Movatterモバイル変換


[0]ホーム

URL:


Skip Navigation Links
Exit Print View
Link to oracle.comman pages section 4: File Formats    Oracle Solaris 11 Information Library
Oracle Technology Network
Library
PDF
Print View
Feedback
search filter icon
search icon
 Search Scope:

Document Information

Preface

Introduction

File Formats

addresses(4)

admin(4)

alias(4)

aliases(4)

a.out(4)

au(4)

audit_class(4)

audit_event(4)

audit.log(4)

auth_attr(4)

autofs(4)

bart_manifest(4)

bart_rules(4)

bootparams(4)

cardbus(4)

compver(4)

contents(4)

contract(4)

copyright(4)

core(4)

crypt.conf(4)

crypto_certs(4)

dacf.conf(4)

dat.conf(4)

defaultdomain(4)

default_fs(4)

defaultrouter(4)

depend(4)

device_allocate(4)

device_contract(4)

device_maps(4)

devices(4)

devid_cache(4)

devname_cache(4)

dfstab(4)

dhcp_inittab(4)

dhcp_network(4)

dhcpsvc.conf(4)

dhcptab(4)

dialups(4)

dir(4)

dir_ufs(4)

d_passwd(4)

driver(4)

driver.conf(4)

ds.log(4)

dumpdates(4)

ethers(4)

exec_attr(4)

fbtab(4)

fd(4)

fdi(4)

flash_archive(4)

format.dat(4)

forward(4)

fs(4)

fspec(4)

fstypes(4)

ftp(4)

ftpusers(4)

fx_dptbl(4)

gateways(4)

geniconvtbl(4)

group(4)

gsscred.conf(4)

hba.conf(4)

holidays(4)

hosts(4)

hosts.equiv(4)

ib(4)

idnkit.pc(4)

ike.config(4)

ike.preshared(4)

inetd.conf(4)

inet_type(4)

infiniband_hca_persistent_cache(4)

init.d(4)

inittab(4)

ipaddrsel.conf(4)

ipf(4)

ipf.conf(4)

ipnat(4)

ipnat.conf(4)

ipnodes(4)

ippool(4)

ippool.conf(4)

isa(4)

issue(4)

kadm5.acl(4)

kdc.conf(4)

keytables(4)

krb5.conf(4)

label_encodings(4)

ldapfilter.conf(4)

ldapsearchprefs.conf(4)

ldaptemplates.conf(4)

llc2(4)

logadm.conf(4)

logindevperm(4)

loginlog(4)

magic(4)

md.cf(4)

mddb.cf(4)

mdi_ib_cache(4)

mdi_scsi_vhci_cache(4)

md.tab(4)

mech(4)

meddb(4)

mnttab(4)

mod_ipp(4)

mpapi.conf(4)

named.conf(4)

ncad_addr(4)

nca.if(4)

ncakmod.conf(4)

ncalogd.conf(4)

ncaport.conf(4)

ndmp(4)

ndpd.conf(4)

netconfig(4)

netgroup(4)

netid(4)

netmasks(4)

netrc(4)

networks(4)

nfs(4)

nfslog.conf(4)

nfssec.conf(4)

NISLDAPmapping(4)

nodename(4)

nologin(4)

note(4)

notrouter(4)

nscd.conf(4)

nss(4)

nsswitch.conf(4)

packingrules(4)

pam.conf(4)

passwd(4)

path_to_inst(4)

pci(4)

pcie(4)

pci_unitaddr_persistent(4)

phones(4)

pkginfo(4)

pkgmap(4)

plot(4B)

policy.conf(4)

priv_names(4)

proc(4)

process(4)

prof_attr(4)

profile(4)

project(4)

protocols(4)

prototype(4)

pseudo(4)

publickey(4)

qop(4)

queuedefs(4)

rcmscript(4)

rdc.cf(4)

registration_profile(4)

remote(4)

resolv.conf(4)

rhosts(4)

rmtab(4)

rndc.conf(4)

rpc(4)

rt_dptbl(4)

sasl_appname.conf(4)

sbus(4)

sccsfile(4)

scsi(4)

securenets(4)

sel_config(4)

sendmail(4)

sendmail.cf(4)

service_bundle(4)

service_provider.conf(4)

services(4)

shadow(4)

sharetab(4)

shells(4)

slp.conf(4)

slpd.reg(4)

smb(4)

smbautohome(4)

smhba.conf(4)

snapshot_cache(4)

sndr(4)

sock2path.d(4)

space(4)

ssh_config(4)

sshd_config(4)

submit.cf(4)

sulog(4)

sysbus(4)

syslog.conf(4)

system(4)

telnetrc(4)

term(4)

terminfo(4)

TIMEZONE(4)

timezone(4)

TrustedExtensionsPolicy(4)

ts_dptbl(4)

ttydefs(4)

ttysrch(4)

ufsdump(4)

updaters(4)

user_attr(4)

utmp(4)

utmpx(4)

vfstab(4)

volume-config(4)

volume-defaults(4)

volume-request(4)

wanboot.conf(4)

warn.conf(4)

wtmp(4)

wtmpx(4)

ypfiles(4)

yppasswdd(4)

ypserv(4)

zoneinfo(4)

prof_attr

- profile description database

Synopsis

/etc/security/prof_attr

Description

/etc/security/prof_attr is a local source for execution profile names, descriptions, and otherattributes of execution profiles. Theprof_attr file can be used with otherprofile sources, including theprof_attr NIS map. Programs use thegetprofattr(3C) routines togain access to this information.

