Apple Training Series: Mac OS X System Administration Reference, Volume 1

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

access control

     databases

     file and folder access rights

     in Mac OS X security model

     networks, managed

access control entries. [See ACEs (access control entries)]

Access Control Lists. [See ACLs (Access Control Lists)]

access points, WLANs

accounts

     categories

     resetting lost passwords

     shell accounts

    user accounts. [See user accounts]

ACEs (access control entries)

     numbering

     overview

     rewriting, deleting, creating

ACLs (Access Control Lists)

     access control entries

     attributes

     creating

     fine grained control with

     modifying keychain ACLs

     overview

     replication and

     securing LDAP servers

Active Directory

     Active Directory KDC

     authentication and identification

     cross-realm authentication

     Directory Access presets

     multiple directory scenarios

     plug-ins for directory service protocols

     shell accounts

     SMB authentication

Active Directory plug-in

     administrative options

     advanced configurations

     bind and 2nd 3rd

     configuration files

     default user experience

     errors

     exploring

     features other than login support

     home folder locations

     initial configuration

     Mac OS X client and server configuration

     Mac OS X server joining Active Directory domain

     mapping options

     MCX and Open Directory integration with Active Directory

     MCX records stored in

     mobile user accounts

     Open Directory and

     overview

     references

     review

     troubleshooting

     user shell

ActiveDirectory.plist

Activity Monitor 2nd

add-in module, CDSA [See also plug-ins]

Address Book, Active Directory integration with

address groups, firewalls

Address Resolution Protocol (ARP)

     in IP stack

     Zeroconf and

admin31GetsSp

administrative access, local system security and

administrative options

     Active Directory plug-in

     Kerberos

administrator accounts 2nd

admins group, Active Directory

ADmitMac

advanced Ethernet options

Advanced pane, for firewall configuration

advanced SSH

AFP (Apple Filing Protocol)

     Connect to Server and

     forked files over

     home folders

     IPv6 and

     locking down access to public servers

     mount command

     Personal File Sharing 2nd

     SSH tunneling and

AFP548 website

AFS (Andrew File System)

AirPort

     cards

     Extreme Base Station

     WLANs and

aliases

     deleting and replacing original files

     moving original files

     overview

     symbolic links compared with

     using

Allow permissions, ACLs

American Registry for Internet Numbers (ARIN)

Andrew File System (AFS)

anonymous binding 2nd

Anonymous Browsing

antennas, WLANs

antivirus programs

Apache, enabling SSL for

APOP

Apple

     certification compliance

     General Troubleshooting Flowchart

     Kerberos adaptation for

     Knowledge Base documents

     LDAP schema

     Mac OS X client integration

     Open Firmware Password support

     registration

Apple Developer Tools (Xcode), building Tripwire with

Apple File Service. [See Personal File Sharing]

Apple Filing Protocol. [See AFP (Apple Filing Protocol)]

Apple Mail

     digital certificates

     encryption with

     filtering junk mail

     incoming mail security

     outgoing mail security

     protecting company email

     testing mail configuration

Apple Remote Desktop (ARD)

     local system security and

     remote monitoring and

apple-generateduid

apple-user-homeurl attribute, LDAP

AppleFileServer

     editing

     overview

     starting

AppleTalk

     file sharing and

     Mac OS X support for 2nd

applications

     Bonjour and

     keychain-aware

     location of

architecture

     Password Server

     replication

     security

Archive and Install, selecting installation type

ARD (Apple Remote Desktop)

     local system security and

     remote monitoring and

ARIN (American Registry for Internet Numbers)

ARP (Address Resolution Protocol)

     in IP stack

     Zeroconf and

arp command

     locating DHCP servers on subnet

     troubleshooting network connectivity

asymmetric cryptography

atlockup command

attackers/attacks

     DoS (Denial of Service) attacks

     reconnaissance attacks

     threat assessment and

attributes

     ACL

     authentication

     creating new

     file permission

     group record

     mount record

     repurposing existing

     Standard vs. Native

     vs. properties

attributes, LDAP

     abbreviated names

     managed client

     mapping Open Directory records to LDAP attributes

     native

     networked user

     object classes and

     overview

audit_control

audit_event

audit_user

audit_warn

auditing

     Apple certification compliance

     centralized log server for

     checksums for auditing software

     detecting Mac OS X intrusions

     detecting UNIX hacks

     log files

     overview

     security audits

authAuthority attribute

authentication

    802.1x. [See 802.1x]

     Active Directory

     back ups and

     CAs (certificate authorities) and

     central data store for

     certificate management and

     choosing authentication method for e-mail

     configuring client authentication

     cryptography and

     defined

     distribution of authentication information

     file-based storage of authentication and identification information

     hash methods

     Kerberos methods

     Kerberos multiple service integration and

     Kerberos pre-authentication

     Kerberos process for 2nd

     LDAPv3 plug-in

     local

     mail clients

     NTLM hash vulnerabilities

     Open Directory security

     overview

     PAM (pluggable authentication module)

     Password Server

     preventing anonymous access

     private/public keys

     references

     removing NTLM hashes

     review

     shadow hash files

     shadow passwords

    single-sign on. [See SSO (single-sign-on)]

     SMB authentication with Active Directory

     SSH

     SSL certificates for secure services

     strong authentication

     trusted third party and

     user authentication 2nd

     VPNs (virtual private networks)

     Web of Trust system

     WEP (Wired Equivalent Privacy)

authentication path

     adding directories to

     Local directory option

authentication search policy

AuthenticationAuthority attribute 2nd 3rd

authenticators

authorization

     authorization APIs

     Authorization framework

     Kerberos

     Mac OS X security and

     Open Directory

automatic configuration, Kerberos

automatic login, disabling

automount daemon 2nd

Категории