|
|
U
- -U option
- allocate command, Device Allocation Commands
- list_devices command, Device Allocation Commands
- uauth audit token
- Solaris Auditing Enhancements in the Solaris 10 Release
- uauth Token
- UDP
- addresses, iport Token
- port forwarding and, How to Configure Port Forwarding in Solaris Secure Shell
- Solaris Secure Shell and, How to Configure Port Forwarding in Solaris Secure Shell
- using for remote audit logs, Audit Files
- umask value
- and file creation, Default umask Value
- typical settings, Default umask Value
- umount command, with security attributes, How to Authorize Users to Allocate a Device
- uninstalling, cryptographic providers, How to Prevent the Use of a User-Level Mechanism
- UNIX file permissions, See files, permissions
- unmounting, allocated devices, How to Deallocate a Device
- update_drv command
- description, Device Policy Commands
- using, How to Change the Device Policy on an Existing Device
- updating, auditing service, How to Update the Auditing Service
- URL for online help, Graphical Kerberos Tool, Online Help URL in the Graphical Kerberos Administration Tool
- use_authid option, SASL and, SASL Options
- UseLogin keyword, sshd_config file, Keywords in Solaris Secure Shell
- user accounts
- See also users
- displaying login status
- How to Display a User's Login Status
- How to Display a User's Login Status
- User Accounts tool, description, How to Change the RBAC Properties of a User
- user ACL entries
- default entries for directories, ACL Entries for Directories
- description, ACL Entries for Files
- setting, How to Add ACL Entries to a File
- user administration audit class, Definitions of Audit Classes
- user_attr database
- defaultpriv keyword, Files With Privilege Information
- description
- Databases That Support RBAC
- user_attr Database
- limitpriv keyword, Files With Privilege Information
- RBAC relationships, RBAC Database Relationships
- user audit fields, audit_user database, audit_user Database
- user classes of files, File and Directory Ownership
- user database (RBAC), See user_attr database
- user ID
- audit ID and
- What Is Auditing?
- Process Audit Characteristics
- in NFS services, How to Create a Credential Table
- User keyword, ssh_config file, Keywords in Solaris Secure Shell
- user principal, description, Kerberos Principals
- user procedures
- adding plugins to KMF, How to Manage Third-Party Plugins in KMF
- allocating devices, Allocating Devices (Task Map)
- assuming a role, Using Roles (Task Map)
- chkey command, How to Set Up a Diffie-Hellman Key for an NIS User
- computing digest of a file, How to Compute a Digest of a File
- computing MAC of a file, How to Compute a MAC of a File
- creating self-signed certificate, How to Create a Certificate by Using the pktool gencert Command
- decrypting files, How to Encrypt and Decrypt a File
- encrypting files, Protecting Files With the Solaris Cryptographic Framework (Task Map)
- encrypting NIS user's private key, How to Set Up a Diffie-Hellman Key for an NIS User
- exporting certificates, How to Export a Certificate and Private Key in PKCS #12 Format
- generating a symmetric key
- using the dd command, How to Generate a Symmetric Key by Using the dd Command
- using the pktool command, How to Generate a Symmetric Key by Using the pktool Command
generating passphrase for keystore, How to Generate a Passphrase by Using the pktool setpin Command
- importing certificates, How to Import a Certificate Into Your Keystore
- protecting files, Protecting Files With UNIX Permissions (Task Map)
- using ACLs, Protecting Files With ACLs (Task Map)
- using an assigned role, Using Roles (Task Map)
- using pktool command, Using the Key Management Framework (Task Map)
- using Solaris Secure Shell, Using Solaris Secure Shell (Task Map)
- user scripts, configuring for ssh-agent daemon in CDE, How to Set Up the ssh-agent Command to Run Automatically in CDE
- useradd command
- adding local user, How to Make root User Into a Role
- description, Commands That Manage RBAC
- userdel command, description, Commands That Manage RBAC
- UserKnownHostsFile keyword, ssh_config file, Keywords in Solaris Secure Shell
- UserKnownHostsFile2 keyword, See UserKnownHostsFile keyword
- usermod command
- changing user's RBAC properties, How to Change the RBAC Properties of a User
- description, Commands That Manage RBAC
- using to assign role, How to Assign a Role to a Local User
- users
- adding local user, How to Make root User Into a Role
- allocating devices, How to Allocate a Device
- assigning allocate authorization to, How to Authorize Users to Allocate a Device
- assigning privileges to, How to Assign Privileges to a User or Role
- assigning RBAC defaults, policy.conf File
- basic privilege set, How Privileges Are Implemented
- changing properties from command line, How to Change the RBAC Properties of a User
