JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Configuration and Administration     Oracle Solaris 11 Express 11/10
search filter icon
search icon

Document Information

Preface

Part I Initial Configuration of Trusted Extensions

1.  Security Planning for Trusted Extensions

2.  Configuration Roadmap for Trusted Extensions

3.  Adding Trusted Extensions Software to the Oracle Solaris OS (Tasks)

4.  Configuring Trusted Extensions (Tasks)

5.  Configuring LDAP for Trusted Extensions (Tasks)

6.  Configuring a Headless System With Trusted Extensions (Tasks)

Part II Administration of Trusted Extensions

7.  Trusted Extensions Administration Concepts

8.  Trusted Extensions Administration Tools

9.  Getting Started as a Trusted Extensions Administrator (Tasks)

10.  Security Requirements on a Trusted Extensions System (Overview)

11.  Administering Security Requirements in Trusted Extensions (Tasks)

12.  Users, Rights, and Roles in Trusted Extensions (Overview)

13.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

14.  Remote Administration in Trusted Extensions (Tasks)

15.  Trusted Extensions and LDAP (Overview)

16.  Managing Zones in Trusted Extensions (Tasks)

17.  Managing and Mounting Files in Trusted Extensions (Tasks)

18.  Trusted Networking (Overview)

19.  Managing Networks in Trusted Extensions (Tasks)

20.  Multilevel Mail in Trusted Extensions (Overview)

21.  Managing Labeled Printing (Tasks)

22.  Devices in Trusted Extensions (Overview)

23.  Managing Devices for Trusted Extensions (Tasks)

24.  Trusted Extensions Auditing (Overview)

25.  Software Management in Trusted Extensions (Reference)

A.  Site Security Policy

Creating and Managing a Security Policy

Site Security Policy and Trusted Extensions

Computer Security Recommendations

Physical Security Recommendations

Personnel Security Recommendations

Common Security Violations

Additional Security References

B.  Configuration Checklist for Trusted Extensions

Checklist for Configuring Trusted Extensions

C.  Quick Reference to Trusted Extensions Administration

Administrative Interfaces in Trusted Extensions

Oracle Solaris Interfaces Extended by Trusted Extensions

Tighter Security Defaults in Trusted Extensions

Limited Options in Trusted Extensions

D.  List of Trusted Extensions Man Pages

Trusted Extensions Man Pages in Alphabetical Order

Oracle Solaris Man Pages That Are Modified by Trusted Extensions

Glossary

Index

A

B

C

D

E

F

G

H

I

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

T

tape devices, accessing, Device Protection With Trusted Extensions Software
tar command, Command Line Tools in Trusted Extensions
Task Map: Configuring Networking, Task Map: Configuring Networking
Task Map: Configuring the Global Zone, Task Map: Configuring the Global Zone
Task Map: Configuring the Labeled Zones, Task Map: Configuring the Labeled Zones
Task Map: Configuring the LDAP Naming Service, Task Map: Configuring the LDAP Naming Service
Task Map: Configuring Trusted Extensions to Your Site's Requirements, Task Map: Configuring Trusted Extensions to Your Site's Requirements
Task Map: Configuring Trusted Extensions With the Provided Defaults, Task Map: Configuring Trusted Extensions With the Provided Defaults
Task Map: Preparing an Oracle Solaris System for Trusted Extensions, Task Map: Preparing an Oracle Solaris System for Trusted Extensions
Task Map: Preparing For and Enabling Trusted Extensions, Task Map: Preparing For and Enabling Trusted Extensions
tasks and task maps
Additional Trusted Extensions Configuration Tasks, Additional Trusted Extensions Configuration Tasks
Administering Trusted Extensions Remotely (Task Map), Administering Trusted Extensions Remotely (Task Map)
Audit Tasks of the Security Administrator, Audit Tasks of the Security Administrator
Audit Tasks of the System Administrator, Audit Tasks of the System Administrator
Backing Up, Sharing, and Mounting Labeled Files (Task Map), Backing Up, Sharing, and Mounting Labeled Files (Task Map)
Common Tasks in Trusted Extensions (Task Map), Common Tasks in Trusted Extensions (Task Map)
Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Proxy Server on a Trusted Extensions Host (Task Map)
Configuring an LDAP Server on a Trusted Extensions Host (Task Map), Configuring an LDAP Server on a Trusted Extensions Host (Task Map)
Configuring Labeled IPsec (Task Map), Configuring Labeled IPsec (Task Map)
Configuring Labeled Printing (Task Map), Configuring Labeled Printing (Task Map)
Configuring Routes and Checking Network Information in Trusted Extensions (Task Map), Configuring Routes and Checking Network Information in Trusted Extensions (Task Map)
