JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Solaris Trusted Extensions Transition Guide
search filter icon
search icon

Document Information

Preface

Transition to the Solaris Trusted Extensions Release

The Solaris Trusted Extensions Release

Overview of Changes From Trusted Solaris Software

Summary of Removed Trusted Solaris Features

Differences Between Trusted Solaris 8 Software and Solaris Trusted Extensions

Audit Events and Classes in Trusted Extensions

Device Management in Trusted Extensions

Files and File System Mounting in Trusted Extensions

Labels in Trusted Extensions

Label APIs in Trusted Extensions

Mail in Trusted Extensions

LDAP Naming Service in Trusted Extensions

Named Pipes in Trusted Extensions

Networking in Trusted Extensions

Packaging in Trusted Extensions

PAM in Trusted Extensions

Policy in Trusted Extensions

Printing in Trusted Extensions

Solaris Management Console in Trusted Extensions

Window System and CDE in Trusted Extensions

Zones in Trusted Extensions

Privileges in Trusted Extensions

Trusted Extensions User Commands

Trusted Extensions System Administration Commands

Trusted Extensions System Calls

Trusted Extensions Library Functions

Trusted Extensions Databases and Files

Trusted Extensions Devices and Drivers

Differences Between Solaris 10 8/07 Software and Solaris Trusted Extensions

Installation and Configuration of Trusted Extensions

Desktops in Trusted Extensions

Security Attributes on CDE Actions in Trusted Extensions Software

Administration Tools in Trusted Extensions

Trusted Device Management

Trusted Printing

Trusted Extensions Software and Removable Media

Additional Rights and Authorizations in Trusted Extensions

New Interfaces in Trusted Extensions Software

A.  Interface Changes in the Solaris Trusted Extensions Release

Overview of Changes From Trusted Solaris Software

Trusted Extensions administrators assign labels to hosts, zones, devices, and users. Trusted Extensions applies these labels to resources such as files, processes, network packets, and windows. The basis for applying these labels is the host or zone with which the resources are associated.

As in previous Trusted Solaris releases, the Solaris OS provides support for privileges, authorizations, and auditing. Trusted Extensions adds to the privileges, authorizations, rights profiles, audit classes, and audit events that the Solaris OS defines. As in previous releases, Trusted Extensions adds CDE actions to rights profiles.

As in previous releases, the software provides a trusted windowing system, desktop, and administration tools that extend Solaris functionality. Printing is modified to handle labeled print jobs. Also, Trusted Extensions provides a trusted version of the Sun Java Desktop System. This trusted version is called Solaris Trusted Extensions (JDS).

Unlike Trusted Solaris software, Trusted Extensions is a configuration of the underlying Solaris OS. Trusted Extensions does not support the NIS+ naming service. LDAP is the recommended naming service for this release. Also, the root user in Trusted Extensions is identical to the root user in the Solaris OS. You can modify the root user as you can in the Solaris OS, that is, by turning the root user into a role.