JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Solaris Trusted Extensions Administrator's Procedures     Oracle Solaris 10 8/11 Information Library
search filter icon
search icon

Document Information

Preface

1.  Trusted Extensions Administration Concepts

2.  Trusted Extensions Administration Tools

3.  Getting Started as a Trusted Extensions Administrator (Tasks)

4.  Security Requirements on a Trusted Extensions System (Overview)

5.  Administering Security Requirements in Trusted Extensions (Tasks)

6.  Users, Rights, and Roles in Trusted Extensions (Overview)

7.  Managing Users, Rights, and Roles in Trusted Extensions (Tasks)

8.  Remote Administration in Trusted Extensions (Tasks)

9.  Trusted Extensions and LDAP (Overview)

10.  Managing Zones in Trusted Extensions (Tasks)

11.  Managing and Mounting Files in Trusted Extensions (Tasks)

12.  Trusted Networking (Overview)

13.  Managing Networks in Trusted Extensions (Tasks)

14.  Multilevel Mail in Trusted Extensions (Overview)

15.  Managing Labeled Printing (Tasks)

16.  Devices in Trusted Extensions (Overview)

17.  Managing Devices for Trusted Extensions (Tasks)

18.  Trusted Extensions Auditing (Overview)

19.  Software Management in Trusted Extensions (Tasks)

A.  Quick Reference to Trusted Extensions Administration

B.  List of Trusted Extensions Man Pages

Index

A

B

C

D

E

F

G

H

I

J

K

L

M

N

O

P

R

S

T

U

V

W

X

Z

R

real UID of root, required for applications, index iconEvaluating Software for Security
Reducing Printing Restrictions in Trusted Extensions (Task Map), index iconReducing Printing Restrictions in Trusted Extensions (Task Map)
regaining control of desktop focus, index iconHow to Regain Control of the Desktop's Current Focus
regular users, See users
relabeling information, index iconHow to Enable a User to Change the Security Level of Data
remote administration
defaults, index iconSecure Remote Administration in Trusted Extensions
methods, index iconMethods for Administering Remote Systems in Trusted Extensions
remote host templates
assigning, index iconConfiguring Trusted Network Databases (Task Map)
assigning to hosts, index iconHow to Assign a Security Template to a Host or a Group of Hosts
creating, index iconHow to Construct a Remote Host Template
tool for administering, index iconSecurity Templates Tool
remote hosts, using fallback mechanism in tnrhdb, index iconTrusted Network Fallback Mechanism
Remote Login authorization, index iconHow to Create a Rights Profile for Convenient Authorizations
remote multilevel desktop, accessing, index iconHow to Use Xvnc to Remotely Access a Trusted Extensions System
removable media, mounting, index iconHow to Add a Software Package in Trusted Extensions
remove_allocatable command, index iconCommand Line Tools in Trusted Extensions
removing, labels on printer output, index iconHow to Remove Labels From Printed Output
repairing, labels in internal databases, index iconHow to Obtain a Readable Label From Its Hexadecimal Form
resolv.conf file, action for editing, index iconTrusted CDE Actions
Restart Zone action, index iconTrusted CDE Actions
restoring control of desktop focus, index iconHow to Regain Control of the Desktop's Current Focus
restricting
access to computer based on label, index iconEffects of Label Range on a Device
access to devices, index iconDevice Protection With Trusted Extensions Software
access to global zone, index iconRole Assumption in Trusted Extensions
access to lower-level files, index iconHow to Disable the Mounting of Lower-Level Files
access to printers with labels, index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
actions by rights profiles, index iconTrusted Processes in the Window System
mounts of lower-level files, index iconHow to Disable the Mounting of Lower-Level Files
printer access with labels, index iconRestricting Access to Printers and Print Job Information in Trusted Extensions
printer label range, index iconHow to Configure a Restricted Label Range for a Printer
remote access, index iconSecure Remote Administration in Trusted Extensions
Revoke or Reclaim Device authorization
index iconHow to Assign Device Authorizations
index iconHow to Assign Device Authorizations
rights, See rights profiles
rights profiles
assigning, index iconSecurity Attribute Assignment to Users in Trusted Extensions
controlling the use of actions, index iconTrusted Processes in the Window System
Convenient Authorizations, index iconHow to Create a Rights Profile for Convenient Authorizations
with Allocate Device authorization, index iconHow to Assign Device Authorizations
with device allocation authorizations, index iconHow to Assign Device Authorizations
with new device authorizations, index iconHow to Create New Device Authorizations
Rights tool, index iconTrusted Extensions Tools in the Solaris Management Console
rmmount.conf file
index iconHow to Configure an Audio Player Program for Use in Trusted CDE
index iconHow to Prevent the File Manager From Displaying After Device Allocation
role workspace, global zone, index iconSecurity Requirements When Administering Trusted Extensions
roles
administering auditing, index iconRole Setup for Audit Administration
administering remotely
index iconHow to Remotely Administer Systems by Using the Solaris Management Console From a Trusted Extensions System
index iconHow to Remotely Administer Systems by Using the Solaris Management Console From an Unlabeled System
assigning rights, index iconSecurity Attribute Assignment to Users in Trusted Extensions
assuming
index iconSecurity Requirements When Administering Trusted Extensions
index iconHow to Enter the Global Zone in Trusted Extensions
creating, index iconRole Creation in Trusted Extensions
leaving role workspace, index iconHow to Exit the Global Zone in Trusted Extensions
remote login, index iconRemote Login by a Role in Trusted Extensions
role assumption from unlabeled host, index iconRemote Role-Based Administration From Unlabeled Hosts
trusted application access, index iconAdministration Tools for Trusted Extensions
workspaces, index iconSecurity Requirements When Administering Trusted Extensions
root UID, required for applications, index iconEvaluating Software for Security
route command
index iconCommand Line Tools in Trusted Extensions
index iconNetwork Commands in Trusted Extensions
routing, index iconOverview of Routing in Trusted Extensions
accreditation checks, index iconTrusted Extensions Accreditation Checks
commands in Trusted Extensions, index iconRouting Commands in Trusted Extensions
concepts, index iconAdministration of Routing in Trusted Extensions
example of, index iconGateways in Trusted Extensions
static with security attributes, index iconHow to Configure Routes With Security Attributes
tables
index iconRouting Table Entries in Trusted Extensions
index iconChoosing Routers in Trusted Extensions
using route command, index iconHow to Configure Routes With Security Attributes