Introduction

The first half of this chapter covers setting and displaying Access Control Lists (ACLs). The second portion describes the purpose of Role-Based Access Control (RBAC), covers details on the configuration files used to implement the RBAC, and includes a summary of the commands that can be used to manage the RBAC.

Get Solaris™ 9 System Administrator Exam Cram™ 2 (Exams 310-014 and 310-015) now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.