Listing Authorizations
Commands and Associated Authorizations
Assuming an ARMOR Role
Users Locking Down the Applications That They Run
Assuming an ARMOR Role
Users Locking Down the Applications That They Run
Commands and Associated Authorizations
Rights Administration Commands
Creating a Login for a Trusted User
Rights Administration Commands
Commands and Associated Authorizations
Rights Administration Commands
Commands and Associated Authorizations
Rights Administration Commands
Creating a Role
Requiring a User to Type Password Before Administering DHCP
Assigning Privileges Directly to a User
policy.conf File
Creating a User Who Can Administer DHCP
How Privileges Are Implemented
How to Change the root Role Into a User
Creating a Role
Listing Qualified Attributes
Determining Whether You Are Using a Profile Shell
Listing Privileges
Expanding Users' Rights
Preventing Guests From Spawning Editor Subprocesses
How Privileges Are Implemented
Users Locking Down the Applications That They Run
Users Locking Down the Applications That They Run
Restricting Users' Rights
How to Troubleshoot Rights Assignments
Using the truss Command to Examine Privilege Use
How to Create an Authorization
How to Lock Down the MySQL Service
Listing Rights and Their Definitions
Assigning Privileges Directly to a Role
Listing Your Assigned Roles
Assigning Privileges Directly to a User
Using Your Assigned Administrative Rights