M
- -M option, auditreduce command,
How to Merge Audit Files From the Audit Trail
- -m option
- cryptoadm command
How to Prevent the Use of a User-Level Mechanism
How to Prevent the Use of a Kernel Software Provider
- Kerberized commands,
Overview of Kerberized Commands
- mac command
- description,
User-Level Commands in the Cryptographic Framework
- syntax,
How to Compute a MAC of a File
- machine security, See system security
- MACS keyword, Secure Shell,
Keywords in Secure Shell
- mail, using with Secure Shell,
How to Use Port Forwarding in Secure Shell
- man pages
- audit service,
Audit Service Man Pages
- commands that require authorizations,
Selected Commands That Require Authorizations
- device allocation,
Device Allocation Commands
- policy,
Security Policy
- RBAC,
Commands That Manage RBAC
- Secure Shell,
Secure Shell Commands
- managing
- See also administering
- audit files
How to Merge Audit Files From the Audit Trail
How to Prevent Audit Trail Overflow
- audit records task map,
Managing Audit Records on Local Systems (Task Map)
- audit trail overflow,
How to Prevent Audit Trail Overflow
- auditing in zones
Auditing on a System With Oracle Solaris Zones
Auditing and Oracle Solaris Zones
- device allocation task map,
Managing Device Allocation (Task Map)
- devices,
Managing Device Allocation (Task Map)
- file permissions,
Protecting Files (Tasks)
- keystores with KMF,
KMF Keystore Management
- passwords with Kerberos,
Kerberos Password Management
- privileges task map,
Using Privileges (Tasks)
- RBAC task map,
Managing RBAC (Task Map)
- manifests
- See also bart create
- control,
BART (Overview)
- customizing,
How to Customize a Manifest
- file format,
BART Manifest File Format
- test in BART,
BART Report
- manually configuring
- Kerberos
- master KDC server,
How to Manually Configure a Master KDC
- master KDC server using LDAP,
How to Configure a KDC to Use an LDAP Data Server
- slave KDC server,
How to Manually Configure a Slave KDC
- mapping
- host names onto realms (Kerberos),
Mapping Host Names Onto Realms
- UIDs to Kerberos principals,
Using the gsscred Table
- mapping GSS credentials,
Mapping GSS Credentials to UNIX Credentials
- mappings, events to classes (auditing),
Audit Classes and Preselection
- mask (auditing), description of process preselection,
Process Audit Characteristics
- master KDC
- automatically configuring,
How to Automatically Configure a Master KDC
- configuring with LDAP,
How to Configure a KDC to Use an LDAP Data Server
- definition,
Kerberos-Specific Terminology
- interactively configuring,
How to Interactively Configure a Master KDC
- manually configuring,
How to Manually Configure a Master KDC
- slave KDCs and
Kerberos Servers
Configuring KDC Servers
- swapping with slave KDC,
Swapping a Master KDC and a Slave KDC
- Match blocks
- chroot directory and,
How to Create an Isolated Directory for sftp Files
- exceptions to Secure Shell defaults,
How to Create User and Host Exceptions to Secure Shell Defaults
- Match keyword, sshd_config file,
Keywords in Secure Shell
- max_life value, description,
Ticket Lifetimes
- max_renewable_life value, description,
Ticket Lifetimes
- MaxStartups keyword, sshd_config file,
Keywords in Secure Shell
- MD4 encryption algorithm, kernel provider,
How to List Available Providers
- MD5 encryption algorithm
- allowing in heterogeneous environment,
How to Specify an Algorithm for Password Encryption
- MD5 encryption algorithm, kernel provider,
How to List Available Providers
- MD5 encryption algorithm
- policy.conf file
How to Specify an Algorithm for Password Encryption
How to Specify an Algorithm for Password Encryption
- mech_dh mechanism, GSS-API credentials,
Acquiring GSS Credentials in Secure Shell
- mech_krb mechanism, GSS-API credentials,
Acquiring GSS Credentials in Secure Shell
- mech_list option, SASL and,
SASL Options
- mechanism, definition in Cryptographic Framework,
Terminology in the Cryptographic Framework
- mechanisms
- disabling all on hardware provider,
How to Disable Hardware Provider Mechanisms and Features
- enabling some on hardware provider,
How to Disable Hardware Provider Mechanisms and Features
- media, device-clean scripts,
Device-Clean Scripts
- Media Backup rights profile
- assigning to trusted users
RBAC: An Alternative to the Superuser Model
How to Plan Your RBAC Implementation
- Media Restore rights profile, assigning to trusted users,
How to Plan Your RBAC Implementation
- merging, binary audit records,
How to Merge Audit Files From the Audit Trail
- message authentication code (MAC), computing for file,
How to Compute a MAC of a File
- messages file, executable stack messages,
Protecting Executable Files From Compromising Security
- metaslot
- administering,
Administrative Commands in the Cryptographic Framework
- definition in Cryptographic Framework,
Terminology in the Cryptographic Framework
- microphone
- allocating,
How to Allocate a Device
- deallocating,
How to Deallocate a Device
- minus sign (-)
- audit class prefix,
Audit Class Syntax
- entry in sulog file,
How to Monitor Who Is Using the su Command
- file permissions symbol,
File Permission Modes
- symbol of file type,
File and Directory Ownership
- mode, definition in Cryptographic Framework,
Terminology in the Cryptographic Framework
- modifying
- policies (Kerberos),
How to Modify a Kerberos Policy
- principal's password (Kerberos),
How to Modify a Kerberos Principal
- principals (Kerberos),
How to Modify a Kerberos Principal
- roles (RBAC),
How to Change the Security Attributes of a Role
- user security attributes,
How to Configure a User's Audit Characteristics
- users (RBAC),
How to Change the Security Attributes of a User
- modules, password encryption,
Password Encryption
- monitoring
- audit trail in real time,
Auditing Efficiently
- root access,
Monitoring and Restricting root Access (Tasks)
- root access attempts,
How to Restrict and Monitor root Logins
- su command attempts
Limiting and Monitoring Superuser Access
How to Monitor Who Is Using the su Command
- system usage
Monitoring Use of Machine Resources
Monitoring File Integrity
- use of privileged commands,
How to Audit Roles
- mount command, with security attributes,
How to Authorize Users to Allocate a Device
- mounting
- allocated CD-ROM,
How to Mount an Allocated Device
- allocated devices,
How to Mount an Allocated Device
- files with DH authentication,
How to Share NFS Files With Diffie-Hellman Authentication
- mt command,
Device-Clean Scripts