Go to main content
	
	
	
	 
	 
	
	
	
		
			
			
			
			 
	
			
				
				Index
Numbers and Symbols
- $$ (double dollar sign)- parent shell process number Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 - removing basic privilege from your process Removing a Basic Privilege From Yourself Removing a Basic Privilege From Yourself
 
- * (asterisk)- checking for in authorizations Checking for Authorizations in a Script or Program Checking for Authorizations in a Script or Program
 - wildcard character- in authorizations Authorization Naming Conventions Authorization Naming Conventions
 
 
- + (plus sign)- keyword modifier Modifying a Role's Rights Modifying a Role's Rights
 
- - (minus sign)- keyword modifier Modifying a Role's Rights Modifying a Role's Rights
 
- . (dot)- authorization name separator Authorization Naming Conventions Authorization Naming Conventions
 
- {} (curly braces)- extended privileges syntax How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 Enabling a Non-root Account to Read a root-Owned
        File Enabling a Non-root Account to Read a root-Owned
        File
 Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 
 
A
- access- controlling application access to specified directories Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - enabling to labeled files Enabling Access to Labeled Files Enabling Access to Labeled Files
 - enabling to restricted files Cloning and Enhancing the Network IPsec Management Rights Profile Cloning and Enhancing the Network IPsec Management Rights Profile
 Editing a System File Editing a System File
 Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 
 - limiting port privileges How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 - restricting by label About Access to Labeled Files About Access to Labeled Files
 - restricting guest access to system Assigning the Editor Restrictions Rights Profile to All Users Assigning the Editor Restrictions Rights Profile to All Users
 - to labeled files Enabling Access to Labeled Files Enabling Access to Labeled Files
 
- access_times keyword user_attr Database user_attr Database
 Basics of User and Process Rights Basics of User and Process Rights
 
- access_tz keyword user_attr Database user_attr Database
 Basics of User and Process Rights Basics of User and Process Rights
 
- accessing- labeled file systems How to Verify User Access to Labeled Files How to Verify User Access to Labeled Files
 - persistent sandboxes Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
 
- account locking Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 Restricting Users' Rights Restricting Users' Rights
 
- account-policy- SMF stencil account-policy SMF Stencil account-policy SMF Stencil
 
- account-policy service- enabling New Feature – Enabling the account-policy Service New Feature – Enabling the account-policy Service
 - replacing security attributes in files account-policy SMF Stencil account-policy SMF Stencil
 New Feature – Enabling the account-policy Service New Feature – Enabling the account-policy Service
 Assigning Rights to Users Assigning Rights to Users
 Following Your Chosen Rights Model Following Your Chosen Rights Model
 What's New in Rights in Oracle Solaris 11.4 What's New in Rights in Oracle Solaris 11.4
 
 - stencils New Feature – Enabling the account-policy Service New Feature – Enabling the account-policy Service
 
- account-policy SMF stencil SMF Stencil That Contains Privilege Information SMF Stencil That Contains Privilege Information
 Commands for Handling Privileges Commands for Handling Privileges
 Rights Administration Commands Rights Administration Commands
 
- accounts- locking and unlocking How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 - locking and unlocking system-wide How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 - timed unlocking How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
 
- adding- auditing of privileged actions Auditing Administrative Actions Auditing Administrative Actions
 - authorizations- to rights profile Adding Authorizations to a Rights Profile Adding Authorizations to a Rights Profile
 - to role Assigning Authorizations to a Role Assigning Authorizations to a Role
 - to user Assigning Authorizations Directly to a User Assigning Authorizations Directly to a User
 
 - cryptomgt role Creating and Assigning a Role to Administer Cryptographic Services Creating and Assigning a Role to Administer Cryptographic Services
 - extended privileges- by users Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - to a database How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - to a port How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 - to a web server How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 
 - new authorization How to Create an Authorization How to Create an Authorization
 - new rights profile Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - new rights profile from existing one How to Clone and Modify a System Rights Profile How to Clone and Modify a System Rights Profile
 - privileges- directly to role Assigning Privileges Directly to a Role Assigning Privileges Directly to a Role
 - directly to user Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 - to command in rights profile Creating a Rights Profile That Includes Privileged Commands Creating a Rights Profile That Includes Privileged Commands
 
 - rights- commands for Commands for Administering Rights Commands for Administering Rights
 - to legacy applications Running an Application With Assigned Rights Running an Application With Assigned Rights
 - to rights profile Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - to roles Creating a Role Creating a Role
 - to users Expanding Users' Rights Expanding Users' Rights
 
 - rights profiles to list of profiles Adding a Rights Profile as the Role's First Rights Profile Adding a Rights Profile as the Role's First Rights Profile
 - roles Assigning Rights to Users Assigning Rights to Users
 - security-related role Creating and Assigning a Role to Administer Cryptographic Services Creating and Assigning a Role to Administer Cryptographic Services
 - set ID- to legacy applications Assigning Security Attributes to a Legacy Application Assigning Security Attributes to a Legacy Application
 
 - trusted users Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 
- administering- ARMOR roles Using ARMOR Roles Using ARMOR Roles
 - authorizations How to Create an Authorization How to Create an Authorization
 How to Create an Authorization How to Create an Authorization
 
 - extended privilege policy Locking Down Resources by Using Extended Privileges Locking Down Resources by Using Extended Privileges
 - immutable zones Administering Immutable Zones Administering Immutable Zones
 - rights- authorizations How to Create an Authorization How to Create an Authorization
 - commands for Commands for Administering Rights Commands for Administering Rights
 - instructions Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 - legacy applications Running an Application With Assigned Rights Running an Application With Assigned Rights
 Assigning Security Attributes to a Legacy Application Assigning Security Attributes to a Legacy Application
 
 - of a role Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 Changing a Role Password Changing a Role Password
 Creating a Role Creating a Role
 
 - of a user Restricting Users' Rights Restricting Users' Rights
 Expanding Users' Rights Expanding Users' Rights
 
 - of all users Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - rights profiles Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - roles How to Reorder Assigned Rights How to Reorder Assigned Rights
 
 - rights profiles Assigning Rights Profiles in a Specific Order Assigning Rights Profiles in a Specific Order
 Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password
 
 - role password Changing a Role Password Changing a Role Password
 Creating a Role Creating a Role
 
 - roles to replace superuser Following Your Chosen Rights Model Following Your Chosen Rights Model
 - user password to assume role How to Reorder Assigned Rights How to Reorder Assigned Rights
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 
 - without privileges Administrative Differences on a System With Privileges Administrative Differences on a System With Privileges
 
- administrative accounts- creating roles for Creating a Role for an Application Administrator Creating a Role for an Application Administrator
 
- administrators- adding to users' rights Expanding Users' Rights Expanding Users' Rights
 - installing ARMOR package Using ARMOR Roles Using ARMOR Roles
 - modifying all users' rights Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - restricting access to a database How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - restricting access to a port How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 - restricting rights Restricting an Administrator to Explicitly Assigned Rights Restricting an Administrator to Explicitly Assigned Rights
 - restricting users' rights Restricting Users' Rights Restricting Users' Rights
 - restricting web server privileges How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 
- All rights profile Rights Profiles Reference Rights Profiles Reference
- allocate command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- ALTSHELL security attribute User Environment Security Attributes in Files and SMF User Environment Security Attributes in Files and SMF
- annotation keyword- description user_attr Database user_attr Database
 
- ANNOTATION security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- Apache HTTP Server- assigning extended privileges How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 - verifying use of privilege How to Determine Which Privileges the Apache HTTP Server Is Using How to Determine Which Privileges the Apache HTTP Server Is Using
 
- applications- Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 - assigning extended privileges Protecting Directories on Your System From Application Processes Protecting Directories on Your System From Application Processes
 - assigning extended privileges to editors Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 - checking for authorizations Checking for Authorizations in a Script or Program Checking for Authorizations in a Script or Program
 - Firefox browser Running a Browser in a Protected Environment Running a Browser in a Protected Environment
 - legacy and privileges Legacy Applications and the Use of Privileges Legacy Applications and the Use of Privileges
 - limiting access to specified directories Protecting Directories on Your System From Application Processes Protecting Directories on Your System From Application Processes
 - MySQL database How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - preventing from spawning new processes Preventing Selected Applications From Spawning New Processes Preventing Selected Applications From Spawning New Processes
 - privilege-aware How Processes Get Privileges How Processes Get Privileges
 How Privileges Are Implemented How Privileges Are Implemented
 
 
- ARMOR- assigning roles to trusted users Using ARMOR Roles Using ARMOR Roles
 - installing package Using ARMOR Roles Using ARMOR Roles
 - introduction to standard User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 - planning use of Following Your Chosen Rights Model Following Your Chosen Rights Model
 
- assigning- authorizations in a rights profile Adding Authorizations to a Rights Profile Adding Authorizations to a Rights Profile
 - clearances- to specific users Enabling Access to Labeled Files Enabling Access to Labeled Files
 
 - privileges- to commands in a rights profile Creating a Rights Profile That Includes Privileged Commands Creating a Rights Profile That Includes Privileged Commands
 - to commands in a script How to Run a Shell Script With Privileged Commands How to Run a Shell Script With Privileged Commands
 - to role Assigning Privileges Directly to a Role Assigning Privileges Directly to a Role
 - to user Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 
 - profile shell as login shell Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 Creating a Login for a Trusted User Creating a Login for a Trusted User
 
 - rights- securely Security Considerations When Assigning Rights Security Considerations When Assigning Rights
 - to specific resources Locking Down Resources by Using Extended Privileges Locking Down Resources by Using Extended Privileges
 - to users User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 - usability considerations Usability Considerations When Assigning Rights Usability Considerations When Assigning Rights
 
 - rights profile- to a role Creating a Role Creating a Role
 - to a user Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 
 - rights profiles How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
 - rights to users- to all logins Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - to users Restricting Users' Rights Restricting Users' Rights
 Expanding Users' Rights Expanding Users' Rights
 
