S



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Safari browsers
     as proxy client
     IP address resolution and
     on public access Mac
     provided with Mac OS X
     security preferences
salpindex
SALTED-SHA 1
Samba
SASL (Simple Authentication and Security Layer)
     adding pluggable authentication to Password Server
     Kerberos and
     single-sign on and
schema
     data structure defined by
     LDAP
     mapping with Open Directory servers
     modifying directory schema and creating new attributes
schg
scope, LDAP search parameters
SCP (Secure Copy)
screen saver passwords
scripts
     network settings and
     shell scripts
scutil
search base, LDAP 2nd
search parameters, LDAP
search protocol, LDAP
search transactions, LDAP
searches
     permissions
     policies
     text files
     vi editor
SearchNodeConfig.plist
Secure Copy (SCP)
Secure Empty Trash
secure FTP (SFTP)
secure hash algorithm (SHA) 2nd
Secure Shell. [See SSH (Secure Shell)]
Secure Sockets Layer. [See SSL (Secure Sockets Layer)]
secure.log
security
     audits
     directory services deployment and
     Kerberos multiple service integration and
     LDAP
     NFS (network file system)
     Web security preferences
Security Framework, Keychain Services in
Security pane, System Preferences
security policies
     documenting
     establishing
security, local system
     account security
     administrative access
     Apple Remote Desktop
     choosing Open Firmware password
     client network configuration
     disabling Open Firmware password
     enabling FileVault
     enabling Open Firmware passwords
     FileVault
     firewalls
     FTP access
     installation type and
     Internet Sharing
     layers of Mac OS X security model
     login process
     Mac OS 9 classic security options
     master password for resetting lost account passwords
     Open Firmware startup security
     operating system security
     other security-related settings
     package customization and
     personal file sharing
     Personal Web Sharing
     physical security
     preinstallation issues
     Printer Sharing
     references
     Remote Apple events
     Remote Login
     review
     secure Mac OS X installation
     services
     Setup Assistant and
     unattended computers
     updates and patches
     Windows Sharing
     Xgrid
security, Mac OS X
     authorization API
     breach response plan
     CDSA and
     certificate and trust management
     keychains
     Layered Services
     monitoring network
     Open Directory authorization
     overview
     policies
     references
     review
     risk analysis
     security model
     solutions
     threat levels
     user accounts and
     user needs and skills and
security, mobile
    Bluetooth. [See Bluetooth]
     choosing mobile technologies
     lesson review
     overview
     references
     risk analysis
    WLANs. [See WLANs (Wireless LANs)]
security, network
     designing secure network
     DoS (Denial of Service) attacks
     firewall address groups
     firewall rules and capabilities
     firewall setup for Mac OS X Server
     Gateway Setup Assistant for routing and NAT configuration
     host firewalls vs. network firewalls
     ipfw for showing firewall rules
     locking down access to private network services
     locking down access to public servers
     locking down and logging traffic from private network
     locking down DNS zone transfers
     locking down pings and ping replies
     locking down remote administration
     logging firewall activity
     monitoring
     NAT Services
     overview 2nd
     references
     review
     security mechanisms
     Services and Advanced Panes for firewall configuration
     stateless vs. stateful firewalls
     stealth mode, enabling
     threat assessment and
     VPN overview
     VPN services 2nd
security, network connection
     advanced SSH
     disabling root SSH logins
     enabling sshd
     network services and
     overview
     references
     replacing telnet with SSH
     review
     SCP
     sftp
     SSH and
     SSH tunneling and
     telnet for testing connectivity
     VPN authentication modes
     VPN service, connecting to
     VPN service, provided with Mac OS X Server
     VPN transport protocols
     VPNs
security, Open Firmware
     choosing Open Firmware password
     disabling Open Firmware password
     enabling Open Firmware passwords
     in Mac OS X security model
     startup security
security, Web
     overview
     proxy servers
     references
     review
     Safari on public access Macs
     server security
     setting security preferences
     setting up secure Website
     SSL for secure website
     viewing certificates
     WebDAV configuration
     WebDAV file permissions
     WebDAV realms and access
sendmail
serial port, PDA sync security options
Server Admin adding WebDAV realms
     as interface for ipfw
     backing up Open Directory master
     configuring email service
     defining Mac OS X server as a replica
     disk image of Open Directory master
     enabling firewall logging
     LDAP protocol settings
     modifying NetInfo settings
     preventing eavesdropping
     promoting standalone server to Open Directory master
     setting up address groups
     setting up secure website
     setting up trusted binding
     troubleshooting replicas
