The Trusted Solaris User's Guide is a guide to operating in the Trusted SolarisTM environment. As a prerequisite, you should be familiar with the SolarisTM operating environment and the Common Desktop Environment (CDE). You should also be familiar with the security policy of your organization.
The Trusted Solaris 8 4/01 documentation set is supplemental to the Solaris 8 4/01 documentation set. You should obtain a copy of both sets for a complete understanding of the Trusted Solaris operating environment. The Trusted Solaris documentation set consists of the following guides:
Trusted Solaris 8 4/01 Release Notes (816-1043-10) lists known problems and describes workarounds for getting started with and using the Trusted Solaris 8 4/01 version of the software. (Primary audience: administrators; secondary audience: developers)
Trusted Solaris Installation and Configuration (816-1040-10) describes how to install the Trusted Solaris operating environment at networked and non-networked sites. (Primary audience: administrators; secondary audience: developers)
Trusted Solaris 8 4/01 Reference Manual (816-1052-10) provides a book version of all Trusted Solaris man pages in four volumes. (Primary audience: all)
Trusted Solaris User's Guide (816-1041-10) describes the basic features of the Trusted Solaris environment. Although it is aimed at end users, it explains basic concepts that are important to administrators and application developers as well. The book contains a glossary. (Primary audience: end users, administrators; secondary audience: developers)
Trusted Solaris Administration Overview (816-1047-10) explains the concepts of administration in the Trusted Solaris operating environment and provides an overview of administrative tools and commands. (Primary audience: administrators; secondary audience: developers)
Trusted Solaris Administrator's Procedures (816-1048-10) provides detailed information for performing specific administration tasks. (Primary audience: administrators; secondary audience: developers)
Trusted Solaris Audit Administration (816-1049-10) describes the auditing system. (Primary audience: administrators; secondary audience: developers)
Trusted Solaris Label Administration (816-1050-10) provides information on specifying label components in the label encodings file. (Primary audience: administrators)
Trusted Solaris Developer's Guide (816-1042-10) describes how to develop applications for the Trusted Solaris environment. (Primary audience: developers; secondary audience: administrators)
Compartmented Mode Workstation Labeling: Encodings Format (816-1051-10) describes the syntax used in the label encodings file for enforcing the various rules concerning well-formed labels for a system. (Primary audience: administrators; secondary audience: developers)
Trusted Solaris 8 4/01 Transition Guide (816-1044-10) provides an overview of the differences between the Trusted Solaris 7, and Trusted Solaris 8, and Trusted Solaris 8 4/01 environments (Primary audience: all)
Chapter 1, Introduction to the Trusted Solaris Environment provides an overview of the basic concepts needed to operate in the Trusted Solaris environment.
Chapter 2, Entering and Leaving the Trusted Solaris Environment presents procedures necessary for accessing and leaving the Trusted Solaris environment.
Chapter 3, Tour of the Trusted Solaris Environment takes you for a quick tour of the Trusted Solaris environment. If you have access to a Trusted Solaris system, you can perform the steps as you read them; or you can get a good idea of the environment simply by reading and following the diagrams.
Chapter 4, Elements of the Trusted Solaris Environment explains the key elements in the Trusted Solaris environment.
Chapter 5, Managing Labels on Files and Directories shows you the basics of managing the security of files and directories in the Trusted Solaris environment.
Appendix A, Supplementary Documentation discusses man pages, online documentation, and online help in the Trusted Solaris operating environment.
Fatbrain.com, the Internet's most comprehensive professional bookstore, stocks select product documentation from Sun Microsystems, Inc.
For a list of documents and how to order them, visit the Sun Documentation Center on Fatbrain.com at http://www1.fatbrain.com/documentation/sun.
The docs.sun.comSM Web site enables you to access Sun technical documentation online. You can browse the docs.sun.com archive or search for a specific book title or subject. The URL is http://docs.sun.com.
The following table describes the type changes and symbols used in this book.
Table P-1 Typographic Conventions
Typeface or Symbol |
Meaning |
Example |
---|---|---|
AaBbCc123 |
The names of commands, files, and directories; on-screen computer output |
Edit your .login file. Use ls -a to list all files. system% You have mail. |
AaBbCc123 |
What you type, contrasted with on-screen computer output |
system% su - janez
Password: |
AaBbCc123 |
Command-line placeholder or variable name. Replace with a real name or value |
To delete a file, type rm filename. The errno variable is set. |
AaBbCc123 |
Book titles, new words or terms, or words to be emphasized |
Read Chapter 6 in User's Guide. These are called class options. You must be the owner to do this. |
Code samples are in code font. |
||
% |
C shell prompt |
system% |