Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Programming
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Databases
Mail Systems
openSolaris
Eclipse Documentation
Techotopia.com
Virtuatopia.com

How To Guides
Virtualization
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Windows
Problem Solutions
Privacy Policy

  




 

 

System Administration Guide: Security Services
Previous Next

U

-U option
allocate command, Device Allocation Commands
list_devices command, Device Allocation Commands
uauth audit token
Solaris Auditing Enhancements in the Solaris 10 Release
uauth Token
UDP
addresses, iport Token
port forwarding and, How to Configure Port Forwarding in Solaris Secure Shell
Solaris Secure Shell and, How to Configure Port Forwarding in Solaris Secure Shell
using for remote audit logs, Audit Files
umask value
and file creation, Default umask Value
typical settings, Default umask Value
umount command, with security attributes, How to Authorize Users to Allocate a Device
uninstalling, cryptographic providers, How to Prevent the Use of a User-Level Mechanism
UNIX file permissions, See files, permissions
unmounting, allocated devices, How to Deallocate a Device
update_drv command
description, Device Policy Commands
using, How to Change the Device Policy on an Existing Device
updating, auditing service, How to Update the Auditing Service
URL for online help, Graphical Kerberos Tool, Online Help URL in the Graphical Kerberos Administration Tool
use_authid option, SASL and, SASL Options
UseLogin keyword, sshd_config file, Keywords in Solaris Secure Shell
user accounts
See also users
displaying login status
How to Display a User's Login Status
How to Display a User's Login Status
User Accounts tool, description, How to Change the RBAC Properties of a User
user ACL entries
default entries for directories, ACL Entries for Directories
description, ACL Entries for Files
setting, How to Add ACL Entries to a File
user administration audit class, Definitions of Audit Classes
user_attr database
defaultpriv keyword, Files With Privilege Information
description
Databases That Support RBAC
user_attr Database
limitpriv keyword, Files With Privilege Information
RBAC relationships, RBAC Database Relationships
user audit fields, audit_user database, audit_user Database
user classes of files, File and Directory Ownership
user database (RBAC), See user_attr database
user ID
audit ID and
What Is Auditing?
Process Audit Characteristics
in NFS services, How to Create a Credential Table
User keyword, ssh_config file, Keywords in Solaris Secure Shell
user principal, description, Kerberos Principals
user procedures
adding plugins to KMF, How to Manage Third-Party Plugins in KMF
allocating devices, Allocating Devices (Task Map)
assuming a role, Using Roles (Task Map)
chkey command, How to Set Up a Diffie-Hellman Key for an NIS User
computing digest of a file, How to Compute a Digest of a File
computing MAC of a file, How to Compute a MAC of a File
creating self-signed certificate, How to Create a Certificate by Using the pktool gencert Command
decrypting files, How to Encrypt and Decrypt a File
encrypting files, Protecting Files With the Solaris Cryptographic Framework (Task Map)
encrypting NIS user's private key, How to Set Up a Diffie-Hellman Key for an NIS User
exporting certificates, How to Export a Certificate and Private Key in PKCS #12 Format
generating a symmetric key
using the dd command, How to Generate a Symmetric Key by Using the dd Command
using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore, How to Generate a Passphrase by Using the pktool setpin Command
importing certificates, How to Import a Certificate Into Your Keystore
protecting files, Protecting Files With UNIX Permissions (Task Map)
using ACLs, Protecting Files With ACLs (Task Map)
using an assigned role, Using Roles (Task Map)
using pktool command, Using the Key Management Framework (Task Map)
using Solaris Secure Shell, Using Solaris Secure Shell (Task Map)
user scripts, configuring for ssh-agent daemon in CDE, How to Set Up the ssh-agent Command to Run Automatically in CDE
useradd command
adding local user, How to Make root User Into a Role
description, Commands That Manage RBAC
userdel command, description, Commands That Manage RBAC
UserKnownHostsFile keyword, ssh_config file, Keywords in Solaris Secure Shell
UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
usermod command
changing user's RBAC properties, How to Change the RBAC Properties of a User
description, Commands That Manage RBAC
using to assign role, How to Assign a Role to a Local User
users
adding local user, How to Make root User Into a Role
allocating devices, How to Allocate a Device
assigning allocate authorization to, How to Authorize Users to Allocate a Device
assigning privileges to, How to Assign Privileges to a User or Role
assigning RBAC defaults, policy.conf File
