JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

Index

A

access, See computer access
access policy
devices, index iconDevice Access Policies
Discretionary Access Control (DAC)
index iconTrusted Extensions Software and the Oracle Solaris OS
index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
Mandatory Access Control (MAC), index iconDifferences Between Trusted Extensions and the Oracle Solaris OS
accessing
Admin Editor action, index iconHow to Edit Administrative Files in Trusted Extensions
administrative tools, index iconGetting Started as a Trusted Extensions Administrator (Task Map)
audit records by label, index iconAudit Tasks of the System Administrator
devices, index iconDevice Protection With Trusted Extensions Software
global zone, index iconHow to Enter the Global Zone in Trusted Extensions
home directories, index iconZones in Trusted Extensions
printers, index iconLabels, Printers, and Printing
remote multilevel desktop, index iconHow to Use Xvnc to Remotely Access a Trusted Extensions System
Solaris Management Console, index iconHow to Administer the Local System With the Solaris Management Console
trusted CDE actions, index iconHow to Start CDE Administrative Actions in Trusted Extensions
ZFS dataset mounted in lower-level zone from higher-level zone, index iconHow to Share a ZFS Dataset From a Labeled Zone
account locking, preventing, index iconHow to Prevent Account Locking for Users
accounts
See roles
See also users
accreditation checks, index iconTrusted Extensions Accreditation Checks
accreditation ranges, label_encodings file, index iconLabel Encodings File
actions
See also individual actions by name
adding new Trusted CDE actions, index iconAdding Trusted CDE Actions
Admin Editor, index iconHow to Edit Administrative Files in Trusted Extensions
Device Allocation Manager
index iconDevice Allocation Manager GUI
index iconDevice Allocation Manager GUI
list of trusted CDE, index iconTrusted CDE Actions
Name Service Switch, index iconHow to Debug the Trusted Extensions Network
restricted by rights profiles, index iconTrusted Processes in the Window System
use differences between CDE and Trusted CDE, index iconAdding Trusted CDE Actions
add_allocatable command, index iconCommand Line Tools in Trusted Extensions
Add Allocatable Device action, index iconTrusted CDE Actions
Admin Editor action, index iconTrusted CDE Actions
opening, index iconHow to Edit Administrative Files in Trusted Extensions
ADMIN_HIGH label, index iconDominance Relationships Between Labels
ADMIN_LOW label
lowest label, index iconDominance Relationships Between Labels
protecting administrative files, index iconPassword Protection
administering
account locking, index iconHow to Prevent Account Locking for Users
assigning device authorizations, index iconHow to Assign Device Authorizations
audio device to play music, index iconHow to Configure an Audio Player Program for Use in Trusted CDE
auditing in Trusted Extensions, index iconAudit Management by Role in Trusted Extensions
changing label of information, index iconHow to Enable a User to Change the Security Level of Data
convenient authorizations for users, index iconHow to Create a Rights Profile for Convenient Authorizations
device allocation, index iconHow to Assign Device Authorizations
device authorizations, index iconHow to Create New Device Authorizations
devices
index iconManaging Devices for Trusted Extensions (Tasks)
index iconManaging Devices in Trusted Extensions (Task Map)
file systems
mounting, index iconHow to NFS Mount Files in a Labeled Zone
overview, index iconSharing and Mounting Files in Trusted Extensions
troubleshooting, index iconHow to Troubleshoot Mount Failures in Trusted Extensions
files
backing up, index iconHow to Back Up Files in Trusted Extensions
restoring, index iconHow to Restore Files in Trusted Extensions
from the global zone, index iconHow to Enter the Global Zone in Trusted Extensions
labeled printing, index iconManaging Labeled Printing (Tasks)
LDAP, index iconTrusted Extensions and LDAP (Overview)
mail, index iconMultilevel Mail in Trusted Extensions (Overview)
multilevel ports, index iconHow to Compare Trusted Network Database Information With the Kernel Cache
network in Trusted Extensions, index iconManaging Networks in Trusted Extensions (Tasks)
network of users, index iconManaging Users and Rights With the Solaris Management Console (Task Map)
PostScript printing, index iconHow to Enable Users to Print PostScript Files in Trusted Extensions
printing in Trusted Extensions, index iconManaging Printing in Trusted Extensions (Task Map)
printing interoperability with Trusted Solaris 8, index iconInteroperability of Trusted Extensions With Trusted Solaris 8 Printing
quick reference for administrators, index iconQuick Reference to Trusted Extensions Administration
