Transition to the Solaris Trusted Extensions Release
The Solaris Trusted Extensions Release
Summary of Removed Trusted Solaris Features
Differences Between Trusted Solaris 8 Software and Solaris Trusted Extensions
Audit Events and Classes in Trusted Extensions
Device Management in Trusted Extensions
Files and File System Mounting in Trusted Extensions
Label APIs in Trusted Extensions
LDAP Naming Service in Trusted Extensions
Named Pipes in Trusted Extensions
Networking in Trusted Extensions
Packaging in Trusted Extensions
Printing in Trusted Extensions
Solaris Management Console in Trusted Extensions
Window System and CDE in Trusted Extensions
Privileges in Trusted Extensions
Trusted Extensions User Commands
Trusted Extensions System Administration Commands
Trusted Extensions System Calls
Trusted Extensions Library Functions
Trusted Extensions Databases and Files
Trusted Extensions Devices and Drivers
Differences Between Solaris 10 8/07 Software and Solaris Trusted Extensions
Installation and Configuration of Trusted Extensions
Desktops in Trusted Extensions
Security Attributes on CDE Actions in Trusted Extensions Software
Administration Tools in Trusted Extensions
Trusted Extensions Software and Removable Media
Additional Rights and Authorizations in Trusted Extensions
New Interfaces in Trusted Extensions Software
A. Interface Changes in the Solaris Trusted Extensions Release
Trusted Extensions administrators assign labels to hosts, zones, devices, and users. Trusted Extensions applies these labels to resources such as files, processes, network packets, and windows. The basis for applying these labels is the host or zone with which the resources are associated.
As in previous Trusted Solaris releases, the Solaris OS provides support for privileges, authorizations, and auditing. Trusted Extensions adds to the privileges, authorizations, rights profiles, audit classes, and audit events that the Solaris OS defines. As in previous releases, Trusted Extensions adds CDE actions to rights profiles.
As in previous releases, the software provides a trusted windowing system, desktop, and administration tools that extend Solaris functionality. Printing is modified to handle labeled print jobs. Also, Trusted Extensions provides a trusted version of the Sun Java Desktop System. This trusted version is called Solaris Trusted Extensions (JDS).
Unlike Trusted Solaris software, Trusted Extensions is a configuration of the underlying Solaris OS. Trusted Extensions does not support the NIS+ naming service. LDAP is the recommended naming service for this release. Also, the root user in Trusted Extensions is identical to the root user in the Solaris OS. You can modify the root user as you can in the Solaris OS, that is, by turning the root user into a role.