 
 - role to a user locally Creating a Role Creating a Role
 
- assuming role- how to Expanding Users' Rights Expanding Users' Rights
 - in a terminal window Assuming an ARMOR Role Assuming an ARMOR Role
 - root Assuming the root Role Assuming the root Role
 - when assigned Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 
- asterisk (*)- checking for in authorizations Checking for Authorizations in a Script or Program Checking for Authorizations in a Script or Program
 - wildcard character- in authorizations Authorization Naming Conventions Authorization Naming Conventions
 
 
- at command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- atq command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- Audit Configuration rights profile- use of Auditing Administrative Actions Auditing Administrative Actions
 
- audit trail  See audit files audit files
- audit command- –s option Auditing Administrative Actions Auditing Administrative Actions
 
- audit_flags keyword- description user_attr Database user_attr Database
 
- auditing- privileges and Privileged Actions in the Audit Record Privileged Actions in the Audit Record
 - roles Auditing Administrative Actions Auditing Administrative Actions
 
- auth_attr database auth_attr Database auth_attr Database
 Rights Databases Rights Databases
 
- auth_profiles keyword- description user_attr Database user_attr Database
 - example of Requiring a User to Type Password Before Administering DHCP Requiring a User to Type Password Before Administering DHCP
 
- AUTH_PROFS_GRANTED keyword- policy.conf file policy.conf File policy.conf File
 
- AUTH_PROFS_GRANTED security attribute User Account Security Attributes in Files and SMF User Account Security Attributes in Files and SMF
- authenticated rights profiles- assigning Requiring a User to Type Password Before Administering DHCP Requiring a User to Type Password Before Administering DHCP
 - keyword in policy.conf file policy.conf File policy.conf File
 - searched before rights profiles How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 Order of Search for Assigned Rights Order of Search for Assigned Rights
 
 
- authorizations  See Also rights rights- adding to rights profile Adding Authorizations to a Rights Profile Adding Authorizations to a Rights Profile
 - checking for wildcards Checking for Authorizations in a Script or Program Checking for Authorizations in a Script or Program
 - checking in privileged application Applications That Check Authorizations Applications That Check Authorizations
 - commands requiring Selected Commands That Require Authorizations Selected Commands That Require Authorizations
 - compared to privileges More About User Authorizations More About User Authorizations
 Basics of User and Process Rights Basics of User and Process Rights
 
 - creating new ones How to Create an Authorization How to Create an Authorization
 - database auth_attr Database auth_attr Database
 Rights Databases Rights Databases
 
 - delegating Delegation Authority in Authorizations Delegation Authority in Authorizations
 - description Authorizations Reference Authorizations Reference
 More About User Authorizations More About User Authorizations
 Basics of User and Process Rights Basics of User and Process Rights
 
 - effect of misspelling How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - granularity Authorization Naming Conventions Authorization Naming Conventions
 - listing Listing Authorizations Listing Authorizations
 - misspelling How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - naming conventions Authorization Naming Conventions Authorization Naming Conventions
 - preventing privilege escalation Privilege Escalation and User Rights Privilege Escalation and User Rights
 - removing from rights profile Cloning and Removing Selected Rights From a Rights Profile Cloning and Removing Selected Rights From a Rights Profile
 - troubleshooting How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 
- auths command- description Rights Administration Commands Rights Administration Commands
 - –t option How to Create an Authorization How to Create an Authorization
 - use Listing Authorizations Listing Authorizations
 How to Create an Authorization How to Create an Authorization
 Checking for Authorizations in a Script or Program Checking for Authorizations in a Script or Program
 
 
- auths keyword- description user_attr Database user_attr Database
 Adding Authorizations to a Rights Profile Adding Authorizations to a Rights Profile
 
 - use Cloning and Removing Selected Rights From a Rights Profile Cloning and Removing Selected Rights From a Rights Profile
 Cloning and Enhancing the Network IPsec Management Rights Profile Cloning and Enhancing the Network IPsec Management Rights Profile
 
 
- AUTHS_GRANTED keyword- policy.conf file policy.conf File policy.conf File
 
- AUTHS_GRANTED security attribute User Account Security Attributes in Files and SMF User Account Security Attributes in Files and SMF
- auto_unlock_time attribute How to Set Account Locking for All Logins How to Set Account Locking for All Logins
B
- basic privilege set How Privileges Are Implemented How Privileges Are Implemented
- basic privileges- limiting use by service How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 
- Basic Solaris User rights profile Rights Profiles Reference Rights Profiles Reference
- browsers- protecting user files with extended privileges Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 
C
- capabilities  See rights rights
- cdrw command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- changing- password of role Changing a Role Password Changing a Role Password
 Creating a Role Creating a Role
 
 - rights- of a port How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 - of a script How to Run a Shell Script With Privileged Commands How to Run a Shell Script With Privileged Commands
 - of a web server How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 - of an application Assigning Rights to Applications and Scripts Assigning Rights to Applications and Scripts
 - of an editor Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 - of Firefox Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - of role Creating a Role Creating a Role
 - to MySQL database How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 
 - rights profile contents Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - root role into user Changing Whether root Is a User or a Role Changing Whether root Is a User or a Role
 - umask How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
 - user file permissions How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
 
- CLEARANCE security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- clearances- assigning to specific users Enabling Access to Labeled Files Enabling Access to Labeled Files
 - labels on processes About Access to Labeled Files About Access to Labeled Files
 - user default About Access to Labeled Files About Access to Labeled Files
 
- cloning- rights profile contents How to Clone and Modify a System Rights Profile How to Clone and Modify a System Rights Profile
 
- commands- determining user's privileged commands Listing Privileges Listing Privileges
 - determining user's qualified attributes Listing Qualified Attributes Listing Qualified Attributes
 - for administering privileges Commands for Handling Privileges Commands for Handling Privileges
 - rights administration commands Commands That Manage Authorizations, Rights Profiles, and Roles Commands That Manage Authorizations, Rights Profiles, and Roles
 - that assign privileges Assigning Privileges to Users and Processes Assigning Privileges to Users and Processes
 - that check for privileges Applications That Check for Privileges Applications That Check for Privileges
 
- components- rights management, of Basics of User and Process Rights Basics of User and Process Rights
 
- config/etc_default_login stencil Modifying Logging Policy Modifying Logging Policy
 Modifying Login Policy Modifying Login Policy
 Modifying Login Environment Variables Modifying Login Environment Variables
 
- config/etc_default_passwd stencil Modifying Password Policy Modifying Password Policy
- config/etc_default_su stencil Modifying Logging Policy Modifying Logging Policy
- config/etc_security_policyconf stencil Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
- configuring- all users Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - authorizations How to Create an Authorization How to Create an Authorization
 - labeled file systems Configuring Users and Processes With Labels Configuring Users and Processes With Labels
 - power management How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 - privileged users Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 - protected database How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - protected port How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 - protected web server How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 - protection of user files from applications Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - restricted users Restricting Users' Rights Restricting Users' Rights
 - rights Restricting Users' Rights Restricting Users' Rights
 Expanding Users' Rights Expanding Users' Rights
 Following Your Chosen Rights Model Following Your Chosen Rights Model
 
 - rights for all logins Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - rights profiles Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - roles Creating a Role Creating a Role
 Assigning Rights to Users Assigning Rights to Users
 
 - root role as user Changing Whether root Is a User or a Role Changing Whether root Is a User or a Role
 - sandboxes Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 - trusted users Creating a Role Creating a Role
 - users who can access labeled files Enabling Access to Labeled Files Enabling Access to Labeled Files
 
- Console User rights profile Rights Profiles Reference Rights Profiles Reference
 How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 
- CONSOLE security attribute Logging and su Security Attributes in Files and SMF Logging and su Security Attributes in Files and SMF
 Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
 
- CONSOLE_USER keyword- policy.conf file policy.conf File policy.conf File
 
- CONSOLE_USER security attribute User Account Security Attributes in Files and SMF User Account Security Attributes in Files and SMF
- creating- ARMOR roles Using ARMOR Roles Using ARMOR Roles
 - authorization How to Create an Authorization How to Create an Authorization
 - privileged users Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 - rights profiles Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 Creating a Rights Profile for Administrators of a Third-Party Application Creating a Rights Profile for Administrators of a Third-Party Application
 
 - roles Assigning Rights to Users Assigning Rights to Users
 - root user How to Change the root Role Into a User How to Change the root Role Into a User
 
- crontab files- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- CRYPT_ALGORITHMS_ALLOW security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- CRYPT_ALGORITHMS_DEPRECATE security                     attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- CRYPT_DEFAULT security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- Crypto Management rights profile- using in a role Creating and Assigning a Role to Administer Cryptographic Services Creating and Assigning a Role to Administer Cryptographic Services
 
- Cryptographic Framework- administering with role Creating and Assigning a Role to Administer Cryptographic Services Creating and Assigning a Role to Administer Cryptographic Services
 
- curly braces ({})- extended privileges syntax How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 Enabling a Non-root Account to Read a root-Owned
        File Enabling a Non-root Account to Read a root-Owned
        File
 Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 
 
D
- daemons- nscd (name service cache daemon) Rights Administration Commands Rights Administration Commands
 - running with privileges Visible Differences Between a System With Privileges and a System Without Privileges Visible Differences Between a System With Privileges and a System Without Privileges
 
- data loss protection- description Labeling Processes for Data Loss Protection Labeling Processes for Data Loss Protection
 - tasks Configuring Users and Processes With Labels Configuring Users and Processes With Labels
 
- databases- auth_attr auth_attr Database auth_attr Database
 - exec_attr exec_attr Database exec_attr Database
 - MySQL How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - prof_attr prof_attr Database prof_attr Database
 - protecting with extended privileges How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - rights Rights Databases Rights Databases
 - user_attr user_attr Database user_attr Database
 
- deallocate command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- default_privileges attribute Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
- defaultpriv keyword How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users- description user_attr Database user_attr Database
 
- defaults- privileges settings SMF Stencil That Contains Privilege Information SMF Stencil That Contains Privilege Information
 
