JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration and Administration     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

7.  Trusted Extensions Administration Concepts

8.  Trusted Extensions Administration Tools

9.  Getting Started as a Trusted Extensions Administrator (Tasks)

10.  Security Requirements on a Trusted Extensions System (Overview)

11.  Administering Security Requirements in Trusted Extensions (Tasks)

12.  Users, Rights, and Roles in Trusted Extensions (Overview)

13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

14.  Remote Administration in Trusted Extensions (Tasks)

15.  Trusted Extensions and LDAP (Overview)

16.  Managing Zones in Trusted Extensions (Tasks)

17.  Managing and Mounting Files in Trusted Extensions (Tasks)

18.  Trusted Networking (Overview)

19.  Managing Networks in Trusted Extensions (Tasks)

20.  Multilevel Mail in Trusted Extensions (Overview)

21.  Managing Labeled Printing (Tasks)

22.  Devices in Trusted Extensions (Overview)

23.  Managing Devices for Trusted Extensions (Tasks)

24.  Trusted Extensions Auditing (Overview)

25.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

R

real UID of root, required for applications, Evaluating Software for Security
rebooting
activating labels, Reboot and Log In to Trusted Extensions
enabling login to labeled zone, Enable Users to Log In to a Labeled Zone
Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
regaining control of desktop focus, How to Regain Control of the Desktop's Current Focus
regular users, See users
relabeling information, How to Enable a User to Change the Security Level of Data
remote administration
defaults, Secure Remote Administration in Trusted Extensions
methods, Methods for Administering Remote Systems in Trusted Extensions
remote host templates
assigning, Configuring Trusted Network Databases (Task Map)
assigning to hosts, How to Assign a Security Template to a Host or a Group of Hosts
creating, How to Construct a Remote Host Template
remote hosts, using fallback mechanism in tnrhdb, Trusted Network Fallback Mechanism
Remote Login authorization, How to Create a Rights Profile for Convenient Authorizations
remote logins, enabling for roles, Enable Remote Login by a Role in Trusted Extensions
remote multilevel desktop, accessing, How to Use Xvnc to Remotely Access a Trusted Extensions System
remove_allocatable command, Command Line Tools in Trusted Extensions
removing
labels on printer output, How to Remove Labels From Printed Output
zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
removing Trusted Extensions, See disabling
repairing, labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
requirements for Trusted Extensions
Oracle Solaris installation options, Install an Oracle Solaris System Securely
Oracle Solaris installed systems, Prepare an Installed Oracle Solaris System for Trusted Extensions
resolv.conf file, loading during configuration, Make the Global Zone an LDAP Client in Trusted Extensions
restoring control of desktop focus, How to Regain Control of the Desktop's Current Focus
restricting
access to computer based on label, Effects of Label Range on a Device
access to devices, Device Protection With Trusted Extensions Software
access to global zone, Role Assumption in Trusted Extensions
access to lower-level files, How to Disable the Mounting of Lower-Level Files
access to printers with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
mounts of lower-level files, How to Disable the Mounting of Lower-Level Files
printer access with labels, Restricting Access to Printers and Print Job Information in Trusted Extensions
printer label range, How to Configure a Restricted Label Range for a Printer
remote access, Secure Remote Administration in Trusted Extensions
Revoke or Reclaim Device authorization
How to Assign Device Authorizations
How to Assign Device Authorizations
rights, See rights profiles
rights profiles
assigning, Security Attribute Assignment to Users in Trusted Extensions
Convenient Authorizations, How to Create a Rights Profile for Convenient Authorizations
with Allocate Device authorization, How to Assign Device Authorizations
with device allocation authorizations, How to Assign Device Authorizations
with new device authorizations, How to Create New Device Authorizations
roadmaps
Task Map: Configuring Networking, Task Map: Configuring Networking
Task Map: Configuring the Global Zone, Task Map: Configuring the Global Zone
Task Map: Configuring the Labeled Zones, Task Map: Configuring the Labeled Zones
Task Map: Configuring Trusted Extensions to Your Site's Requirements, Task Map: Configuring Trusted Extensions to Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaults, Task Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Configuringthe LDAP Naming Service, Task Map: Configuring the LDAP Naming Service
Task Map: Preparing an Oracle Solaris System for Trusted Extensions, Task Map: Preparing an Oracle Solaris System for Trusted Extensions
Task Map: Preparing For and Enabling Trusted Extensions, Task Map: Preparing For and Enabling Trusted Extensions
role workspace, global zone, Security Requirements When Administering Trusted Extensions
roleadd command, Create the Security Administrator Role in Trusted Extensions
roles
adding local role with roleadd, Create the Security Administrator Role in Trusted Extensions
administering auditing, Role Setup for Audit Administration
assigning rights, Security Attribute Assignment to Users in Trusted Extensions
assuming
Security Requirements When Administering Trusted Extensions
How to Enter the Global Zone in Trusted Extensions
creating, Role Creation in Trusted Extensions
creating Security Administrator, Create the Security Administrator Role in Trusted Extensions
determining when to create, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
leaving role workspace, How to Exit the Global Zone in Trusted Extensions
logging in remotely, Enable Remote Login by a Role in Trusted Extensions
remote login, Remote Login by a Role in Trusted Extensions
role assumption from unlabeled host, Remote Role-Based Administration From Unlabeled Hosts
trusted application access, Administration Tools for Trusted Extensions
verifying they work, Verify That the Trusted Extensions Roles Work
workspaces, Security Requirements When Administering Trusted Extensions
root passwords, required in Trusted Extensions, Prepare an Installed Oracle Solaris System for Trusted Extensions
root UID, required for applications, Evaluating Software for Security
route command
Command Line Tools in Trusted Extensions
Network Commands in Trusted Extensions
routing, Overview of Routing in Trusted Extensions
accreditation checks, Trusted Extensions Accreditation Checks
commands in Trusted Extensions, Routing Commands in Trusted Extensions
concepts, Administration of Routing in Trusted Extensions
example of, Gateways in Trusted Extensions
specifying default routes for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
static with security attributes, How to Configure Routes With Security Attributes
tables
Routing Table Entries in Trusted Extensions
Choosing Routers in Trusted Extensions
using route command, How to Configure Routes With Security Attributes