<?Pub UDT _bookmark _target?><chapter id="manageusers-1"><?Pub Tag atict:info tracking="on" ref="10"?><?Pub Tag
atict:user user="sharonr" fullname="Sharon Veach"?><title>Managing Users, Rights,
and Roles in Trusted Extensions (Tasks)</title><indexterm><primary>administering</primary><secondary>users</secondary>
</indexterm><highlights><para>This chapter provides the Solaris Trusted Extensions procedures for configuring and managing
users, user accounts, and rights profiles.</para><itemizedlist remap="jumplist"><listitem><para><olink targetptr="manageusers-59" remap="internal">Customizing the User Environment
for Security (Task Map)</olink></para>
</listitem><listitem><para><olink targetptr="usermgr-13" remap="internal">Managing Users and Rights With
the Solaris Management Console (Task Map)</olink></para>
</listitem><listitem><para><olink targetptr="manageusers-42" remap="internal">Handling Other Tasks in
the Solaris Management Console (Task Map)</olink></para>
</listitem>
</itemizedlist>
</highlights><sect1 id="manageusers-59"><title>Customizing the User Environment for Security
(Task Map)</title><indexterm><primary>customizing</primary><secondary>user accounts</secondary>
</indexterm><indexterm><primary>users</primary><secondary>customizing environment</secondary>
</indexterm><indexterm><primary>tasks and task maps</primary><secondary>Customizing User Environment for Security (Task Map)</secondary>
</indexterm><indexterm><primary>Customizing User Environment for Security (Task Map)</primary>
</indexterm><para>The following task map describes common tasks that you can perform when
customizing a system for all users, or when customizing an individual user's
account.</para><informaltable frame="all" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><colspec colname="colspec0" colwidth="100.91*"/><colspec colname="col2" colwidth="187.77*"/><colspec colname="colspec1" colwidth="107.31*"/><thead><row><entry><para>Task</para>
</entry><entry><para>Description</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry><para>Change label attributes.</para>
</entry><entry><para>Modify label attributes, such as minimum label and default label view,
for a user account.</para>
</entry><entry><para><olink targetptr="manageusers-25" remap="internal">How to Modify Default User Label Attributes</olink></para>
</entry>
</row><row><entry morerows="4" rowsep="1"><para>Change Trusted Extensions policy for all users of a system.</para>
</entry><entry><para>Changes the <filename>policy.conf</filename> file.</para>
</entry><entry><para><olink targetptr="manageusers-26" remap="internal">How to Modify policy.conf Defaults</olink></para>
</entry>
</row><row><entry><para>Turns on the screensaver after a set amount of time.</para><para>Logs the user out after a set amount of time that the system is idle.</para>
</entry><entry><para><olink targetptr="manageusers-37" remap="internal">Example&nbsp;13&ndash;1</olink></para>
</entry>
</row><row><entry><para>Removes unnecessary privileges from all ordinary users of a system.</para>
</entry><entry><para><olink targetptr="manageusers-19" remap="internal">Example&nbsp;13&ndash;2</olink></para>
</entry>
</row><row><entry><para>Prevents labels from being visible on a single-label system.</para>
</entry><entry><para><olink targetptr="modifyenc-43" remap="internal">Example&nbsp;13&ndash;3</olink></para>
</entry>
</row><row><entry><para>Removes labels from printed output at a public kiosk.</para>
</entry><entry><para><olink targetptr="manageprint-38" remap="internal">Example&nbsp;13&ndash;4</olink></para>
</entry>
</row><row><entry><para>Configure initialization files for users.</para>
</entry><entry><para>Configures startup files, such as <filename>.cshrc</filename>, <filename>.copy_files</filename>, and <filename>.soffice</filename> for all users.</para>
</entry><entry><para><olink targetptr="manageusers-11" remap="internal">How to Configure Startup Files for
Users in Trusted Extensions</olink></para>
</entry>
</row><row><entry><para>Lengthen the timeout for file relabeling.</para>
</entry><entry><para>Configures some applications to enable authorized users to relabel files.</para>
</entry><entry><para><olink targetptr="manageusers-12" remap="internal">How to Lengthen the Timeout When Relabeling
Information</olink></para>
</entry>
</row><row><entry><para>Log in to a failsafe session.</para>
</entry><entry><para>Fixes faulty user initialization files.</para>
</entry><entry><para><olink targetptr="manageusers-18" remap="internal">How to Log In to a Failsafe Session
in Trusted Extensions</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable><task id="manageusers-25"><title>How to Modify Default User Label Attributes</title><indexterm><primary>users</primary><secondary>modifying security defaults</secondary>
</indexterm><indexterm><primary>security attributes</primary><secondary>modifying user defaults</secondary>
</indexterm><tasksummary><para>You can modify the default user label attributes during the configuration
of the first system. The changes must be copied to every Trusted Extensions host.</para>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone. For
details, see <olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone
in Trusted Extensions</olink>.</para>
</taskprerequisites><procedure><step><para>Review the default user attribute settings in the <filename>/etc/security/tsol/label_encodings</filename> file.</para><para>For the defaults, see <olink targetptr="manageusers-46" remap="internal">label_encodings File Defaults</olink>.</para>
</step><step><para>Modify the user attribute settings in the <filename>label_encodings</filename> file.</para><para>Use the trusted editor. For details, see <olink targetptr="roles-10" remap="internal">How to Edit Administrative Files in Trusted Extensions</olink>. In Trusted CDE,
you can also use the Edit Label Encodings action. For details, see <olink targetptr="commontasks-42" remap="internal">How to Start CDE Administrative Actions in Trusted
Extensions</olink>.</para><para>The <filename>label_encodings</filename> file should be the same on
all hosts.</para>
</step><step><para>Distribute a copy of the file to every Trusted Extensions host.</para>
</step>
</procedure>
</task><task id="manageusers-26"><title>How to Modify <filename>policy.conf</filename> Defaults</title><indexterm><primary><filename>policy.conf</filename> file</primary><secondary>how to edit</secondary>
</indexterm><indexterm><primary>users</primary><secondary>modifying security defaults for all users</secondary>
</indexterm><indexterm><primary>security attributes</primary><secondary>modifying defaults for all users</secondary>
</indexterm><indexterm><primary>files</primary><secondary><filename>/etc/security/policy.conf</filename></secondary>
</indexterm><indexterm><primary><filename>/etc/security/policy.conf</filename> file</primary>
</indexterm><tasksummary><para>Changing the <filename>policy.conf</filename> defaults in Trusted Extensions is
