A



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

access control
     databases
     file and folder access rights
     in Mac OS X security model
     networks, managed
access control entries. [See ACEs (access control entries)]
Access Control Lists. [See ACLs (Access Control Lists)]
access points, WLANs
accounts
     categories
     resetting lost passwords
     shell accounts
    user accounts. [See user accounts]
ACEs (access control entries)
     numbering
     overview
     rewriting, deleting, creating
ACLs (Access Control Lists)
     access control entries
     attributes
     creating
     fine grained control with
     modifying keychain ACLs
     overview
     replication and
     securing LDAP servers
Active Directory
     Active Directory KDC
     authentication and identification
     cross-realm authentication
     Directory Access presets
     multiple directory scenarios
     plug-ins for directory service protocols
     shell accounts
     SMB authentication
Active Directory plug-in
     administrative options
     advanced configurations
     bind and 2nd 3rd
     configuration files
     default user experience
     errors
     exploring
     features other than login support
     home folder locations
     initial configuration
     Mac OS X client and server configuration
     Mac OS X server joining Active Directory domain
     mapping options
     MCX and Open Directory integration with Active Directory
     MCX records stored in
     mobile user accounts
     Open Directory and
     overview
     references
     review
     troubleshooting
     user shell
ActiveDirectory.plist
Activity Monitor 2nd
add-in module, CDSA [See also plug-ins]
Address Book, Active Directory integration with
address groups, firewalls
Address Resolution Protocol (ARP)
     in IP stack
     Zeroconf and
admin31GetsSp
administrative access, local system security and
administrative options
     Active Directory plug-in
     Kerberos
administrator accounts 2nd
admins group, Active Directory
ADmitMac
advanced Ethernet options
Advanced pane, for firewall configuration
advanced SSH
AFP (Apple Filing Protocol)
     Connect to Server and
     forked files over
     home folders
     IPv6 and
     locking down access to public servers
     mount command
     Personal File Sharing 2nd
     SSH tunneling and
AFP548 website
AFS (Andrew File System)
AirPort
     cards
     Extreme Base Station
     WLANs and
aliases
     deleting and replacing original files
     moving original files
     overview
     symbolic links compared with
     using
Allow permissions, ACLs
American Registry for Internet Numbers (ARIN)
Andrew File System (AFS)
anonymous binding 2nd
Anonymous Browsing
antennas, WLANs
antivirus programs
Apache, enabling SSL for
APOP
Apple
     certification compliance
     General Troubleshooting Flowchart
     Kerberos adaptation for
     Knowledge Base documents
     LDAP schema
     Mac OS X client integration
     Open Firmware Password support
     registration
Apple Developer Tools (Xcode), building Tripwire with
Apple File Service. [See Personal File Sharing]
Apple Filing Protocol. [See AFP (Apple Filing Protocol)]
Apple Mail
     digital certificates
     encryption with
     filtering junk mail
     incoming mail security
     outgoing mail security
     protecting company email
     testing mail configuration
Apple Remote Desktop (ARD)
     local system security and
     remote monitoring and
apple-generateduid
apple-user-homeurl attribute, LDAP
AppleFileServer
     editing
     overview
     starting
AppleTalk
     file sharing and
     Mac OS X support for 2nd
applications
     Bonjour and
     keychain-aware
     location of
architecture
     Password Server
     replication
     security
Archive and Install, selecting installation type
ARD (Apple Remote Desktop)
     local system security and
     remote monitoring and
ARIN (American Registry for Internet Numbers)
ARP (Address Resolution Protocol)
     in IP stack
     Zeroconf and
arp command
     locating DHCP servers on subnet
     troubleshooting network connectivity
asymmetric cryptography
atlockup command
attackers/attacks
     DoS (Denial of Service) attacks
     reconnaissance attacks
     threat assessment and
attributes
     ACL
     authentication
     creating new
     file permission
     group record
     mount record
     repurposing existing
     Standard vs. Native
     vs. properties
attributes, LDAP
     abbreviated names
     managed client
     mapping Open Directory records to LDAP attributes
     native
     networked user
     object classes and
     overview
audit_control
audit_event
audit_user
audit_warn
auditing
     Apple certification compliance
     centralized log server for
     checksums for auditing software
     detecting Mac OS X intrusions
     detecting UNIX hacks
     log files
     overview
     security audits
authAuthority attribute
authentication
    802.1x. [See 802.1x]
     Active Directory
     back ups and
     CAs (certificate authorities) and
     central data store for
     certificate management and
     choosing authentication method for e-mail
     configuring client authentication
     cryptography and
     defined
     distribution of authentication information
     file-based storage of authentication and identification information
     hash methods
     Kerberos methods
     Kerberos multiple service integration and
     Kerberos pre-authentication
     Kerberos process for 2nd
     LDAPv3 plug-in
     local
     mail clients
     NTLM hash vulnerabilities
     Open Directory security
     overview
     PAM (pluggable authentication module)
     Password Server
     preventing anonymous access
     private/public keys
     references
     removing NTLM hashes
     review
     shadow hash files
     shadow passwords
    single-sign on. [See SSO (single-sign-on)]
     SMB authentication with Active Directory
     SSH
     SSL certificates for secure services
     strong authentication
     trusted third party and
     user authentication 2nd
     VPNs (virtual private networks)
     Web of Trust system
     WEP (Wired Equivalent Privacy)
authentication path
     adding directories to
     Local directory option
authentication search policy
AuthenticationAuthority attribute 2nd 3rd
authenticators
authorization
     authorization APIs
     Authorization framework
     Kerberos
     Mac OS X security and
     Open Directory
automatic configuration, Kerberos
automatic login, disabling
automount daemon 2nd




Apple Training Series. Mac OS X System Administration Reference, Volume 1
Apple Training Series: Mac OS X System Administration Reference, Volume 1
ISBN: 032136984X
EAN: 2147483647
Year: 2005
Pages: 258
Authors: Schoun Regan

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net