server directory services. [See directory services, server]
Server Message Block/Common Internet File System (SMB/CIFS)
server registration, Kerberos
server roles, Open Directory
servers, email
     authentication requirements and
     overview
     setting up
     spam control
     virus protection
servers, log
servers, Web
service discovery
Service Location Protocol (SLP)
services
     certificates for securing
     disabling unneeded
     discovering on Windows network
     DNS Service Discovery
     file-sharing
     local system security and
     network connection security and
     starting/stopping
     troubleshooting network services
Services pane, for firewall configuration
session permissions
set goup ID (setGID) 2nd
set group ID (SGID)
set user ID (setUID)
set user ID (SUID)
SetFile command 2nd
setGID (set goup ID) 2nd
setUID (set user ID)
Setup Assistant
sftp
SFTP (secure FTP)
SGID (set group ID)
SHA (secure hash algorithm) 2nd
shadow files
shadow hash files
shadow passwords 2nd
sharing directory data
shell accounts, Active Directory
shell commands
shell scripts
shell wildcards
showmount
Sidebar, Network icon in
Simple Authentication and Security
    Layer. [See SASL (Simple Authentication and Security Layer)]
Simple Mail Transfer Protocol. [See SMTP (Simple Mail Transfer Protocol)]
single-sign-on. [See SSO (single-sign-on)]
Sites folder, file and folder permissions
slap tools, OpenLDAP
slapadd
slapcat
slapconfig
     creating replicas
     Open Directory and
     Password Server and
     replica troubleshooting
slapd 2nd
slapd.conf
slapd_macosxserver.conf
slappasswd
sleep/screen saver passwords
SLP (Service Location Protocol)
slurpd
smart cards, in multifactor authentication
SMB (Server Message Block) Active Directory plug-in and
     authentication with Active Directory
     configuring with Directory Access
     configuring with smb.conf
     discovery protocols supported in Mac OS X
     locking down access to public servers
     mount command
     smbclient
     starting
     troubleshooting
     Windows file sharing and
SMB-LAN-MANAGER
     hash types supported in Mac OS X
     removing
     weaknesses of
SMB-NT
     hash types supported in Mac OS X
     removing
     strength of
smb.conf
SMB/CIFS (Server Message Block/Common Internet File System)
smbclient
smbd
SMTP (Simple Mail Transfer Protocol)
     enabling
     locking down access to public servers
     sending/receiving email
SMTP relay
sniffing. [See also packet sniffers]
     mobile security and
     network connection security and
social engineering attacks
sockets
software
     checksums for auditing
     security policies
Software Update
     local system security and
     performing security updates
     Web security and 2nd
spam
     controlling
     two email addresses for control of
     WLANs and
Spam Assassin
spoofing
spyware
srm command
ssh
     dscl utility and
     examples of ssh login
     remote monitoring
     viewing log files with
SSH (Secure Shell)
     advanced SSH
     authentication
     disabling root SSH logins
     enabling sshd
     keytab transfer via
     overview
     replacing telnet with SSH
     replica creation and
     replica troubleshooting and
     security issues with
     SFTP (secure FTP) and
     tunneling
     versions
ssh1
ssh2
sshd
SSL (Secure Sockets Layer)
     authentication
     certificates for email security
     e-mail security
     email providers supporting
     enabling 2nd
     LDAP configuration and
     LDAP protocol settings for SSL certificates
     port security
     preventing eavesdropping
     service security
     Web security
     website security
SSO (single-sign-on)
     for network services
    Kerberos. [See Kerberos]
     Open Directory master and
     open source components
    Password Server. [See Password Server]
     references
     review
     troubleshooting
standalone servers
     Open Directory configured as
     Open Directory server roles
     promoting to Open Directory master
standard users, types of user accounts
startup items
     adding monitoring to
     adding volume to
startup security, Open Firmware security
startup, Active Directory plug-in
stateless vs. stateful firewalls
static IP addresses
static mappings
stealth mode, enabling
sticky bits
     chmod for setting on a folder
     CLI for setting sticky bit on folders
     collaboration and
     for controlling file deletion
strong authentication
su
subnet masks
     firewall address groups and
     IP addresses and
sudo command
     rootkits and
     setting higher privilege levels
     troubleshooting network services
sudo killall
SUID (set user ID)
Sun
SunOne
super server [See also xinetd]
swap files
symbolic links
     comparing aliases and symbolic links
     creating
     moving original files
     overview
     recreating an original path
symmetric cryptography
SYN flood attacks
system accounts
system administrators
     Internet security
     managing networking
     reference information for
     types of user accounts
System Preferences
     Active Directory password policies
     Network pane
     Security pane
System Profiler
system usage, managing from command line
system.log 2nd
system_profiler




Apple Training Series. Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors: Schoun Regan

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net