Introduction
366
Administering User Accounts
Managing User and Group Accounts with the SMC
Adding User Accounts with the SMC
367
Deleting User Accounts with the SMC
376
Modifying User Accounts with the SMC
377
Adding Groups with the SMC
378
Managing User and Group Accounts from the Command Line
381
Adding User Accounts from the Command Line
Modifying User Accounts from the Command Line
385
Deleting User Accounts from the Command Line
387
Adding Group Accounts from the Command Line
Modifying Group Accounts from the Command Line
388
Deleting Group Accounts from the Command Line
Setting Up Shell Initialization Files
389
C Shell Initialization Files
Bourne Shell Initialization Files
390
Korn Shell Initialization Files
Additional Shells Included with Solaris 10
Default Initialization Files
391
Customizing User Initialization Files
392
The Home Directory
395
Projects
396
Name Services
System Security
397
Controlling Physical Security
398
Controlling System Access
Where User Account Information Is Stored
402
Restricted Shells
406
Controlling File Access
407
Effective UIDs and GIDs
409
The Default User Mask
410
Sticky Bits
Access Control Lists (ACLs)
411
Setting ACL Entries
412
Checking the New File Permissions
414
Verifying ACL Entries
Copying a File's ACL to Another File
Modifying ACL Entries on a File
415
Deleting ACL Entries from a File
Setting the Correct Path
416
The setuid and setgid Programs
Auditing Users
418
Monitoring Users and System Usage
Checking Who Is Logged In
420
Controlling Network Security
423
Securing Network Services
The /etc/default/login File
425
Modems
426
Trusted Hosts
The /etc/hosts.equiv File
The .rhosts File
427
Restricting FTP
Securing Superuser Access
429
Restricting Root Access
430
Monitoring Superuser Access
431
The Secure Shell (ssh)
432
ASET
435
Common-Sense Security Techniques
437
Summary
438