Configuring Trusted Network Databases (Task Map), Configuring Trusted Network Databases (Task Map)
Creating Labeled Zones, Creating Labeled Zones
Customizing Device Authorizations in Trusted Extensions (Task Map), Customizing Device Authorizations in Trusted Extensions (Task Map)
Customizing User Environment for Security (Task Map), Customizing the User Environment for Security (Task Map)
Getting Started as a Trusted Extensions Administrator (Task Map), Getting Started as a Trusted Extensions Administrator (Task Map)
Handling Devices in Trusted Extensions (Task Map), Handling Devices in Trusted Extensions (Task Map)
Headless System Configuration in Trusted Extensions (Task Map), Headless System Configuration in Trusted Extensions (Task Map)
Managing Devices in Trusted Extensions (Task Map), Managing Devices in Trusted Extensions (Task Map)
Managing Printing in Trusted Extensions (Task Map), Managing Printing in Trusted Extensions (Task Map)
Managing Trusted Networking (Task Map), Managing the Trusted Network (Task Map)
Managing Users and Rights, Managing Users and Rights (Task Map)
Managing Zones (Task Map), Managing Zones (Task Map)
Reducing Printing Restrictions in Trusted Extensions (Task Map), Reducing Printing Restrictions in Trusted Extensions (Task Map)
Troubleshooting the Trusted Network (Task Map), Troubleshooting the Trusted Network (Task Map)
Using Devices in Trusted Extensions (Tasks Map), Using Devices in Trusted Extensions (Task Map)
text label equivalents, determining, How to Obtain a Readable Label From Its Hexadecimal Form
Thunderbird, lengthening timeout when relabeling, How to Lengthen the Timeout When Relabeling Information
tnchkdb command, description, Network Commands in Trusted Extensions
tnctl command
description, Network Commands in Trusted Extensions
summary, Command Line Tools in Trusted Extensions
updating kernel cache, How to Synchronize the Kernel Cache With Trusted Network Databases
using, How to Synchronize the Kernel Cache With Trusted Network Databases
tnd command
description, Network Commands in Trusted Extensions
summary, Command Line Tools in Trusted Extensions
tninfo command
description, Network Commands in Trusted Extensions
summary, Command Line Tools in Trusted Extensions
using
How to Debug the Trusted Extensions Network
How to Debug a Client Connection to the LDAP Server
tnrhdb database
0.0.0.0 host address
Trusted Network Fallback Mechanism
How to Limit the Hosts That Can Be Contacted on the Trusted Network
0.0.0.0 wildcard address, How to Limit the Hosts That Can Be Contacted on the Trusted Network
adding to, How to Assign a Security Template to a Host or a Group of Hosts
configuring, Configuring Trusted Network Databases (Task Map)
entry for Sun Ray servers, How to Limit the Hosts That Can Be Contacted on the Trusted Network
fallback mechanism
Trusted Network Fallback Mechanism
Configuring Trusted Network Databases (Task Map)
wildcard address, Configuring Trusted Network Databases (Task Map)
tnrhtp database, adding to, How to Construct a Remote Host Template
tools, See administrative tools
trailer pages, See banner pages
translation, See localizing
troubleshooting
accessing X server, Labeled Zone Is Unable to Access the X Server
failed login, How to Log In to a Failsafe Session in Trusted Extensions
IPv6 configuration, Enable IPv6 Networking in Trusted Extensions
LDAP, How to Debug a Client Connection to the LDAP Server
mounted file systems, How to Troubleshoot Mount Failures in Trusted Extensions
network, Troubleshooting the Trusted Network (Task Map)
reclaiming a device, How to Revoke or Reclaim a Device in Trusted Extensions
repairing labels in internal databases, How to Obtain a Readable Label From Its Hexadecimal Form
Trusted Extensions configuration, Troubleshooting Your Trusted Extensions Configuration
trusted network, How to Debug the Trusted Extensions Network
verifying interface is up, How to Verify That a Host's Interfaces Are Up
viewing ZFS dataset mounted in lower-level zone, How to Share a ZFS Dataset From a Labeled Zone
Troubleshooting the Trusted Network (Task Map), Troubleshooting the Trusted Network (Task Map)
trusted applications, in a role workspace, Administration Tools for Trusted Extensions
Trusted Extensions
See Trusted Extensions
See also Trusted Extensions planning
adding, Add Trusted Extensions Packages to an Oracle Solaris System
collecting information before enabling, Collect System Information Before Enabling Trusted Extensions
decisions to make before enabling, Secure System Hardware and Make Security Decisions Before Enabling Trusted Extensions
differences from Oracle Solaris administrator's perspective, Results of Enabling Trusted Extensions From an Administrator's Perspective
