| | | |
D |
|
| DAC, See discretionary access control (DAC) |
|
| databases |
| | in LDAP ( ) |
| | trusted network ( ) |
|
| datasets, See ZFS |
|
| deallocate command ( ) |
|
| deallocating, forcing ( ) |
|
| debugging, See troubleshooting |
|
| deciding |
| | to configure as a role or as superuser ( ) |
| | to use a Sun-supplied encodings file ( ) |
|
| decisions to make |
| | based on site security policy ( ) |
| | before enabling Trusted Extensions ( ) |
|
| default routes, specifying for labeled zones ( ) |
|
| deleting, labeled zones ( ) |
|
| desktops |
| | accessing multilevel remotely ( ) |
| | logging in to a failsafe session ( ) |
| | workspace color changes ( ) |
|
| /dev/kmem kernel image file, security violation ( ) |
|
| developer responsibilities ( ) |
|
| device allocation |
| | authorizing ( ) |
| | overview ( ) |
| | profiles that include allocation authorizations ( ) |
|
| device-clean scripts |
| | adding to devices ( ) |
| | requirements ( ) |
|
| Device Manager |
| | administrative tool ( ) |
| | description ( ) |
| | use by administrators ( ) |
|
| devices |
| | access policy ( ) |
| | accessing ( ) |
| | adding customized authorizations ( ) |
| | adding device_clean script ( ) |
| | administering ( ) |
| | administering with Device Manager ( ) |
| | allocating ( ) |
| | configuring devices ( ) |
| | configuring serial line ( ) |
| | creating new authorizations ( ) |
| | in Trusted Extensions ( ) |
| | policy defaults ( ) |
| | preventing remote allocation of audio ( ) |
| | protecting ( ) |
| | protecting nonallocatable ( ) |
| | reclaiming ( ) |
| | setting label range for nonallocatable ( ) |
| | setting policy ( ) |
| | troubleshooting ( ) |
| | using ( ) |
|
| dfstab file, for public zone ( ) |
|
| differences |
| | administrative interfaces in Trusted Extensions ( ) |
| | between Trusted Extensions and Solaris auditing ( ) |
| | between Trusted Extensions and Solaris OS ( ) |
| | defaults in Trusted Extensions ( ) |
| | extending Solaris interfaces ( ) |
| | limited options in Trusted Extensions ( ) |
|
| directories |
| | accessing lower-level ( ) |
| | authorizing a user or role to change label of ( ) |
| | for naming service setup ( ) |
| | mounting ( ) |
| | sharing ( ) |
|
| disabling, Trusted Extensions ( ) |
|
| discretionary access control (DAC) ( ) |
|
| diskettes, accessing ( ) |
|
| displaying |
| | labels of file systems in labeled zone ( ) |
| | status of every zone ( ) |
|
| DOI, remote host templates ( ) |
|
| domain of interpretation (DOI), entry in /etc/system file ( ) |
|
| dominance of labels ( ) |
|
| Downgrade DragNDrop or CutPaste Info authorization ( ) |
|
| Downgrade File Label authorization ( ) |
|
| downgrading labels, configuring rules for selection confirmer ( ) |
|
| dpadm service ( ) |
|
| DragNDrop or CutPaste without viewing contents authorization ( ) |
|
| dsadm service ( ) |
|
| dtsession command, running updatehome ( ) |
|
| dtterm terminal, forcing the sourcing of .profile ( ) |