JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

R

real UID of root, required for applications, Evaluating Software for Security
Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
regaining control of desktop focus, How to Regain Control of the Desktop's Current Focus
regular users, See users
relabeling information, How to Enable a User to Change the Security Level of Data
remote administration
defaults, Secure Remote Administration in Trusted Extensions
methods, Methods for Administering Remote Systems in Trusted Extensions
remote host templates
assigning, Configuring Trusted Network Databases (Task Map)
assigning to hosts, How to Assign a Security Template to a Host or a Group of Hosts
creating, How to Construct a Remote Host Template
tool for administering, Security Templates Tool
remote hosts, using fallback mechanism in tnrhdb, Trusted Network Fallback Mechanism
Remote Login authorization, How to Create a Rights Profile for Convenient Authorizations
remote multilevel desktop, accessing, How to Use Xvnc to Remotely Access a Trusted Extensions System
removable media, mounting, How to Add a Software Package in Trusted Extensions
remove_allocatable command, Command Line Tools in Trusted Extensions
removing, labels on printer output, How to Remove Labels From Printed Output
repairing, labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
resolv.conf file, action for editing, Trusted CDE Actions
Restart Zone action, Trusted CDE Actions
restoring control of desktop focus, How to Regain Control of the Desktop's Current Focus
restricting
access to computer based on label, Effects of Label Range on a Device
access to devices, Device Protection With Trusted Extensions Software
access to global zone, Role Assumption in Trusted Extensions
access to lower-level files, How to Disable the Mounting of Lower-Level Files
access to printers with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
actions by rights profiles, Trusted Processes in the Window System
mounts of lower-level files, How to Disable the Mounting of Lower-Level Files
printer access with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
printer label range, How to Configure a Restricted Label Range for a Printer
remote access, Secure Remote Administration in Trusted Extensions
Revoke or Reclaim Device authorization
How to Assign Device Authorizations
How to Assign Device Authorizations
rights, See rights profiles
rights profiles
assigning, Security Attribute Assignment to Users in Trusted Extensions
controlling the use of actions, Trusted Processes in the Window System
Convenient Authorizations, How to Create a Rights Profile for Convenient Authorizations
with Allocate Device authorization, How to Assign Device Authorizations
with device allocation authorizations, How to Assign Device Authorizations
with new device authorizations, How to Create New Device Authorizations
Rights tool, Trusted Extensions Tools in the Solaris Management Console
rmmount.conf file
How to Configure an Audio Player Program for Use in Trusted CDE
How to Prevent the File Manager From Displaying After Device Allocation
role workspace, global zone, Security Requirements When Administering Trusted Extensions
roles
administering auditing, Role Setup for Audit Administration
administering remotely
How to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
How to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
assigning rights, Security Attribute Assignment to Users in Trusted Extensions
assuming
Security Requirements When Administering Trusted Extensions
How to Enter the Global Zone in Trusted Extensions
creating, Role Creation in Trusted Extensions
leaving role workspace, How to Exit the Global Zone in Trusted Extensions
remote login, Remote Login by a Role in Trusted Extensions
role assumption from unlabeled host, Remote Role-Based Administration From Unlabeled Hosts
trusted application access, Administration Tools for Trusted Extensions
workspaces, Security Requirements When Administering Trusted Extensions
root UID, required for applications, Evaluating Software for Security
route command
Command Line Tools in Trusted Extensions
Network Commands in Trusted Extensions
routing, Overview of Routing in Trusted Extensions
accreditation checks, Trusted Extensions Accreditation Checks
commands in Trusted Extensions, Routing Commands in Trusted Extensions
concepts, Administration of Routing in Trusted Extensions
example of, Gateways in Trusted Extensions
static with security attributes, How to Configure Routes With Security Attributes
tables
Routing Table Entries in Trusted Extensions
Choosing Routers in Trusted Extensions
using route command, How to Configure Routes With Security Attributes