remote host database, index iconHow to Assign a Security Template to a Host or a Group of Hosts
remote host templates, index iconHow to Construct a Remote Host Template
remotely, index iconRemote Administration in Trusted Extensions (Tasks)
remotely from command line, index iconHow to Log In Remotely From the Command Line in Trusted Extensions
remotely with dtappsession, index iconHow to Remotely Administer Trusted Extensions With dtappsession
remotely with Solaris Management Console
index iconHow to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
index iconHow to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
routes with security attributes, index iconHow to Configure Routes With Security Attributes
serial line for login, index iconHow to Configure a Serial Line for Logins
sharing file systems, index iconHow to Share Directories From a Labeled Zone
startup files for users, index iconHow to Configure Startup Files for Users in Trusted Extensions
Sun Ray printing, index iconHow to Configure a Network Printer for Sun Ray Clients
system files, index iconHow to Change Security Defaults in System Files
third-party software, index iconSoftware Management in Trusted Extensions (Tasks)
timeout when relabeling information, index iconHow to Lengthen the Timeout When Relabeling Information
trusted network databases, index iconConfiguring Trusted Network Databases (Task Map)
trusted networking, index iconManaging Networks in Trusted Extensions (Tasks)
unlabeled printing, index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
user privileges, index iconHow to Restrict a User's Set of Privileges
users
index iconDecisions to Make Before Creating Users in Trusted Extensions
index iconManaging Users, Rights, and Roles in Trusted Extensions (Tasks)
zones, index iconManaging Zones (Task Map)
zones from Trusted JDS, index iconZone Administration Utilities in Trusted Extensions
Administering Trusted Extensions Remotely (Task Map), index iconAdministering Trusted Extensions Remotely (Task Map)
administrative actions
See also actions
accessing, index iconHow to Edit Administrative Files in Trusted Extensions
in CDE, index iconTrusted CDE Actions
in Trusted_Extensions folder, index iconHow to Start CDE Administrative Actions in Trusted Extensions
list of trusted CDE, index iconTrusted CDE Actions
starting remotely
index iconHow to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
index iconHow to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
trusted, index iconTrusted Processes in the Window System
administrative labels, index iconDominance Relationships Between Labels
administrative roles, See roles
Administrative Roles tool, index iconTrusted Extensions Tools in the Solaris Management Console
administrative tools
accessing, index iconGetting Started as a Trusted Extensions Administrator (Task Map)
commands, index iconCommand Line Tools in Trusted Extensions
description, index iconTrusted Extensions Administration Tools
Device Allocation Manager, index iconDevice Allocation Manager
in Trusted_Extensions folder, index iconHow to Start CDE Administrative Actions in Trusted Extensions
label builder, index iconLabel Builder in Trusted Extensions
Labeled Zone Manager, index icontxzonemgr Script
Solaris Management Console
index iconSolaris Management Console Tools
index iconHow to Administer the Local System With the Solaris Management Console
Trusted CDE actions, index iconTrusted CDE Actions
txzonemgr script, index icontxzonemgr Script
allocate command, index iconCommand Line Tools in Trusted Extensions
Allocate Device authorization
index iconHow to Create a Rights Profile for Convenient Authorizations
index iconDevice Protection With Trusted Extensions Software
index iconHow to Assign Device Authorizations
index iconHow to Assign Device Authorizations
allocate error state, correcting, index iconHow to Revoke or Reclaim a Device in Trusted Extensions
allocating, using Device Allocation Manager, index iconDevice Allocation Manager GUI
applications
evaluating for security, index iconSecurity Administrator Responsibilities for Trusted Programs
installing, index iconManaging Software in Trusted Extensions (Tasks)
trusted and trustworthy, index iconEvaluating Software for Security
assigning
editor as the trusted editor, index iconHow to Assign the Editor of Your Choice as the Trusted Editor
privileges to users, index iconSecurity Attribute Assignment to Users in Trusted Extensions
rights profiles, index iconSecurity Attribute Assignment to Users in Trusted Extensions
Assume Role menu item, index iconHow to Enter the Global Zone in Trusted Extensions
assuming, roles, index iconHow to Enter the Global Zone in Trusted Extensions
atohexlabel command
