System Administration Guide: Security Services
Previous Next

Managing RBAC (Task Map)

The following task map points to procedures for customizing role-based access control (RBAC) after RBAC has been initially implemented.



For Instructions

Change the role password

An authorized user or role changes the password of another role.

How to Change the Password of a Role

Modify the properties of a role

Modifies the capabilities (privileges, privileged commands, profiles, or authorizations) of a role.

How to Change the Properties of a Role

Create or change rights profiles

Creates a rights profile. Or modifies the authorizations, privileged commands, or supplementary rights profiles in a rights profile.

How to Create or Change a Rights Profile

Change a user's administrative capabilities

Adds a role, a rights profile, an authorization, or privileges to an ordinary user.

How to Change the RBAC Properties of a User

Secure legacy applications

Turns on the set ID permissions for legacy applications. Scripts can contain commands with set IDs. Legacy applications can check for authorizations, if appropriate.

How to Add RBAC Properties to Legacy Applications

These procedures manage the elements that are used in RBAC. For user management procedures, refer to Chapter 5, Managing User Accounts and Groups (Tasks), in System Administration Guide: Basic Administration.

Previous Next