Trusted Solaris User's Guide

Preface

The Trusted Solaris User's Guide is a guide to operating in the Trusted Solaris 8TMenvironment. As a prerequisite, you should be familiar with the Solaris 8 operating environment and the Common Desktop Environment (CDE). You should also be familiar with the security policy of your organization.

Related Materials

The Trusted Solaris 8 documentation set is supplemental to the Solaris 8 documentation set. You should obtain a copy of both sets for a complete understanding of the Trusted Solaris 8 operating environment. The Trusted Solaris documentation set consists of:

How This Guide is Organized

Chapter 1, Introduction to Trusted Solaris provides an overview of the basic concepts needed to operate in the Trusted Solaris environment.

Chapter 2, Accessing and Leaving the Trusted Solaris Environment presents procedures necessary for accessing and leaving the Trusted Solaris environment.

Chapter 3, Tour of the Trusted Solaris Environment takes you for a quick tour of the Trusted Solaris environment. If you have access to a Trusted Solaris system, you can perform the steps as you read them; or you can get a good idea of the environment simply by reading and following the diagrams.

Chapter 4, Elements of the Trusted Solaris Environment explains the key elements in the Trusted Solaris environment.

Chapter 5, Managing Files and Directories shows you the basics of managing the security of files and directories in the Trusted Solaris environment.

Appendix A, Supplementary Documentation discusses man pages, online documentation, and online help in the Trusted Solaris operating environment.

Ordering Sun Documents

For a list of Trusted Solaris and other Sun Microsystems, Inc. documents and how to order them, refer to http://www.fatbrain.com/.

Typographic Changes and Symbols

The following table describes the type changes and symbols used in this book.

Table P-1 Typographic Conventions

Typeface or Symbol 

Meaning 

Example 

AaBbCc123

The names of commands, files, and directories; on-screen computer output 

Edit your .login file.

Use ls -a to list all files.

system% You have mail.

 

AaBbCc123

What you type, contrasted with on-screen computer output 

system% su

Password:

AaBbCc123

Command-line placeholder or variable name. Replace with a real name or value 

To delete a file, type rm filename.

The errno variable is set.

AaBbCc123

Book titles, new words or terms, or words to be emphasized 

Read Chapter 6 in User's Guide. These are called class options.

You must be root to do this.

Code samples are in code font.

%

UNIX C shell prompt 

system%