index iconCommand Line Tools in Trusted Extensions
index iconHow to Obtain the Hexadecimal Equivalent for a Label
audio devices
automatically starting an audio player, index iconHow to Configure an Audio Player Program for Use in Trusted CDE
preventing remote allocation, index iconHow to Protect Nonallocatable Devices in Trusted Extensions
audit_class file, action for editing, index iconTrusted CDE Actions
Audit Classes action, index iconTrusted CDE Actions
audit classes for Trusted Extensions, list of new X audit classes, index iconTrusted Extensions Audit Classes
Audit Control action, index iconTrusted CDE Actions
audit_control file, action for editing, index iconTrusted CDE Actions
audit_event file, index iconTrusted CDE Actions
Audit Events action, index iconTrusted CDE Actions
audit events for Trusted Extensions, list of, index iconTrusted Extensions Audit Events
audit policy in Trusted Extensions, index iconTrusted Extensions Audit Policy Options
audit records in Trusted Extensions, policy, index iconTrusted Extensions Audit Policy Options
Audit Review profile, reviewing audit records, index iconAudit Tasks of the System Administrator
Audit Startup action, index iconTrusted CDE Actions
audit_startup command, action for editing, index iconTrusted CDE Actions
Audit Tasks of the System Administrator, index iconAudit Tasks of the System Administrator
audit tokens for Trusted Extensions
label token, index iconlabel Token
list of, index iconTrusted Extensions Audit Tokens
xatom token, index iconxatom Token
xclient token, index iconxclient Token
xcolormap token, index iconxcolormap Token
xcursor token, index iconxcursor Token
xfont token, index iconxfont Token
xgc token, index iconxgc Token
xpixmap token, index iconxpixmap Token
xproperty token, index iconxproperty Token
xselect token, index iconxselect Token
xwindow token, index iconxwindow Token
auditconfig command, index iconCommand Line Tools in Trusted Extensions
auditing in Trusted Extensions
additional audit events, index iconTrusted Extensions Audit Events
additional audit policies, index iconTrusted Extensions Audit Policy Options
additional audit tokens, index iconTrusted Extensions Audit Tokens
additions to existing auditing commands, index iconExtensions to Auditing Commands in Trusted Extensions
differences from Oracle Solaris auditing, index iconTrusted Extensions and Auditing
reference, index iconTrusted Extensions Auditing (Overview)
roles for administering, index iconAudit Management by Role in Trusted Extensions
security administrator tasks, index iconAudit Tasks of the Security Administrator
system administrator tasks, index iconAudit Tasks of the System Administrator
tasks, index iconAudit Tasks in Trusted Extensions
X audit classes, index iconTrusted Extensions Audit Classes
auditreduce command, index iconCommand Line Tools in Trusted Extensions
authorizations
adding new device authorizations, index iconHow to Create New Device Authorizations
Allocate Device
index iconDevice Protection With Trusted Extensions Software
index iconHow to Assign Device Authorizations
index iconHow to Assign Device Authorizations
assigning, index iconSecurity Attribute Assignment to Users in Trusted Extensions
assigning device authorizations, index iconHow to Assign Device Authorizations
authorizing a user or role to change label, index iconHow to Enable a User to Change the Security Level of Data
Configure Device Attributes, index iconHow to Assign Device Authorizations
convenient for users, index iconHow to Create a Rights Profile for Convenient Authorizations
creating customized device authorizations, index iconHow to Create New Device Authorizations
creating local and remote device authorizations, index iconHow to Create New Device Authorizations
customizing for devices, index iconHow to Add Site-Specific Authorizations to a Device in Trusted Extensions
granted, index iconTrusted Extensions and Access Control
Print PostScript, index iconHow to Enable Users to Print PostScript Files in Trusted Extensions
Print Postscript, index iconPostScript Printing of Security Information
profiles that include device allocation authorizations, index iconHow to Assign Device Authorizations
Revoke or Reclaim Device
index iconHow to Assign Device Authorizations
index iconHow to Assign Device Authorizations
solaris.print.nobanner, index iconHow to Suppress Banner and Trailer Pages for Specific Users
solaris.print.ps, index iconHow to Enable Users to Print PostScript Files in Trusted Extensions
authorizing
device allocation, index iconHow to Assign Device Authorizations
PostScript printing, index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
unlabeled printing, index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
automount command, index iconCommand Line Tools in Trusted Extensions