similar to changing any security-relevant system file in the Solaris OS. In Trusted Extensions,
you use a trusted editor to modify system files.</para>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone. For
details, see <olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone
in Trusted Extensions</olink>.</para>
</taskprerequisites><procedure><step><para>Review the default settings in the <filename>/etc/security/policy.conf</filename> file.</para><para>For Trusted Extensions keywords, see <olink targetptr="manageusers-tbl-3" remap="internal">Table&nbsp;12&ndash;1</olink>.</para>
</step><step><para>Modify the settings.</para><para>Use the trusted editor to edit
the system file. For details, see <olink targetptr="roles-10" remap="internal">How to Edit
Administrative Files in Trusted Extensions</olink>.</para>
</step>
</procedure><example id="manageusers-37"><title>Changing the System's Idle Settings</title><indexterm><primary>logout</primary><secondary>requiring</secondary>
</indexterm><indexterm><primary><constant>IDLECMD</constant> keyword</primary><secondary>changing default</secondary>
</indexterm><indexterm><primary>changing</primary><secondary><constant>IDLETIME</constant> keyword</secondary>
</indexterm><indexterm><primary><constant>IDLETIME</constant> keyword</primary><secondary>changing default</secondary>
</indexterm><indexterm><primary><filename>policy.conf</filename> file</primary><secondary>changing Trusted Extensions keywords</secondary>
</indexterm><para>In this example, the security administrator wants idle systems to return
to the login screen. The default locks an idle system. Therefore, the Security
Administrator role adds the <constant>IDLECMD</constant> keyword=value pair
to the <filename>/etc/security/policy.conf</filename> file as follows:</para><screen>IDLECMD=LOGOUT</screen><para>The administrator also wants systems to be idle a shorter amount of
time before logout. Therefore, the Security Administrator role adds the <constant>IDLETIME</constant> keyword=value pair to the <filename>policy.conf</filename> file
as follows:</para><screen>IDLETIME=10</screen><para>The system now logs out the user after the system is idle for 10 minutes.</para>
</example><example id="manageusers-19"><title>Modifying Every User's Basic Privilege Set</title><indexterm><primary>privileges</primary><secondary>removing <constant>proc_info</constant> from basic set</secondary>
</indexterm><indexterm><primary><constant>proc_info</constant> privilege</primary><secondary>removing from basic set</secondary>
</indexterm><indexterm><primary>Sun Ray systems</primary><secondary>preventing users from seeing others' processes</secondary>
</indexterm><indexterm><primary>processes</primary><secondary>preventing users from seeing others' processes</secondary>
</indexterm><indexterm><primary>users</primary><secondary>preventing from seeing others' processes</secondary>
</indexterm><para>In this example, the security administrator of a <trademark>Sun Ray</trademark> installation
does not want regular users to view the processes of other Sun Ray users.
Therefore, on every system that is configured with Trusted Extensions, the administrator
removes <constant>proc_info</constant> from the basic set of privileges. The <constant>PRIV_DEFAULT</constant> setting in the <filename>/etc/policy.conf</filename> file
is modified as follows:</para><screen>PRIV_DEFAULT=basic,!proc_info</screen>
</example><example id="modifyenc-43"><title>Hiding Labels on a System</title><para>In this example, the security administrator changes the default setting
in a system's <filename>policy.conf</filename> file to hide labels. Any user
on this system would not view labels, unless the user was specifically configured
to be able to view labels. This setting is reasonable on a single-label system,
or on a system that is available to the general public.</para><screen># /etc/security/policy.conf
&hellip;
LABELVIEW=hidesl</screen><para>To configure a user to override this setting, see <olink targetptr="modifyenc-18" remap="internal">How to Hide Labels From a User</olink>.</para>
</example><example id="manageprint-38"><title>Assigning Printing-Related Authorizations to All Users of a System</title><indexterm><primary>Security Administrator role</primary><secondary>enabling unlabeled body pages from a public system</secondary>
</indexterm><indexterm><primary>printing</primary><secondary>authorizations for unlabeled output from a public system</secondary>
</indexterm><indexterm><primary><literal>solaris.print.unlabeled</literal> authorization</primary>
</indexterm><indexterm><primary><constant>solaris.print.nobanner</constant> authorization</primary>
</indexterm><para>In this example, the security administrator enables a public kiosk computer
to print without labels by typing the following in the computer's <filename>/etc/security/policy.conf</filename> file. At the next boot, print jobs by all users of this kiosk
print without page labels.</para><screen>AUTHS_GRANTED= solaris.print.unlabeled</screen><para>Then, the administrator decides to save paper by removing banner and
trailer pages. She first ensures that the Always Print Banners checkbox in
the Print Manager is not selected. She then modifies the <filename>policy.conf</filename> entry
to read the following and reboots. Now, all print jobs are unlabeled, and
have no banner or trailer pages.</para><screen>AUTHS_GRANTED= solaris.print.unlabeled,solaris.print.nobanner</screen>
</example>
</task><task id="manageusers-11"><title>How to Configure Startup Files for Users
in Trusted Extensions</title><indexterm><primary>administering</primary><secondary>startup files for users</secondary>
</indexterm><indexterm><primary>files</primary><secondary>startup</secondary>
</indexterm><indexterm><primary>users</primary><secondary>startup files</secondary>
</indexterm><indexterm><primary><filename>.copy_files</filename> file</primary><secondary>setting up for users</secondary>
</indexterm><indexterm><primary>files</primary><secondary><filename>.copy_files</filename></secondary>
</indexterm><indexterm><primary><filename>.link_files</filename> file</primary><secondary>setting up for users</secondary>
</indexterm><indexterm><primary>files</primary><secondary><filename>.link_files</filename></secondary>
</indexterm><indexterm><primary>users</primary><secondary>using <filename>.link_files</filename> file</secondary>
</indexterm><indexterm><primary>users</primary><secondary>using <filename>.copy_files</filename> file</secondary>
</indexterm><indexterm><primary>configuring</primary><secondary>startup files for users</secondary>
</indexterm><indexterm><primary>startup files</primary><secondary>procedures for customizing</secondary>
</indexterm><indexterm><primary>users</primary><secondary>setting up skeleton directories</secondary>
</indexterm><tasksummary><para>Users can put a <filename>.copy_files</filename> file and <filename>.link_files</filename> file into their home directory at the label that corresponds to
