JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

Index

A

access, See computer access
access policy
devices, Device Access Policies
Discretionary Access Control (DAC)
Trusted Extensions Software and the Oracle Solaris OS
Differences Between Trusted Extensions and the Oracle Solaris OS
Mandatory Access Control (MAC), Differences Between Trusted Extensions and the Oracle Solaris OS
accessing
Admin Editor action, How to Edit Administrative Files in Trusted Extensions
administrative tools, Getting Started as a Trusted Extensions Administrator (Task Map)
audit records by label, Audit Tasks of the System Administrator
devices, Device Protection With Trusted Extensions Software
global zone, How to Enter the Global Zone in Trusted Extensions
home directories, Zones in Trusted Extensions
printers, Labels, Printers, and Printing
remote multilevel desktop, How to Use Xvnc to Remotely Access a Trusted Extensions System
Solaris Management Console, How to Administer the Local System With the Solaris Management Console
trusted CDE actions, How to Start CDE Administrative Actions in Trusted Extensions
ZFS dataset mounted in lower-level zone from higher-level zone, How to Share a ZFS Dataset From a Labeled Zone
account locking, preventing, How to Prevent Account Locking for Users
accounts
See roles
See also users
accreditation checks, Trusted Extensions Accreditation Checks
accreditation ranges, label_encodings file, Label Encodings File
actions
See also individual actions by name
adding new Trusted CDE actions, Adding Trusted CDE Actions
Admin Editor, How to Edit Administrative Files in Trusted Extensions
Device Allocation Manager
Device Allocation Manager GUI
Device Allocation Manager GUI
list of trusted CDE, Trusted CDE Actions
Name Service Switch, How to Debug the Trusted Extensions Network
restricted by rights profiles, Trusted Processes in the Window System
use differences between CDE and Trusted CDE, Adding Trusted CDE Actions
add_allocatable command, Command Line Tools in Trusted Extensions
Add Allocatable Device action, Trusted CDE Actions
Admin Editor action, Trusted CDE Actions
opening, How to Edit Administrative Files in Trusted Extensions
ADMIN_HIGH label, Dominance Relationships Between Labels
ADMIN_LOW label
lowest label, Dominance Relationships Between Labels
protecting administrative files, Password Protection
administering
account locking, How to Prevent Account Locking for Users
assigning device authorizations, How to Assign Device Authorizations
audio device to play music, How to Configure an Audio Player Program for Use in Trusted CDE
auditing in Trusted Extensions, Audit Management by Role in Trusted Extensions
changing label of information, How to Enable a User to Change the Security Level of Data
convenient authorizations for users, How to Create a Rights Profile for Convenient Authorizations
device allocation, How to Assign Device Authorizations
device authorizations, How to Create New Device Authorizations
devices
Managing Devices for Trusted Extensions (Tasks)
Managing Devices in Trusted Extensions (Task Map)
file systems
mounting, How to NFS Mount Files in a Labeled Zone
overview, Sharing and Mounting Files in Trusted Extensions
troubleshooting, How to Troubleshoot Mount Failures in Trusted Extensions
files
backing up, How to Back Up Files in Trusted Extensions
restoring, How to Restore Files in Trusted Extensions
from the global zone, How to Enter the Global Zone in Trusted Extensions
labeled printing, Managing Labeled Printing (Tasks)
LDAP, Trusted Extensions and LDAP (Overview)
mail, Multilevel Mail in Trusted Extensions (Overview)
multilevel ports, How to Compare Trusted Network Database Information With the Kernel Cache
network in Trusted Extensions, Managing Networks in Trusted Extensions (Tasks)
network of users, Managing Users and Rights With the Solaris Management Console (Task Map)
PostScript printing, How to Enable Users to Print PostScript Files in Trusted Extensions
printing in Trusted Extensions, Managing Printing in Trusted Extensions (Task Map)
printing interoperability with Trusted Solaris 8, Interoperability of Trusted Extensions With Trusted Solaris 8 Printing
quick reference for administrators, Quick Reference to Trusted Extensions Administration
remote host database, How to Assign a Security Template to a Host or a Group of Hosts
remote host templates, How to Construct a Remote Host Template
remotely, Remote Administration in Trusted Extensions (Tasks)
remotely from command line, How to Log In Remotely From the Command Line in Trusted Extensions
remotely with dtappsession, How to Remotely Administer Trusted Extensions With dtappsession
remotely with Solaris Management Console
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
routes with security attributes, How to Configure Routes With Security Attributes
serial line for login, How to Configure a Serial Line for Logins
sharing file systems, How to Share Directories From a Labeled Zone
startup files for users, How to Configure Startup Files for Users in Trusted Extensions
Sun Ray printing, How to Configure a Network Printer for Sun Ray Clients
system files, How to Change Security Defaults in System Files
third-party software, Software Management in Trusted Extensions (Tasks)
timeout when relabeling information, How to Lengthen the Timeout When Relabeling Information
trusted network databases, Configuring Trusted Network Databases (Task Map)
trusted networking, Managing Networks in Trusted Extensions (Tasks)
unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
user privileges, How to Restrict a User's Set of Privileges
users
Decisions to Make Before Creating Users in Trusted Extensions
Managing Users, Rights, and Roles in Trusted Extensions (Tasks)
zones, Managing Zones (Task Map)
zones from Trusted JDS, Zone Administration Utilities in Trusted Extensions
Administering Trusted Extensions Remotely (Task Map), Administering Trusted Extensions Remotely (Task Map)
administrative actions
See also actions
accessing, How to Edit Administrative Files in Trusted Extensions
in CDE, Trusted CDE Actions
in Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted Extensions
