Previous Page
Next Page

Outline

Introduction

366

Administering User Accounts

366

Managing User and Group Accounts with the SMC

366

Adding User Accounts with the SMC

367

Deleting User Accounts with the SMC

376

Modifying User Accounts with the SMC

377

Adding Groups with the SMC

378

Managing User and Group Accounts from the Command Line

381

Adding User Accounts from the Command Line

381

Modifying User Accounts from the Command Line

385

Deleting User Accounts from the Command Line

387

Adding Group Accounts from the Command Line

387

Modifying Group Accounts from the Command Line

388

Deleting Group Accounts from the Command Line

388

Setting Up Shell Initialization Files

389

C Shell Initialization Files

389

Bourne Shell Initialization Files

390

Korn Shell Initialization Files

390

Additional Shells Included with Solaris 10

390

Default Initialization Files

391

Customizing User Initialization Files

392

The Home Directory

395

Projects

396

Name Services

396

System Security

397

Controlling Physical Security

398

Controlling System Access

398

Where User Account Information Is Stored

402

Restricted Shells

406

Controlling File Access

407

Effective UIDs and GIDs

409

The Default User Mask

410

Sticky Bits

410

Access Control Lists (ACLs)

411

Setting ACL Entries

412

Checking the New File Permissions

414

Verifying ACL Entries

414

Copying a File's ACL to Another File

414

Modifying ACL Entries on a File

415

Deleting ACL Entries from a File

415

Setting the Correct Path

416

The setuid and setgid Programs

416

Auditing Users

418

Monitoring Users and System Usage

418

Checking Who Is Logged In

420

Controlling Network Security

423

Securing Network Services

423

The /etc/default/login File

425

Modems

426

Trusted Hosts

426

The /etc/hosts.equiv File

426

The .rhosts File

427

Restricting FTP

427

Securing Superuser Access

429

Restricting Root Access

430

Monitoring Superuser Access

431

The Secure Shell (ssh)

432

ASET

435

Common-Sense Security Techniques

437

Summary

438



Previous Page
Next Page