diff options
author | Eugeni Dodonov <eugeni@mandriva.org> | 2009-01-13 22:43:40 +0000 |
---|---|---|
committer | Eugeni Dodonov <eugeni@mandriva.org> | 2009-01-13 22:43:40 +0000 |
commit | 24acf3686de17cc10018c3892822314f9eecc240 (patch) | |
tree | 8dc3d159463b07daaab0fd582351fe7445fb7058 /man/C | |
parent | e665d55463bc2b662a29fbdd6b747fdd3cc26e3d (diff) | |
download | msec-24acf3686de17cc10018c3892822314f9eecc240.tar msec-24acf3686de17cc10018c3892822314f9eecc240.tar.gz msec-24acf3686de17cc10018c3892822314f9eecc240.tar.bz2 msec-24acf3686de17cc10018c3892822314f9eecc240.tar.xz msec-24acf3686de17cc10018c3892822314f9eecc240.zip |
Updated man page and version.
Diffstat (limited to 'man/C')
-rw-r--r-- | man/C/msec.8 | 38 |
1 files changed, 37 insertions, 1 deletions
diff --git a/man/C/msec.8 b/man/C/msec.8 index 0663c14..8740db4 100644 --- a/man/C/msec.8 +++ b/man/C/msec.8 @@ -1,5 +1,5 @@ .ds q \N'34' -.TH msec 0.60.3 msec "Mandriva Linux" +.TH msec 0.60.4 msec "Mandriva Linux" .SH NAME msec \- Mandriva Linux security tools .SH SYNOPSIS @@ -202,6 +202,15 @@ Accepted values: \fIyes, no\fP .TP 4 +.B \fIenable_sudo\fP +Enables support for sudo application, which allows users to run applications using system account. If yes, users must autenticate themselves using password. If this parameter is set to 'wheel', users must belong to the 'wheel' group to be able to use sudo + +MSEC parameter: \fIENABLE_SUDO\fP + +Accepted values: \fIyes, no, wheel\fP + + +.TP 4 .B \fIallow_xserver_to_listen\fP The argument specifies if clients are authorized to connect to the X server on the tcp port 6000 or not. @@ -418,6 +427,15 @@ Accepted values: \fIyes, no\fP .TP 4 +.B \fIenable_apparmor\fP +Enables support for AppArmor security framework + +MSEC parameter: \fIENABLE_APPARMOR\fP + +Accepted values: \fIyes, no\fP + + +.TP 4 .B \fIallow_x_connections\fP Allow/Forbid X connections. Accepted arguments: yes (all connections are allowed), local (only local connection), no (no connection). @@ -562,6 +580,15 @@ Accepted values: \fIyes, no\fP .TP 4 +.B \fInotify_warn\fP +Enables support for security notifications using libnotify. This allows the security notifications to be delivered directly to the users' desktop + +MSEC parameter: \fINOTIFY_WARN\fP + +Accepted values: \fIyes, no\fP + + +.TP 4 .B \fIallow_remote_root_login\fP Allow/Forbid remote root login via sshd. You can specify yes, no and without-password. See sshd_config(5) man page for more information. @@ -632,6 +659,15 @@ MSEC parameter: \fITTY_WARN\fP Accepted values: \fIyes, no\fP + +.TP 4 +.B \fIenable_policykit\fP +Enables support for PolicyKit framework, which allows ordinary users to run system application + +MSEC parameter: \fIENABLE_POLICYKIT\fP + +Accepted values: \fIyes, no\fP + .RE .SH NOTES Msec applications must be run by root. |