- delegating authorizations Delegation Authority in Authorizations Delegation Authority in Authorizations
- determining- access to labeled files How to Verify User Access to Labeled Files How to Verify User Access to Labeled Files
 - Apache HTTP Server's privileges How to Determine Which Privileges the Apache HTTP Server Is Using How to Determine Which Privileges the Apache HTTP Server Is Using
 - privileges on a process Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 - required privileges How to Determine Which Privileges a Program Requires How to Determine Which Privileges a Program Requires
 - rights, available or assigned Listing Rights and Their Definitions Listing Rights and Their Definitions
 - which rights model to use Deciding Which Rights Model to Use for Administration Deciding Which Rights Model to Use for Administration
 
- devices- rights model and Privileges and Devices Privileges and Devices
 - superuser model and Privileges and Devices Privileges and Devices
 
- DICTIONDBDIR security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- DICTIONLIST security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- DICTIONMINWORDLENGTH security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- DISABLETIME security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- displaying  See Also listing listing- roles you can assume Rights Administration Commands Rights Administration Commands
 Assuming an ARMOR Role Assuming an ARMOR Role
 
 
- dominance  See label dominance label dominance
- dot (.)- authorization name separator Authorization Naming Conventions Authorization Naming Conventions
 
- double dollar sign ($$)- parent shell process number Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 - removing basic privilege from your shell Removing a Basic Privilege From Yourself Removing a Basic Privilege From Yourself
 
E
- /etc/default/login file How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
- /etc/security/policy.conf                           file- editing How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 
- /etc/security/policy.conf                       file- editing How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 
- /etc/security/policy.conf file- editing How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 
- editors- preventing from spawning new processes Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 - restricting for guest user Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 
- effective privilege set How Privileges Are Implemented How Privileges Are Implemented
- enabling- access to labeled files Enabling Access to Labeled Files Enabling Access to Labeled Files
 
- encodings file- Sandbox Labels v1.0 Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
 Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 
 
- escalation of privilege- description Privilege Escalation and User Rights Privilege Escalation and User Rights
 - preventing in devices Privileges and Devices Privileges and Devices
 
- exacct files- reading with Perl scripts Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 
- exec_attr database exec_attr Database exec_attr Database
 Rights Databases Rights Databases
 
- expanding users rights Expanding Users' Rights Expanding Users' Rights
- Extended Accounting Net Management rights profile Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
- extended policy  See extended privileges extended privileges
- extended privilege policy  See extended privileges extended privileges
- extended privileges- administering Locking Down Resources by Using Extended Privileges Locking Down Resources by Using Extended Privileges
 - assigned by regular users Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - assigning- in rights profile Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 - to a database How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - to a port How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 - to trusted users Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 - to web server How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 
 - description Using Extended Privilege Policy to Restrict Privilege Use Using Extended Privilege Policy to Restrict Privilege Use
 Expanding a User or Role's Privileges Expanding a User or Role's Privileges
 
 - listing How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - PRIV_XPOLICY flag How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - protecting files of regular users Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - reading root-owned files Enabling a Non-root Account to Read a root-Owned
        File Enabling a Non-root Account to Read a root-Owned
        File
 
F
- file labels  See labels labels
- FILE privileges- description Privilege Descriptions Privilege Descriptions
 - file_chown How Processes Get Privileges How Processes Get Privileges
 - file_chown_self Privilege Escalation and Kernel Privileges Privilege Escalation and Kernel Privileges
 
- file systems- configuring as labeled Configuring Users and Processes With Labels Configuring Users and Processes With Labels
 
- files- /etc/default/login How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 - accessing labeled How to Verify User Access to Labeled Files How to Verify User Access to Labeled Files
 - configuring as labeled Configuring Users and Processes With Labels Configuring Users and Processes With Labels
 - privileges relating to Privilege Descriptions Privilege Descriptions
 
- Firefox browser- assigning extended privileges Running a Browser in a Protected Environment Running a Browser in a Protected Environment
 
- flags- PRIV_PFEXEC in profile             shells Determining Whether You Are Using a Profile Shell Determining Whether You Are Using a Profile Shell
 - PRIV_XPOLICY on process How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 
- FTP service- protecting with labels Example - Protecting the FTP Service With a Label Example - Protecting the FTP Service With a Label
 
G
- getent command- description Rights Administration Commands Rights Administration Commands
 - listing commands with assigned security attributes Listing Privileges Listing Privileges
 - listing contents of rights databases Listing Rights and Their Definitions Listing Rights and Their Definitions
 - listing definitions of all authorizations Listing the Content of the Authorizations Database Listing the Content of the Authorizations Database
 - listing definitions of all rights profiles Listing the Contents of the Rights Profiles Database Listing the Contents of the Rights Profiles Database
 - listing qualified security attributes Listing Qualified Attributes Listing Qualified Attributes
 - using Changing the root User Into the root Role Changing the root User Into the root Role
 
H
- hardware- restricting user control of How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 
- HISTORY security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- host qualified attribute- description user_attr Database user_attr Database
 
- HZ security attribute User Environment Security Attributes in Files and SMF User Environment Security Attributes in Files and SMF
I
- idlecmd keyword- description user_attr Database user_attr Database
 - use How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 
- idletime keyword- description user_attr Database user_attr Database
 - use How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 
- immutable zones- administering Administering Immutable Zones Administering Immutable Zones
 
- inheritable privilege set How Privileges Are Implemented How Privileges Are Implemented
- IPC privileges Privilege Descriptions Privilege Descriptions
- IPS packages  See packages packages
K
- kernel processes and privileges Privileges Protecting Kernel Processes Privileges Protecting Kernel Processes
- keywords- defaultpriv How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 - lock_after_retries How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 - RETRIES How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
L
- label dominance- effect on access About Access to Labeled Files About Access to Labeled Files
 
- label policy- planning About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - protecting sensitive data About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 
- labeled file systems- configuring Configuring Users and Processes With Labels Configuring Users and Processes With Labels
 
- labeled files- configuring Configuring Users and Processes With Labels Configuring Users and Processes With Labels
 - enabling access Enabling Access to Labeled Files Enabling Access to Labeled Files
 - verifying access How to Verify User Access to Labeled Files How to Verify User Access to Labeled Files
 
- labeling  See labels labels
- labels- assigning clearances Enabling Access to Labeled Files Enabling Access to Labeled Files
 - processes and About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - protecting FTP service Example - Protecting the FTP Service With a Label Example - Protecting the FTP Service With a Label
 - protecting sensitive data About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - translation About Access to Labeled Files About Access to Labeled Files
 
- ldapaddent command- listing all qualified security attributes Listing Qualified Attributes Listing Qualified Attributes
 
- least privilege- principle of Privileges Protecting Kernel Processes Privileges Protecting Kernel Processes
 
- legacy applications and privileges Assigning Security Attributes to a Legacy Application Assigning Security Attributes to a Legacy Application
 Legacy Applications and the Use of Privileges Legacy Applications and the Use of Privileges
 
- levels  See classifications classifications
- limit privilege set How Privileges Are Implemented How Privileges Are Implemented
- limit_privileges attribute- account-policy SMF stencil SMF Stencil That Contains Privilege Information SMF Stencil That Contains Privilege Information
 
- limitpriv keyword user_attr Database user_attr Database
- Linux behaviors- sudo command Creating a Role That Requires the User's Password Creating a Role That Requires the User's Password
 Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 Deciding Which Rights Model to Use for Administration Deciding Which Rights Model to Use for Administration
 
 - user password when assuming role Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 Enabling Users to Use Own Password for Role Password Enabling Users to Use Own Password for Role Password
 
 
- list_devices command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- listing  See Also displaying displaying- all rights Listing Rights and Their Definitions Listing Rights and Their Definitions
 - authorizations Listing Authorizations Listing Authorizations
 - default rights configuration Listing Rights and Their Definitions Listing Rights and Their Definitions
 - one user's rights Listing All Rights Assigned to a User Listing All Rights Assigned to a User
 - privileges Listing Privileges Listing Privileges
 - qualifiers to security attributes Listing Qualified Attributes Listing Qualified Attributes
 - rights Listing Rights and Their Definitions Listing Rights and Their Definitions
 - rights of initial user Listing Rights and Their Definitions Listing Rights and Their Definitions
 - rights profiles Listing Rights Profiles Listing Rights Profiles
 - roles Listing Roles Listing Roles
 - roles you can assume Rights Administration Commands Rights Administration Commands
 Assuming an ARMOR Role Assuming an ARMOR Role
 
 - your rights Listing Rights and Their Definitions Listing Rights and Their Definitions
 
- lock_after_retries attribute How to Set Account Locking for All Logins How to Set Account Locking for All Logins
- lock_after_retries keyword How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users- description user_attr Database user_attr Database
 
- LOCK_AFTER_RETRIES security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- locking- accounts Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 Restricting Users' Rights Restricting Users' Rights
 
 - user account automatically How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 - user accounts automatically How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 
- logging in- remote root login Changing Whether root Is a User or a Role Changing Whether root Is a User or a Role
 - users' basic privilege set How Privileges Are Implemented How Privileges Are Implemented
 
- logins- effect on clearances About Access to Labeled Files About Access to Labeled Files
 
M
- man pages- commands that require authorizations Selected Commands That Require Authorizations Selected Commands That Require Authorizations
 - rights Commands That Manage Authorizations, Rights Profiles, and Roles Commands That Manage Authorizations, Rights Profiles, and Roles
 
- managing  See administering administering
- MAXDAYS security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MAXREPEATS security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MAXWEEKS security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- Media Backup rights profile- assigning to trusted users Distribution of Rights Distribution of Rights
 
- Media Restore rights profile- preventing privilege escalation Privilege Escalation and User Rights Privilege Escalation and User Rights
 
- MINALPHA security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MINDAYS security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MINDIFF security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MINDIGIT security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MINLOWER security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MINNONALPHA security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MINSPECIAL security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- MINUPPER security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- minus sign (-)- keyword modifier Modifying a Role's Rights Modifying a Role's Rights
 