their minimum sensitivity label. Users can also modify the existing <filename>.copy_files</filename> and <filename>.link_files</filename> files at the users' minimum
label. This procedure is for the administrator role to automate the setup
for a site.</para>
</tasksummary><taskprerequisites><para>You must be in the System Administrator role in the global zone. For
details, see <olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone
in Trusted Extensions</olink>.</para>
</taskprerequisites><procedure><step><para>Create two Trusted Extensions startup files.</para><para>You are going
to add <filename>.copy_files</filename> and <filename>.link_files</filename> to
your list of startup files.</para><screen># <userinput>cd /etc/skel</userinput>
# <userinput>touch .copy_files .link_files</userinput></screen>
</step><step><para>Customize the <filename>.copy_files</filename> file.</para><substeps><step><para>Start the trusted editor.</para><para>For details, see <olink targetptr="roles-10" remap="internal">How to Edit Administrative Files in Trusted Extensions</olink>.</para>
</step><step><para>Type the full pathname to the <filename>.copy_files</filename> file.</para><screen><userinput>/etc/skel/.copy_files</userinput></screen>
</step><step id="manageusers-copyfiles-1"><para>Type into <filename>.copy_files</filename>,
one file per line, the files to be copied into the user's home directory at
all labels.</para><para>Use <olink targetptr="manageusers-28" remap="internal">.copy_files
and .link_files Files</olink> for ideas. For sample files, see <olink targetptr="manageusers-33" remap="internal">Example&nbsp;13&ndash;5</olink>.</para>
</step>
</substeps>
</step><step><para>Customize the <filename>.link_files</filename> file.</para><substeps><step><para>Type the full pathname to the <filename>.link_files</filename> file
in the trusted editor.</para><screen><userinput>/etc/skel/.link_files</userinput></screen>
</step><step id="geoxu"><para>Type into <filename>.link_files</filename>, one file
per line, the files to be linked into the user's home directory at all labels.</para>
</step>
</substeps>
</step><step><para>Customize the other startup files for your users.</para><itemizedlist><listitem><para>For a discussion of what to include in startup files, see <olink targetdoc="group-sa" targetptr="userconcept-23295" remap="external"><citetitle remap="section">Customizing a User&rsquo;s Work Environment</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>.</para>
</listitem><listitem><para>For details, see <olink targetdoc="group-sa" targetptr="usersetup-52714" remap="external"><citetitle remap="section">How to Customize User Initialization Files</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink>.</para>
</listitem><listitem><para>For an example, see <olink targetptr="manageusers-33" remap="internal">Example&nbsp;13&ndash;5</olink>.</para>
</listitem>
</itemizedlist>
</step><step performance="optional"><para>Create a <filename>skelP</filename> subdirectory
for users whose default shell is a profile shell.</para><para>The <filename>P</filename> indicates
the Profile shell.</para>
</step><step><para>Copy the customized startup files into the appropriate skeleton
directory.</para>
</step><step><para>Use the appropriate <filename>skel</filename><replaceable>X</replaceable> pathname
when you create the user.</para><para>The <replaceable>X</replaceable> indicates
the letter that begins the shell's name, such as <literal>B</literal> for
Bourne, <literal>K</literal> for Korn, <literal>C</literal> for a C shell,
and <literal>P</literal> for Profile shell.</para>
</step>
</procedure><example id="manageusers-33"><title>Customizing Startup Files for Users</title><indexterm><primary><filename>.copy_files</filename> file</primary><secondary>setting up for users</secondary>
</indexterm><para>In this example, the security administrator configures files for every
user's home directory. The files are in place before any user logs in. The
files are at the user's minimum label. At this site, the users' default shell
is the C shell.</para><para>The security administrator creates a <filename>.copy_files</filename> and
a <filename>.link_files</filename> file in the trusted editor with the following
contents:</para><screen>## .copy_files for regular users
## Copy these files to my home directory in every zone
.mailrc
.mozilla
.soffice
:wq</screen><screen>## .link_files for regular users with C shells
## Link these files to my home directory in every zone
.cshrc
.login
.Xdefaults
.Xdefaults-<replaceable>hostname</replaceable>
:wq</screen><screen>## .link_files for regular users with Korn shells
# Link these files to my home directory in every zone
.ksh
.profile
.Xdefaults
.Xdefaults-<replaceable>hostname</replaceable>
:wq</screen><para>In the shell initialization files, the administrator ensures that the
users' print jobs go to a labeled printer.</para><screen>## .cshrc file
setenv PRINTER conf-printer1
setenv LPDEST  conf-printer1</screen><screen>## .ksh file
export PRINTER conf-printer1
export LPDEST  conf-printer1</screen><para><indexterm><primary><command>dtterm</command> terminal</primary><secondary>forcing the sourcing of <filename>.profile</filename></secondary></indexterm>The administrator modifies the <filename>.Xdefaults-</filename><replaceable>home-directory-server</replaceable> file to force the <command>dtterm</command> command
to source the <filename>.profile</filename> file for a new terminal.</para><screen>## Xdefaults-HDserver
Dtterm*LoginShell: true</screen><para>The customized files are copied to the appropriate skeleton directory.</para><screen>$ <userinput>cp .copy_files .link_files .cshrc .login .profile \</userinput>
<userinput>.mailrc .Xdefaults .Xdefaults-<replaceable>home-directory-server</replaceable> \</userinput>
<userinput>/etc/skelC</userinput>
$ <userinput>cp .copy_files .link_files .ksh .profile \</userinput>
<userinput>.mailrc .Xdefaults .Xdefaults-<replaceable>home-directory-server</replaceable> \</userinput>
<userinput>/etc/skelK</userinput></screen>
</example><taskrelated role="troubleshooting"><itemizedlist><para>If you create a <filename>.copy_files</filename> files at your lowest
label, then log in to a higher zone to run the <command>updatehome</command> command
and the command fails with an access error, try the following:</para><listitem><para>Verify that from the higher-level zone you can view the lower-level
directory.</para><screen>higher-level zone# <userinput>ls /zone/<replaceable>lower-level-zone</replaceable>/home/</userinput><replaceable>username</replaceable>
ACCESS ERROR: there are no files under that directory</screen>
</listitem><listitem><para>If you cannot view the directory, then restart the automount
service in the higher-level zone:</para><screen>higher-level zone# <userinput>svcadm restart autofs</userinput></screen>
</listitem>
</itemizedlist><para>Unless you are using NFS mounts for home directories, the automounter
