The Trusted Solaris Administration Overview is an introduction to administering the Trusted SolarisTM environment. As prerequisites, you should be familiar with basic system administration in the UNIX environment, understand security policy concepts, and should read the Trusted Solaris User's Guide.
The Trusted Solaris documentation set is supplemental to the Solaris 8 documentation set. You should obtain a copy of both sets for a complete understanding of Trusted Solaris. The Trusted Solaris documentation set consists of:
Trusted Solaris Documentation Roadmap shows all volumes in the documentation set.
Trusted Solaris 7 Release Notes presents information regarding the hardware requirements for installing Trusted Solaris, features included in the release, any known problems, and interoperability with previous versions.
Trusted Solaris Installation and Configuration describes the process of planning for, installing, and configuring a new or upgraded Trusted Solaris system.
Trusted Solaris User's Guide describes basic features of the Trusted Solaris environment from the end user's point of view.
Trusted Solaris User's Guide contains a glossary that applies to the entire documentation set.
Trusted Solaris Administrator's Procedures provides detailed information for performing specific administration tasks.
Trusted Solaris Audit Administration describes the auditing system for system administrators.
Trusted Solaris Label Administrationprovides information on specifying label components in the label encodings file.
Trusted Solaris Reference Manual is a printed version of the man pages available in the Trusted Solaris environment.
Compartmented Mode Workstation Labeling: Encodings Format describes the syntax used in the label encodings file for enforcing the various rules concerning well-formed labels for a system.
Trusted Solaris 7 Transition Guide provides an overview of the differences between Trusted Solaris 1.x and Trusted Solaris 2.5.
Chapter 1, Introduction to Administration provides an overview of basic concepts needed to administer Trusted Solaris.
Chapter 2, Quick Tour of the Admin Tools presents an overview of the tools available in the Trusted Solaris environment, how they are accessed, and the databases on which they operate.
Chapter 3, Administering Trusted Networking provides an overview of how networking is implemented in the Trusted Solaris environment and discusses the tools for administering networking.
Chapter 4, Administering Auditing describes the basics of performing auditing in the Trusted Solaris environment.
The following table describes the type changes and symbols used in this book.
Table P-1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. system% You have mail.
|
AaBbCc123 |
What you type, contrasted with on-screen computer output |
system% su
Password:: |
AaBbCc123 |
Command-line placeholder or variable name. Replace with a real name or value |
To delete a file, type rm filename. The errno variable is set. |
AaBbCc123 |
Book titles, new words or terms, or words to be emphasized |
Read Chapter 6 in User's Guide. These are called class options. You must be root to do this. |
Code samples are in code font and may display the following: |
||
% |
UNIX C shell prompt |
system% |
$ |
UNIX Bourne and Korn shell prompt |
system$
|
# |
Superuser prompt, all shells |
system# |