POLICY.CONF(5)         File Formats and Configurations        POLICY.CONF(5)
NAME
       policy.conf - configuration file for security policy
SYNOPSIS
       /etc/security/policy.conf
DESCRIPTION
       The 
policy.conf file provides the security policy configuration for
       user-level attributes. Each entry consists of a key/value pair in the
       form:
       key=value
       The following keys are defined:       
AUTHS_GRANTED           Specify the default set of authorizations granted to all users.
           This entry is interpreted by 
chkauthattr(3SECDB). The value is
           zero or more comma-separated authorizations defined in           
auth_attr(5).       
PROFS_GRANTED           Specify the default set of profiles granted to all users. This
           entry is interpreted by 
chkauthattr(3SECDB) and           
getexecuser(3SECDB). The value is zero or more comma-separated
           profiles defined in 
prof_attr(5).       
CONSOLE_USER           Specify an additional default set of profiles granted to the           
console user user. This entry is interpreted by           
chkauthattr(3SECDB) and 
getexecuser(3SECDB). The value is zero or
           more comma-separated profiles defined in 
prof_attr(5).       
PRIV_DEFAULT and 
PRIV_LIMIT           Settings for these keys determine the default privileges that
           users have. (See 
privileges(7).) If these keys are not set, the
           default privileges are taken from the inherited set. 
PRIV_DEFAULT           determines the default set on login. 
PRIV_LIMIT defines the limit
           set on login. Users can have privileges assigned or taken away
           through use of 
user_attr(5). Privileges can also be assigned to
           profiles, in which case users who have those profiles can
           exercise the assigned privileges through 
pfexec(1).
           For maximum future compatibility, the privilege specifications
           should always include 
basic or 
all. Privileges should then be
           removed using negation. See EXAMPLES. By assigning privileges in
           this way, you avoid a situation where, following an addition of a
           currently unprivileged operation to the basic privilege set, a
           user unexpectedly does not have the privileges he needs to
           perform that now-privileged operation.
           Note that removing privileges from the limit set requires 
extreme           care, as any set-uid root program might suddenly fail because it
           lacks certain privilege(s). Note also that dropping 
basic           privileges from the default privilege set can cause unexpected
           failure modes in applications.       
LOCK_AFTER_RETRIES=YES|NO           Specifies whether a local account is locked after the count of
           failed logins for a user equals or exceeds the allowed number of
           retries as defined by 
RETRIES in 
/etc/default/login. The default
           value for users is 
NO. Individual account overrides are provided
           by 
user_attr(5).       
CRYPT_ALGORITHMS_ALLOW           Specify the algorithms that are allowed for new passwords and is
           enforced only in 
crypt_gensalt(3C).       
CRYPT_ALGORITHMS_DEPRECATE           Specify the algorithm for new passwords that is to be deprecated.
           For example, to deprecate use of the traditional UNIX algorithm,
           specify 
CRYPT_ALGORITHMS_DEPRECATE=__unix__ and change           
CRYPT_DEFAULT= to another algorithm, such as 
CRYPT_DEFAULT=1 for
           BSD and Linux MD5.       
CRYPT_DEFAULT           Specify the default algorithm for new passwords. The Solaris
           default was once the traditional UNIX algorithm. This is not
           listed in 
crypt.conf(5) since it is internal to 
libc. The
           reserved name 
__unix__ is used to refer to it.
       The key/value pair must appear on a single line, and the key must
       start the line. Lines starting with 
# are taken as comments and
       ignored. Option name comparisons are case-insensitive.
       Only one 
CRYPT_ALGORITHMS_ALLOW or 
CRYPT_ALGORITHMS_DEPRECATE value
       can be specified. Whichever is listed first in the file takes
       precedence. The algorithm specified for 
CRYPT_DEFAULT must either be
       specified for 
CRYPT_ALGORITHMS_ALLOW or not be specified for       
CRYPT_ALGORITHMS_DEPRECATE. If 
CRYPT_DEFAULT is not specified, the
       default is 
__unix__.
EXAMPLES
       Example 1: Defining a Key/Value Pair
         AUTHS_GRANTED=solaris.date       Example 2: Specifying Privileges
       As noted above, you should specify privileges through negation,
       specifying 
all for 
PRIV_LIMIT and 
basic for 
PRIV_DEFAULT, then
       subtracting privileges, as shown below.
         PRIV_LIMIT=all,!sys_linkdir
         PRIV_DEFAULT=basic,!file_link_any
       The first line, above, takes away only the 
sys_linkdir privilege. The
       second line takes away only the 
file_link privilege. These privilege
       specifications are unaffected by any future addition of privileges
       that might occur.
FILES
       /etc/user_attr                                    Defines extended user attributes.       
/etc/security/auth_attr                                    Defines authorizations.       
/etc/security/prof_attr                                    Defines profiles.       
/etc/security/policy.conf                                    Defines policy for the system.
ATTRIBUTES
       See 
attributes(7) for descriptions of the following attributes:
       +--------------------+-----------------+
       |  ATTRIBUTE TYPE    | ATTRIBUTE VALUE |
       +--------------------+-----------------+
       |Interface Stability | Committed       |
       +--------------------+-----------------+
SEE ALSO
       login(1), 
pfexec(1), 
chkauthattr(3SECDB), 
getexecuser(3SECDB),       
auth_attr(5), 
crypt.conf(5), 
prof_attr(5), 
user_attr(5),       
attributes(7), 
privileges(7)NOTES
       The 
console user is defined as the owner of 
/dev/console.
                              February 25, 2008               POLICY.CONF(5)