in the higher-level zone should be loopback mounting from  <filename>/zone/<replaceable>lower-level-zone</replaceable>/export/home/</filename><replaceable>username</replaceable> to <filename>/zone/<replaceable>lower-level-zone</replaceable>/home/</filename><replaceable>username</replaceable>.</para>
</taskrelated>
</task><task id="manageusers-12"><title>How to Lengthen the Timeout When
Relabeling Information</title><indexterm><primary>administering</primary><secondary>timeout when relabeling information</secondary>
</indexterm><indexterm><primary>lengthening timeout</primary><secondary>for relabeling</secondary>
</indexterm><indexterm><primary>users</primary><secondary>lengthening timeout when relabeling</secondary>
</indexterm><indexterm><primary>Selection Manager</primary><secondary>changing timeout</secondary>
</indexterm><indexterm><primary>StarOffice</primary><secondary>lengthening timeout when relabeling</secondary>
</indexterm><indexterm><primary>Firefox</primary><secondary>lengthening timeout when relabeling</secondary>
</indexterm><indexterm><primary>Mozilla</primary><secondary>lengthening timeout when relabeling</secondary>
</indexterm><indexterm><primary>Thunderbird</primary><secondary>lengthening timeout when relabeling</secondary>
</indexterm><indexterm><primary>GNOME ToolKit (GTK) library</primary><secondary>lengthening timeout when relabeling</secondary>
</indexterm><indexterm><primary>files</primary><secondary><filename>.gtkrc-mine</filename></secondary>
</indexterm><indexterm><primary><filename>.gtkrc-mine</filename> file</primary>
</indexterm><indexterm><primary>files</primary><secondary><replaceable>office-install-directory</replaceable><filename>/VCL.xcu</filename></secondary>
</indexterm><indexterm><primary>files</primary><secondary><filename>VCL.xcu</filename></secondary>
</indexterm><indexterm><primary><filename>VCL.xcu</filename> file</primary>
</indexterm><indexterm><primary><replaceable>office-install-directory</replaceable><filename>/VCL.xcu</filename></primary>
</indexterm><tasksummary><para>In Trusted Extensions, the Selection Manager mediates transfers of information
between labels. The Selection Manager appears for drag-and-drop operations,
and for cut-and-paste operations. Some applications require that you set a
suitable timeout so that the Selection Manager has time to intervene. A value
of two minutes is sufficient.</para><caution><para>Do not change the default timeout value on an unlabeled system.
The operations fail with the longer timeout value.</para>
</caution>
</tasksummary><taskprerequisites><para>You must be in the System Administrator role in the global zone. For
details, see <olink targetptr="commontasks-19" remap="internal">How to Enter the Global Zone
in Trusted Extensions</olink>.</para>
</taskprerequisites><procedure><step><para>For the <trademark>StarOffice</trademark> application, do the
following:</para><substeps><step><para>Navigate to the file <replaceable>office-install-directory</replaceable><filename>/VCL.xcu</filename>.</para><para>where <replaceable>office-install-directory</replaceable> is
the StarOffice installation directory, for example:</para><screen><replaceable>office-top-dir</replaceable><filename class="directory">/share/registry/data/org/staroffice</filename></screen>
</step><step><para>Change the <constant>SelectionTimeout</constant> property value
to 120.</para><para>Use the trusted editor. For details, see <olink targetptr="roles-10" remap="internal">How to Edit Administrative Files in Trusted Extensions</olink>.</para><para>The default value is three seconds. A value of 120 sets the timeout
to two minutes.</para>
</step>
</substeps>
</step><step><para>For users of applications that rely on the GNOME ToolKit (GTK)
library, change the selection timeout property value to two minutes.</para><note><para>As an alternative, you could have each user change the selection
timeout property value.</para>
</note><para>Most Sun <trademark>Java</trademark> Desktop System applications use the GTK library. Web browsers such as
Mozilla, Firefox, and Thunderbird use the GTK library.</para><para>By default, the selection timeout value is 300, or five seconds. A value
of 7200 sets the timeout to two minutes.</para><substeps><step><para>Create a GTK startup file.</para><para>Name the file <filename>.gtkrc-mine</filename>. The <filename>.gtkrc-mine</filename> file belongs in the user's
home directory at the minimum label.</para>
</step><step><para>Add the selection timeout value to the file.</para><screen>## $HOME/.gtkrc-mine file
*gtk-selection-timeout: 7200</screen><para>As in the Solaris OS, the <command>gnome-settings-daemon</command> reads
this file on startup.</para>
</step>
</substeps>
</step><step performance="optional"><para>Add the <filename>.gtkrc-mine</filename> file
to the list in each user's <filename>.link_files</filename> file.</para><para>For
details, see <olink targetptr="manageusers-11" remap="internal">How to Configure Startup Files
for Users in Trusted Extensions</olink>.</para>
</step>
</procedure>
</task><task id="manageusers-18"><title>How to Log In to a Failsafe Session
in Trusted Extensions</title><indexterm><primary>users</primary><secondary>logging in to a failsafe session</secondary>
</indexterm><indexterm><primary>failsafe session</primary><secondary>logging in</secondary>
</indexterm><indexterm><primary>desktops</primary><secondary>logging in to a failsafe session</secondary>
</indexterm><indexterm><primary>sessions</primary><secondary>failsafe</secondary>
</indexterm><indexterm><primary>troubleshooting</primary><secondary>failed login</secondary>
</indexterm><tasksummary><para>In Trusted Extensions, failsafe login is protected. If a regular user has
customized shell initialization files and now cannot log in, you can use failsafe
login to fix the user's files.</para>
</tasksummary><taskprerequisites><para>You must know the <literal>root</literal> password.</para>
</taskprerequisites><procedure><step><para>As in the Solaris OS, choose Options &ndash;&gt; Failsafe Session on
the login screen.</para>
</step><step><para>At the prompt, have the user provide the user name and password.</para>
</step><step><para>At the prompt for the <literal>root</literal> password, provide
the password for <literal>root</literal>.</para><para>You can now debug the
user's initialization files.</para>
</step>
</procedure>
</task>
</sect1><sect1 id="usermgr-13"><title>Managing Users and Rights With the Solaris Management Console (Task
Map)</title><indexterm><primary>tasks and task maps</primary><secondary>Managing Users and Rights With the Solaris Management Console</secondary>
</indexterm><indexterm><primary>Managing Users and Rights With the Solaris Management Console (Task Map)</primary>
</indexterm><indexterm><primary>Security Administrator role</primary><secondary>administering network of users</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>network of users</secondary>
</indexterm><indexterm><primary>Solaris Management Console</primary><secondary>administering users</secondary>
