Follow Techotopia on Twitter

On-line Guides
All Guides
eBook Store
iOS / Android
Linux for Beginners
Office Productivity
Linux Installation
Linux Security
Linux Utilities
Linux Virtualization
Linux Kernel
System/Network Admin
Scripting Languages
Development Tools
Web Development
GUI Toolkits/Desktop
Mail Systems
Eclipse Documentation

How To Guides
General System Admin
Linux Security
Linux Filesystems
Web Servers
Graphics & Desktop
PC Hardware
Problem Solutions
Privacy Policy




System Administration Guide: Security Services
Previous Next

Managing RBAC (Task Map)

The following task map points to procedures for customizing role-based access control (RBAC) after RBAC has been initially implemented.



For Instructions

Change the role password

An authorized user or role changes the password of another role.

How to Change the Password of a Role

Modify the properties of a role

Modifies the capabilities (privileges, privileged commands, profiles, or authorizations) of a role.

How to Change the Properties of a Role

Create or change rights profiles

Creates a rights profile. Or modifies the authorizations, privileged commands, or supplementary rights profiles in a rights profile.

How to Create or Change a Rights Profile

Change a user's administrative capabilities

Adds a role, a rights profile, an authorization, or privileges to an ordinary user.

How to Change the RBAC Properties of a User

Secure legacy applications

Turns on the set ID permissions for legacy applications. Scripts can contain commands with set IDs. Legacy applications can check for authorizations, if appropriate.

How to Add RBAC Properties to Legacy Applications

These procedures manage the elements that are used in RBAC. For user management procedures, refer to Chapter 5, Managing User Accounts and Groups (Tasks), in System Administration Guide: Basic Administration.

Previous Next

  Published under the terms fo the Public Documentation License Version 1.01. Design by Interspire