differences from Oracle Solaris auditing, Trusted Extensions and Auditing
differences from Oracle Solaris OS, Differences Between Trusted Extensions and the Oracle Solaris OS
disabling, How to Remove Trusted Extensions From the System
enabling, Enable Trusted Extensions
man pages quick reference, List of Trusted Extensions Man Pages
memory requirements, Planning System Hardware and Capacity for Trusted Extensions
planning configuration strategy, Devising a Configuration Strategy for Trusted Extensions
planning for, Planning for Security in Trusted Extensions
planning hardware, Planning System Hardware and Capacity for Trusted Extensions
planning network, Planning Your Trusted Network
preparing for
Preparing the Oracle Solaris OS and Adding Trusted Extensions
Collecting Information and Making Decisions Before Enabling Trusted Extensions
quick reference to administration, Quick Reference to Trusted Extensions Administration
results before configuration, Results of Enabling Trusted Extensions From an Administrator's Perspective
similarities with Oracle Solaris auditing, Trusted Extensions and Auditing
similarities with Oracle Solaris OS, Similarities Between Trusted Extensions and the Oracle Solaris OS
two-role configuration strategy, Devising a Configuration Strategy for Trusted Extensions
Trusted Extensions configuration
adding network databases to LDAP server, Populate the Sun Java System Directory Server
changing default DOI value, Configure the Domain of Interpretation
databases for LDAP, Configuring the Sun Java System Directory Server on a Trusted Extensions System
division of tasks, Initial Setup Team Responsibilities
evaluated configuration, Understanding Your Site's Security Policy
headless systems, Configuring a Headless System With Trusted Extensions (Tasks)
initial procedures, Configuring Trusted Extensions (Tasks)
initial setup team responsibilities, Initial Setup Team Responsibilities
labeled zones, Creating Labeled Zones
LDAP, Configuring the Sun Java System Directory Server on a Trusted Extensions System
reboot to activate labels, Reboot and Log In to Trusted Extensions
task maps, Configuration Roadmap for Trusted Extensions
troubleshooting, Troubleshooting Your Trusted Extensions Configuration
Trusted Extensions network
adding zone-specific interface, Add a Network Interface to Route an Existing Labeled Zone
adding zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
enabling IPv6, Enable IPv6 Networking in Trusted Extensions
planning, Planning Your Trusted Network
removing zone-specific nscd daemon, Configure a Name Service Cache in Each Labeled Zone
specifying default routes for labeled zones, Add a Network Interface That Does Not Use the Global Zone to Route an Existing Labeled Zone
Trusted Extensions requirements
Oracle Solaris installation, Install an Oracle Solaris System Securely
Oracle Solaris installed systems, Prepare an Installed Oracle Solaris System for Trusted Extensions
root password, Prepare an Installed Oracle Solaris System for Trusted Extensions
trusted grab, key combination, How to Regain Control of the Desktop's Current Focus
trusted network
0.0.0.0 tnrhdb entry, How to Limit the Hosts That Can Be Contacted on the Trusted Network
checking syntax of files, How to Check the Syntax of Trusted Network Databases
concepts, Trusted Networking (Overview)
default labeling, Trusted Extensions Accreditation Checks
editing local files, Configuring Trusted Network Databases (Task Map)
example of routing, Gateways in Trusted Extensions
host types, Host Type and Template Name in Security Templates
labels and MAC enforcement, The Trusted Network
using templates, Configuring Trusted Network Databases (Task Map)
Trusted Network Zones tool
configuring a multilevel print server, How to Configure a Multilevel Print Server and Its Printers
creating a multilevel port, How to Create a Multilevel Port for a Zone
Trusted Path, Device Manager, Device Manager GUI
trusted path attribute, when available, Roles and Trusted Extensions
Trusted Path menu, Assume Role, How to Enter the Global Zone in Trusted Extensions
trusted programs
adding, Developer Responsibilities When Creating Trusted Programs
defined, Evaluating Software for Security
trusted stripe
on multiheaded system, Multiheaded Systems and the Trusted Extensions Desktop
warping pointer to, How to Regain Control of the Desktop's Current Focus
trustworthy programs, Evaluating Software for Security
tsol_separator.ps file
configurable values, Labeled Banner and Trailer Pages
customizing labeled printing, Labeled Printer Output
tsoljdsselmgr application, Rules When Changing the Level of Security for Data
txzonemgr script
Create a Default Trusted Extensions System
Labeled Zone Is Unable to Access the X Server