</indexterm><para>In Trusted Extensions, you must use the Solaris Management Console to administer users, authorizations,
rights, and roles. To manage users and their security attributes, assume the
Security Administrator role.</para><informaltable frame="all" pgwide="1"><tgroup cols="3" colsep="1" rowsep="1"><colspec colname="colspec0" colwidth="101.01*"/><colspec colname="col2" colwidth="154.92*"/><colspec colname="colspec1" colwidth="140.06*"/><thead><row><entry><para>Task</para>
</entry><entry><para>Description</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry><para>Modify a user's label range.</para>
</entry><entry><para>Modifies the labels at which a user can work. Modifications can restrict
or extend the range that the <filename>label_encodings</filename> file permits.</para>
</entry><entry><para><olink targetptr="manageusers-14" remap="internal">How to Modify a User's Label Range
in the Solaris Management Console</olink></para>
</entry>
</row><row><entry><para>Create a rights profile for convenient authorizations.</para>
</entry><entry><para>Several authorizations exist that might be useful for regular users.
Creates a profile for users who qualify to have these authorizations.</para>
</entry><entry><para><olink targetptr="manageusers-40" remap="internal">How to Create a Rights Profile for
Convenient Authorizations</olink></para>
</entry>
</row><row><entry><para>Modify a user's default privilege set.</para>
</entry><entry><para>Removes a privilege from the user's default privilege set.</para>
</entry><entry><para><olink targetptr="manageusers-38" remap="internal">How to Restrict a User's Set of Privileges</olink></para>
</entry>
</row><row><entry><para>Prevent account locking for particular users.</para>
</entry><entry><para>Users who can assume a role must have account locking turned off.</para>
</entry><entry><para><olink targetptr="commontasks-29" remap="internal">How to Prevent Account Locking for
Users</olink></para>
</entry>
</row><row><entry><para>Hide labels on a user's screen.</para>
</entry><entry><para>On a single-label system, you might want a user to not view labels.</para>
</entry><entry><para><olink targetptr="modifyenc-18" remap="internal">How to Hide Labels From a User</olink></para>
</entry>
</row><row><entry><para>Enable a user to relabel data.</para>
</entry><entry><para>Authorizes a user to downgrade information or upgrade information.</para>
</entry><entry><para><olink targetptr="manageusers-16" remap="internal">How to Enable a User to Change the
Security Level of Data</olink></para>
</entry>
</row><row><entry><para>Remove a user from the system.</para>
</entry><entry><para>Completely removes a user and the user's processes..</para>
</entry><entry><para><olink targetptr="txconf-46" remap="internal">How to Delete a User Account From a Trusted
Extensions System</olink></para>
</entry>
</row><row><entry><para>Handle other tasks.</para>
</entry><entry><para>Uses the Solaris Management Console to handle tasks that are not specific to Trusted Extensions.</para>
</entry><entry><para><olink targetptr="manageusers-42" remap="internal">Handling Other Tasks in the Solaris
Management Console (Task Map)</olink></para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable><task id="manageusers-14"><title>How to Modify a User's Label Range in the Solaris Management Console</title><tasksummary><para>You might want to extend a user's label range to give the user read
access to an administrative application. For example, a user who can log in
to the global zone could then run the Solaris Management Console. The user could view, but not
not change the contents.</para><para>Alternatively, you might want to restrict the user's label range. For
example, a guest user might be limited to one label.</para>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone.</para>
</taskprerequisites><procedure><step><para>Open a  Trusted Extensions toolbox in the Solaris Management Console.</para><para>Use a
toolbox of the appropriate scope. For details, see <olink targetptr="confsys-21" remap="internal">Initialize the Solaris Management Console Server in
Trusted Extensions</olink>.</para>
</step><step><para>Under System Configuration, navigate to User Accounts.</para><para>A
password prompt might be displayed.</para>
</step><step><para>Type the role password. </para>
</step><step><para>Select the individual user from User Accounts. </para>
</step><step><para>Click the Trusted Extensions Attributes tab.</para><mediaobject><imageobject><imagedata entityref="smc.usertxattr.tiff"/>
</imageobject><textobject><simpara>Dialog box shows the Trusted Extensions Attributes tab
for a user.</simpara>
</textobject>
</mediaobject><stepalternatives><step><para>To extend the user's label range, choose a higher clearance.</para><para>You can also lower the minimum label.</para>
</step><step><para>To restrict the label range to one label, make the clearance equal
to the minimum label.</para>
</step>
</stepalternatives>
</step><step><para>To save the changes, click OK.</para>
</step>
</procedure>
</task><task id="manageusers-40"><title>How to Create a Rights Profile for Convenient
Authorizations</title><indexterm><primary>administering</primary><secondary>convenient authorizations for users</secondary>
</indexterm><indexterm><primary>rights profiles</primary><secondary>Convenient Authorizations</secondary>
</indexterm><indexterm><primary>authorizations</primary><secondary>convenient for users</secondary>
</indexterm><indexterm><primary>users</primary><secondary>authorizations for</secondary>
</indexterm><indexterm><primary>Security Administrator role</primary><secondary>creating Convenient Authorizations rights profile</secondary>
</indexterm><indexterm><primary>Security Administrator role</primary><secondary>assigning authorizations to users</secondary>
</indexterm><indexterm><primary>Allocate Device authorization</primary>
</indexterm><indexterm><primary>Downgrade DragNDrop or CutPaste Info authorization</primary>
</indexterm><indexterm><primary>Downgrade File Label authorization</primary>
</indexterm><indexterm><primary>DragNDrop or CutPaste without viewing contents authorization</primary>
</indexterm><indexterm><primary>Print without Banner authorization</primary>
</indexterm><indexterm><primary>Print Postscript authorization</primary>
</indexterm><indexterm><primary>Print without Label authorization</primary>
</indexterm><indexterm><primary>Remote Login authorization</primary>
</indexterm><indexterm><primary>Shutdown authorization</primary>
</indexterm><indexterm><primary>Upgrade DragNDrop or CutPaste Info authorization</primary>
</indexterm><indexterm><primary>Upgrade File Label authorization</primary>
</indexterm><indexterm><primary>labeled printing</primary><secondary>without banner page</secondary>
</indexterm><indexterm><primary>labeled printing</primary><secondary>removing label</secondary>
</indexterm><indexterm><primary>labeled printing</primary><secondary>removing PostScript restriction</secondary>