- MINWEEKS security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- modifying  See changing changing
- monitoring- use of privileged commands Auditing Administrative Actions Auditing Administrative Actions
 
- multilevel file systems  See labeled file systems labeled file systems
- MySQL database- installing IPS package How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - protecting with extended privileges How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 
N
- NAMECHECK security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- naming- persistent sandboxes Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
 - sandboxes Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 
- naming conventions- authorizations Authorization Naming Conventions Authorization Naming Conventions
 
- naming services- rights databases and Rights Databases and the Naming Services Rights Databases and the Naming Services
 - scope of assigned rights Name Service Scope and Rights Verification Name Service Scope and Rights Verification
 
- NET privileges Privilege Descriptions Privilege Descriptions
- netgroup qualified attribute- description user_attr Database user_attr Database
 
- network- privileges relating to Privilege Descriptions Privilege Descriptions
 
- Network IPsec Management rights profile- adding solaris.admin.edit authorization Cloning and Enhancing the Network IPsec Management Rights Profile Cloning and Enhancing the Network IPsec Management Rights Profile
 
- non-global zones  See zones zones
- non-UNIX accounts- troubleshooting password assignments Using the openldap System Account to Run a
        cron Job Using the openldap System Account to Run a
        cron Job
 
- nscd (name service cache daemon)- use Rights Administration Commands Rights Administration Commands
 
O
- Object Access Management rights profile How Processes Get Privileges How Processes Get Privileges
- obtaining- privileged commands Creating a Role Creating a Role
 - privileges Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 Assigning Privileges Directly to a Role Assigning Privileges Directly to a Role
 Assigning Privileges to Users and Processes Assigning Privileges to Users and Processes
 How Processes Get Privileges How Processes Get Privileges
 
 - privileges on a process Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 
- one-time passwords- requiring use of Restricting Users' Rights Restricting Users' Rights
 
- Operator rights profile- assigning to role Distribution of Rights Distribution of Rights
 - description Rights Profiles Reference Rights Profiles Reference
 
- order of search- authenticated rights profiles Order of Search for Assigned Rights Order of Search for Assigned Rights
 - rights Order of Search for Assigned Rights Order of Search for Assigned Rights
 - rights profiles example Adding a Rights Profile as the Role's First Rights Profile Adding a Rights Profile as the Role's First Rights Profile
 - user security attributes Order of Search for Assigned Rights Order of Search for Assigned Rights
 
- OTP  See one-time password (OTP) one-time password (OTP)
P
- packages- ARMOR Using ARMOR Roles Using ARMOR Roles
 - MySQL How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 
- PAM- adding su stack to configuration file Caching Authentication for Ease of Role Use Caching Authentication for Ease of Role Use
 - modules Caching Authentication for Ease of Role Use Caching Authentication for Ease of Role Use
 - stack to cache authentication Caching Authentication for Ease of Role Use Caching Authentication for Ease of Role Use
 - time-sensitive user access user_attr Database user_attr Database
 Basics of User and Process Rights Basics of User and Process Rights
 
 
- pam_policy keyword- description user_attr Database user_attr Database
 
- PAM_POLICY security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- pam_roles module Rights Administration Commands Rights Administration Commands
- pam_tty_tickets module Caching Authentication for Ease of Role Use Caching Authentication for Ease of Role Use
- pam_unix_account module Rights Administration Commands Rights Administration Commands
- PASSLENGTH security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- PASSREQ security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- passwd command- changing password of role Changing a Role Password Changing a Role Password
 Creating a Role Creating a Role
 
 - NP accounts Using the openldap System Account to Run a
        cron Job Using the openldap System Account to Run a
        cron Job
 
- passwords- changing role password Changing a Role Password Changing a Role Password
 Creating a Role Creating a Role
 
 - locking out users How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
 - overriding constraints Overriding the Password Requirements for an Account Overriding the Password Requirements for an Account
 - unlocking user How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
 - using user's to assume role How to Reorder Assigned Rights How to Reorder Assigned Rights
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 
 
- PATH security attribute Logging and su Security Attributes in Files and SMF Logging and su Security Attributes in Files and SMF
 User Environment Security Attributes in Files and SMF User Environment Security Attributes in Files and SMF
 
- Perl scripts- for extended accounting Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 
- permissions- changing user file permissions How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
 
- permissive security policy- components of Basics of User and Process Rights Basics of User and Process Rights
 - creating Expanding Users' Rights Expanding Users' Rights
 
- permitted privilege set How Privileges Are Implemented How Privileges Are Implemented
- persistent sandboxes Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
- pfbash command Rights Administration Commands Rights Administration Commands
- pfedit command Rights Administration Commands Rights Administration Commands
 Editing a System File Editing a System File
 
- pfexec command Rights Administration Commands Rights Administration Commands
 Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 
- planning- ARMOR role use Following Your Chosen Rights Model Following Your Chosen Rights Model
 - clearing users to access labeled data About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - data loss protection About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - labeling sensitive data About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - rights model use Following Your Chosen Rights Model Following Your Chosen Rights Model
 - use of rights Following Your Chosen Rights Model Following Your Chosen Rights Model
 
- plus sign (+)- keyword modifier Modifying a Role's Rights Modifying a Role's Rights
 
- policy  See label policy label policy
- policy.conf file- description policy.conf File policy.conf File
 - keywords- for authenticated rights profiles policy.conf File policy.conf File
 - for authorizations policy.conf File policy.conf File
 - for privileges policy.conf File policy.conf File
 - for rights profiles policy.conf File policy.conf File
 - for workstation owner policy.conf File policy.conf File
 
 
- ports- protecting with extended privileges How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 
- power management- configuring How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 
- powers  See rights rights
- ppriv command Commands for Handling Privileges Commands for Handling Privileges
 Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 Listing Privileges Listing Privileges
 - –eD option Commands for Handling Privileges Commands for Handling Privileges
 How to Determine Which Privileges a Program Requires How to Determine Which Privileges a Program Requires
 How to Run a Shell Script With Privileged Commands How to Run a Shell Script With Privileged Commands
 
 - –r option Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - –s option Protecting Directories on Your System From Application Processes Protecting Directories on Your System From Application Processes
 
- predefined roles- ARMOR standard Using ARMOR Roles Using ARMOR Roles
 User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 
 - planning use of Following Your Chosen Rights Model Following Your Chosen Rights Model
 
- preparing- persistent sandboxes, for Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
 
- principle of least privilege Privileges Protecting Kernel Processes Privileges Protecting Kernel Processes
- Printer Management rights profile Rights Profiles Reference Rights Profiles Reference
- PRIV_DEFAULT keyword- policy.conf file policy.conf File policy.conf File
 
- PRIV_DEFAULT security attribute User Account Security Attributes in Files and SMF User Account Security Attributes in Files and SMF
- PRIV_LIMIT keyword- policy.conf file policy.conf File policy.conf File
 
- PRIV_LIMIT security attribute User Account Security Attributes in Files and SMF User Account Security Attributes in Files and SMF
- PRIV_PFEXEC flag Determining Whether You Are Using a Profile Shell Determining Whether You Are Using a Profile Shell
- PRIV_PROC_LOCK_MEMORY privilege Privileges and Resource Management Privileges and Resource Management
- PRIV_XPOLICY flag How to Lock Down the MySQL Service How to Lock Down the MySQL Service
- privilege checking Applications That Check for Privileges Applications That Check for Privileges
- privilege sets- adding privileges to Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 Assigning Privileges Directly to a Role Assigning Privileges Directly to a Role
 Expanding a User or Role's Privileges Expanding a User or Role's Privileges
 
 - basic How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 Listing the Basic Privileges and Their Definitions Listing the Basic Privileges and Their Definitions
 How Privileges Are Implemented How Privileges Are Implemented
 
 - effective How Privileges Are Implemented How Privileges Are Implemented
 - inheritable How Privileges Are Implemented How Privileges Are Implemented
 - limit How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 How Privileges Are Implemented How Privileges Are Implemented
 
 - listing Listing Privileges That Are Used in Privilege Assignment Listing Privileges That Are Used in Privilege Assignment
 How Privileges Are Implemented How Privileges Are Implemented
 
 - permitted How Privileges Are Implemented How Privileges Are Implemented
 - removing privileges from Removing Basic Privileges From a Rights Profile Removing Basic Privileges From a Rights Profile
 Creating a Remote Users Rights Profile Creating a Remote Users Rights Profile
 Removing a Basic Privilege From Yourself Removing a Basic Privilege From Yourself
 Using Extended Privilege Policy to Restrict Privilege Use Using Extended Privilege Policy to Restrict Privilege Use
 Restricting Privileges for a User or Role Restricting Privileges for a User or Role
 
 
- privileged application- authorization checking Applications That Check Authorizations Applications That Check Authorizations
 - checking for security attributes Applications That Check for Rights Applications That Check for Rights
 - description Basics of User and Process Rights Basics of User and Process Rights
 - ID checking Applications That Check UIDs and GIDs Applications That Check UIDs and GIDs
 - privilege checking Applications That Check for Privileges Applications That Check for Privileges
 
- privileged users  See trusted users trusted users
- privileges- adding to command in rights profile Creating a Rights Profile That Includes Privileged Commands Creating a Rights Profile That Includes Privileged Commands
 - assigning- to a command Assigning Privileges to Users and Processes Assigning Privileges to Users and Processes
 - to a script Assigning Privileges to a Script Assigning Privileges to a Script
 - to a user Assigning Privileges to Users and Processes Assigning Privileges to Users and Processes
 - to Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 - to MySQL database How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - to role Assigning Privileges Directly to a Role Assigning Privileges Directly to a Role
 - to user Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 
 - auditing and Privileged Actions in the Audit Record Privileged Actions in the Audit Record
 - categories Privilege Descriptions Privilege Descriptions
 - checking in applications Applications That Check for Privileges Applications That Check for Privileges
 - commands Commands for Handling Privileges Commands for Handling Privileges
 - compared to authorizations More About User Authorizations More About User Authorizations
 Basics of User and Process Rights Basics of User and Process Rights
 