- computing digest of files, How to Compute a Digest of a File
- computing MAC of files, How to Compute a MAC of a File
- creating local user, How to Make root User Into a Role
- deallocating devices, How to Deallocate a Device
- determining directly assigned privileges, How to Determine the Privileges That You Have Been Directly Assigned
- determining own privileged commands, How to Determine the Privileged Commands That You Can Run
- disabling login, How to Temporarily Disable User Logins
- displaying login status, How to Display a User's Login Status
- encrypting files, How to Encrypt and Decrypt a File
- generating a symmetric key, How to Generate a Symmetric Key by Using the pktool Command
- having no passwords, How to Display Users Without Passwords
- initial inheritable privileges, How Privileges Are Implemented
- modifying audit preselection mask of, How to Change a User's Audit Characteristics
- modifying properties (RBAC), How to Change the RBAC Properties of a User
- mounting allocated devices, How to Mount an Allocated Device
- restricting basic privileges, How to Limit a User's or Role's Privileges
- unmounting allocated devices, How to Deallocate a Device
- using
- ACLs, How to Add ACL Entries to a File
- allocate command, How to Allocate a Device
- BART, Using BART (Tasks)
- cryptoadm command, Administering the Cryptographic Framework
- cryptographic framework task map, Using the Cryptographic Framework (Task Map)
- dd command, How to Generate a Symmetric Key by Using the dd Command
- deallocate command, How to Deallocate a Device
- device allocation
- Allocating Devices (Task Map)
- How to Allocate a Device
- digest command, How to Compute a Digest of a File
- encrypt command, How to Encrypt and Decrypt a File
- file permissions, Protecting Files (Task Map)
- mac command, How to Compute a MAC of a File
- mount command, How to Mount an Allocated Device
- new password algorithm, How to Specify an Algorithm for Password Encryption
- pktool command, How to Generate a Symmetric Key by Using the pktool Command
- ppriv command
- How to Determine the Privileges on a Process
- How to Determine the Privileges on a Process
- privileges, Determining Your Assigned Privileges
- privileges task map, Determining Your Privileges (Task Map)
- RBAC task map, Using RBAC (Task Map)
- roles, Using Roles
- roles task map, Using Roles (Task Map)
- smrole command, How to Assign Privileges to a User or Role
- Solaris Secure Shell task map, Using Solaris Secure Shell (Task Map)
- ssh-add command, How to Reduce Password Prompts in Solaris Secure Shell
- ssh-agent daemon, How to Reduce Password Prompts in Solaris Secure Shell
- truss command, How to Determine Which Privileges a Program Requires
- umount command, How to Deallocate a Device
- usermod command, How to Assign Privileges to a User or Role
- Using the Key Management Framework (Task Map), Using the Key Management Framework (Task Map)
- /usr/bin/ftp command, Kerberos and, Kerberos Commands
- /usr/bin/kdestroy command, Kerberos and, Kerberos Commands
- /usr/bin/kinit command, Kerberos and, Kerberos Commands
- /usr/bin/klist command, Kerberos and, Kerberos Commands
- /usr/bin/kpasswd command, Kerberos and, Kerberos Commands
- /usr/bin/ktutil command, Kerberos and, Kerberos Commands
- /usr/bin/rcp command, Kerberos and, Kerberos Commands
- /usr/bin/rdist command, Kerberos and, Kerberos Commands
- /usr/bin/rlogin command, Kerberos and, Kerberos Commands
- /usr/bin/rsh command, Kerberos and, Kerberos Commands
- /usr/bin/telnet command, Kerberos and, Kerberos Commands
- /usr/lib/kprop command, description, Kerberos Commands
- /usr/lib/krb5/kadmind daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/kpropd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/krb5kdc daemon, Kerberos and, Kerberos Daemons
- /usr/lib/krb5/ktkt_warnd daemon, Kerberos and, Kerberos Daemons
- /usr/lib/libsasl.so library, overview, SASL (Overview)
- /usr/sbin/gkadmin command, description, Kerberos Commands
- /usr/sbin/gsscred command, description, Kerberos Commands
- /usr/sbin/in.ftpd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.rlogind daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.rshd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/in.telnetd daemon, Kerberos and, Kerberos Daemons
- /usr/sbin/kadmin command, description, Kerberos Commands
- /usr/sbin/kadmin.local command, description, Kerberos Commands
- /usr/sbin/kclient command, description, Kerberos Commands
- /usr/sbin/kdb5_ldap_util command, description, Kerberos Commands
- /usr/sbin/kdb5_util command, description, Kerberos Commands
- /usr/sbin/kgcmgr command, description, Kerberos Commands
- /usr/sbin/kproplog command, description, Kerberos Commands
- /usr/share/lib/xml directory, praudit Command
- uucico command, login program, How to Create a Dial-Up Password
|
|
|
|