</indexterm><indexterm><primary>printing</primary><secondary>without labeled banners and trailers</secondary>
</indexterm><indexterm><primary>printing</primary><secondary>without page labels</secondary>
</indexterm><indexterm><primary>printing</primary><secondary>removing PostScript restriction</secondary>
</indexterm><tasksummary><para>Where site security policy permits, you might want to create a rights
profile that contains authorizations for users who can perform tasks that
require authorization. To enable every user of a particular system to be authorized,
see <olink targetptr="manageusers-26" remap="internal">How to Modify policy.conf Defaults</olink>.</para>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone.</para>
</taskprerequisites><procedure><step><para>Open a  Trusted Extensions toolbox in the Solaris Management Console.</para><para>Use a
toolbox of the appropriate scope. For details, see <olink targetptr="confsys-21" remap="internal">Initialize the Solaris Management Console Server in
Trusted Extensions</olink>.</para>
</step><step><para>Under System Configuration, navigate to Rights.</para><para>A
password prompt might be displayed.</para>
</step><step><para>Type the role password. </para>
</step><step><para>To add a rights profile, click Action &ndash;&gt; Add Right.</para>
</step><step><para>Create a rights profile that contains one or more of the following
authorizations.</para><para>For the step-by-step procedure, see <olink targetdoc="group-sa" targetptr="rbactask-24" remap="external"><citetitle remap="section">How to Create or Change a Rights Profile</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink>.</para><para>In the following figure, the Authorizations Included window shows the
authorizations that might be convenient for users.</para><mediaobject><imageobject><imagedata entityref="smc.convauth.tiff"/>
</imageobject><textobject><simpara>Dialog box shows the authorizations that might be appropriate
for users at your site.</simpara>
</textobject>
</mediaobject><itemizedlist><listitem><para>Allocate Device &ndash; Authorizes a user to allocate a peripheral
device, such as a microphone.</para><para>By default, Solaris users
can read and write to a CD-ROM. However, in Trusted Extensions, only users who
can allocate a device can access the CD-ROM drive. To allocate the drive for
use requires authorization. Therefore, to read and write to a CD-ROM in Trusted Extensions,
a user needs the Allocate Device authorization.</para>
</listitem><listitem><para>Downgrade DragNDrop or CutPaste Info &ndash; Authorizes a
user to select information from a higher-level file and place that information
in a lower-level file.</para>
</listitem><listitem><para>Downgrade File Label &ndash; Authorizes a user to lower the
security level of a file</para>
</listitem><listitem><para>DragNDrop or CutPaste without viewing contents &ndash; Authorizes
a user to move information without viewing the information that is being moved.</para>
</listitem><listitem><para>Print Postscript &ndash; Authorizes a user to print <trademark>PostScript</trademark> files.</para>
</listitem><listitem><para>Print without Banner - Authorizes a user to print hard copy
without a banner page.</para>
</listitem><listitem><para>Print without Label &ndash; Authorizes a user to print hard
copy that does not display labels.</para>
</listitem><listitem><para>Remote Login &ndash; Authorizes a user to remotely log in.</para>
</listitem><listitem><para>Shutdown the System &ndash; Authorizes a user to shut down
the system and to shut down a zone.</para>
</listitem><listitem><para>Upgrade DragNDrop or CutPaste Info &ndash; Authorizes a user
to select information from a lower-level file and place that information in
a higher-level file.</para>
</listitem><listitem><para>Upgrade File Label &ndash; Authorizes a user to heighten the
security level of a file.</para>
</listitem>
</itemizedlist>
</step><step><para>Assign the rights profile to a user or a role.</para><para>For
assistance, see the online help. For the step-by-step procedure, see <olink targetdoc="group-sa" targetptr="rbactask-25" remap="external"><citetitle remap="section">How to Change the RBAC Properties of a User</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink>.</para>
</step>
</procedure><example id="manageprint-46"><title>Assigning a Printing-Related Authorization to a Role</title><para>In the following example, the Security Administrator allows a role to
print jobs without labels on body pages.</para><para>In the Solaris Management Console, the security administrator navigates to Administrative
Roles. She views the rights profiles that are included in a particular role,
then ensures that the print-related authorizations are contained in one of
the role's rights profiles.</para>
</example>
</task><task id="manageusers-38"><title>How to Restrict a User's Set of Privileges</title><indexterm><primary>privileges</primary><secondary>restricting users'</secondary>
</indexterm><indexterm><primary>users</primary><secondary>removing some privileges</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>user privileges</secondary>
</indexterm><indexterm><primary>changing</primary><secondary>user privileges</secondary>
</indexterm><tasksummary><para>Site security might require that users be permitted fewer privileges
than users are assigned by default. For example, at a site that uses Trusted Extensions on
Sun Ray systems, you might want to prevent users from viewing other users'
processes on the Sun Ray server.</para>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone.</para>
</taskprerequisites><procedure><step><para>Open a  Trusted Extensions toolbox in the Solaris Management Console.</para><para>Use a
toolbox of the appropriate scope. For details, see <olink targetptr="confsys-21" remap="internal">Initialize the Solaris Management Console Server in
Trusted Extensions</olink>.</para>
</step><step><para>Under System Configuration, navigate to User Accounts.</para><para>A
password prompt might be displayed.</para>
</step><step><para>Type the role password. </para>
</step><step><para>Double&ndash;click the icon for the user. </para>
</step><step><para>Remove one or more of the privileges in the <literal>basic</literal> set.</para><substeps><step><para>Double-click the icon for the user.</para>
</step><step><para>Click the Rights tab.</para><mediaobject><imageobject><imagedata entityref="smc.rights.tiff"/>
</imageobject><textobject><simpara>Dialog box shows the contents of the Rights tab for a
regular user.</simpara>
</textobject>
</mediaobject>
</step><step><para>Click the Edit button to the right of the <literal>basic</literal> set
in the <literal>right_extended_attr</literal> field.</para>
</step><step><para>Remove <constant>proc_session</constant> or <constant>file_link_any</constant>.</para><para>By removing the <literal>proc_session</literal> privilege, you
prevent the user from examining any processes outside the user's current session.