 - compared to superuser model Process Rights Management Process Rights Management
 - debugging Debugging Use of Privilege Debugging Use of Privilege
 - description Privilege Descriptions Privilege Descriptions
 Privilege Descriptions Privilege Descriptions
 Basics of User and Process Rights Basics of User and Process Rights
 
 - devices and Privileges and Devices Privileges and Devices
 - differences from superuser model Administrative Differences on a System With Privileges Administrative Differences on a System With Privileges
 - escalation prevention at user level Privilege Escalation and User Rights Privilege Escalation and User Rights
 - escalation prevention in kernel Privilege Escalation and Kernel Privileges Privilege Escalation and Kernel Privileges
 - expanding user or role's Expanding a User or Role's Privileges Expanding a User or Role's Privileges
 - extended privilege policy Using Extended Privilege Policy to Restrict Privilege Use Using Extended Privilege Policy to Restrict Privilege Use
 Expanding a User or Role's Privileges Expanding a User or Role's Privileges
 
 - finding missing Using the ppriv Command to Examine Privilege
          Use in a Profile Shell Using the ppriv Command to Examine Privilege
          Use in a Profile Shell
 - implemented in sets How Privileges Are Implemented How Privileges Are Implemented
 - inherited by processes How Processes Get Privileges How Processes Get Privileges
 - legacy applications and Assigning Security Attributes to a Legacy Application Assigning Security Attributes to a Legacy Application
 Legacy Applications and the Use of Privileges Legacy Applications and the Use of Privileges
 
 - limiting all users Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
 - limiting users How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 - listing on a process Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 - PRIV_PROC_LOCK_MEMORY Privileges and Resource Management Privileges and Resource Management
 - processes with assigned privileges How Processes Get Privileges How Processes Get Privileges
 - programs aware of privileges How Processes Get Privileges How Processes Get Privileges
 - protecting kernel processes Privileges Protecting Kernel Processes Privileges Protecting Kernel Processes
 - removing- basic privilege Removing Basic Privileges From a Rights Profile Removing Basic Privileges From a Rights Profile
 - basic privilege from your process Removing a Basic Privilege From Yourself Removing a Basic Privilege From Yourself
 - from a rights profile Removing Basic Privileges From a Rights Profile Removing Basic Privileges From a Rights Profile
 - from a user Restricting Privileges for a User or Role Restricting Privileges for a User or Role
 - from a user's limit set Removing Privileges From a User's Limit Set Removing Privileges From a User's Limit Set
 - from yourself Removing a Basic Privilege From Yourself Removing a Basic Privilege From Yourself
 
 - removing basic How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 - removing several basic from public system Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
 - SMF account-policy stencil SMF Stencil That Contains Privilege Information SMF Stencil That Contains Privilege Information
 - translating a label About Access to Labeled Files About Access to Labeled Files
 - troubleshooting- lack of How to Determine Which Privileges a Program Requires How to Determine Which Privileges a Program Requires
 - user assignment How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 
 - using in shell script How to Run a Shell Script With Privileged Commands How to Run a Shell Script With Privileged Commands
 
- privileges keyword- listing Listing Privileges Listing Privileges
 
- PROC privileges- description Privilege Descriptions Privilege Descriptions
 - proc_owner Privileges and Devices Privileges and Devices
 
- process privileges Privilege Descriptions Privilege Descriptions
- process rights management  See privileges, rights privileges, rights
- processes- labeling About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 
- prof_attr database prof_attr Database prof_attr Database- summary Rights Databases Rights Databases
 
- profile shells- assigning to users Creating a Login for a Trusted User Creating a Login for a Trusted User
 - description Profile Shells and Rights Verification Profile Shells and Rights Verification
 - determining if PRIV_PFEXEC flag is             set Determining Whether You Are Using a Profile Shell Determining Whether You Are Using a Profile Shell
 - login shells for trusted users Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 - opening Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 - reading exacct network files Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 - restricting rights Restricting an Administrator to Explicitly Assigned Rights Restricting an Administrator to Explicitly Assigned Rights
 
- profiles  See rights profiles rights profiles
- profiles command- creating rights profiles How to Create a Rights Profile How to Create a Rights Profile
 - description Rights Administration Commands Rights Administration Commands
 - –l option Viewing the Contents of Rights Profiles Viewing the Contents of Rights Profiles
 - listing user's authenticated rights profiles Listing Rights Profiles Listing Rights Profiles
 - listing user's rights profiles Listing Rights and Their Definitions Listing Rights and Their Definitions
 - use Listing Rights Profiles Listing Rights Profiles
 
- profiles keyword- description user_attr Database user_attr Database
 - listing Listing Rights Profiles Listing Rights Profiles
 
- PROFS_GRANTED keyword- policy.conf file policy.conf File policy.conf File
 
- PROFS_GRANTED security attribute User Account Security Attributes in Files and SMF User Account Security Attributes in Files and SMF
- programs  See applications applications
- project.max-locked-memory resource control Privileges and Resource Management Privileges and Resource Management
- projects- isolating with sandboxes Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 
- protecting FTP service- by labeling Example - Protecting the FTP Service With a Label Example - Protecting the FTP Service With a Label
 
- protecting sensitive data- with labels About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 
Q
- qualified user attributes- description About Qualified User Attributes About Qualified User Attributes
 - overview Basics of User and Process Rights Basics of User and Process Rights
 
- qualifier attribute- listing Listing Qualified Attributes Listing Qualified Attributes
 - user_attr database user_attr Database user_attr Database
 
R
- removing- basic privilege from application Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 
 - basic privilege from rights profile Removing Basic Privileges From a Rights Profile Removing Basic Privileges From a Rights Profile
 - basic privilege from yourself Removing a Basic Privilege From Yourself Removing a Basic Privilege From Yourself
 - basic privileges from a rights profile Removing Basic Privileges From a Rights Profile Removing Basic Privileges From a Rights Profile
 - limit privilege from user Removing Privileges From a User's Limit Set Removing Privileges From a User's Limit Set
 - power management capability from users How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 - privileges from a system Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
 - privileges from a user How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 - rights from all logins Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - role assignments How to Change the root Role Into a User How to Change the root Role Into a User
 - users' rights Restricting Users' Rights Restricting Users' Rights
 
- replacing- keyword values Requiring a User to Type Password Before Administering DHCP Requiring a User to Type Password Before Administering DHCP
 Modifying a Role's Rights Modifying a Role's Rights
 
 - root role with root user How to Change the root Role Into a User How to Change the root Role Into a User
 - root user with root role Changing the root User Into the root Role Changing the root User Into the root Role
 - superuser with roles Following Your Chosen Rights Model Following Your Chosen Rights Model
 
- resource controls- privileges, and Privileges and Resource Management Privileges and Resource Management
 - project.max-locked-memory Privileges and Resource Management Privileges and Resource Management
 - zone.max-locked-memory Privileges and Resource Management Privileges and Resource Management
 
- resources- isolating with sandboxes Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 
- restricted files- enabling read access to Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 - enabling write access to Cloning and Enhancing the Network IPsec Management Rights Profile Cloning and Enhancing the Network IPsec Management Rights Profile
 Editing a System File Editing a System File
 
 
- restricting- access to computer by time and day Basics of User and Process Rights Basics of User and Process Rights
 - database privileges How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - editor of guest user Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 - guest access to system Assigning the Editor Restrictions Rights Profile to All Users Assigning the Editor Restrictions Rights Profile to All Users
 - login attempts Restricting Users' Rights Restricting Users' Rights
 - port privileges How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 - rights in a rights profile Removing Basic Privileges From a Rights Profile Removing Basic Privileges From a Rights Profile
 Creating a Remote Users Rights Profile Creating a Remote Users Rights Profile
 
 - user control of hardware How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 - user file permissions How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
 - web server privileges How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 
- restrictive security policy- components of Basics of User and Process Rights Basics of User and Process Rights
 - creating Restricting Users' Rights Restricting Users' Rights
 - creating system-wide Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - enforcing Locking Down Resources by Using Extended Privileges Locking Down Resources by Using Extended Privileges
 
- RETRIES keyword How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
- RETRIES security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- rights  See Also authorizations, privileges, rights profiles, roles authorizations, privileges, rights profiles, roles- access_times keyword Basics of User and Process Rights Basics of User and Process Rights
 - access_tz keyword Basics of User and Process Rights Basics of User and Process Rights
 - account locking Restricting Users' Rights Restricting Users' Rights
 - adding privileged users Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 - administration commands Commands That Manage Authorizations, Rights Profiles, and Roles Commands That Manage Authorizations, Rights Profiles, and Roles
 - assigning Expanding Users' Rights Expanding Users' Rights- authenticated rights profiles Requiring a User to Type Password Before Administering DHCP Requiring a User to Type Password Before Administering DHCP
 - system-wide Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - to restrict users Restricting Users' Rights Restricting Users' Rights
 - to users Assigning Rights to Users Assigning Rights to Users
 
 - auditing use of Auditing Administrative Actions Auditing Administrative Actions
 - authorization database auth_attr Database auth_attr Database
 - authorizations More About User Authorizations More About User Authorizations
 - basic concepts Basics of User and Process Rights Basics of User and Process Rights
 - changing role passwords Changing a Role Password Changing a Role Password
 Creating a Role Creating a Role
 
 - checking for Applications That Check UIDs and GIDs Applications That Check UIDs and GIDs
 Rights Verification Rights Verification
 
 - checking scripts or programs for authorizations Checking for Authorizations in a Script or Program Checking for Authorizations in a Script or Program
 - commands for Commands for Administering Rights Commands for Administering Rights
 - commands for managing Commands That Manage Authorizations, Rights Profiles, and Roles Commands That Manage Authorizations, Rights Profiles, and Roles
 - compared to superuser model User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 - configuring Restricting Users' Rights Restricting Users' Rights
 Expanding Users' Rights Expanding Users' Rights
 
