- Allocate Error State
- authorizations required
- Device Allocation Commands
- Selected Commands That Require Authorizations
- device-clean scripts and, Device-Clean Scripts
- using, How to Deallocate a Device
- deallocating
- devices, How to Deallocate a Device
- forcibly, How to Forcibly Deallocate a Device
- microphone, How to Deallocate a Device
- debugging sequence number, sequence Token
- decrypt command
- description, User-Level Commands in the Cryptographic Framework
- syntax, How to Encrypt and Decrypt a File
- decrypting
- conversation keys for Secure RPC, Implementation of Diffie-Hellman Authentication
- files, How to Encrypt and Decrypt a File
- NFS secret keys, Implementation of Diffie-Hellman Authentication
- secret keys, Implementation of Diffie-Hellman Authentication
- default/login file, description, Secure Shell Files
- default_realm section
- krb5.conf file
- How to Manually Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- defaults
- audit service, Audit Service
- privilege settings in policy.conf file, Files With Privilege Information
- system-wide in policy.conf file, Password Encryption
- umask value, Default umask Value
- definitive control flag, PAM, How PAM Stacking Works
- delegating, RBAC authorizations, Delegation Authority in Authorizations
- delete_entry command, ktutil command, How to Temporarily Disable Authentication for a Service on a Host
- deleting
- archived audit files, How to Prevent Audit Trail Overflow
- audit files, How to Merge Audit Files From the Audit Trail
- host's service, How to Temporarily Disable Authentication for a Service on a Host
- not_terminated audit files, How to Clean Up a not_terminated Audit File
- policies (Kerberos), How to Delete a Kerberos Policy
- principal (Kerberos), How to Delete a Kerberos Principal
- DenyGroups keyword, sshd_config file, Keywords in Secure Shell
- DenyUsers keyword, sshd_config file, Keywords in Secure Shell
- DES encryption, kernel provider, How to List Available Providers
- DES encryption, Secure NFS, DES Encryption With Secure NFS
- destroying, tickets with kdestroy, Destroying Kerberos Tickets
- determining
- audit ID of a user, How to Update the Preselection Mask of Logged In Users
- auditing is running, How to Determine That Auditing Is Running
- files with setuid permissions, How to Find Files With Special File Permissions
- privileges on a process, How to Determine the Privileges on a Process
- privileges task map, Using Privileges (Tasks)
- /dev/arp device, getting IP MIB-II information, How to Retrieve IP MIB-II Information From a /dev/* Device
- devfsadm command, description, Device Policy Commands
- device_allocate file
- description, device_allocate File
- format, device_allocate File
- sample
- How to Change Which Devices Can Be Allocated
- device_allocate File
- device allocation
- adding devices, Managing Device Allocation (Task Map)
- allocatable devices
- device_allocate File
- device_allocate File
- allocate error state, Allocate Error State
- allocating devices, How to Allocate a Device
- auditing, How to Audit Device Allocation
- authorizations, Device Allocation Rights Profiles
- authorizations for commands, Device Allocation Commands
- authorizing users to allocate, How to Authorize Users to Allocate a Device
- changing allocatable devices, How to Change Which Devices Can Be Allocated
- commands, Device Allocation Commands
- components of mechanism, Components of Device Allocation
- configuration file, device_maps File
- deallocate command
- device-clean scripts and, Device-Clean Scripts
- using, How to Deallocate a Device
deallocating devices, How to Deallocate a Device
- device_allocate file, device_allocate File
- device-clean scripts
- description, Device-Clean Scripts
- options, Device-Clean Scripts
- writing new scripts, Device-Clean Scripts
device_maps file, device_maps File
- disabling, How to Enable Device Allocation
- enabling
- How to Enable Device Allocation
- How to Enable Device Allocation
- examples, How to Allocate a Device
- forcibly allocating devices, How to Forcibly Allocate a Device
- forcibly deallocating devices, How to Forcibly Deallocate a Device
- making device allocatable, How to Enable Device Allocation
