| Sudoers option | Explanation |
|---|---|
| admin_flag | Safeguard does not use an admin flag file. |
| apparmor_profile | AppArmor policies are not supported. |
| compress_io | Compresses I/O logs using zlib. |
| fast_glob | fast_glob is always enabled; disabling fast_glob has no effect. |
| fdexec | Execute by file descriptor instead of path, not supported. |
| ignore_local_sudoers | Sudoers in LDAP is not supported. |
| iolog_dir (‘%’) escape sequences %{seq} | The %{seq} escape sequence is not supported. |
|
iolog_flush |
Safeguard keystroke logs are not buffered so this option is always on. |
|
iolog_group |
Safeguard keystroke logs are owned by the pmlog group. |
|
iolog_mode |
Safeguard keystroke logs are readable and writable by the root user and readable by the pmlog group. |
|
iolog_user |
Safeguard keystroke logs are owned by the root user. |
|
lecture_status_dir |
Safeguard stores the lecture status with the time stamp data. |
|
limitprivs |
Default set of Solaris limit privileges; not supported. |
|
log_server_cabundle |
Safeguard uses auditsrvCAbundle in pm.settings instead. |
|
log_server_keepalive |
Safeguard uses auditsrvKeepalive in pm.settings instead. |
|
log_server_peer_cert |
Safeguard uses auditsrvCert in pm.settings instead. |
|
log_server_peer_key |
Safeguard uses auditsrvPkey in pm.settings instead. |
|
log_server_timeout |
Safeguard uses auditsrvTimeout in pm.settings instead. |
|
log_server_verify |
Safeguard uses auditsrvTLSVerify in pm.settings instead. |
|
log_servers |
Safeguard uses auditsrvHosts in pm.settings instead. |
|
maxseq |
Maximum I/O sequence number; not used by Safeguard. |
|
noninteractive_auth |
Authentication is only attempted in interactive mode. |
|
pam_acct_mgmt |
Safeguard always runs PAM account management modules. |
|
pam_askpass_service |
PAM service to use with "sudo -A"; Safeguard always uses "sudo". |
|
pam_login_service |
PAM service to use for login shells; Safeguard always uses "sudo". |
|
pam_rhost |
Safeguard does not set the PAM remote host. |
|
pam_ruser |
Safeguard does not set the PAM remote user. |
|
pam_service |
PAM service name to use; Safeguard always uses "sudo". |
|
pam_session |
Safeguard always creates a new PAM session. |
|
pam_setcred |
Attempts to establish PAM credentials for the target user; not used by Safeguard. |
| passprompt_override | Forces sudo to always use passprompt. |
|
privs |
Default set of permitted Solaris privileges, not supported. |
| pwfeedback | When set, sudo provides visual feedback when you press a key. |
| role | SELinux RBAC not supported. |
| selinux | SELinux RBAC not supported. |
| stay_setuid | Forces sudo to act as a setuid wrapper. |
|
timestamp_type |
Safeguard uses its own time stamp format. |
| timestampdir | The directory in which sudo stores its timestamp files. |
| timestampowner | The owner of the timestamp directory and the timestamps stored therein. |
| type | SELinux RBAC not supported. |
|
use_loginclass |
BSD login classes are not supported. |
|
use_pty |
Not relevant; pty is always used. |
|
visiblepw |
Safeguard does not allow the password to echo to screen. |