Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] access control databases file and folder access rights in Mac OS X security model networks, managed access control entries. [See ACEs (access control entries)] Access Control Lists. [See ACLs (Access Control Lists)] access points, WLANs accounts categories resetting lost passwords shell accounts user accounts. [See user accounts] ACEs (access control entries) numbering overview rewriting, deleting, creating ACLs (Access Control Lists) access control entries attributes creating fine grained control with modifying keychain ACLs overview replication and securing LDAP servers Active Directory Active Directory KDC authentication and identification cross-realm authentication Directory Access presets multiple directory scenarios plug-ins for directory service protocols shell accounts SMB authentication Active Directory plug-in administrative options advanced configurations bind and 2nd 3rd configuration files default user experience errors exploring features other than login support home folder locations initial configuration Mac OS X client and server configuration Mac OS X server joining Active Directory domain mapping options MCX and Open Directory integration with Active Directory MCX records stored in mobile user accounts Open Directory and overview references review troubleshooting user shell ActiveDirectory.plist Activity Monitor 2nd add-in module, CDSA [See also plug-ins] Address Book, Active Directory integration with address groups, firewalls Address Resolution Protocol (ARP) in IP stack Zeroconf and admin31GetsSp administrative access, local system security and administrative options Active Directory plug-in Kerberos administrator accounts 2nd admins group, Active Directory ADmitMac advanced Ethernet options Advanced pane, for firewall configuration advanced SSH AFP (Apple Filing Protocol) Connect to Server and forked files over home folders IPv6 and locking down access to public servers mount command Personal File Sharing 2nd SSH tunneling and AFP548 website AFS (Andrew File System) AirPort cards Extreme Base Station WLANs and aliases deleting and replacing original files moving original files overview symbolic links compared with using Allow permissions, ACLs American Registry for Internet Numbers (ARIN) Andrew File System (AFS) anonymous binding 2nd Anonymous Browsing antennas, WLANs antivirus programs Apache, enabling SSL for APOP Apple certification compliance General Troubleshooting Flowchart Kerberos adaptation for Knowledge Base documents LDAP schema Mac OS X client integration Open Firmware Password support registration Apple Developer Tools (Xcode), building Tripwire with Apple File Service. [See Personal File Sharing] Apple Filing Protocol. [See AFP (Apple Filing Protocol)] Apple Mail digital certificates encryption with filtering junk mail incoming mail security outgoing mail security protecting company email testing mail configuration Apple Remote Desktop (ARD) local system security and remote monitoring and apple-generateduid apple-user-homeurl attribute, LDAP AppleFileServer editing overview starting AppleTalk file sharing and Mac OS X support for 2nd applications Bonjour and keychain-aware location of architecture Password Server replication security Archive and Install, selecting installation type ARD (Apple Remote Desktop) local system security and remote monitoring and ARIN (American Registry for Internet Numbers) ARP (Address Resolution Protocol) in IP stack Zeroconf and arp command locating DHCP servers on subnet troubleshooting network connectivity asymmetric cryptography atlockup command attackers/attacks DoS (Denial of Service) attacks reconnaissance attacks threat assessment and attributes ACL authentication creating new file permission group record mount record repurposing existing Standard vs. Native vs. properties attributes, LDAP abbreviated names managed client mapping Open Directory records to LDAP attributes native networked user object classes and overview audit_control audit_event audit_user audit_warn auditing Apple certification compliance centralized log server for checksums for auditing software detecting Mac OS X intrusions detecting UNIX hacks log files overview security audits authAuthority attribute authentication 802.1x. [See 802.1x] Active Directory back ups and CAs (certificate authorities) and central data store for certificate management and choosing authentication method for e-mail configuring client authentication cryptography and defined distribution of authentication information file-based storage of authentication and identification information hash methods Kerberos methods Kerberos multiple service integration and Kerberos pre-authentication Kerberos process for 2nd LDAPv3 plug-in local mail clients NTLM hash vulnerabilities Open Directory security overview PAM (pluggable authentication module) Password Server preventing anonymous access private/public keys references removing NTLM hashes review shadow hash files shadow passwords single-sign on. [See SSO (single-sign-on)] SMB authentication with Active Directory SSH SSL certificates for secure services strong authentication trusted third party and user authentication 2nd VPNs (virtual private networks) Web of Trust system WEP (Wired Equivalent Privacy) authentication path adding directories to Local directory option authentication search policy AuthenticationAuthority attribute 2nd 3rd authenticators authorization authorization APIs Authorization framework Kerberos Mac OS X security and Open Directory automatic configuration, Kerberos automatic login, disabling automount daemon 2nd |