JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Solaris Trusted Extensions Transition Guide
search filter icon
search icon

Document Information

Preface

Transition to the Solaris Trusted Extensions Release

The Solaris Trusted Extensions Release

Overview of Changes From Trusted Solaris Software

Summary of Removed Trusted Solaris Features

Differences Between Trusted Solaris 8 Software and Solaris Trusted Extensions

Audit Events and Classes in Trusted Extensions

Device Management in Trusted Extensions

Files and File System Mounting in Trusted Extensions

Labels in Trusted Extensions

Label APIs in Trusted Extensions

Mail in Trusted Extensions

LDAP Naming Service in Trusted Extensions

Named Pipes in Trusted Extensions

Networking in Trusted Extensions

Packaging in Trusted Extensions

PAM in Trusted Extensions

Policy in Trusted Extensions

Printing in Trusted Extensions

Solaris Management Console in Trusted Extensions

Window System and CDE in Trusted Extensions

Zones in Trusted Extensions

Privileges in Trusted Extensions

Trusted Extensions User Commands

Trusted Extensions System Administration Commands

Trusted Extensions System Calls

Trusted Extensions Library Functions

Trusted Extensions Databases and Files

Trusted Extensions Devices and Drivers

Differences Between Solaris 10 8/07 Software and Solaris Trusted Extensions

Installation and Configuration of Trusted Extensions

Desktops in Trusted Extensions

Security Attributes on CDE Actions in Trusted Extensions Software

Administration Tools in Trusted Extensions

Trusted Device Management

Trusted Printing

Trusted Extensions Software and Removable Media

Additional Rights and Authorizations in Trusted Extensions

New Interfaces in Trusted Extensions Software

A.  Interface Changes in the Solaris Trusted Extensions Release

Differences Between Solaris 10 8/07 Software and Solaris Trusted Extensions

Trusted Extensions builds on Solaris software, and can restrict the use of some Solaris utilities. The differences affect users, administrators, and developers. Configuration options that are optional on a Solaris system can be required by Trusted Extensions. For example, roles are required to administer the system, and the Solaris Management Console is required to administer users, roles, profiles, and the network. Zones must be installed, and each zone must be assigned a unique label.

Installation and Configuration of Trusted Extensions

Solaris Trusted Extensions installs as a set of packages on a newly installed Solaris 10 system. The following installation practices should be followed:

Desktops in Trusted Extensions

Solaris Trusted Extensions supports a trusted version of the Sun Java Desktop System, (Trusted JDS) as well as CDE. The Trusted CDE desktop continues to support the visible Trusted Solaris features, such as labels, trusted stripe, the Device Allocation Manager, the Admin Editor, and so on.

New administrative actions in CDE 1.7 are modified for security on the Trusted Extensions desktop. Actions that are unique to Trusted Extensions are in the Trusted_Extensions folder.

Security Attributes on CDE Actions in Trusted Extensions Software

Trusted Extensions adds CDE actions to the objects that can be assigned security attributes in the exec_attr database. CDE actions can be constrained by label by customizing the Workspace Menu to include only actions that are relevant to a specific label. To customize the menu, see How to Customize the CDE Workspace Menu in Solaris Trusted Extensions User’s Guide

Administration Tools in Trusted Extensions

Secure administration requires the use of GUIs that Trusted Extensions provides. Trusted Extensions provides actions in the Trusted_Extensions folder in CDE, a Device Allocation Manager, and the Solaris Management Console. Trusted Extensions adds tools and options to existing tools in the Solaris Management Console GUI. This GUI enables administrators to manage users, networks, zones, and other databases. After launching the Solaris Management Console, the administrator chooses a Trusted Extensions “toolbox”. The toolbox is a collection of programs. The administrator then uses the programs that are permitted to the role.

Trusted Device Management

The Solaris OS provides three methods of managing devices: the Volume Manager (vold), logindevperm and device allocation. As in the Trusted Solaris 8 releases, Trusted Extensions supports only device allocation. The Device Allocation Manager GUI is used to create an allocatable device. All devices that are allocated to a zone get deallocated when that zone shuts down, halts, or reboots. Device allocation can be done remotely or in shell scripts only from the global zone.

The allocate, deallocate, and list_devices commands do not work in labeled zones for roles or ordinary users. Users and roles must use the Device Allocation Manager GUI to allocate, deallocate and list devices. Trusted Extensions adds the solaris.device.config authorization to configure devices.

Trusted Printing

To manage printers, use the Printer Administrator action in the System_Admin folder in the global zone. To limit the label range of a printer, use the Device Allocation Manager in the global zone.

Trusted Extensions Software and Removable Media

Use the Solaris Management Console Devices and Hardware tool to manage serial lines and serial ports in the global zone. To limit the label range of removable media, use the Device Allocation Manager in the global zone.

Additional Rights and Authorizations in Trusted Extensions

The Solaris Trusted Extensions release adds privileged commands to the Device Security profile, and privileged actions to many profiles.

The Solaris Trusted Extensions release adds the following authorizations:

The Solaris Trusted Extensions release adds the following rights profiles:

The Solaris Trusted Extensions release adds label authorizations and service management authorizations to the following rights profiles:

Together, the Information Security and the User Security rights profiles define the Security Administrator role.