oracle home
Securing Systems and Attached Devices in Oracle® Solaris 11.2
Exit Print View
Search Term
Search Scope:
This Document
Entire Library
Documentation Home
»
Oracle Solaris 11.2 Information Library
»
Securing Systems and Attached Devices in ...
»
Index D
Updated: September 2014
Securing Systems and Attached Devices in Oracle
®
Solaris 11.2
Document Information
Using This Documentation
Product Documentation Library
Access to Oracle Support
Feedback
Chapter 1 Managing Machine Security
What's New in Securing Systems and Devices in Oracle Solaris 11.2
Controlling Access to a Computer System
Maintaining Physical Security
Maintaining Login Control
Managing Password Information
Local Passwords
NIS Passwords
LDAP Passwords
Password Encryption
Password Algorithm Identifiers
Algorithms Configuration in the policy.conf File
Special System Accounts
Remote Logins
Controlling Access to Devices
Device Policy
Device Allocation
Controlling Access to Machine Resources
Address Space Layout Randomization
Limiting and Monitoring Superuser Access
Configuring Role-Based Access Control to Replace Superuser
Preventing Unintentional Misuse of System Resources
Setting the PATH Variable
Assigning a Restricted Shell to Users
Restricting Access to Data in Files
Restricting setuid Executable Files
Using the Secure by Default Configuration
Using Resource Management Features
Using Oracle Solaris Zones
Monitoring Use of Machine Resources
Monitoring File Integrity
Controlling Access to Files
Encrypting Files on Disk
Using Access Control Lists
Sharing Files Across Machines
Restricting root Access to Shared Files
Controlling Network Access
Network Security Mechanisms
Authentication and Authorization for Remote Access
Firewall Systems
Encryption and Firewall Systems
Reporting Security Problems
Chapter 2 Protecting Oracle Solaris Systems Integrity
Using Verified Boot
Verified Boot and ELF Signatures
Verification Sequence During System Boot
Policies for Verified Boot
Enabling Verified Boot
SPARC: How to Enable Verified Boot on SPARC Systems With Oracle ILOM Verified-Boot Support
How to Enable Verified Boot on Legacy SPARC Systems and x86 Systems
How to Manage Certificates on Systems With Oracle ILOM Verified-Boot Support
How to Manually Verify the elfsign Signature
About Trusted Platform Module
Initializing TPM on Oracle Solaris Systems
How to Check Whether the TPM Device Is Recognized by the Operating System
SPARC: How to Initialize TPM Using the Oracle ILOM Interface
x86: How to Initialize TPM Using BIOS
How to Enable PKCS #11 Consumers to Use TPM as a Secure Keystore
Troubleshooting TPM
Chapter 3 Controlling Access to Systems
Securing Logins and Passwords
How to Display the User's Login Status
How to Display Users Without Passwords
How to Temporarily Disable User Logins
Changing the Default Algorithm for Password Encryption
How to Specify an Algorithm for Password Encryption
How to Specify a New Password Algorithm for an NIS Domain
How to Specify a New Password Algorithm for an LDAP Domain
Monitoring and Restricting root Access
How to Monitor Who Is Using the su Command
How to Restrict and Monitor root Logins
Controlling Access to System Hardware
How to Require a Password for SPARC Hardware Access
How to Disable a System's Abort Sequence
Chapter 4 Controlling Access to Devices
Configuring Device Policy
How to View Device Policy
How to Audit Changes in Device Policy
How to Retrieve IP MIB-II Information From a /dev/* Device
Managing Device Allocation
How to Enable Device Allocation
How to Authorize Users to Allocate a Device
How to View Allocation Information About a Device
How to Forcibly Allocate a Device
How to Forcibly Deallocate a Device
How to Change Which Devices Can Be Allocated
How to Audit Device Allocation
Allocating Devices
How to Allocate a Device
How to Mount an Allocated Device
How to Deallocate a Device
Device Protection Reference
Device Policy Commands
Device Allocation
Components of Device Allocation
Device Allocation Service
Device Allocation Rights Profiles
Device Allocation Commands
Authorizations for the Allocation Commands
Allocate Error State
device_maps File
device_allocate File
Device-Clean Scripts
Device-Clean Script for Tapes
Device-Clean Scripts for Diskettes and CD-ROM Drives
Device-Clean Script for Audio
Writing New Device-Clean Scripts
Chapter 5 Virus Scanning Service
About Virus Scanning
About the vscan Service
Using the vscan Service
How to Enable Virus Scanning on a File System
How to Enable the vscan Service
How to Add a Scan Engine
How to View Vscan Properties
How to Limit the Size of Scanned Files
How to Exclude Files From Virus Scans
Security Glossary
Index
Index Numbers and Symbols
Index A
Index B
Index C
Index D
Index E
Index F
Index G
Index H
Index I
Index K
Index L
Index M
Index N
Index O
Index P
Index R
Index S
Index T
Index U
Index V
Index Z
Please tell us how to improve our documentation:
Provide more details about the topic
Fix incorrect information
0 of 500
Provide missing information
0 of 500
Provide translated version
--Select--
Deutsch
Español
Français
Italiano
Português Brasil
日本語
한국어
简体中文
繁體中文
Other Language
Other
0 of 500
Terms of Use |
Your Privacy Rights
Thank you for your feedback! If you want to participate in content improvement and share additional information, please click Feedback button.
