Listing Rights Profiles
Users Locking Down the Applications That They Run
How to Apply Extended Privilege Policy to a Port
Assigning the Editor Restrictions Rights Profile to All Users
Auditing Administrative Actions
Adding Authorizations to a Rights Profile
How to Lock Down the MySQL Service
How to Assign Specific Privileges to the Apache Web Server
How to Create an Authorization
Creating Rights Profiles and Authorizations
How to Clone and Modify a System Rights Profile
Assigning Privileges Directly to a Role
Assigning Privileges Directly to a User
Creating a Rights Profile That Includes Privileged Commands
Commands for Administering Rights
Running an Application With Assigned Rights
Creating Rights Profiles and Authorizations
Creating a Role
Expanding Users' Rights
Adding a Rights Profile as the Role's First Rights Profile
Creating and Assigning a Role to Administer Cryptographic Services
Assigning Security Attributes to a Legacy Application
Creating a User Who Can Administer DHCP
Using ARMOR Roles
Locking Down Resources by Using Extended Privileges
How to Create an Authorization
Commands for Administering Rights
Using Your Assigned Administrative Rights
Creating Rights Profiles and Authorizations
Following Your Chosen Rights Model
Administrative Differences on a System With Privileges
Expanding Users' Rights
Using ARMOR Roles
How to Lock Down the MySQL Service
How to Apply Extended Privilege Policy to a Port
Restricting an Administrator to Explicitly Assigned Rights
Restricting Users' Rights
How to Assign Specific Privileges to the Apache Web Server
Rights Profiles Reference
Commands and Associated Authorizations
How to Assign Specific Privileges to the Apache Web Server
How to Determine Which Privileges the Apache Web Server Is Using
How to Assign Specific Privileges to the Apache Web Server
Protecting Directories on Your System From Application Processes
Preventing Guests From Spawning Editor Subprocesses
Checking for Authorizations in a Script or Program
Running a Browser in a Protected Environment
Legacy Applications and the Use of Privileges
Protecting Directories on Your System From Application Processes
How to Lock Down the MySQL Service
Preventing Selected Applications From Spawning New Processes
Using ARMOR Roles
Using ARMOR Roles
User and Process Rights Provide an Alternative to the Superuser Model
Following Your Chosen Rights Model
Adding Authorizations to a Rights Profile
Creating a Rights Profile That Includes Privileged Commands
How to Run a Shell Script With Privileged Commands
Locking Down Resources by Using Extended Privileges
Usability Considerations When Assigning Rights
Creating a Role
Creating a Role
Expanding Users' Rights
Assuming an ARMOR Role
Using Your Assigned Administrative Rights
Checking for Authorizations in a Script or Program
Authorization Naming Conventions
Commands and Associated Authorizations
Commands and Associated Authorizations
user_attr Database
Privileged Actions in the Audit Record
user_attr Database
policy.conf File
policy.conf File
rights
Adding Authorizations to a Rights Profile
Checking for Authorizations in a Script or Program
Applications That Check Authorizations
Selected Commands That Require Authorizations
How to Create an Authorization
Delegation Authority in Authorizations
How to Troubleshoot Rights Assignments
Authorization Naming Conventions
Listing Authorizations
How to Troubleshoot Rights Assignments
Authorization Naming Conventions
Privilege Escalation and User Rights
Cloning and Removing Selected Rights From a Rights Profile
How to Troubleshoot Rights Assignments
Rights Administration Commands
policy.conf File