| Sudoers option | Explanation | 
|---|---|
| admin_flag | Safeguard does not use an admin flag file. | 
| apparmor_profile | AppArmor policies are not supported. | 
| compress_io | Compresses I/O logs using zlib. | 
| fast_glob | fast_glob is always enabled; disabling fast_glob has no effect. | 
| fdexec | Execute by file descriptor instead of path, not supported. | 
| ignore_local_sudoers | Sudoers in LDAP is not supported. | 
| iolog_dir (‘%’) escape sequences %{seq} | The %{seq} escape sequence is not supported. | 
| iolog_flush | Safeguard keystroke logs are not buffered so this option is always on. | 
| iolog_group | Safeguard keystroke logs are owned by the pmlog group. | 
| iolog_mode | Safeguard keystroke logs are readable and writable by the root user and readable by the pmlog group. | 
| iolog_user | Safeguard keystroke logs are owned by the root user. | 
| lecture_status_dir | Safeguard stores the lecture status with the time stamp data. | 
| limitprivs | Default set of Solaris limit privileges; not supported. | 
| log_server_cabundle | Safeguard uses auditsrvCAbundle in pm.settings instead. | 
| log_server_keepalive | Safeguard uses auditsrvKeepalive in pm.settings instead. | 
| log_server_peer_cert | Safeguard uses auditsrvCert in pm.settings instead. | 
| log_server_peer_key | Safeguard uses auditsrvPkey in pm.settings instead. | 
| log_server_timeout | Safeguard uses auditsrvTimeout in pm.settings instead. | 
| log_server_verify | Safeguard uses auditsrvTLSVerify in pm.settings instead. | 
| log_servers | Safeguard uses auditsrvHosts in pm.settings instead. | 
| maxseq | Maximum I/O sequence number; not used by Safeguard. | 
| noninteractive_auth | Authentication is only attempted in interactive mode. | 
| pam_acct_mgmt | Safeguard always runs PAM account management modules. | 
| pam_askpass_service | PAM service to use with "sudo -A"; Safeguard always uses "sudo". | 
| pam_login_service | PAM service to use for login shells; Safeguard always uses "sudo". | 
| pam_rhost | Safeguard does not set the PAM remote host. | 
| pam_ruser | Safeguard does not set the PAM remote user. | 
| pam_service | PAM service name to use; Safeguard always uses "sudo". | 
| pam_session | Safeguard always creates a new PAM session. | 
| pam_setcred | Attempts to establish PAM credentials for the target user; not used by Safeguard. | 
| passprompt_override | Forces sudo to always use passprompt. | 
| privs | Default set of permitted Solaris privileges, not supported. | 
| pwfeedback | When set, sudo provides visual feedback when you press a key. | 
| role | SELinux RBAC not supported. | 
| selinux | SELinux RBAC not supported. | 
| stay_setuid | Forces sudo to act as a setuid wrapper. | 
| timestamp_type | Safeguard uses its own time stamp format. | 
| timestampdir | The directory in which sudo stores its timestamp files. | 
| timestampowner | The owner of the timestamp directory and the timestamps stored therein. | 
| type | SELinux RBAC not supported. | 
| use_loginclass | BSD login classes are not supported. | 
| use_pty | Not relevant; pty is always used. | 
| visiblepw | Safeguard does not allow the password to echo to screen. | 