list of trusted CDE, Trusted CDE Actions
starting remotely
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
trusted, Trusted Processes in the Window System
administrative labels, Dominance Relationships Between Labels
administrative roles, See roles
Administrative Roles tool, Trusted Extensions Tools in the Solaris Management Console
administrative tools
accessing, Getting Started as a Trusted Extensions Administrator (Task Map)
commands, Command Line Tools in Trusted Extensions
description, Trusted Extensions Administration Tools
Device Allocation Manager, Device Allocation Manager
in Trusted_Extensions folder, How to Start CDE Administrative Actions in Trusted Extensions
label builder, Label Builder in Trusted Extensions
Labeled Zone Manager, txzonemgr Script
Solaris Management Console
Solaris Management Console Tools
How to Administer the Local System With the Solaris Management Console
Trusted CDE actions, Trusted CDE Actions
txzonemgr script, txzonemgr Script
allocate command, Command Line Tools in Trusted Extensions
Allocate Device authorization
How to Create a Rights Profile for Convenient Authorizations
Device Protection With Trusted Extensions Software
How to Assign Device Authorizations
How to Assign Device Authorizations
allocate error state, correcting, How to Revoke or Reclaim a Device in Trusted Extensions
allocating, using Device Allocation Manager, Device Allocation Manager GUI
applications
evaluating for security, Security Administrator Responsibilities for Trusted Programs
installing, Managing Software in Trusted Extensions (Tasks)
trusted and trustworthy, Evaluating Software for Security
assigning
editor as the trusted editor, How to Assign the Editor of Your Choice as the Trusted Editor
privileges to users, Security Attribute Assignment to Users in Trusted Extensions
rights profiles, Security Attribute Assignment to Users in Trusted Extensions
Assume Role menu item, How to Enter the Global Zone in Trusted Extensions
assuming, roles, How to Enter the Global Zone in Trusted Extensions
atohexlabel command
Command Line Tools in Trusted Extensions
How to Obtain the Hexadecimal Equivalent for a Label
audio devices
automatically starting an audio player, How to Configure an Audio Player Program for Use in Trusted CDE
preventing remote allocation, How to Protect Nonallocatable Devices in Trusted Extensions
audit_class file, action for editing, Trusted CDE Actions
Audit Classes action, Trusted CDE Actions
audit classes for Trusted Extensions, list of new X audit classes, Trusted Extensions Audit Classes
Audit Control action, Trusted CDE Actions
audit_control file, action for editing, Trusted CDE Actions
audit_event file, Trusted CDE Actions
Audit Events action, Trusted CDE Actions
audit events for Trusted Extensions, list of, Trusted Extensions Audit Events
audit policy in Trusted Extensions, Trusted Extensions Audit Policy Options
audit records in Trusted Extensions, policy, Trusted Extensions Audit Policy Options
Audit Review profile, reviewing audit records, Audit Tasks of the System Administrator
Audit Startup action, Trusted CDE Actions
audit_startup command, action for editing, Trusted CDE Actions
Audit Tasks of the System Administrator, Audit Tasks of the System Administrator
audit tokens for Trusted Extensions
label token, label Token
list of, Trusted Extensions Audit Tokens
xatom token, xatom Token
xclient token, xclient Token
xcolormap token, xcolormap Token
xcursor token, xcursor Token
xfont token, xfont Token
xgc token, xgc Token
xpixmap token, xpixmap Token
xproperty token, xproperty Token
xselect token, xselect Token
xwindow token, xwindow Token
auditconfig command, Command Line Tools in Trusted Extensions
auditing in Trusted Extensions
additional audit events, Trusted Extensions Audit Events
additional audit policies, Trusted Extensions Audit Policy Options
additional audit tokens, Trusted Extensions Audit Tokens
additions to existing auditing commands, Extensions to Auditing Commands in Trusted Extensions
differences from Oracle Solaris auditing, Trusted Extensions and Auditing
reference, Trusted Extensions Auditing (Overview)
roles for administering, Audit Management by Role in Trusted Extensions
security administrator tasks, Audit Tasks of the Security Administrator
system administrator tasks, Audit Tasks of the System Administrator
tasks, Audit Tasks in Trusted Extensions
X audit classes, Trusted Extensions Audit Classes
auditreduce command, Command Line Tools in Trusted Extensions
authorizations
adding new device authorizations, How to Create New Device Authorizations
Allocate Device
Device Protection With Trusted Extensions Software
How to Assign Device Authorizations
How to Assign Device Authorizations
assigning, Security Attribute Assignment to Users in Trusted Extensions
assigning device authorizations, How to Assign Device Authorizations
authorizing a user or role to change label, How to Enable a User to Change the Security Level of Data
Configure Device Attributes, How to Assign Device Authorizations
convenient for users, How to Create a Rights Profile for Convenient Authorizations
creating customized device authorizations, How to Create New Device Authorizations
creating local and remote device authorizations, How to Create New Device Authorizations
customizing for devices, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
granted, Trusted Extensions and Access Control
Print Postscript, PostScript Printing of Security Information
Print PostScript, How to Enable Users to Print PostScript Files in Trusted Extensions
profiles that include device allocation authorizations, How to Assign Device Authorizations
Revoke or Reclaim Device
How to Assign Device Authorizations
How to Assign Device Authorizations
solaris.print.nobanner, How to Suppress Banner and Trailer Pages for Specific Users
solaris.print.ps, How to Enable Users to Print PostScript Files in Trusted Extensions
authorizing
device allocation, How to Assign Device Authorizations
PostScript printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
unlabeled printing, Reducing Printing Restrictions in Trusted Extensions (Task Map)
automount command, Command Line Tools in Trusted Extensions