The search order for multipleprof_attr sources is specified in the/etc/nsswitch.conffile, as described in thensswitch.conf(4) man page.

An execution profile is a mechanism used to bundle together the commandsand authorizations needed to perform a specific function. An execution profile canalso contain other execution profiles. Each entry in theprof_attr database consistsof one line of text containing five fields separated by colons (:). Linecontinuations using the backslash (\) character are permitted. The format of eachentry is:

profname:res1:res2:desc:attr

profname

The name of the profile. Profile names are case-sensitive.

res1

The charactersRO in this field indicate it is read only and not modifiable by the tools that update this database.

res2

Reserved for future use.

desc

A long description. This field should explain the purpose of the profile, including what type of user would be interested in using it. The long description should be suitable for displaying in the help text of an application.

attr

An optional list of semicolon-separated (;) key-value pairs that describe the security attributes to apply to the object upon execution. Zero or more keys can be specified. The following keys are currently interpreted by the system:

help is assigned the name of a file ending in.htm or.html.

auths specifies a comma-separated list of authorization names chosen from those names defined in theauth_attr(4) database. Authorization names can be specified using the asterisk (*) character as a wildcard. For example,solaris.printer.* would mean all of Sun's authorizations for printing.

audit_flags specifies per-user Audit preselection flags as colon-separated always-audit-flags and never-audit-flags. For example,audit_flags=always-audit-flags:never-audit-flags. Seeaudit_flags(5).

profiles specifies a comma-separated list of profile names chosen from those names defined in theprof_attr database.

privs specifies a comma-separated list of privileges names chosen from those names defined in thepriv_names(4) database. These privileges can then be used for executing commands withpfexec(1).

defaultpriv andlimitpriv have the same semantics as inuser_attr(4). If they are not specified in theuser_attr database, the assigned profiles are searched until a match is found.

audit_flags specifies per-user audit preselection flags as a colon-separated list ofalways-audit-flags andnever-audit-flags values, for example,audit_flags=always-audit-flags:never-audit-flags. Seeaudit_flags(5).

Examples

Example 1 Allowing Execution of All Commands

The following entry allows the user to execute all commands:

All:::Use this profile to give a :help=All.html

Example 2 Consulting the Localprof_attr File First

With the followingnsswitch.conf entry, the localprof_attr file is consulted beforethe NIS map:

prof_attr: files nis

Files

/etc/nsswitch.conf

/etc/security/prof_attr

Locally added entries. Make sure that the shipped header remains intact.

/etc/security/prof_attr.d/*

Entries added by package installation.

Notes

The root user is usually defined in local databases because root needsto be able to log in and do system maintenance in single-usermode and at other times when the network name service databases arenot available. So that the profile definitions for root can be locatedat such times, root's profiles should be defined in the localprof_attr file,and the order shown in the examplensswitch.conf(4) file entry under EXAMPLES ishighly recommended.

Because the list of legal keys is likely to expand, any codethat parses this database must be written to ignore unknown key-value pairswithout error. When any new keywords are created, the names should beprefixed with a unique string, such as the company's stock symbol, toavoid potential naming conflicts.

Each application has its own requirements for whether thehelp value mustbe a relative pathname ending with a filename or the name ofa file. The only known requirement is for the name of afile.

The following characters are used in describing the database format and mustbe escaped with a backslash if used as data: colon (:), semicolon(;), equals (=), and backslash (\).

The following authorizations are required to set various fields:

prof        namename of profile        solaris.profile.managedesc        description of profile     solaris.profile.managehelp        html help file name        solaris.profile.manage            of profileauths       authorizations granted     solaris.auth.assign/delegate profiles    profiles granted           solaris.profile.assign/delegateprivs       privileges granted         solaris.privilege.assign/delegatelimitpriv   the limit set of           solaris.privilege.assign/delegate            privileges for the             command processdefaultpriv  the inheritable set of    solaris.privilege.assign/delegate             privileges for the              command process

The value oflimitpriv that can be set by an authorized userfor a given command are limited to thelimitpriv privilges that aregranted to the user.

The value of thedefaultpriv that can be set by an authorizeduser for a given command are limited to thedefaultpriv privileges grantedto the user.

Thesolaris.auth.assign authorization allows the authorized user to grant any authorization toanother user. Thesolaris.auth.delegate allows the authorized user to grant only theuser's authorizations to another user. The same principle applies to profiles, privileges.

See Also

auths(1),pfexec(1),profiles(1),getauthattr(3C),getprofattr(3C),getuserattr(3C),auth_attr(4),exec_attr(4),priv_names(4),user_attr(4),audit_flags(5)

Copyright © 2011, Oracle and/or its affiliates. All rights reserved.Legal Notices
PreviousNext

[8]ページ先頭

©2009-2025 Movatter.jp