 - considerations when directly assigning Considerations When Assigning Rights Considerations When Assigning Rights
 - creating authorizations How to Create an Authorization How to Create an Authorization
 - creating rights profiles Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - databases Rights Databases Rights Databases
 - defaults Listing Rights and Their Definitions Listing Rights and Their Definitions
 - elements Basics of User and Process Rights Basics of User and Process Rights
 - expanding users Expanding Users' Rights Expanding Users' Rights
 - gaining administrative Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 - limiting login attempts Restricting Users' Rights Restricting Users' Rights
 - listing all Listing Rights and Their Definitions Listing Rights and Their Definitions
 - listing for one user Listing All Rights Assigned to a User Listing All Rights Assigned to a User
 - modifying roles Creating a Role Creating a Role
 - naming services and Rights Databases and the Naming Services Rights Databases and the Naming Services
 - Network Security rights profile Example of a User Rights and Process Rights Assignment Example of a User Rights and Process Rights Assignment
 - new features in this release What's New in Rights in Oracle Solaris 11.4 What's New in Rights in Oracle Solaris 11.4
 - order of search Order of Search for Assigned Rights Order of Search for Assigned Rights
 - planning use of Following Your Chosen Rights Model Following Your Chosen Rights Model
 - privileges on commands Applications That Check for Privileges Applications That Check for Privileges
 - profile shells Profile Shells and Rights Verification Profile Shells and Rights Verification
 - reading exacct network files Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 
 - recommended roles User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 - removing from users Restricting Users' Rights Restricting Users' Rights
 - removing system-wide Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - restricting administrator to explicitly assigned Restricting an Administrator to Explicitly Assigned Rights Restricting an Administrator to Explicitly Assigned Rights
 - restricting rights Restricting an Administrator to Explicitly Assigned Rights Restricting an Administrator to Explicitly Assigned Rights
 - restricting users to specific times of access Basics of User and Process Rights Basics of User and Process Rights
 - restricting users' Restricting Users' Rights Restricting Users' Rights
 - restricting users' system-wide Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - rights profile database prof_attr Database prof_attr Database
 - rights profiles More About Rights Profiles More About Rights Profiles
 - search order Order of Search for Assigned Rights Order of Search for Assigned Rights
 - securing scripts Assigning Rights to Applications and Scripts Assigning Rights to Applications and Scripts
 - security considerations when assigning Security Considerations When Assigning Rights Security Considerations When Assigning Rights
 - special ID on commands Applications That Check UIDs and GIDs Applications That Check UIDs and GIDs
 - troubleshooting How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - usability considerations when assigning Usability Considerations When Assigning Rights Usability Considerations When Assigning Rights
 - using user password to assume role How to Reorder Assigned Rights How to Reorder Assigned Rights
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 
 - viewing all Listing Rights and Their Definitions Listing Rights and Their Definitions
 - viewing your Listing Rights and Their Definitions Listing Rights and Their Definitions
 
- rights management  See privileges, rights privileges, rights
- rights profiles- adding privileges to command Creating a Rights Profile That Includes Privileged Commands Creating a Rights Profile That Includes Privileged Commands
 - adding solaris.admin.edit authorization Cloning and Enhancing the Network IPsec Management Rights Profile Cloning and Enhancing the Network IPsec Management Rights Profile
 - All Rights Profiles Reference Rights Profiles Reference
 - assigning- to users Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 
 - assigning to trusted users Distribution of Rights Distribution of Rights
 - authenticating with user's password Assigning Rights Profiles in a Specific Order Assigning Rights Profiles in a Specific Order
 Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password
 
 - Basic Solaris User Rights Profiles Reference Rights Profiles Reference
 - changing contents of Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - cloning contents of How to Clone and Modify a System Rights Profile How to Clone and Modify a System Rights Profile
 - compared to roles More About Roles More About Roles
 - Console User Rights Profiles Reference Rights Profiles Reference
 How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 Order of Search for Assigned Rights Order of Search for Assigned Rights
 
 - contents of typical Rights Profiles Reference Rights Profiles Reference
 - creating How to Create a Rights Profile How to Create a Rights Profile
 - creating and assigning How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
 - creating for remote users Creating a Remote Users Rights Profile Creating a Remote Users Rights Profile
 - databases  See exec_attr database, prof_attr database exec_attr database, prof_attr database
 - description More About Rights Profiles More About Rights Profiles
 Basics of User and Process Rights Basics of User and Process Rights
 
 - Extended Accounting Net Management Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 - first in list Adding a Rights Profile as the Role's First Rights Profile Adding a Rights Profile as the Role's First Rights Profile
 - for all users of a system Assigning a Rights Profile to a System Assigning a Rights Profile to a System
 - major rights profiles descriptions Rights Profiles Reference Rights Profiles Reference
 - modifying Creating Rights Profiles and Authorizations Creating Rights Profiles and Authorizations
 - Network IPsec Management Cloning and Enhancing the Network IPsec Management Rights Profile Cloning and Enhancing the Network IPsec Management Rights Profile
 - Object Access Management How Processes Get Privileges How Processes Get Privileges
 - Operator Rights Profiles Reference Rights Profiles Reference
 - order of search Order of Search for Assigned Rights Order of Search for Assigned Rights
 - preventing privilege escalation Privilege Escalation and User Rights Privilege Escalation and User Rights
 Distribution of Rights Distribution of Rights
 
 - Printer Management Rights Profiles Reference Rights Profiles Reference
 - removing authorizations Cloning and Removing Selected Rights From a Rights Profile Cloning and Removing Selected Rights From a Rights Profile
 - requiring authentication by any user of a system Assigning the Editor Restrictions Rights Profile to All Logins Assigning the Editor Restrictions Rights Profile to All Logins
 - restricting basic privileges Removing Basic Privileges From a Rights Profile Removing Basic Privileges From a Rights Profile
 - restricting rights of all users of a system Modifying the policy.conf File to Limit the Rights Available to
          System Users Modifying the policy.conf File to Limit the Rights Available to
          System Users
 - Stop Rights Profiles Reference Rights Profiles Reference
 Order of Search for Assigned Rights Order of Search for Assigned Rights
 
 - System Administrator Rights Profiles Reference Rights Profiles Reference
 - third-party applications Creating a Rights Profile for Administrators of a Third-Party Application Creating a Rights Profile for Administrators of a Third-Party Application
 - troubleshooting How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - viewing contents Viewing the Contents of Rights Profiles Viewing the Contents of Rights Profiles
 - VSCAN Management Cloning and Removing Selected Rights From a Rights Profile Cloning and Removing Selected Rights From a Rights Profile
 
- role-based access control (RBAC)  See rights rights
- roleadd command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 - description Rights Administration Commands Rights Administration Commands
 Rights Administration Commands Rights Administration Commands
 
 - example of using Creating and Assigning a Role to Administer Cryptographic Services Creating and Assigning a Role to Administer Cryptographic Services
 - –P option Caching Authentication for Ease of Role Use Caching Authentication for Ease of Role Use
 - –s option Creating a User Administrator Role in the LDAP Repository Creating a User Administrator Role in the LDAP Repository
 - –S option Creating a User Administrator Role in the LDAP Repository Creating a User Administrator Role in the LDAP Repository
 
- roleauth keyword- example of using Changing the Value of roleauth for a Role in the LDAP
        Repository Changing the Value of roleauth for a Role in the LDAP
        Repository
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 Enabling Users to Use Own Password for Role Password Enabling Users to Use Own Password for Role Password
 
 - passwords for roles How to Reorder Assigned Rights How to Reorder Assigned Rights
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 
 - use Caching Authentication for Ease of Role Use Caching Authentication for Ease of Role Use
 
- roledel command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 - example of using Deleting a Role Deleting a Role
 
- rolemod command- assigning rights to a role Replacing a Local Role's Assigned Profiles Replacing a Local Role's Assigned Profiles
 - authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 - changing rights of role Replacing a Local Role's Assigned Profiles Replacing a Local Role's Assigned Profiles
 - description Rights Administration Commands Rights Administration Commands
 - example of using Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 Enabling Users to Use Own Password for Role Password Enabling Users to Use Own Password for Role Password
 
 - –K option How to Change the root Role Into a User How to Change the root Role Into a User
 - passwords for roles How to Reorder Assigned Rights How to Reorder Assigned Rights
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 
 
- roles- ARMOR User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 - assigning- privileges to Assigning Privileges Directly to a Role Assigning Privileges Directly to a Role
 - rights Assigning Rights to Users Assigning Rights to Users
 - with usermod command Creating a Role Creating a Role
 
 - assuming- after login More About Roles More About Roles
 - ARMOR Assuming an ARMOR Role Assuming an ARMOR Role
 - in a terminal window Assuming an ARMOR Role Assuming an ARMOR Role
 Profile Shells and Rights Verification Profile Shells and Rights Verification
 
 - root role Assuming the root Role Assuming the root Role
 - to use assigned rights Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 
 - auditing Auditing Administrative Actions Auditing Administrative Actions
 - authenticating with user's password How to Reorder Assigned Rights How to Reorder Assigned Rights
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 
 - changing password of Changing a Role Password Changing a Role Password
 Creating a Role Creating a Role
 
 - changing properties of Creating a Role Creating a Role
 - compared to rights profiles More About Roles More About Roles
 - configured like sudo Creating a Role That Requires the User's Password Creating a Role That Requires the User's Password
 - creating Assigning Rights to Users Assigning Rights to Users
 - creating ARMOR Using ARMOR Roles Using ARMOR Roles
 - creating for administrative accounts Creating a Role for an Application Administrator Creating a Role for an Application Administrator
 - deleting Deleting a Role Deleting a Role
 - description More About Roles More About Roles
 - determining directly assigned privileges Adding to a Role's Basic Privileges Adding to a Role's Basic Privileges
 - determining role's privileged commands Determining the Privileged Commands of a Role Determining the Privileged Commands of a Role
 - listing local roles Rights Administration Commands Rights Administration Commands
 Assuming an ARMOR Role Assuming an ARMOR Role
 