Rate this document:
Language:
English
D
deallocate
command
allocate error state
Allocate Error State
Allocate Error State
authorizations required
Authorizations for the Allocation Commands
device-clean scripts and
Writing New Device-Clean Scripts
using
How to Deallocate a Device
deallocating
devices
How to Deallocate a Device
forcibly
How to Forcibly Deallocate a Device
microphone
Deallocating a Microphone
defaults
system-wide in
policy.conf
file
Password Algorithm Identifiers
devfsadm
command
description
Device Management Commands
device allocation
adding devices
Managing Device Allocation Task Map
allocatable devices
device_allocate File
device_allocate File
allocate error state
Allocate Error State
allocating devices
How to Allocate a Device
auditing
How to Audit Device Allocation
authorizations
Device Allocation Rights Profiles
authorizations for commands
Authorizations for the Allocation Commands
authorizing users to allocate
How to Authorize Users to Allocate a Device
changing allocatable devices
How to Change Which Devices Can Be Allocated
commands
Device Allocation Commands
components of mechanism
Components of Device Allocation
configuration file
device_maps File
deallocate
command
device-clean scripts and
Writing New Device-Clean Scripts
using
How to Deallocate a Device
deallocating devices
How to Deallocate a Device
device-clean scripts
creating
Writing New Device-Clean Scripts
description
Device-Clean Scripts
options
Writing New Device-Clean Scripts
device_allocate
file
device_allocate File
device_maps
file
device_maps File
disabling
How to Enable Device Allocation
enabling
How to Enable Device Allocation
How to Enable Device Allocation
examples
Allocating a USB Flash Drive
forcibly allocating devices
How to Forcibly Allocate a Device
forcibly deallocating devices
How to Forcibly Deallocate a Device
making device allocatable
How to Enable Device Allocation
managing devices
Managing Device Allocation Task Map
mounting devices
How to Mount an Allocated Device
not requiring authorization
Permitting Any User to Allocate a Device
preventing
Preventing All Peripheral Devices From Being Used
requiring authorization
How to Change Which Devices Can Be Allocated
rights profiles
Device Allocation Rights Profiles
SMF service
Device Allocation Service
task map
Managing Device Allocation Task Map
troubleshooting
Allocating a CD-ROM Drive
Allocating a USB Flash Drive
troubleshooting permissions
How to View Allocation Information About a Device
unmounting allocated device
Deallocating a CD-ROM Drive
user procedures
Managing Device Allocation
using
Managing Device Allocation
using
allocate
command
How to Allocate a Device
viewing information
How to View Allocation Information About a Device
device management
See
device policy
Device Management rights profile
Device Allocation Rights Profiles
device policy
add_drv
command
Device Policy Commands
auditing changes
How to Audit Changes in Device Policy
commands
Device Policy Commands
configuring
Configuring Device Policy
kernel protection
Device Protection Reference
managing devices
Configuring Device Policy Task Map
overview
Device Policy
Controlling Access to Devices
task map
Configuring Device Policy Task Map
update_drv
command
Device Policy Commands
viewing
How to View Device Policy
Device Security rights profile
Device Allocation Rights Profiles
How to Enable Device Allocation
device-clean scripts
description
Device-Clean Scripts
media
Device-Clean Scripts
device_allocate File
object reuse
Device-Clean Scripts
options
Writing New Device-Clean Scripts
writing new scripts
Writing New Device-Clean Scripts
device_allocate
file
description
device_allocate File
format
device_allocate File
sample
device_allocate File
How to Change Which Devices Can Be Allocated
device_maps
file
device_maps File
device_maps File
devices
allocating for use
Managing Device Allocation
allocation
See
device allocation
auditing allocation of
How to Audit Device Allocation
auditing policy changes
How to Audit Changes in Device Policy
authorizing users to allocate
How to Authorize Users to Allocate a Device
changing which are allocatable
How to Change Which Devices Can Be Allocated
deallocating
How to Deallocate a Device
forcibly allocating
How to Forcibly Allocate a Device
forcibly deallocating
How to Forcibly Deallocate a Device
getting IP MIB-II information
How to Retrieve IP MIB-II Information From a /dev/* Device
listing
How to View Device Policy
listing device names
How to View Allocation Information About a Device
login access control
Remote Logins
making allocatable
How to Enable Device Allocation
managing
Configuring Device Policy Task Map
managing allocation of
Managing Device Allocation Task Map
mounting allocated devices
How to Mount an Allocated Device
not requiring authorization for use
Permitting Any User to Allocate a Device
policy commands
Device Policy Commands
preventing use of all
Preventing All Peripheral Devices From Being Used
preventing use of some
Preventing Some Peripheral Devices From Being Used
protecting by device allocation
Controlling Access to Devices
protecting in the kernel
Controlling Access to Devices
security
Controlling Access to Devices
unmounting allocated device
Deallocating a CD-ROM Drive
viewing allocation information
How to View Allocation Information About a Device
viewing device policy
How to View Device Policy
zones and
Controlling Access to Devices
disabling
abort sequence
How to Disable a System's Abort Sequence
device allocation
How to Enable Device Allocation
keyboard abort
How to Disable a System's Abort Sequence
keyboard shutdown
How to Disable a System's Abort Sequence
logins temporarily
How to Temporarily Disable User Logins
remote
root
access
How to Restrict and Monitor root Logins
system abort sequence
How to Disable a System's Abort Sequence
user logins
How to Temporarily Disable User Logins
displaying
allocatable devices
How to View Allocation Information About a Device
device policy
How to View Device Policy
root
access attempts
How to Restrict and Monitor root Logins
su
command attempts
How to Restrict and Monitor root Logins
user's login status
Displaying a User's Login Status
How to Display the User's Login Status
users with no passwords
How to Display Users Without Passwords
dminfo
command
device_maps File
Previous
Next