By removing the <literal>file_link_any</literal> privilege, you prevent the
user from making hard links to files that are not owned by the user.</para><caution><para>Do not remove the <constant>proc_fork</constant>  or the <constant>proc_exec</constant> privilege. Without these privileges, the user would not
be able to use the system.</para>
</caution><mediaobject><imageobject><imagedata entityref="smc.priv.tiff"/>
</imageobject><textobject><simpara>Dialog box shows the basic privilege set for a regular
user.</simpara>
</textobject>
</mediaobject>
</step>
</substeps>
</step><step><para>To save the changes, click OK.</para>
</step>
</procedure>
</task><task id="commontasks-29"><title>How to Prevent Account Locking for Users</title><indexterm><primary>users</primary><secondary>preventing account locking</secondary>
</indexterm><indexterm><primary>account locking</primary><secondary>preventing</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>account locking</secondary>
</indexterm><tasksummary><para>Trusted Extensions extends the user security features in the Solaris Management Console to include
account locking. Turn off account locking for users who can assume a role.</para>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone.</para>
</taskprerequisites><procedure><step><para>Start the Solaris Management Console.</para><para>Use a toolbox of the appropriate
scope. For details, see <olink targetptr="confsys-21" remap="internal">Initialize the
Solaris Management Console Server in Trusted Extensions</olink>.</para>
</step><step><para>Under System Configuration, navigate to User Accounts.</para><para>A
password prompt might be displayed.</para>
</step><step><para>Type the role password. </para>
</step><step><para>Double&ndash;click the icon for the user. </para>
</step><step><para>Click the Trusted Extensions Attributes tab.</para>
</step><step><para>In the Account Usage section, choose <literal>No</literal> from
the pull-down menu next to <literal>Lock account after maximum failed logins</literal>.</para>
</step><step><para>To save the changes, click OK.</para>
</step>
</procedure>
</task><task id="modifyenc-18"><title>How to Hide Labels From a User</title><indexterm><primary>administering</primary><secondary>hiding labels from users</secondary>
</indexterm><indexterm><primary>hiding labels from users</primary>
</indexterm><indexterm><primary>labels</primary><secondary>hiding from users</secondary>
</indexterm><tasksummary><para>Hiding labels is useful at a site where users can work at a single label
only. An organization might not want regular users to see labels or to be
aware of mandatory access controls. Ordinary users can then work whose desktop
closely resembles the Java Desktop System, Release <replaceable>number</replaceable> or the CDE desktop on a Solaris system.</para>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone.</para>
</taskprerequisites><procedure><step><para>Open a  Trusted Extensions toolbox in the Solaris Management Console.</para><para>Use a
toolbox of the appropriate scope. For details, see <olink targetptr="confsys-21" remap="internal">Initialize the Solaris Management Console Server in
Trusted Extensions</olink>.</para>
</step><step><para>Under System Configuration, navigate to User Accounts.</para><para>A
password prompt might be displayed.</para>
</step><step><para>Type the role password. </para>
</step><step><para>Double&ndash;click the icon for the user. </para>
</step><step><para>Click the Trusted Extensions Attributes tab.</para>
</step><step><para>Choose Hide from the Label: selection list.</para><para>This setting
overrides the value of <literal>LABELVIEW</literal> in the system's <filename>policy.conf</filename> file. For details, see <olink targetptr="manageusers-20" remap="internal">Default
User Security Attributes in Trusted Extensions</olink>.</para>
</step><step><para>To save the changes, click OK.</para>
</step>
</procedure>
</task><task id="manageusers-16"><title>How to Enable a User to Change
the Security Level of Data</title><indexterm><primary>files</primary><secondary>authorizing a user or role to change label of</secondary>
</indexterm><indexterm><primary>directories</primary><secondary>authorizing a user or role to change label of</secondary>
</indexterm><indexterm><primary>authorizations</primary><secondary>authorizing a user or role to change label</secondary>
</indexterm><indexterm><primary>labels</primary><secondary>authorizing a user or role to change label of data</secondary>
</indexterm><indexterm><primary>changing</primary><secondary>labels by authorized users</secondary>
</indexterm><indexterm><primary>changing</primary><secondary>security level of data</secondary>
</indexterm><indexterm><primary>administering</primary><secondary>changing label of information</secondary>
</indexterm><indexterm><primary>relabeling information</primary>
</indexterm><tasksummary><para>A regular user or a role can be authorized to change the security level,
or labels, of files and directories. The user or role, in addition to having
the authorization, must be configured to work at more than one label. And,
the labeled zones must be configured to permit relabeling. For the procedure,
see <olink targetptr="managezones-8" remap="internal">How to Enable Files to be Relabeled From
a Labeled Zone</olink>.</para><caution><para>Changing the security level of data is a privileged operation.
