D
- DAC, See discretionary access control (DAC)
- databases
- devices, Trusted CDE Actions
- in LDAP, Using a Naming Service in Trusted Extensions
- trusted network, Network Configuration Databases in Trusted Extensions
- datasets, See ZFS
- deallocate command, Command Line Tools in Trusted Extensions
- deallocating, forcing, How to Revoke or Reclaim a Device in Trusted Extensions
- debugging, See troubleshooting
- desktops
- accessing multilevel remotely, How to Use Xvnc to Remotely Access a Trusted Extensions System
- logging in to a failsafe session, How to Log In to a Failsafe Session in Trusted Extensions
- workspace color changes, How to Enter the Global Zone in Trusted Extensions
- /dev/kmem kernel image file, security violation, Evaluating Software for Security
- developer responsibilities, Developer Responsibilities When Creating Trusted Programs
- device allocation
- authorizing, How to Assign Device Authorizations
- overview, Device Protection With Trusted Extensions Software
- preventing File Manager display, How to Prevent the File Manager From Displaying After Device Allocation
- profiles that include allocation authorizations, How to Assign Device Authorizations
- Device Allocation Manager
- administrative tool, Administration Tools for Trusted Extensions
- description, Device Allocation Manager GUI
- device-clean scripts
- adding to devices, How to Add a Device_Clean Script in Trusted Extensions
- requirements, Device-Clean Scripts
- device databases, action for editing, Trusted CDE Actions
- Device Manager
- administrative tool, Administration Tools for Trusted Extensions
- use by administrators, How to Configure a Device in Trusted Extensions
- devices
- access policy, Device Access Policies
- accessing
- Device Allocation Manager GUI
- Device Allocation Manager GUI
- adding customized authorizations, How to Add Site-Specific Authorizations to a Device in Trusted Extensions
- adding device_clean script, How to Add a Device_Clean Script in Trusted Extensions
- administering, Managing Devices for Trusted Extensions (Tasks)
- administering with Device Manager, How to Configure a Device in Trusted Extensions
- allocating, Device Protection With Trusted Extensions Software
- automatically starting an audio player, How to Configure an Audio Player Program for Use in Trusted CDE
- configuring devices, How to Configure a Device in Trusted Extensions
- configuring serial line, How to Configure a Serial Line for Logins
- creating new authorizations, How to Create New Device Authorizations
- in Trusted Extensions, Devices in Trusted Extensions (Overview)
- policy defaults, Device Access Policies
- preventing remote allocation of audio, How to Protect Nonallocatable Devices in Trusted Extensions
- protecting, Device Allocation Manager
- protecting nonallocatable, How to Protect Nonallocatable Devices in Trusted Extensions
- reclaiming, How to Revoke or Reclaim a Device in Trusted Extensions
- setting label range for nonallocatable, Effects of Label Range on a Device
- setting policy, Device Access Policies
- setting up audio, How to Configure an Audio Player Program for Use in Trusted CDE
- troubleshooting, How to Revoke or Reclaim a Device in Trusted Extensions
- using, Using Devices in Trusted Extensions (Task Map)
- dfstab file
- action for editing, Trusted CDE Actions
- for public zone, Access to NFS Mounted Directories in Trusted Extensions
- differences
- administrative interfaces in Trusted Extensions, Administrative Interfaces in Trusted Extensions
- between Trusted Extensions and Oracle Solaris auditing, Trusted Extensions and Auditing
- between Trusted Extensions and Oracle Solaris OS, Differences Between Trusted Extensions and the Oracle Solaris OS
- defaults in Trusted Extensions, Tighter Security Defaults in Trusted Extensions
- extending Oracle Solaris interfaces, Oracle Solaris Interfaces Extended by Trusted Extensions
- limited options in Trusted Extensions, Limited Options in Trusted Extensions
- directories
- accessing lower-level, Zones in Trusted Extensions
- authorizing a user or role to change label of, How to Enable a User to Change the Security Level of Data
- mounting, How to Share Directories From a Labeled Zone
- sharing, How to Share Directories From a Labeled Zone
- discretionary access control (DAC), Trusted Extensions and Access Control
- diskettes, accessing, Device Protection With Trusted Extensions Software
- displaying
- labels of file systems in labeled zone, How to Display the Labels of Mounted Files
- status of every zone, How to Display Ready or Running Zones
- DOI, remote host templates, Network Security Attributes in Trusted Extensions
- dominance of labels, Dominance Relationships Between Labels
- Downgrade DragNDrop or CutPaste Info authorization, How to Create a Rights Profile for Convenient Authorizations
- Downgrade File Label authorization, How to Create a Rights Profile for Convenient Authorizations
- downgrading labels, configuring rules for selection confirmer, sel_config File
- DragNDrop or CutPaste without viewing contents authorization, How to Create a Rights Profile for Convenient Authorizations
- dtappsession command, Command Line Tools in Trusted Extensions
- dtsession command, running updatehome, .copy_files and .link_files Files
- dtterm terminal, forcing the sourcing of .profile, How to Configure Startup Files for Users in Trusted Extensions
- dtwm command, Trusted Processes in the Window System