 - making root role into user Changing Whether root Is a User or a Role Changing Whether root Is a User or a Role
 - modifying Creating a Role Creating a Role
 - planning predefined Following Your Chosen Rights Model Following Your Chosen Rights Model
 - predefined Using ARMOR Roles Using ARMOR Roles
 User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 
 - removing assignment from users How to Change the root Role Into a User How to Change the root Role Into a User
 - separation of duty Using Two Roles to Configure Auditing Using Two Roles to Configure Auditing
 Creating Roles for Separation of Duty Creating Roles for Separation of Duty
 
 - summary Basics of User and Process Rights Basics of User and Process Rights
 - use in user rights assignment User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 - using an assigned role Assuming an ARMOR Role Assuming an ARMOR Role
 - using user password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password
 Example of a User Rights and Process Rights Assignment Example of a User Rights and Process Rights Assignment
 
 - with user passwords Creating a Role That Requires the User's Password Creating a Role That Requires the User's Password
 
- roles command- description Rights Administration Commands Rights Administration Commands
 - using Assuming an ARMOR Role Assuming an ARMOR Role
 
- roles keyword- listing Listing Roles Listing Roles
 
- root role- assuming role Assuming the root Role Assuming the root Role
 - changing from root user Changing the root User Into the root Role Changing the root User Into the root Role
 - changing to root user Changing Whether root Is a User or a Role Changing Whether root Is a User or a Role
 - created at installation Distribution of Rights Distribution of Rights
 - description Distribution of Rights Distribution of Rights
 - overriding password constraints Overriding the Password Requirements for an Account Overriding the Password Requirements for an Account
 - secure remote login Changing Whether root Is a User or a Role Changing Whether root Is a User or a Role
 - troubleshooting Preventing the root Role From Being Used to Maintain a System Preventing the root Role From Being Used to Maintain a System
 
- root user- changing into root role Changing the root User Into the root Role Changing the root User Into the root Role
 - replacing in rights model More About Roles More About Roles
 
S
- applications- protecting administrative accounts Creating a Role for an Application Administrator Creating a Role for an Application Administrator
 
- Sandbox Labels v1.0 encodings file Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
 Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 
- sandboxes- configuring Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 - for operating at a lower clearance About Access to Labeled Files About Access to Labeled Files
 - persistent Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
 - preparing for persistent Preparing for Persistent Sandboxes Preparing for Persistent Sandboxes
 
- scope of assigned rights Name Service Scope and Rights Verification Name Service Scope and Rights Verification
- scripts- checking for authorizations Checking for Authorizations in a Script or Program Checking for Authorizations in a Script or Program
 - for extended accounting Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 - Perl scripts Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 - running with privileges Assigning Privileges to a Script Assigning Privileges to a Script
 - securing Assigning Rights to Applications and Scripts Assigning Rights to Applications and Scripts
 - use of privileges in How to Run a Shell Script With Privileged Commands How to Run a Shell Script With Privileged Commands
 
- security attributes  See Also rights rights- auto_unlock_time How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 - correspondence between files and SMF properties Security Attributes in Files and Their Corresponding SMF Properties Security Attributes in Files and Their Corresponding SMF Properties
 - default_privileges Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
 - description Basics of User and Process Rights Basics of User and Process Rights
 - lock_after_retries How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 - qualified About Qualified User Attributes About Qualified User Attributes
 Basics of User and Process Rights Basics of User and Process Rights
 
 
- security policy- default rights Rights Databases Rights Databases
 - restrictive and permissive Basics of User and Process Rights Basics of User and Process Rights
 
- security properties  See rights rights
- sendmail command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 
- sensitive files  See labeled files labeled files
- separation of duty- security and non-security roles Creating Roles for Separation of Duty Creating Roles for Separation of Duty
 - two roles to handle auditing Using Two Roles to Configure Auditing Using Two Roles to Configure Auditing
 
- setprop command- security-attribute=value Assigning Rights to Users Assigning Rights to Users
 
- shell commands- passing parent shell process number Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 
- shells- determining if privileged Determining Whether You Are Using a Profile Shell Determining Whether You Are Using a Profile Shell
 - listing privileges on process Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 - privileged versions Profile Shells and Rights Verification Profile Shells and Rights Verification
 - troubleshooting if profile How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - usability considerations Usability Considerations When Assigning Rights Usability Considerations When Assigning Rights
 - writing privileged scripts How to Run a Shell Script With Privileged Commands How to Run a Shell Script With Privileged Commands
 
- SLEEPTIME security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- SMF account-policy stencil- attributes- for privileges SMF Stencil That Contains Privilege Information SMF Stencil That Contains Privilege Information
 
 - containing privilege information SMF Stencil That Contains Privilege Information SMF Stencil That Contains Privilege Information
 - containing syslog information SMF Stencil That Contains Privilege Information SMF Stencil That Contains Privilege Information
 - correspondence with legacy files Security Attributes in Files and Their Corresponding SMF Properties Security Attributes in Files and Their Corresponding SMF Properties
 - security attributes account-policy SMF Stencil account-policy SMF Stencil
 
- SMF services- account-policy New Feature – Enabling the account-policy Service New Feature – Enabling the account-policy Service
 - account-policy account-policy SMF Stencil account-policy SMF Stencil
 
- solaris.*.assign authorizations- preventing privilege escalation Privilege Escalation and User Rights Privilege Escalation and User Rights
 
- solaris.admin.edit authorization- adding to rights profile Cloning and Enhancing the Network IPsec Management Rights Profile Cloning and Enhancing the Network IPsec Management Rights Profile
 
- solaris.smf.value authorization- removing from rights profile Cloning and Removing Selected Rights From a Rights Profile Cloning and Removing Selected Rights From a Rights Profile
 
- stencils- account-policy service New Feature – Enabling the account-policy Service New Feature – Enabling the account-policy Service
 - config/etc_default_login Modifying Logging Policy Modifying Logging Policy
 Modifying Login Policy Modifying Login Policy
 Modifying Login Environment Variables Modifying Login Environment Variables
 
 - config/etc_default_passwd Modifying Password Policy Modifying Password Policy
 - config/etc_default_su Modifying Logging Policy Modifying Logging Policy
 - config/etc_security_policyconf Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
 
- Stop rights profile Rights Profiles Reference Rights Profiles Reference
- su command- becoming root How to Change the root Role Into a User How to Change the root Role Into a User
 - changing to a role Creating and Assigning a Role to Administer Cryptographic Services Creating and Assigning a Role to Administer Cryptographic Services
 - in role assumption Assuming an ARMOR Role Assuming an ARMOR Role
 
- subshells- restricting editing rights Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 
- sudo- roles configured like Creating a Role That Requires the User's Password Creating a Role That Requires the User's Password
 
- sudo command- using in Oracle Solaris Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 Deciding Which Rights Model to Use for Administration Deciding Which Rights Model to Use for Administration
 
 
- SULOG security attribute Logging and su Security Attributes in Files and SMF Logging and su Security Attributes in Files and SMF
- SUPATH security attribute Logging and su Security Attributes in Files and SMF Logging and su Security Attributes in Files and SMF
 User Environment Security Attributes in Files and SMF User Environment Security Attributes in Files and SMF
 
- superuser- compared to rights model Process Rights Management Process Rights Management
 User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 
 - differences from rights model Administrative Differences on a System With Privileges Administrative Differences on a System With Privileges
 - eliminating by delegating rights More About Roles More About Roles
 - troubleshooting becoming root as a role Preventing the root Role From Being Used to Maintain a System Preventing the root Role From Being Used to Maintain a System
 
- svc:/application/database/mysql:version_57 How to Lock Down the MySQL Service How to Lock Down the MySQL Service
- svc:/network/http:Apache2 How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
- svc:/system/account-policy:default- replacement for security attributes in files What's New in Rights in Oracle Solaris 11.4 What's New in Rights in Oracle Solaris 11.4
 
- svc:/system/name-service/switch How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 Name Service Scope and Rights Verification Name Service Scope and Rights Verification
 
- svccfg command- –s option How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 Assigning Rights to Users Assigning Rights to Users
 
 
- svcprop command- –p option Modifying Login Policy Modifying Login Policy
 Modifying Login Environment Variables Modifying Login Environment Variables
 
 - –s option How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 
- SYS privileges Privilege Descriptions Privilege Descriptions
- sys_trans_label privilege About Access to Labeled Files About Access to Labeled Files
- SYSLOG security attribute Logging and su Security Attributes in Files and SMF Logging and su Security Attributes in Files and SMF
 Logging and su Security Attributes in Files and SMF Logging and su Security Attributes in Files and SMF
 
- SYSLOG_FAILED_LOGINS security attribute Logging and su Security Attributes in Files and SMF Logging and su Security Attributes in Files and SMF
- system- removing some basic privileges Modifying System-Wide Privileges, Authorizations, and Rights Profiles Modifying System-Wide Privileges, Authorizations, and Rights Profiles
 
- System Administrator rights profile- assigning to role Distribution of Rights Distribution of Rights
 - description Rights Profiles Reference Rights Profiles Reference
 
- system properties- privileges relating to Privilege Descriptions Privilege Descriptions
 
- system security- privileges Process Rights Management Process Rights Management
 - using rights User and Process Rights Provide an Alternative to the Superuser Model User and Process Rights Provide an Alternative to the Superuser Model
 
- System V IPC privileges Privilege Descriptions Privilege Descriptions
T
- third-party applications- creating rights profiles for Creating a Rights Profile for Administrators of a Third-Party Application Creating a Rights Profile for Administrators of a Third-Party Application
 