- managing devices, Managing Device Allocation (Task Map)
- mounting devices, How to Mount an Allocated Device
- not requiring authorization, How to Change Which Devices Can Be Allocated
- preventing, How to Change Which Devices Can Be Allocated
- requiring authorization, How to Change Which Devices Can Be Allocated
- rights profiles, Device Allocation Rights Profiles
- SMF service, Device Allocation Service
- task map, Managing Device Allocation (Task Map)
- troubleshooting
- How to Allocate a Device
- How to Mount an Allocated Device
- troubleshooting permissions, How to View Allocation Information About a Device
- unmounting allocated device, How to Deallocate a Device
- user procedures, Managing Device Allocation (Tasks)
- using, Managing Device Allocation (Tasks)
- using allocate command, How to Allocate a Device
- viewing information, How to View Allocation Information About a Device
- device-clean scripts
- description, Device-Clean Scripts
- media
- device_allocate File
- Device-Clean Scripts
- object reuse, Device-Clean Scripts
- options, Device-Clean Scripts
- writing new scripts, Device-Clean Scripts
- device management, See device policy
- Device Management rights profile, Device Allocation Rights Profiles
- device_maps file
- description, device_maps File
- format, device_maps File
- sample entries, device_maps File
- device policy
- add_drv command, Device Policy Commands
- auditing changes, How to Audit Changes in Device Policy
- commands, Device Policy Commands
- configuring, Configuring Device Policy (Tasks)
- kernel protection, Device Protection (Reference)
- managing devices, Configuring Device Policy (Task Map)
- overview
- Controlling Access to Devices
- Device Policy (Overview)
- task map, Configuring Device Policy (Task Map)
- update_drv command, Device Policy Commands
- viewing, How to View Device Policy
- Device Security rights profile
- How to Enable Device Allocation
- Device Allocation Rights Profiles
- devices
- allocating for use, Managing Device Allocation (Tasks)
- auditing allocation of, How to Audit Device Allocation
- auditing policy changes, How to Audit Changes in Device Policy
- authorizing users to allocate, How to Authorize Users to Allocate a Device
- changing which are allocatable, How to Change Which Devices Can Be Allocated
- deallocating a device, How to Deallocate a Device
- device allocation
- See device allocation
forcibly allocating, How to Forcibly Allocate a Device
- forcibly deallocating, How to Forcibly Deallocate a Device
- getting IP MIB-II information, How to Retrieve IP MIB-II Information From a /dev/* Device
- listing, How to View Device Policy
- listing device names, How to View Allocation Information About a Device
- login access control, Remote Logins
- making allocatable, How to Enable Device Allocation
- managing, Configuring Device Policy (Task Map)
- managing allocation of, Managing Device Allocation (Task Map)
- mounting allocated devices, How to Mount an Allocated Device
- not requiring authorization for use, How to Change Which Devices Can Be Allocated
- policy commands, Device Policy Commands
- preventing use of all, How to Change Which Devices Can Be Allocated
- preventing use of some, How to Change Which Devices Can Be Allocated
- privilege model and, Privileges and Devices
- protecting by device allocation, Controlling Access to Devices
- protecting in the kernel, Controlling Access to Devices
- security, Controlling Access to Devices
- superuser model and, Privileges and Devices
- unmounting allocated device, How to Deallocate a Device
- viewing allocation information, How to View Allocation Information About a Device
- viewing device policy, How to View Device Policy
- zones and, Controlling Access to Devices
- DH authentication
- configuring in NIS, How to Set Up a Diffie-Hellman Key for an NIS Host
- description, Diffie-Hellman Authentication and Secure RPC
- for NIS client, How to Set Up a Diffie-Hellman Key for an NIS Host
- mounting files with, How to Share NFS Files With Diffie-Hellman Authentication
- sharing files with, How to Share NFS Files With Diffie-Hellman Authentication
- Diffie-Hellman authentication, See DH authentication
- digest command
- description, User-Level Commands in the Cryptographic Framework