basic privilege set, How Privileges Are Implemented
changing properties from command line, How to Change the RBAC Properties of a User
computing digest of files, How to Compute a Digest of a File
computing MAC of files, How to Compute a MAC of a File
creating local user, How to Make root User Into a Role
deallocating devices, How to Deallocate a Device
determining directly assigned privileges, How to Determine the Privileges That You Have Been Directly Assigned
determining own privileged commands, How to Determine the Privileged Commands That You Can Run
disabling login, How to Temporarily Disable User Logins
displaying login status, How to Display a User's Login Status
encrypting files, How to Encrypt and Decrypt a File
generating a symmetric key, How to Generate a Symmetric Key by Using the pktool Command
having no passwords, How to Display Users Without Passwords
initial inheritable privileges, How Privileges Are Implemented
modifying audit preselection mask of, How to Change a User's Audit Characteristics
modifying properties (RBAC), How to Change the RBAC Properties of a User
mounting allocated devices, How to Mount an Allocated Device
restricting basic privileges, How to Limit a User's or Role's Privileges
unmounting allocated devices, How to Deallocate a Device
using
ACLs, How to Add ACL Entries to a File
allocate command, How to Allocate a Device
BART, Using BART (Tasks)
cryptoadm command, Administering the Cryptographic Framework
cryptographic framework task map, Using the Cryptographic Framework (Task Map)
dd command, How to Generate a Symmetric Key by Using the dd Command
deallocate command, How to Deallocate a Device
device allocation
Allocating Devices (Task Map)
How to Allocate a Device
digest command, How to Compute a Digest of a File
encrypt command, How to Encrypt and Decrypt a File
file permissions, Protecting Files (Task Map)
mac command, How to Compute a MAC of a File
mount command, How to Mount an Allocated Device
new password algorithm, How to Specify an Algorithm for Password Encryption
pktool command, How to Generate a Symmetric Key by Using the pktool Command
ppriv command
How to Determine the Privileges on a Process
How to Determine the Privileges on a Process
privileges, Determining Your Assigned Privileges
privileges task map, Determining Your Privileges (Task Map)
RBAC task map, Using RBAC (Task Map)
roles, Using Roles
roles task map, Using Roles (Task Map)
smrole command, How to Assign Privileges to a User or Role
Solaris Secure Shell task map, Using Solaris Secure Shell (Task Map)
ssh-add command, How to Reduce Password Prompts in Solaris Secure Shell
ssh-agent daemon, How to Reduce Password Prompts in Solaris Secure Shell
truss command, How to Determine Which Privileges a Program Requires
umount command, How to Deallocate a Device
usermod command, How to Assign Privileges to a User or Role
Using the Key Management Framework (Task Map), Using the Key Management Framework (Task Map)
/usr/bin/ftp command, Kerberos and, Kerberos Commands
/usr/bin/kdestroy command, Kerberos and, Kerberos Commands
/usr/bin/kinit command, Kerberos and, Kerberos Commands
/usr/bin/klist command, Kerberos and, Kerberos Commands
/usr/bin/kpasswd command, Kerberos and, Kerberos Commands
/usr/bin/ktutil command, Kerberos and, Kerberos Commands
/usr/bin/rcp command, Kerberos and, Kerberos Commands
/usr/bin/rdist command, Kerberos and, Kerberos Commands
/usr/bin/rlogin command, Kerberos and, Kerberos Commands
/usr/bin/rsh command, Kerberos and, Kerberos Commands
/usr/bin/telnet command, Kerberos and, Kerberos Commands
/usr/lib/kprop command, description, Kerberos Commands
/usr/lib/krb5/kadmind daemon, Kerberos and, Kerberos Daemons
/usr/lib/krb5/kpropd daemon, Kerberos and, Kerberos Daemons
/usr/lib/krb5/krb5kdc daemon, Kerberos and, Kerberos Daemons
/usr/lib/krb5/ktkt_warnd daemon, Kerberos and, Kerberos Daemons
/usr/lib/libsasl.so library, overview, SASL (Overview)
/usr/sbin/gkadmin command, description, Kerberos Commands
/usr/sbin/gsscred command, description, Kerberos Commands
/usr/sbin/in.ftpd daemon, Kerberos and, Kerberos Daemons
/usr/sbin/in.rlogind daemon, Kerberos and, Kerberos Daemons
/usr/sbin/in.rshd daemon, Kerberos and, Kerberos Daemons
/usr/sbin/in.telnetd daemon, Kerberos and, Kerberos Daemons
/usr/sbin/kadmin command, description, Kerberos Commands
/usr/sbin/kadmin.local command, description, Kerberos Commands
/usr/sbin/kclient command, description, Kerberos Commands
/usr/sbin/kdb5_ldap_util command, description, Kerberos Commands
/usr/sbin/kdb5_util command, description, Kerberos Commands
/usr/sbin/kgcmgr command, description, Kerberos Commands
/usr/sbin/kproplog command, description, Kerberos Commands
/usr/share/lib/xml directory, praudit Command
uucico command, login program, How to Create a Dial-Up Password
Previous Next

 
 
  Published under the terms fo the Public Documentation License Version 1.01. Design by Interspire