- TIMEOUT security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- TIMEZONE security attribute User Environment Security Attributes in Files and SMF User Environment Security Attributes in Files and SMF
- troubleshooting- assigning passwords for cron           jobs Using the openldap System Account to Run a
        cron Job Using the openldap System Account to Run a
        cron Job
 - failed use of privilege How to Determine Which Privileges a Program Requires How to Determine Which Privileges a Program Requires
 - lack of privilege How to Determine Which Privileges a Program Requires How to Determine Which Privileges a Program Requires
 - non-UNIX passwords Using the openldap System Account to Run a
        cron Job Using the openldap System Account to Run a
        cron Job
 - privilege requirements How to Determine Which Privileges a Program Requires How to Determine Which Privileges a Program Requires
 - rights How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - rights assignments How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - root as a role Preventing the root Role From Being Used to Maintain a System Preventing the root Role From Being Used to Maintain a System
 - user running privileged commands How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - user running privileged shell Determining Whether You Are Using a Profile Shell Determining Whether You Are Using a Profile Shell
 
- truss -t command- for privilege debugging Using the truss Command to Examine Privilege
          Use Using the truss Command to Examine Privilege
          Use
 
- trusted users- assigning extended privileges to Enabling a Trusted User to Read Extended Accounting Files Enabling a Trusted User to Read Extended Accounting Files
 - assigning roles to Adding a Role to a User Adding a Role to a User
 Using ARMOR Roles Using ARMOR Roles
 
 - creating Expanding Users' Rights Expanding Users' Rights
 Creating a Role Creating a Role
 
 - profile shell as login shell Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 
U
- ULIMIT security attribute User Environment Security Attributes in Files and SMF User Environment Security Attributes in Files and SMF
- UMASK security attribute User Environment Security Attributes in Files and SMF User Environment Security Attributes in Files and SMF
- umask value, making more restrictive How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
- unlock_after keyword- description user_attr Database user_attr Database
 
- UNLOCK_AFTER security attribute Login Security Attributes in Files and SMF Login Security Attributes in Files and SMF
- unlocking all user accounts How to Set Account Locking for All Logins How to Set Account Locking for All Logins
- unlocking user account How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
- user procedures- assuming a role Assuming an ARMOR Role Assuming an ARMOR Role
 - protecting own files from application access Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - using an assigned role Assuming an ARMOR Role Assuming an ARMOR Role
 - using extended privileges Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 
- user_attr database user_attr Database user_attr Database
 Rights Databases Rights Databases
 
- useradd command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 - description Rights Administration Commands Rights Administration Commands
 - example of using Creating a Login for a Trusted User Creating a Login for a Trusted User
 
- useradm command- description Rights Administration Commands Rights Administration Commands
 - listing local user's rights Listing a Local User's Rights Listing a Local User's Rights
 - use Listing All Rights Assigned to a User Listing All Rights Assigned to a User
 
- userattr command- description Rights Administration Commands Rights Administration Commands
 - use How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 Preventing the root Role From Being Used to Maintain a System Preventing the root Role From Being Used to Maintain a System
 Removing Privileges From a User's Limit Set Removing Privileges From a User's Limit Set
 
 
- userdel command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 - description Rights Administration Commands Rights Administration Commands
 
- usermod command- authorizations required for Commands and Associated Authorizations Commands and Associated Authorizations
 - description Rights Administration Commands Rights Administration Commands
 - –R option Changing the root User Into the root Role Changing the root User Into the root Role
 Caching Authentication for Ease of Role Use Caching Authentication for Ease of Role Use
 
 - using to assign role Creating a Role Creating a Role
 
- users- assigning- authenticated rights profiles Requiring a User to Type Password Before Administering DHCP Requiring a User to Type Password Before Administering DHCP
 - privileges to Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 - rights Assigning Rights to Users Assigning Rights to Users
 - rights defaults policy.conf File policy.conf File
 - rights profiles Creating a Trusted User to Administer DHCP Creating a Trusted User to Administer DHCP
 
 - assigning clearances to Enabling Access to Labeled Files Enabling Access to Labeled Files
 - authenticating to rights profile Assigning Rights Profiles in a Specific Order Assigning Rights Profiles in a Specific Order
 Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password
 
 - authenticating to role How to Reorder Assigned Rights How to Reorder Assigned Rights
 Enabling a User to Use Own Password for Role Password Enabling a User to Use Own Password for Role Password
 
 - basic privilege set How Privileges Are Implemented How Privileges Are Implemented
 - creating root user How to Change the root Role Into a User How to Change the root Role Into a User
 - creating with useradd command Creating a Role Creating a Role
 - determining hosts where attributes are valid Listing Qualified Attributes Listing Qualified Attributes
 - determining if running a profile shell Determining Whether You Are Using a Profile Shell Determining Whether You Are Using a Profile Shell
 - determining own privileged commands Listing Privileges Listing Privileges
 - enabling access to labeled files Enabling Access to Labeled Files Enabling Access to Labeled Files
 - expanding rights Expanding Users' Rights Expanding Users' Rights
 - file permissions- restricting How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
 
 - guest restrictions Preventing Guests From Spawning Editor Subprocesses Preventing Guests From Spawning Editor Subprocesses
 - initial inheritable privileges How Privileges Are Implemented How Privileges Are Implemented
 - isolating processes with sandboxes Configuring Sandboxes for Project Isolation Configuring Sandboxes for Project Isolation
 - labeling processes About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - locking account How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
 - managing third-party accounts Creating a Rights Profile for Administrators of a Third-Party Application Creating a Rights Profile for Administrators of a Third-Party Application
 - protecting their files from access by applications Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - protecting their files from web application access Users Locking Down the Applications That They Run Users Locking Down the Applications That They Run
 - removing basic privileges How to Remove Unneeded Basic Privileges From Users How to Remove Unneeded Basic Privileges From Users
 - removing rights Restricting Users' Rights Restricting Users' Rights
 - removing rights system-wide Modifying Rights System-Wide As SMF Properties Modifying Rights System-Wide As SMF Properties
 - requiring use of one-time password Restricting Users' Rights Restricting Users' Rights
 - restricting access to labeled data About Process Labels and Clearances in Oracle Solaris About Process Labels and Clearances in Oracle Solaris
 - restricting control of hardware How to Remove Power Management Capability From Users How to Remove Power Management Capability From Users
 - restricting file permissions How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
 - timed unlocking accounts of How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 - timed unlocking system-wide How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 - troubleshooting running privileged commands How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 - umask value How to Set a More Restrictive umask Value for All Logins How to Set a More Restrictive umask Value for All Logins
 How to Set a More Restrictive umask Value for Regular
          Users How to Set a More Restrictive umask Value for Regular
          Users
 
 - unlocking accounts of How to Set Account Locking for All Logins How to Set Account Locking for All Logins
 How to Set Account Locking for Regular Users How to Set Account Locking for Regular Users
 
 - using rights profile Assigning Rights Profiles in a Specific Order Assigning Rights Profiles in a Specific Order
 Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password
 
 
- using-  truss command Using the truss Command to Examine Privilege
          Use Using the truss Command to Examine Privilege
          Use
 - auths command How to Create an Authorization How to Create an Authorization
 - getent command Listing Privileges Listing Privileges
 Listing the Contents of the Rights Profiles Database Listing the Contents of the Rights Profiles Database
 Listing the Content of the Authorizations Database Listing the Content of the Authorizations Database
 Changing the root User Into the root Role Changing the root User Into the root Role
 
 - ipadm set-prop command How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - ppriv command Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 
 - profiles command Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password Modifying a Rights Profile to Enable a User to Use Own Password for Role
        Password
 Creating and Assigning a Role to Administer Cryptographic Services Creating and Assigning a Role to Administer Cryptographic Services
 
 - rights defaults Listing Rights and Their Definitions Listing Rights and Their Definitions
 - rolemod command Assigning Privileges Directly to a Role Assigning Privileges Directly to a Role
 - roles command Listing Your Assigned Roles Listing Your Assigned Roles
 - sudo command Deciding Which Rights Model to Use for Administration Deciding Which Rights Model to Use for Administration
 - svccfg command How to Troubleshoot Rights Assignments How to Troubleshoot Rights Assignments
 How to Apply Extended Privilege Policy to a Port How to Apply Extended Privilege Policy to a Port
 
 - svcprop command How to Lock Down the MySQL Service How to Lock Down the MySQL Service
 - useradm command Listing a Local User's Rights Listing a Local User's Rights
 - usermod command Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 - your assigned administrative rights Using Your Assigned Administrative Rights Using Your Assigned Administrative Rights
 
V
- verifying- access to labeled file systems How to Verify User Access to Labeled Files How to Verify User Access to Labeled Files
 
- viewing  See displaying displaying- contents of rights profiles Viewing the Contents of Rights Profiles Viewing the Contents of Rights Profiles
 - directly assigned privileges Assigning Privileges Directly to a User Assigning Privileges Directly to a User
 - privileges in a shell Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 Adding to a Role's Basic Privileges Adding to a Role's Basic Privileges
 
 - privileges on a process Listing the Privileges in Your Current Shell Listing the Privileges in Your Current Shell
 - rights of initial user Listing Rights and Their Definitions Listing Rights and Their Definitions
 - your rights Listing Rights and Their Definitions Listing Rights and Their Definitions
 
- VSCAN Management rights profile- cloning to modify Cloning and Removing Selected Rights From a Rights Profile Cloning and Removing Selected Rights From a Rights Profile
 
W
- WARNDAYS security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- WARNWEEKS security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- web browsers- assigning limited privileges Running a Browser in a Protected Environment Running a Browser in a Protected Environment
 
- web servers- Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 - checking protections How to Determine Which Privileges the Apache HTTP Server Is Using How to Determine Which Privileges the Apache HTTP Server Is Using
 - protecting with extended privileges How to Assign Specific Privileges to the Apache HTTP Server How to Assign Specific Privileges to the Apache HTTP Server
 
- WHITESPACE security attribute Password Security Attributes in Files and SMF Password Security Attributes in Files and SMF
- wildcard characters- in authorizations Authorization Naming Conventions Authorization Naming Conventions
 
Z
- zone.max-locked-memory resource control Privileges and Resource Management Privileges and Resource Management