This task is for trustworthy users only.</para>
</caution>
</tasksummary><taskprerequisites><para>You must be in the Security Administrator role in the global zone.</para>
</taskprerequisites><procedure><step><para>Follow the procedure <olink targetptr="manageusers-40" remap="internal">How to
Create a Rights Profile for Convenient Authorizations</olink> to create a
rights profile.</para><itemizedlist><para>The following authorizations enable a user to relabel a file:</para><listitem><para>Downgrade File Label</para>
</listitem><listitem><para>Upgrade File Label</para>
</listitem>
</itemizedlist><itemizedlist><para>The following authorizations enable a user to relabel information within
a file:</para><listitem><para>Downgrade DragNDrop or CutPaste Info</para>
</listitem><listitem><para>DragNDrop or CutPaste Info Without Viewing</para>
</listitem><listitem><para>Upgrade DragNDrop or CutPaste Info</para>
</listitem>
</itemizedlist>
</step><step><para>Use the Solaris Management Console to assign the profile to the appropriate users and
roles.</para><para>For assistance, use the online help. For a step-by-step
procedure, see <olink targetdoc="group-sa" targetptr="rbactask-25" remap="external"><citetitle remap="section">How to Change the RBAC Properties of a User</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink>.</para>
</step>
</procedure>
</task><task id="txconf-46"><title>How to Delete a User Account From a Trusted Extensions System</title><tasksummary><para>When a user is removed from the system, you must ensure that the user's
home directory and any objects that the user owns are also deleted. As an
alternative to deleting objects that are owned by the user, you might change
the ownership of these objects to a valid user.</para><para>You must also ensure that all batch jobs that are associated with the
user are also deleted. No objects or processes belonging to a removed user
can remain on the system.</para>
</tasksummary><taskprerequisites><para>You must be in the System Administrator role.</para>
</taskprerequisites><procedure><step><para>Archive the user's home directory at every label.</para>
</step><step><para>Archive the user's mail files at every label.</para>
</step><step><para>In the Solaris Management Console, delete the user account.</para><substeps><step><para>Open a  Trusted Extensions toolbox in the Solaris Management Console.</para><para>Use a
toolbox of the appropriate scope. For details, see <olink targetptr="confsys-21" remap="internal">Initialize the Solaris Management Console Server in
Trusted Extensions</olink>.</para>
</step><step><para>Under System Configuration, navigate to User Accounts.</para><para>A
password prompt might be displayed.</para>
</step><step><para>Type the role password. </para>
</step><step><para>Select the user account to be removed, and click the Delete button.</para><para>You are prompted to delete the user's home directory and mail files.
When you accept the prompt, the user's home directory and mail files are deleted
in the global zone only.</para>
</step>
</substeps>
</step><step><para>In every labeled zone, manually delete the user's directories
and mail files.</para><note><para>You are responsible for finding and deleting the user's temporary
files at all labels, such as files in <filename class="directory">/tmp</filename> directories.</para>
</note>
</step>
</procedure>
</task>
</sect1><sect1 id="manageusers-42"><title>Handling Other Tasks in the Solaris Management Console (Task
Map)</title><indexterm><primary>tasks and task maps</primary><secondary>Handling Other Tasks in the Solaris Management Console (Task Map)</secondary>
</indexterm><indexterm><primary>Handling Other Tasks in the Solaris Management Console (Task Map)</primary>
</indexterm><para>Follow Solaris procedures to handle tasks in the Solaris Management Console. You must
be superuser, or in a role in the global zone.</para><informaltable frame="topbot"><tgroup cols="2" colsep="0" rowsep="0"><colspec colwidth="40.25*"/><colspec colwidth="48.60*"/><thead><row rowsep="1"><entry><para>Task</para>
</entry><entry><para>For Instructions</para>
</entry>
</row>
</thead><tbody><row><entry><para>Perform administrative tasks by using the Solaris Management Console.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="smcover-1" remap="external">Chapter 2, <citetitle remap="chapter">Working With the Solaris Management Console (Tasks),</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink></para>
</entry>
</row><row><entry><para>Create users.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="smcover-95" remap="external"><citetitle remap="section">Using the Solaris Management Tools With RBAC (Task Map)</citetitle> in <citetitle remap="book">System Administration Guide: Basic Administration</citetitle></olink></para>
</entry>
</row><row><entry><para>Create roles.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="rbactask-32" remap="external"><citetitle remap="section">How to Create and Assign a Role by Using the GUI</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para>Modify roles.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="rbactask-23" remap="external"><citetitle remap="section">How to Change the Properties of a Role</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para>Create or modify a rights profile.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="rbactask-24" remap="external"><citetitle remap="section">How to Create or Change a Rights Profile</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para>Change other security attributes of a user.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="rbactask-25" remap="external"><citetitle remap="section">How to Change the RBAC Properties of a User</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para>Audit the actions of a role.</para>
</entry><entry><para><olink targetdoc="group-sa" targetptr="rbactask-34" remap="external"><citetitle remap="section">How to Audit Roles</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></para>
</entry>
</row><row><entry><para>List the rights profiles by using <command>smprofile list <option>D</option><replaceable>name-service-type</replaceable>:/<replaceable>server-name</replaceable>/<replaceable>domain-name</replaceable></command></para>
</entry><entry><para><citetitle><olink targetdoc="group-sa" targetptr="rbactask-1" remap="external">Chapter 9, <citetitle remap="chapter">Using Role-Based Access Control (Tasks),</citetitle> in <citetitle remap="book">System Administration Guide: Security Services</citetitle></olink></citetitle> or
the <olink targetdoc="group-refman" targetptr="smprofile-1m" remap="external"><citerefentry><refentrytitle>smprofile</refentrytitle><manvolnum>1M</manvolnum></citerefentry></olink> man
page</para>
</entry>
</row>
</tbody>
</tgroup>
</informaltable>
</sect1>
</chapter><?Pub *0000056740 0?>