- example, How to Compute a Digest of a File
- syntax, How to Compute a Digest of a File
- digestmd5.so.1 plug-in, SASL and, SASL Plug-ins
- digests
- computing for file, How to Compute a Digest of a File
- of files
- How to Compute a Digest of a File
- How to Compute a Digest of a File
- direct realms, How to Establish Direct Cross-Realm Authentication
- directories
- See also files
- displaying files and related information
- Commands for Viewing and Securing Files
- How to Display File Information
- permissions
- defaults, Default umask Value
- description, UNIX File Permissions
public directories, Sticky Bit
- DisableBanner keyword, ssh_config file, Keywords in Secure Shell
- disabling
- 32-bit executables that compromise security, Protecting Executable Files From Compromising Security
- abort sequence, How to Disable a System's Abort Sequence
- audit policy, How to Change Audit Policy
- audit service, How to Disable the Audit Service
- cryptographic mechanisms, How to Prevent the Use of a User-Level Mechanism
- device allocation, How to Enable Device Allocation
- executable stacks, How to Disable Programs From Using Executable Stacks
- hardware mechanisms, How to Disable Hardware Provider Mechanisms and Features
- keyboard abort, How to Disable a System's Abort Sequence
- keyboard shutdown, How to Disable a System's Abort Sequence
- logging of executable stack messages, How to Disable Programs From Using Executable Stacks
- logins temporarily, How to Temporarily Disable User Logins
- programs from using executable stacks, How to Disable Programs From Using Executable Stacks
- remote root access, How to Restrict and Monitor root Logins
- service on a host (Kerberos), How to Temporarily Disable Authentication for a Service on a Host
- system abort sequence, How to Disable a System's Abort Sequence
- user logins, How to Temporarily Disable User Logins
- disk space, for binary audit files, How to Create ZFS File Systems for Audit Files
- disk space requirements, audit files, Cost of Storage of Audit Data
- displaying
- allocatable devices, How to View Allocation Information About a Device
- audit policies, How to Change Audit Policy
- audit policy defaults, How to Display Audit Service Defaults
- audit queue controls
- How to Display Audit Service Defaults
- How to Change Audit Queue Controls
- audit record definitions, How to Display Audit Record Definitions
- audit records, How to View the Contents of Binary Audit Files
- audit records in XML format, How to View the Contents of Binary Audit Files
- auditing defaults, How to Display Audit Service Defaults
- definition of audit records, How to Display Audit Record Definitions
- device policy, How to View Device Policy
- exceptions to system-wide auditing, How to Display Audit Service Defaults
- file information, How to Display File Information
- files and related information, Commands for Viewing and Securing Files
- providers in the Cryptographic Framework, How to List Available Providers
- roles you can assume
- How to Assume a Role
- Commands That Manage RBAC
- root access attempts, How to Restrict and Monitor root Logins
- selected audit records, How to Merge Audit Files From the Audit Trail
- su command attempts, How to Restrict and Monitor root Logins
- sublist of principals (Kerberos), How to View the List of Kerberos Principals
- user's login status
- How to Display a User's Login Status
- How to Display a User's Login Status
- users with no passwords, How to Display Users Without Passwords
- dminfo command, device_maps File
- DNS, Kerberos and, Client and Service Principal Names
- domain_realm section
- krb5.conf file
- Mapping Host Names Onto Realms
- How to Manually Configure a Master KDC
- How to Configure a KDC to Use an LDAP Data Server
- dot (.)
- authorization name separator, Authorization Naming Conventions
- displaying hidden files, How to Display File Information
- double dollar sign ($$), parent shell process number, How to Determine the Privileges on a Process
- DSAAuthentication keyword, See PubkeyAuthentication keyword
- duplicating, principals (Kerberos), How to Duplicate a Kerberos Principal
- DynamicForward keyword, ssh_config file, Keywords in Secure Shell